Practical Hacking Techniques and Countermeasures

Book description

Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack. This book shows how an attack is conceptualized, formulated and performed. With the VMware Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. It also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. This text provides valuable information for constructing a system to defend against attacks.

Table of contents

  1. Front cover
  2. Preface
  3. Contents (1/2)
  4. Contents (2/2)
  5. Chapter 1. Preparation (1/13)
  6. Chapter 1. Preparation (2/13)
  7. Chapter 1. Preparation (3/13)
  8. Chapter 1. Preparation (4/13)
  9. Chapter 1. Preparation (5/13)
  10. Chapter 1. Preparation (6/13)
  11. Chapter 1. Preparation (7/13)
  12. Chapter 1. Preparation (8/13)
  13. Chapter 1. Preparation (9/13)
  14. Chapter 1. Preparation (10/13)
  15. Chapter 1. Preparation (11/13)
  16. Chapter 1. Preparation (12/13)
  17. Chapter 1. Preparation (13/13)
  18. Chapter 2. Banner Identification (1/5)
  19. Chapter 2. Banner Identification (2/5)
  20. Chapter 2. Banner Identification (3/5)
  21. Chapter 2. Banner Identification (4/5)
  22. Chapter 2. Banner Identification (5/5)
  23. Chapter 3. Target Enumeration (1/12)
  24. Chapter 3. Target Enumeration (2/12)
  25. Chapter 3. Target Enumeration (3/12)
  26. Chapter 3. Target Enumeration (4/12)
  27. Chapter 3. Target Enumeration (5/12)
  28. Chapter 3. Target Enumeration (6/12)
  29. Chapter 3. Target Enumeration (7/12)
  30. Chapter 3. Target Enumeration (8/12)
  31. Chapter 3. Target Enumeration (9/12)
  32. Chapter 3. Target Enumeration (10/12)
  33. Chapter 3. Target Enumeration (11/12)
  34. Chapter 3. Target Enumeration (12/12)
  35. Chapter 4. Scanning (1/10)
  36. Chapter 4. Scanning (2/10)
  37. Chapter 4. Scanning (3/10)
  38. Chapter 4. Scanning (4/10)
  39. Chapter 4. Scanning (5/10)
  40. Chapter 4. Scanning (6/10)
  41. Chapter 4. Scanning (7/10)
  42. Chapter 4. Scanning (8/10)
  43. Chapter 4. Scanning (9/10)
  44. Chapter 4. Scanning (10/10)
  45. Chapter 5. Sniffing Traffic (1/14)
  46. Chapter 5. Sniffing Traffic (2/14)
  47. Chapter 5. Sniffing Traffic (3/14)
  48. Chapter 5. Sniffing Traffic (4/14)
  49. Chapter 5. Sniffing Traffic (5/14)
  50. Chapter 5. Sniffing Traffic (6/14)
  51. Chapter 5. Sniffing Traffic (7/14)
  52. Chapter 5. Sniffing Traffic (8/14)
  53. Chapter 5. Sniffing Traffic (9/14)
  54. Chapter 5. Sniffing Traffic (10/14)
  55. Chapter 5. Sniffing Traffic (11/14)
  56. Chapter 5. Sniffing Traffic (12/14)
  57. Chapter 5. Sniffing Traffic (13/14)
  58. Chapter 5. Sniffing Traffic (14/14)
  59. Chapter 6. Spoofing (1/8)
  60. Chapter 6. Spoofing (2/8)
  61. Chapter 6. Spoofing (3/8)
  62. Chapter 6. Spoofing (4/8)
  63. Chapter 6. Spoofing (5/8)
  64. Chapter 6. Spoofing (6/8)
  65. Chapter 6. Spoofing (7/8)
  66. Chapter 6. Spoofing (8/8)
  67. Chapter 7. Brute Force (1/12)
  68. Chapter 7. Brute Force (2/12)
  69. Chapter 7. Brute Force (3/12)
  70. Chapter 7. Brute Force (4/12)
  71. Chapter 7. Brute Force (5/12)
  72. Chapter 7. Brute Force (6/12)
  73. Chapter 7. Brute Force (7/12)
  74. Chapter 7. Brute Force (8/12)
  75. Chapter 7. Brute Force (9/12)
  76. Chapter 7. Brute Force (10/12)
  77. Chapter 7. Brute Force (11/12)
  78. Chapter 7. Brute Force (12/12)
  79. Chapter 8. Vulnerability Scanning (1/31)
  80. Chapter 8. Vulnerability Scanning (2/31)
  81. Chapter 8. Vulnerability Scanning (3/31)
  82. Chapter 8. Vulnerability Scanning (4/31)
  83. Chapter 8. Vulnerability Scanning (5/31)
  84. Chapter 8. Vulnerability Scanning (6/31)
  85. Chapter 8. Vulnerability Scanning (7/31)
  86. Chapter 8. Vulnerability Scanning (8/31)
  87. Chapter 8. Vulnerability Scanning (9/31)
  88. Chapter 8. Vulnerability Scanning (10/31)
  89. Chapter 8. Vulnerability Scanning (11/31)
  90. Chapter 8. Vulnerability Scanning (12/31)
  91. Chapter 8. Vulnerability Scanning (13/31)
  92. Chapter 8. Vulnerability Scanning (14/31)
  93. Chapter 8. Vulnerability Scanning (15/31)
  94. Chapter 8. Vulnerability Scanning (16/31)
  95. Chapter 8. Vulnerability Scanning (17/31)
  96. Chapter 8. Vulnerability Scanning (18/31)
  97. Chapter 8. Vulnerability Scanning (19/31)
  98. Chapter 8. Vulnerability Scanning (20/31)
  99. Chapter 8. Vulnerability Scanning (21/31)
  100. Chapter 8. Vulnerability Scanning (22/31)
  101. Chapter 8. Vulnerability Scanning (23/31)
  102. Chapter 8. Vulnerability Scanning (24/31)
  103. Chapter 8. Vulnerability Scanning (25/31)
  104. Chapter 8. Vulnerability Scanning (26/31)
  105. Chapter 8. Vulnerability Scanning (27/31)
  106. Chapter 8. Vulnerability Scanning (28/31)
  107. Chapter 8. Vulnerability Scanning (29/31)
  108. Chapter 8. Vulnerability Scanning (30/31)
  109. Chapter 8. Vulnerability Scanning (31/31)
  110. Chapter 9. Wireless (1/19)
  111. Chapter 9. Wireless (2/19)
  112. Chapter 9. Wireless (3/19)
  113. Chapter 9. Wireless (4/19)
  114. Chapter 9. Wireless (5/19)
  115. Chapter 9. Wireless (6/19)
  116. Chapter 9. Wireless (7/19)
  117. Chapter 9. Wireless (8/19)
  118. Chapter 9. Wireless (9/19)
  119. Chapter 9. Wireless (10/19)
  120. Chapter 9. Wireless (11/19)
  121. Chapter 9. Wireless (12/19)
  122. Chapter 9. Wireless (13/19)
  123. Chapter 9. Wireless (14/19)
  124. Chapter 9. Wireless (15/19)
  125. Chapter 9. Wireless (16/19)
  126. Chapter 9. Wireless (17/19)
  127. Chapter 9. Wireless (18/19)
  128. Chapter 9. Wireless (19/19)
  129. Chapter 10. Redirection (1/8)
  130. Chapter 10. Redirection (2/8)
  131. Chapter 10. Redirection (3/8)
  132. Chapter 10. Redirection (4/8)
  133. Chapter 10. Redirection (5/8)
  134. Chapter 10. Redirection (6/8)
  135. Chapter 10. Redirection (7/8)
  136. Chapter 10. Redirection (8/8)
  137. Chapter 11. Denial-of-Service (DoS) (1/6)
  138. Chapter 11. Denial-of-Service (DoS) (2/6)
  139. Chapter 11. Denial-of-Service (DoS) (3/6)
  140. Chapter 11. Denial-of-Service (DoS) (4/6)
  141. Chapter 11. Denial-of-Service (DoS) (5/6)
  142. Chapter 11. Denial-of-Service (DoS) (6/6)
  143. Appendix A. References
  144. Appendix B. Tool Syntax (1/10)
  145. Appendix B. Tool Syntax (2/10)
  146. Appendix B. Tool Syntax (3/10)
  147. Appendix B. Tool Syntax (4/10)
  148. Appendix B. Tool Syntax (5/10)
  149. Appendix B. Tool Syntax (6/10)
  150. Appendix B. Tool Syntax (7/10)
  151. Appendix B. Tool Syntax (8/10)
  152. Appendix B. Tool Syntax (9/10)
  153. Appendix B. Tool Syntax (10/10)
  154. Index (1/3)
  155. Index (2/3)
  156. Index (3/3)
  157. Back cover

Product information

  • Title: Practical Hacking Techniques and Countermeasures
  • Author(s): Mark D. Spivey
  • Release date: November 2006
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420013382