Book description
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack. This book shows how an attack is conceptualized, formulated and performed. With the VMware Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. It also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. This text provides valuable information for constructing a system to defend against attacks.
Table of contents
- Front cover
- Preface
- Contents (1/2)
- Contents (2/2)
- Chapter 1. Preparation (1/13)
- Chapter 1. Preparation (2/13)
- Chapter 1. Preparation (3/13)
- Chapter 1. Preparation (4/13)
- Chapter 1. Preparation (5/13)
- Chapter 1. Preparation (6/13)
- Chapter 1. Preparation (7/13)
- Chapter 1. Preparation (8/13)
- Chapter 1. Preparation (9/13)
- Chapter 1. Preparation (10/13)
- Chapter 1. Preparation (11/13)
- Chapter 1. Preparation (12/13)
- Chapter 1. Preparation (13/13)
- Chapter 2. Banner Identification (1/5)
- Chapter 2. Banner Identification (2/5)
- Chapter 2. Banner Identification (3/5)
- Chapter 2. Banner Identification (4/5)
- Chapter 2. Banner Identification (5/5)
- Chapter 3. Target Enumeration (1/12)
- Chapter 3. Target Enumeration (2/12)
- Chapter 3. Target Enumeration (3/12)
- Chapter 3. Target Enumeration (4/12)
- Chapter 3. Target Enumeration (5/12)
- Chapter 3. Target Enumeration (6/12)
- Chapter 3. Target Enumeration (7/12)
- Chapter 3. Target Enumeration (8/12)
- Chapter 3. Target Enumeration (9/12)
- Chapter 3. Target Enumeration (10/12)
- Chapter 3. Target Enumeration (11/12)
- Chapter 3. Target Enumeration (12/12)
- Chapter 4. Scanning (1/10)
- Chapter 4. Scanning (2/10)
- Chapter 4. Scanning (3/10)
- Chapter 4. Scanning (4/10)
- Chapter 4. Scanning (5/10)
- Chapter 4. Scanning (6/10)
- Chapter 4. Scanning (7/10)
- Chapter 4. Scanning (8/10)
- Chapter 4. Scanning (9/10)
- Chapter 4. Scanning (10/10)
- Chapter 5. Sniffing Traffic (1/14)
- Chapter 5. Sniffing Traffic (2/14)
- Chapter 5. Sniffing Traffic (3/14)
- Chapter 5. Sniffing Traffic (4/14)
- Chapter 5. Sniffing Traffic (5/14)
- Chapter 5. Sniffing Traffic (6/14)
- Chapter 5. Sniffing Traffic (7/14)
- Chapter 5. Sniffing Traffic (8/14)
- Chapter 5. Sniffing Traffic (9/14)
- Chapter 5. Sniffing Traffic (10/14)
- Chapter 5. Sniffing Traffic (11/14)
- Chapter 5. Sniffing Traffic (12/14)
- Chapter 5. Sniffing Traffic (13/14)
- Chapter 5. Sniffing Traffic (14/14)
- Chapter 6. Spoofing (1/8)
- Chapter 6. Spoofing (2/8)
- Chapter 6. Spoofing (3/8)
- Chapter 6. Spoofing (4/8)
- Chapter 6. Spoofing (5/8)
- Chapter 6. Spoofing (6/8)
- Chapter 6. Spoofing (7/8)
- Chapter 6. Spoofing (8/8)
- Chapter 7. Brute Force (1/12)
- Chapter 7. Brute Force (2/12)
- Chapter 7. Brute Force (3/12)
- Chapter 7. Brute Force (4/12)
- Chapter 7. Brute Force (5/12)
- Chapter 7. Brute Force (6/12)
- Chapter 7. Brute Force (7/12)
- Chapter 7. Brute Force (8/12)
- Chapter 7. Brute Force (9/12)
- Chapter 7. Brute Force (10/12)
- Chapter 7. Brute Force (11/12)
- Chapter 7. Brute Force (12/12)
- Chapter 8. Vulnerability Scanning (1/31)
- Chapter 8. Vulnerability Scanning (2/31)
- Chapter 8. Vulnerability Scanning (3/31)
- Chapter 8. Vulnerability Scanning (4/31)
