Book description
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits.
Security Power Tools details best practices for:
- Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation
- Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes
- Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux
- Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing
- Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes
- Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg
Publisher resources
Table of contents
- Security Power Tools
- Foreword
- Credits
- Preface
- I. Legal and Ethics
-
II. Reconnaissance
-
2. Network Scanning
- How Scanners Work
- Superuser Privileges
- Three Network Scanners to Consider
- Host Discovery
- Port Scanning
- Specifying Custom Ports
- Specifying Targets to Scan
- Different Scan Types
- Tuning the Scan Speed
- Application Fingerprinting
- Operating System Detection
- Saving Nmap Output
- Resuming Nmap Scans
- Avoiding Detection
- Conclusion
- 3. Vulnerability Scanning
- 4. LAN Reconnaissance
-
5. Wireless Reconnaissance
- Get the Right Wardriving Gear
- 802.11 Network Basics
- 802.11 Frames
- How Wireless Discovery Tools Work
- Netstumbler
- Kismet at a Glance
- Using Kismet
- Sorting the Kismet Network List
- Using Network Groups with Kismet
- Using Kismet to Find Networks by Probe Requests
- Kismet GPS Support Using gpsd
- Looking Closer at Traffic with Kismet
- Capturing Packets and Decrypting Traffic with Kismet
- Wireshark at a Glance
- Using Wireshark
- AirDefense Mobile
- AirMagnet Analyzers
- Other Wardriving Tools
-
6. Custom Packet Generation
- Why Create Custom Packets?
- Scapy
- Packet-Crafting Examples with Scapy
- Packet Mangling with Netfilter
- References
-
2. Network Scanning
-
III. Penetration
- 7. Metasploit
- 8. Wireless Penetration
-
9. Exploitation Framework Applications
- Task Overview
- Core Impact Overview
- Network Reconnaissance with Core Impact
- Core Impact Exploit Search Engine
- Running an Exploit
- Running Macros
- Bouncing Off an Installed Agent
- Enabling an Agent to Survive a Reboot
- Mass Scale Exploitation
- Writing Modules for Core Impact
- The Canvas Exploit Framework
- Porting Exploits Within Canvas
- Using Canvas from the Command Line
- Digging Deeper with Canvas
- Advanced Exploitation with MOSDEF
- Writing Exploits for Canvas
- Exploiting Alternative Tools
- 10. Custom Exploitation
-
IV. Control
-
11. Backdoors
- Choosing a Backdoor
- VNC
- Creating and Packaging a VNC Backdoor
- Connecting to and Removing the VNC Backdoor
- Back Orifice 2000
- Configuring a BO2k Server
- Configuring a BO2k Client
- Adding New Servers to the BO2k Workspace
- Using the BO2k Backdoor
- BO2k Powertools
- Encryption for BO2k Communications
- Concealing the BO2k Protocol
- Removing BO2k
- A Few Unix Backdoors
- 12. Rootkits
-
11. Backdoors
-
V. Defense
- 13. Proactive Defense: Firewalls
- 14. Host Hardening
-
15. Securing Communications
- The SSH-2 Protocol
- SSH Configuration
- SSH Authentication
- SSH Shortcomings
- SSH Troubleshooting
- Remote File Access with SSH
- SSH Advanced Use
- Using SSH Under Windows
- File and Email Signing and Encryption
- GPG
- Create Your GPG Keys
- Encryption and Signature with GPG
- PGP Versus GPG Compatibility
- Encryption and Signature with S/MIME
- Stunnel
- Disk Encryption
- Windows Filesystem Encryption with PGP Disk
- Linux Filesystem Encryption with LUKS
- Conclusion
-
16. Email Security and Anti-Spam
- Norton Antivirus
- The ClamAV Project
- ClamWin
- Freshclam
- Clamscan
- clamd and clamdscan
- ClamAV Virus Signatures
- Procmail
- Basic Procmail Rules
- Advanced Procmail Rules
- ClamAV with Procmail
- Unsolicited Email
- Spam Filtering with Bayesian Filters
- SpamAssassin
- SpamAssassin Rules
- Plug-ins for SpamAssassin
- SpamAssassin with Procmail
- Anti-Phishing Tools
- Conclusion
- 17. Device Security Testing
-
VI. Monitoring
-
18. Network Capture
- tcpdump
- Ethereal/Wireshark
- pcap Utilities: tcpflow and Netdude
- Python/Scapy Script Fixes Checksums
- Conclusion
-
19. Network Monitoring
- Snort
- Implementing Snort
- Honeypot Monitoring
- Gluing the Stuff Together
-
20. Host Monitoring
- Using File Integrity Checkers
- File Integrity Hashing
- The Do-It-Yourself Way with rpmverify
- Comparing File Integrity Checkers
- Prepping the Environment for Samhain and Tripwire
- Database Initialization with Samhain and Tripwire
- Securing the Baseline Storage with Samhain and Tripwire
- Running Filesystem Checks with Samhain and Tripwire
- Managing File Changes and Updating Storage Database with Samhain and Tripwire
- Recognizing Malicious Activity with Samhain and Tripwire
- Log Monitoring with Logwatch
- Improving Logwatch’s Filters
- Host Monitoring in Large Environments with Prelude-IDS
- Conclusion
-
18. Network Capture
-
VII. Discovery
- 21. Forensics
- 22. Application Fuzzing
-
23. Binary Reverse Engineering
- Interactive Disassembler
- Sysinternals
- OllyDbg
- Other Tools
- Index
- About the Authors
- Colophon
- Copyright
Product information
- Title: Security Power Tools
- Author(s):
- Release date: August 2007
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596009632
You might also like
book
Attacking Network Protocols
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug …
book
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 3rd Edition
Through a recent series of breakthroughs, deep learning has boosted the entire field of machine learning. …
book
The Hardware Hacking Handbook
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object …
video
Microsoft Power BI - The Complete Masterclass [2023 EDITION]
Microsoft Power BI is an interactive data visualization software primarily focusing on business intelligence, part of …