Book description
Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to implement appropriate network security solutions within a laboratory environment. Topics covered include CAM table poisoning attacks on network switches, ARP cache poisoning attacks, the detection and prevention of abnormal ARP traffic, network traffic sniffing and the detection of NICs running in promiscuous mode, and IP-based DoS attacks. It also examines reconnaissance traffic, network traffic filtering and inspection, and IPsec VPN security solution protocols, standards, types, and deployments.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/4)
- Contents (2/4)
- Contents (3/4)
- Contents (4/4)
- Introduction (1/2)
- Introduction (2/2)
- Chapter 1 - Switch’s CAM Table Poisoning Attack (1/4)
- Chapter 1 - Switch’s CAM Table Poisoning Attack (2/4)
- Chapter 1 - Switch’s CAM Table Poisoning Attack (3/4)
- Chapter 1 - Switch’s CAM Table Poisoning Attack (4/4)
- Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (1/6)
- Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (2/6)
- Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (3/6)
- Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (4/6)
- Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (5/6)
- Chapter 2 - ARP Cache Poisoning-Based MiM and DoS Attacks (6/6)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (1/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (2/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (3/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (4/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (5/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (6/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (7/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (8/9)
- Chapter 3 - Abnormal ARP Traffic Detection and Prevention (9/9)
- Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (1/6)
- Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (2/6)
- Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (3/6)
- Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (4/6)
- Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (5/6)
- Chapter 4 - Network Traffic Sniffing and Promiscuous Mode Detection (6/6)
- Chapter 5 - IP-Based Denial-of-Service Attacks (1/7)
- Chapter 5 - IP-Based Denial-of-Service Attacks (2/7)
- Chapter 5 - IP-Based Denial-of-Service Attacks (3/7)
- Chapter 5 - IP-Based Denial-of-Service Attacks (4/7)
- Chapter 5 - IP-Based Denial-of-Service Attacks (5/7)
- Chapter 5 - IP-Based Denial-of-Service Attacks (6/7)
- Chapter 5 - IP-Based Denial-of-Service Attacks (7/7)
- Chapter 6 - Reconnaissance Traffic (1/6)
- Chapter 6 - Reconnaissance Traffic (2/6)
- Chapter 6 - Reconnaissance Traffic (3/6)
- Chapter 6 - Reconnaissance Traffic (4/6)
- Chapter 6 - Reconnaissance Traffic (5/6)
- Chapter 6 - Reconnaissance Traffic (6/6)
- Chapter 7 - Packet Filtering and Inspection (1/19)
- Chapter 7 - Packet Filtering and Inspection (2/19)
- Chapter 7 - Packet Filtering and Inspection (3/19)
- Chapter 7 - Packet Filtering and Inspection (4/19)
- Chapter 7 - Packet Filtering and Inspection (5/19)
- Chapter 7 - Packet Filtering and Inspection (6/19)
- Chapter 7 - Packet Filtering and Inspection (7/19)
- Chapter 7 - Packet Filtering and Inspection (8/19)
- Chapter 7 - Packet Filtering and Inspection (9/19)
- Chapter 7 - Packet Filtering and Inspection (10/19)
- Chapter 7 - Packet Filtering and Inspection (11/19)
- Chapter 7 - Packet Filtering and Inspection (12/19)
- Chapter 7 - Packet Filtering and Inspection (13/19)
- Chapter 7 - Packet Filtering and Inspection (14/19)
- Chapter 7 - Packet Filtering and Inspection (15/19)
- Chapter 7 - Packet Filtering and Inspection (16/19)
- Chapter 7 - Packet Filtering and Inspection (17/19)
- Chapter 7 - Packet Filtering and Inspection (18/19)
- Chapter 7 - Packet Filtering and Inspection (19/19)
- Chapter 8 - Router Security (1/11)
- Chapter 8 - Router Security (2/11)
- Chapter 8 - Router Security (3/11)
- Chapter 8 - Router Security (4/11)
- Chapter 8 - Router Security (5/11)
- Chapter 8 - Router Security (6/11)
- Chapter 8 - Router Security (7/11)
- Chapter 8 - Router Security (8/11)
- Chapter 8 - Router Security (9/11)
- Chapter 8 - Router Security (10/11)
- Chapter 8 - Router Security (11/11)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (1/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (2/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (3/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (4/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (5/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (6/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (7/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (8/9)
- Chapter 9 - Site-to-Site VPN Tunnel Implementation against Eavesdropping Attacks (9/9)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (1/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (2/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (3/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (4/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (5/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (6/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (7/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (8/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (9/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (10/11)
- Chapter 10 - Remote Access VPN Tunnel Implementation against Eavesdropping Attacks (11/11)
- Back Cover
Product information
- Title: Network Attacks and Defenses
- Author(s):
- Release date: October 2012
- Publisher(s): Auerbach Publications
- ISBN: 9781466517974
You might also like
book
Network Attacks and Exploitation
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides …
book
Seven Deadliest Network Attacks
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, …
book
Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security Most …
book
Network Vulnerability Assessment
Build a network security threat model with this comprehensive learning guide Key Features Develop a network …