Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
暫譯: 破解堆疊:使用 Snort 和 Ethereal 精通不安全網路的 8 層
Michael Gregg, Stephen Watkins, George Mays, Chris Ries, Ronald M. Bandes, Brandon Franklin
- 出版商: Syngress Media
- 出版日期: 2006-12-27
- 售價: $1,650
- 貴賓價: 9.5 折 $1,568
- 語言: 英文
- 頁數: 481
- 裝訂: Paperback
- ISBN: 1597491098
- ISBN-13: 9781597491099
-
相關分類:
資訊安全、駭客 Hack
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$600$600 -
$600$600 -
$600$600 -
$580$458 -
$380$300 -
$820$648 -
$350$277 -
$880$695 -
$650$514 -
$780$741 -
$600$474 -
$650$507 -
$1,500$1,425 -
$690$538 -
$620$527 -
$420$412 -
$680$578 -
$580$493 -
$580$493 -
$2,270$2,157 -
$1,872Continuous Integration: Improving Software Quality and Reducing Risk (Paperback)
-
$740$703 -
$2,400$2,280 -
$380$300 -
$890$757
相關主題
商品描述
A Unique and Refreshing Look at Network Security
The first thing many people think of when they hear the word hack is some type of malicious activity. Although some hacks are malicious, many are not. Nonmalicious hacks are about exploring the details of programmable systems and learning how they really work. They are explored by those who want to understand every detail of a system and how to stretch the capabilities of these systems beyond what they were originally designed to do.
Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.
• Extend OSI to Network Security: Use the well-known Open Systems Interconnect (OSI) model to see security topics in a new way.
• Defend the Physical Layer: Learn ways to avoid the loss of physical security, which can result in total exposure.
• Attack and Defend the Data Link Layer: Examine methods like ARP spoofing, MAC flooding, and using honeytokens.
• Understand IP Attacks: Learn how spoofing and evasion tasks can undermine the network layer.
• Detect Scans on Your Network: Understand port scanning techniques and utilities such as Scanrand, Wireshark, and Nmap.
• Avoid the Effects of Session Hijacking: See how Ettercap can be used for both malicious activity and to protect the session layer.
• Protect the Confidentiality of a Transaction: Use protocols such as IPSec to secure communications between two hosts.
• Analyze DNS and Its Weaknesses: See how DNS is susceptible to attacks that could lead to DoS or provide attackers with information.
• Make the Case for Stronger Security: Perform asset identification and valuation procedures.
商品描述(中文翻譯)
獨特且新穎的網路安全觀點
許多人聽到「駭客」這個詞時,首先想到的就是某種惡意活動。雖然有些駭客行為確實是惡意的,但許多並非如此。非惡意的駭客行為是關於探索可程式系統的細節,並學習它們實際上是如何運作的。這些行為是由那些希望了解系統每個細節並如何將這些系統的能力擴展到超出其原始設計範圍的人所探索的。
《駭客堆疊》是為那些希望更好地理解和深入了解 TCP/IP 系統實際運作方式的人所撰寫的。這種知識使安全專業人員能夠使網路更加安全。
• 擴展 OSI 到網路安全:使用眾所周知的開放系統互連(OSI)模型,以新的方式看待安全主題。
• 防禦物理層:學習避免物理安全損失的方法,這可能導致完全暴露。
• 攻擊和防禦資料鏈路層:檢視像 ARP 欺騙、MAC 洪水攻擊和使用蜜罐(honeytokens)等方法。
• 理解 IP 攻擊:學習如何欺騙和逃避任務可能會破壞網路層。
• 偵測網路上的掃描:了解端口掃描技術和工具,如 Scanrand、Wireshark 和 Nmap。
• 避免會話劫持的影響:了解如何使用 Ettercap 進行惡意活動和保護會話層。
• 保護交易的機密性:使用如 IPSec 的協議來保護兩個主機之間的通信。
• 分析 DNS 及其弱點:了解 DNS 如何容易受到攻擊,這可能導致拒絕服務(DoS)或提供攻擊者信息。
• 提出加強安全性的理由:執行資產識別和評估程序。