|
|
libcats.org
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure NetworkMichael GreggRemember the first time someone told you about the OSI model and described the various layers? It's probably something you never forgot. This book takes that same layered approach but applies it to network security in a new and refreshing way. It guides readers step-by-step through the stack starting with physical security and working its way up through each of the seven OSI layers. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer. It's called the people layer. It's included because security is not just about technology it also requires interaction with people, policy and office politics.This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Только что пользователи скачали эти книги:
[Forgotten Realms - The Erevis Cale Trilogy, Book 1] - Kemp, Paul S. - Twilight FallingАвтор: Cale Trilogy
Размер книги: 831 Kb
Winning Ways for your mathematical playsАвтор: Elwyn R. Berlekamp, Автор: John Horton Conway, Автор: Richard K. GuyКатегория: Mathematics, Popular-level
Размер книги: 4.98 Mb
Военная оториноларингологияАвтор: Воячек В.И.Категория: Медицина, Оториноларингология
Размер книги: 6.83 Mb
Лучший способ выучить астрологиюАвтор: Марч Марион, Автор: Мак-Эверс ДжоанКатегория: Астрология
Размер книги: 2.04 Mb
Zones Of Conflict: US Foreign Policy in the Balkans and the Greater Middle EastАвтор: Vassilis K. FouskasКатегория: Общественные науки прочие, Политика
Размер книги: 1.72 Mb
American Medical Association Guide to Preventing and Treating Heart Disease: Essential Information You and Your Family Need to Know about Having a Healthy HeartАвтор: American Medical Association, Автор: Martin S. Lipsky MD, Автор: Marla Mendelson, Автор: Stephen Havas MD MPH, Автор: Michael Miller MD
Размер книги: 3.54 Mb
Romance And Sex in Adolescence And Emerging Adulthood: Risks And Opportunities (Penn State University Family Issues Symposia) (Penn State University Family Issues Symposia)Автор: Ann C. Crouter, Автор: Alan Booth
Размер книги: 1.97 Mb
|
|
|