Book description
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.
Table of contents
- Copyright
- About the Author
- About the Technical Reviewers
- Acknowledgments
- Tell Us What You Think
- Introduction
- Introduction
- How and Why Hackers Do It
- Information Gathering
- Spoofing
- Session Hijacking
-
Denial of Service Attacks
- What Is a Denial of Service Attack?
- What Is a Distributed Denial of Service Attack?
- Why Are They Difficult to Protect Against?
- Types of Denial of Service Attacks
- Tools for Running DOS Attacks
- Tools for Running DDOS Attacks
- Preventing Denial of Service Attacks
- Preventing Distributed Denial of Service Attacks
- Summary
- Buffer Overflow Attacks
- Password Security
- Microsoft NT Password Crackers
- UNIX Password Crackers
- Fundamentals of Microsoft NT
- Specific Exploits for NT
- Fundamentals of UNIX
- Specific Exploits for UNIX
- Preserving Access
- Covering the Tracks
- Other Types of Attacks
- SANS Top 10
- Putting It All Together
- Summary
- References
Product information
- Title: Hackers Beware
- Author(s):
- Release date: August 2001
- Publisher(s): Sams
- ISBN: 0735710090
You might also like
book
Becoming the Hacker
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and …
book
An Introduction to Hacking and Crimeware
Defend your business, protect your livelihood, safeguard your future. Cybercrime is on the rise. Unchecked, it …
book
Gray Hat Hacking, Second Edition, 2nd Edition
"A fantastic book for anyone looking to learn the tools and techniques needed to break in …
book
Metasploit
"The best guide to the Metasploit Framework."HD Moore, Founder of the Metasploit Project The Metasploit Framework …