Network Security: A Hacker's Perspective
by FADIARent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
| Introduction | p. xvii |
| IP Addresses: Your Identity on the Internet | p. 1 |
| IP Addresses Torn Apart | p. 2 |
| The Various Forms of IP Addresses | p. 5 |
| Subnet Addressing Torn Apart | p. 12 |
| Netmask Values | p. 14 |
| Subnet Mask Explained | p. 15 |
| Special-Case IP Addresses | p. 17 |
| Obtaining the IP Address of a Remote System | p. 18 |
| Obtaining the IP Address of a Person Through Instant-Messaging Software | p. 18 |
| Getting the IP Address of a Person Visiting Your Web Site | p. 23 |
| Obtaining IP Addresses by Studying Email Headers | p. 34 |
| Getting an IP Address Via IRC | p. 36 |
| Netstat Made Easy | p. 39 |
| @netstat -a | p. 40 |
| @netstat -n | p. 42 |
| @netstat -p | p. 42 |
| @netstat -e | p. 43 |
| @netstat -r | p. 44 |
| Closing Open Holes | p. 45 |
| Open Ports: A Threat to Security? | p. 45 |
| Firewalls | p. 48 |
| Proxy Servers Torn Apart | p. 51 |
| Using Wingate | p. 52 |
| Squid | p. 54 |
| Gathering Information | p. 57 |
| Port Scanning Unscanned | p. 59 |
| Port Scanning TCP Ports | p. 59 |
| Types of TCP Port Scans | p. 60 |
| Port-Scanning UDP Ports | p. 77 |
| FTP Bounce Port Scanning | p. 78 |
| Using Port Scanners to Obtain Information about the Target System | p. 82 |
| General Countermeasures Against Port Scanning | p. 85 |
| Daemon-Banner Grabbing and Exploiting Open Ports | p. 86 |
| Using the FTP Port to Determine a System's OS | p. 86 |
| Using the HTTP Port to Obtain a Web Server's Name | p. 90 |
| Using the Identification Protocol (Port 113) to Gather Information about the Remote System | p. 93 |
| Exploiting the SMTP Port | p. 94 |
| General Countermeasures Against Port Exploitation | p. 95 |
| ICMP Messages Torn Apart | p. 95 |
| Main Errors and Sub-errors | p. 96 |
| Using ICMP Error Messages to Gather Information about the Remote Host | p. 98 |
| Remote OS Detection with ICMP Messages | p. 105 |
| Using ICMP Error Messages to Detect Filtering Devices and Firewalls | p. 109 |
| Ping Unpinged | p. 111 |
| How Ping Works | p. 111 |
| Detecting a Ping Session | p. 113 |
| Countermeasures | p. 114 |
| Tracing the Traceroute | p. 115 |
| Traceroute: A Look under the Hood | p. 116 |
| Traceroute Breeds | p. 118 |
| Traceroute's Uses | p. 120 |
| Anonymous Tracerouting | p. 128 |
| Countermeasures | p. 129 |
| Fingerprinting Techniques | p. 130 |
| Using Active fingerprinting to Determine the OS of a Remote System | p. 130 |
| Using Passive Fingerprinting to Determine the OS of a Remote System | p. 132 |
| Countermeasures | p. 136 |
| Sniffers Torn Apart | p. 136 |
| Protocol Analysis: Studying and Analyzing Sniffed Packets | p. 139 |
| Coding Your Own Sniffer in C | p. 143 |
| Countermeasures | p. 145 |
| Getting Information about a Remote System's Routing Tables | p. 145 |
| Unix Routing Tables | p. 146 |
| Windows Routing Tables | p. 151 |
| Getting Information about a Remote Router | p. 154 |
| Using Email Headers to Determine the OS of a Remote System | p. 158 |
| Obtaining Geographical Information about a Remote System | p. 159 |
| Under Attack!!! | p. 165 |
| DOS Attacked!!! | p. 166 |
| Ping of Death | p. 167 |
| Teardrop Attacks | p. 167 |
| SYN-Flood Attacks | p. 169 |
| Land Attacks | p. 172 |
| Smurf Attacks | p. 173 |
| UDP-Flood Attacks | p. 173 |
| Distributed DOS Attacks | p. 174 |
| Modem-Disconnect Attacks | p. 174 |
| IP Spoofing Torn Apart | p. 187 |
| IP Spoofing: How It Works | p. 188 |
| Problems with IP Spoofing | p. 188 |
| Networking Basics Involved in IP Spoofing | p. 189 |
| Spoofing Your IP Address to Exploit Tru st Relationships | p. 195 |
| Countermeasures | p. 198 |
| TCP Wrappers Unwrapped | p. 198 |
| TCP Wrappers: How They Work | p. 199 |
| Configuring TCP Wrappers | p. 200 |
| Attacks on Password Files | p. 203 |
| Getting the NT Administrator Password | p. 203 |
| Attacks on the *nix Password File | p. 207 |
| Removing Footprints from a Remote System | p. 215 |
| Removing Footprints from a Unix System | p. 215 |
| Removing Footprints from a Windows NT System | p. 225 |
| Trojan Attacks | p. 225 |
| Trojans: How They Work | p. 226 |
| Detecting Trojans | p. 228 |
| Countermeasures | p. 229 |
| Securing Your Systems | p. 230 |
| Securing a Standalone Home System | p. 230 |
| Securing a System Acting as a Server | p. 232 |
| Secure Protocols, Encryption Algorithms, and File Security | p. 235 |
| Secure Sockets Layer (SSL) Torn Apart | p. 236 |
| Determining Whether Your Connection Is Secure | p. 237 |
| SSL: How It Works | p. 237 |
| Cracking SSL | p. 240 |
| Kerberos Torn Apart | p. 248 |
| Kerberos: How It Works | p. 250 |
| Determining Whether Your ISP Is Running Kerberos | p. 253 |
| Encryption Algorithms Torn Apart | p. 256 |
| The RSA Encryption Algorithm | p. 257 |
| The Blowfish Encryption Algorithm | p. 260 |
| Data Encryption Standard (DES) Algorithm | p. 272 |
| The RC4 Cipher | p. 286 |
| The MD5 Hash Algorithm | p. 289 |
| XOR | p. 290 |
| Base64 Encoding Torn Apart | p. 291 |
| Base64 Encoding: How It Works | p. 292 |
| Decoding Base64 Encoding | p. 295 |
| Coding Your Own Base64 Encoder/Decoder | p. 295 |
| Securing Files on Your Hard Disk | p. 301 |
| The Windows Policy Editor | p. 301 |
| File-Security Software | p. 302 |
| Encryption for Masses (E4M) | p. 303 |
| Securing Data by Encrypting NTFS Partitions | p. 304 |
| Well-Known Port Numbers | p. 305 |
| Country Codes | p. 309 |
| Trojan Port Numbers | p. 315 |
| Protocol Numbers List | p. 323 |
| Bibliography | p. 327 |
| Index | p. 329 |
| Table of Contents provided by Rittenhouse. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.