- Chapter 8. Vulnerability Scanning (5/31)
- Chapter 8. Vulnerability Scanning (6/31)
- Chapter 8. Vulnerability Scanning (7/31)
- Chapter 8. Vulnerability Scanning (8/31)
- Chapter 8. Vulnerability Scanning (9/31)
- Chapter 8. Vulnerability Scanning (10/31)
- Chapter 8. Vulnerability Scanning (11/31)
- Chapter 8. Vulnerability Scanning (12/31)
- Chapter 8. Vulnerability Scanning (13/31)
- Chapter 8. Vulnerability Scanning (14/31)
- Chapter 8. Vulnerability Scanning (15/31)
- Chapter 8. Vulnerability Scanning (16/31)
- Chapter 8. Vulnerability Scanning (17/31)
- Chapter 8. Vulnerability Scanning (18/31)
- Chapter 8. Vulnerability Scanning (19/31)
- Chapter 8. Vulnerability Scanning (20/31)
- Chapter 8. Vulnerability Scanning (21/31)
- Chapter 8. Vulnerability Scanning (22/31)
- Chapter 8. Vulnerability Scanning (23/31)
- Chapter 8. Vulnerability Scanning (24/31)
- Chapter 8. Vulnerability Scanning (25/31)
- Chapter 8. Vulnerability Scanning (26/31)
- Chapter 8. Vulnerability Scanning (27/31)
- Chapter 8. Vulnerability Scanning (28/31)
- Chapter 8. Vulnerability Scanning (29/31)
- Chapter 8. Vulnerability Scanning (30/31)
- Chapter 8. Vulnerability Scanning (31/31)
- Chapter 9. Wireless (1/19)
- Chapter 9. Wireless (2/19)
- Chapter 9. Wireless (3/19)
- Chapter 9. Wireless (4/19)
- Chapter 9. Wireless (5/19)
- Chapter 9. Wireless (6/19)
- Chapter 9. Wireless (7/19)
- Chapter 9. Wireless (8/19)
- Chapter 9. Wireless (9/19)
- Chapter 9. Wireless (10/19)
- Chapter 9. Wireless (11/19)
- Chapter 9. Wireless (12/19)
- Chapter 9. Wireless (13/19)
- Chapter 9. Wireless (14/19)
- Chapter 9. Wireless (15/19)
- Chapter 9. Wireless (16/19)
- Chapter 9. Wireless (17/19)
- Chapter 9. Wireless (18/19)
- Chapter 9. Wireless (19/19)
- Chapter 10. Redirection (1/8)
- Chapter 10. Redirection (2/8)
- Chapter 10. Redirection (3/8)
- Chapter 10. Redirection (4/8)
- Chapter 10. Redirection (5/8)
- Chapter 10. Redirection (6/8)
- Chapter 10. Redirection (7/8)
- Chapter 10. Redirection (8/8)
- Chapter 11. Denial-of-Service (DoS) (1/6)
- Chapter 11. Denial-of-Service (DoS) (2/6)
- Chapter 11. Denial-of-Service (DoS) (3/6)
- Chapter 11. Denial-of-Service (DoS) (4/6)
- Chapter 11. Denial-of-Service (DoS) (5/6)
- Chapter 11. Denial-of-Service (DoS) (6/6)
- Appendix A. References
- Appendix B. Tool Syntax (1/10)
- Appendix B. Tool Syntax (2/10)
- Appendix B. Tool Syntax (3/10)
- Appendix B. Tool Syntax (4/10)
- Appendix B. Tool Syntax (5/10)
- Appendix B. Tool Syntax (6/10)
- Appendix B. Tool Syntax (7/10)
- Appendix B. Tool Syntax (8/10)
- Appendix B. Tool Syntax (9/10)
- Appendix B. Tool Syntax (10/10)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: Practical Hacking Techniques and Countermeasures
- Author(s):
- Release date: November 2006
- Publisher(s): Auerbach Publications
- ISBN: 9781420013382
You might also like
book
The Web Application Hacker's Handbook, 2nd Edition
The highly successful security book returns with a new edition, completely updated Web applications are the …
book
Learn Kali Linux 2019
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
Social Engineering, 2nd Edition
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking …