Hacking Techniques in Wired Networks
Qijun Gu, Peng Liu, and Chao-Hsien Chu, Pennsylvania State University
Classifications of Hacking Toolkits
Attacks against the Internet Infrastructure
Attacks against End Systems of the Internet
Attacks against Enterprise Network Systems
Attacks against Private Networks
Attacks against Private Networks with Web Service
Attacks against Firewalls and Virtual Private Networks
INTRODUCTION
Nowadays, wired networks, especially the Internet, have already become a platform to support not only high-speed data communication, but also powerful distributed computing for a variety of personal and business processes every day. However, the principles for designing and developing a network mainly targeted at providing connection and communication capabilities, until a series of security “disasters” happened on the Internet recently as shown in Figure 1. As a result, without making security an inherent part of the network design and development process, existing networks are very vulnerable to cyber-attacks because of various security vulnerabilities. Such vulnerabilities, when being exploited by the hacker, can motivate the development of a variety of hacking techniques. ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.