Book description
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup.If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start?Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed.This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.
Publisher resources
Table of contents
- A Note Regarding Supplemental Files
- Foreword
- Preface
- 1. Network Security Assessment
- 2. The Tools Required
- 3. Internet Host and Network Enumeration
-
4. IP Network Scanning
- 4.1. ICMP Probing
- 4.2. TCP Port Scanning
- 4.3. UDP Port Scanning
- 4.4. IDS Evasion and Filter Circumvention
- 4.5. Low-Level IP Assessment
- 4.6. Network Scanning Recap
- 4.7. Network Scanning Countermeasures
-
5. Assessing Remote Information Services
- 5.1. Remote Information Services
- 5.2. systat and netstat
- 5.3. DNS
- 5.4. finger
- 5.5. auth
- 5.6. SNMP
- 5.7. LDAP
- 5.8. rwho
- 5.9. RPC rusers
- 5.10. Remote Information Services Countermeasures
-
6. Assessing Web Services
- 6.1. Web Services
- 6.2. Identifying the Web Service
- 6.3. Identifying Subsystems and Components
-
6.4. Investigating Web Service Vulnerabilities
- 6.4.1. The Tools
- 6.4.2. Security Web Sites and Mailing Lists
-
6.4.3. Microsoft IIS Vulnerabilities
- 6.4.3.1. IIS ASP sample scripts and tools
- 6.4.3.2. HTR (ISM.DLL) extension exposures
- 6.4.3.3. HTW (WEBHITS.DLL) extension exposures
- 6.4.3.4. IIS Unicode exploit
- 6.4.3.5. PRINTER (MSW3PRT.DLL) extension overflow
- 6.4.3.6. IDA (IDQ.DLL) extension overflow
- 6.4.3.7. IIS WebDAV vulnerability
- 6.4.3.8. Microsoft FrontPage exposures
- 6.4.3.9. Poorly configured IIS permissions
- 6.4.4. Apache Vulnerabilities
- 6.4.5. OpenSSL Vulnerabilities
- 6.4.6. HTTP Proxy Component Exposures
- 6.5. Accessing Poorly Protected Information
- 6.6. Assessing CGI Scripts and Custom ASP Pages
- 6.7. Web Services Countermeasures
-
7. Assessing Remote Maintenance Services
- 7.1. Remote Maintenance Services
- 7.2. SSH
- 7.3. Telnet
- 7.4. R-Services
- 7.5. X Windows
- 7.6. Microsoft Remote Desktop Protocol
- 7.7. VNC
- 7.8. Citrix
- 7.9. Remote Maintenance Services Countermeasures
-
8. Assessing FTP and Database Services
- 8.1. FTP
- 8.2. FTP Banner Grabbing and Enumeration
- 8.3. FTP Brute-Force Password Guessing
- 8.4. FTP Bounce Attacks
- 8.5. Circumventing Stateful Filters Using FTP
- 8.6. FTP Process Manipulation Attacks
- 8.7. FTP Services Countermeasures
- 8.8. Database Services
- 8.9. Microsoft SQL Server
- 8.10. Oracle
- 8.11. MySQL
- 8.12. Database Services Countermeasures
-
9. Assessing Windows Networking Services
- 9.1. Microsoft Windows Networking Services
- 9.2. Microsoft RPC Services
- 9.3. The NetBIOS Name Service
- 9.4. The NetBIOS Datagram Service
- 9.5. The NetBIOS Session Service
- 9.6. The CIFS Service
- 9.7. Unix Samba Vulnerabilities
- 9.8. Windows Networking Services Countermeasures
- 10. Assessing Email Services
-
11. Assessing IP VPN Services
- 11.1. IPsec VPNs
- 11.2. Attacking IPsec VPNs
- 11.3. Check Point VPN Security Issues
- 11.4. Microsoft PPTP
- 11.5. VPN Services Countermeasures
-
12. Assessing Unix RPC Services
- 12.1. Enumerating Unix RPC Services
-
12.2. RPC Service Vulnerabilities
- 12.2.1. Abusing rpc.mountd (100005)
- 12.2.2. Multiple Vendor rpc.statd (100024) Vulnerabilities
- 12.2.3. Solaris rpc.sadmind (100232) Vulnerabilities
- 12.2.4. Solaris rpc.cachefsd (100235) Vulnerability
- 12.2.5. Solaris rpc.snmpXdmid (100249) Vulnerability
- 12.2.6. Multiple Vendor rpc.cmsd (100068) Vulnerabilities
- 12.2.7. Multiple Vendor rpc.ttdbserverd (100083) Vulnerability
- 12.3. Unix RPC Services Countermeasures
-
13. Application-Level Risks
- 13.1. The Fundamental Hacking Concept
- 13.2. The Reasons Why Software Is Vulnerable
- 13.3. Network Service Vulnerabilities and Attacks
- 13.4. Classic Buffer-Overflow Vulnerabilities
- 13.5. Heap Overflows
- 13.6. Integer Overflows
- 13.7. Format String Bugs
- 13.8. Memory Manipulation Attacks Recap
- 13.9. Mitigating Process Manipulation Risks
- 13.10. Recommended Secure Development Reading
-
14. Example Assessment Methodology
- 14.1. Network Scanning
- 14.2. Accessible Network Service Identification
- 14.3. Investigation of Known Vulnerabilities
- 14.4. Network Service Testing
- 14.5. Methodology Flow Diagram
- 14.6. Recommendations
- 14.7. Closing Comments
- A. TCP, UDP Ports, and ICMP Message Types
- B. Sources of Vulnerability Information
- Index
- Colophon
- Copyright
Product information
- Title: Network Security Assessment
- Author(s):
- Release date: March 2004
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596006112
You might also like
book
Network Security Assessment, 2nd Edition
How secure is your network? The best way to find out is to attack it. Network …
book
Network Vulnerability Assessment
Build a network security threat model with this comprehensive learning guide Key Features Develop a network …
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …