Muutke küpsiste eelistusi

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (Ceh) 2nd ed. [Pehme köide]

  • Formaat: Paperback / softback, kõrgus x laius x paksus: 231x185x15 mm, kaal: 499 g, Illustrations, unspecified
  • Ilmumisaeg: 18-Feb-2016
  • Kirjastus: Cengage Learning
  • ISBN-10: 1305883462
  • ISBN-13: 9781305883468
Teised raamatud teemal:
  • Formaat: Paperback / softback, kõrgus x laius x paksus: 231x185x15 mm, kaal: 499 g, Illustrations, unspecified
  • Ilmumisaeg: 18-Feb-2016
  • Kirjastus: Cengage Learning
  • ISBN-10: 1305883462
  • ISBN-13: 9781305883468
Teised raamatud teemal:
The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C|EH certification exam from EC-Council.
Preface xiii
Chapter 1 Hacking Wireless Networks 1(42)
What If?
2(1)
Introduction to Hacking Wireless Networks
2(1)
Wireless Networking
2(2)
Wired Network Versus Wireless Network
2(1)
Effects of Wireless Attacks on Businesses
3(1)
Types of Wireless Networks
3(1)
Advantages and Disadvantages of a Wireless Network
4(1)
Wireless Standards
4(3)
Wireless Standard: 802.11a
5(1)
Wireless Standard: 802.11b
5(1)
Wireless Standard: 802.11g
5(1)
Wireless Standard: 802.11i
6(1)
Wireless Standard: 802.11n
6(1)
Wireless Standard: 802.15.1 (Bluetooth)
6(1)
Wireless Standard: 802.16 (WiMAX)
6(1)
Wireless Concepts
7(4)
Related Technologies and Carrier Networks
7(1)
Service Set Identifier (SSID)
8(1)
Authentication and Association
8(2)
Authentication and (Dis) Association Attacks
10(1)
MAC Sniffing and AP Spoofing
10(1)
Wireless Devices
11(2)
Antennas
11(1)
Wireless Access Points
11(1)
Beacon Frames
12(1)
Phone Jammers
12(1)
Wired Equivalent Privacy (WEP)
13(3)
Role of WEP in Wireless Communication
13(1)
Key Points
13(1)
WEP Issues
13(1)
WEP Authentication Phase
14(1)
WEP Association Phase
15(1)
WEP Flaws
15(1)
WPA
16(1)
WPA Vulnerabilities
16(1)
WEP, WPA, and WPA2
16(1)
WPA2
16(1)
Attacking WPA-Encrypted Networks
16(1)
TKIP and LEAP
17(3)
Temporal Key Integrity Protocol (TKIP)
17(1)
LEAP: The Lightweight Extensible Authentication Protocol
18(2)
Hacking Methods
20(4)
Techniques to Detect Open Wireless Networks
20(1)
Steps for Hacking Wireless Networks
21(1)
Super Bluetooth Hack
21(1)
Man-in-the-Middle Attack (MITM)
22(1)
Denial-of-Service Attacks
22(1)
Hijacking and Modifying a Wireless Network
23(1)
Cracking WEP
24(4)
Automated WEP Crackers
24(1)
Pad Collection Attacks
24(1)
XOR Encryption
25(1)
Stream Cipher
25(1)
WEP Cracking Tools
25(3)
Rogue Access Points
28(2)
Requesting a Beacon
28(1)
Sniffing the Air
28(1)
Tools to Generate Rogue Access Points
29(1)
Cloaked Access Point
30(1)
Scanning Tools
30(2)
Prismstumbler
30(1)
MacStumbler
30(1)
Mognet
30(1)
WaveStumbler
31(1)
NetChaser
31(1)
Wavemon
31(1)
Wireless Security Auditor (WSA)
31(1)
AirTraf
32(1)
WifiScanner
32(1)
eEye Retina Network Security Scanner
32(1)
Wireless Lan Scanner
32(1)
Sniffing Tools
32(4)
OmniPeek
32(1)
Wireshark
33(1)
vxSniffer
34(1)
EtherPEG
34(1)
AirMagnet
35(1)
driftnet
35(1)
WinDump
35(1)
THC-RUT
35(1)
Microsoft Network Monitor
35(1)
Wireless Security Tools
36(2)
CommView for WiFi PPC
36(1)
AirMagnet Handheld Analyzer
36(1)
AirDefense Guard
37(1)
Google Secure Access
38(1)
RogueScanner
38(1)
Chapter Summary
38(1)
Key Terms
38(1)
Review Questions
39(1)
Hands-On Projects
40(3)
Chapter 2 Physical Security 43(34)
What If?
44(1)
Introduction to Physical Security
44(1)
What Is the Need for Physical Security?
44(1)
Physical Security
45(9)
Physical Measures
45(2)
Technical Measures
47(6)
Operational Measures
53(1)
Physical Security Personnel
54(1)
Physical Security Challenges
54(19)
Physical Security Threats
54(2)
Personnel Challenges
56(1)
Security Countermeasures
56(5)
Physical Security Checklists
61(6)
Tools
67(5)
Encryption Tools
72(1)
Chapter Summary
73(1)
Key Terms
74(1)
Review Questions
74(2)
Hands-On Projects
76(1)
Chapter 3 Evading IDS, Firewalls and Detecting Honeypots 77(58)
What If?
78(1)
Introduction to Evading IDS, Firewalls, and Detecting Honeypots
78(1)
Introduction to Intrusion Detection Systems
78(30)
Intrusion Detection System (IDS)
79(3)
Types of Intrusion Detection Systems
82(3)
Indications of Intrusion
85(1)
Steps to Perform after an IDS Detects an Attack
86(1)
Evading IDS
86(3)
Intrusion Prevention Systems (IPS)
89(4)
Firewalls
93(6)
Firewall Countermeasures
99(5)
Honeypots
104(4)
Security Responses to Hacking Attacks
108(1)
Tools
109(21)
Logging Tools
109(1)
Host-Based IDS Tools
109(1)
Intrusion Detection Tools
110(4)
Tools to Evade IDS
114(1)
Packet Generators
115(4)
Tools to Breach Firewalls
119(2)
Common Tools for Testing Firewalls and IDS
121(7)
Honeypot Tools
128(2)
Tools to Detect Honeypots
130(1)
Chapter Summary
130(1)
Key Terms
130(1)
Review Questions
131(1)
Hands-On Projects
132(3)
Chapter 4 Hacking Routers and Cable Modems 135(18)
What If?
136(1)
Introduction to Hacking Routers and Cable Modems
136(1)
Routers
137(7)
Accessing Routers
137(4)
Vulnerability Scanning
141(1)
Router Attacks
142(2)
Cable Modems
144(1)
Cable Modem Hacking
144(1)
Tools
144(4)
Brute-Forcing Tools
144(1)
Router Identification Tools
145(1)
Router Analysis Tools
146(1)
Password-Cracking Tools
146(1)
Pen-Testing Tools
147(1)
Cable Modem Tools
148(1)
Chapter Summary
148(1)
Key Terms
149(1)
Review Questions
149(2)
Hands-On Project
151(2)
Chapter 5 Linux Hacking 153(48)
What If?
154(1)
Introduction to Linux Hacking
154(1)
Why Linux?
154(1)
Linux Basics
155(9)
Aliased Commands
155(1)
Shell Types
156(1)
Linux Users and Groups
156(1)
Linux Signals and Logging
157(1)
/etc/securetty
157(1)
Linux LiveCDs
157(2)
Files and Directories
159(1)
File System
159(1)
Linux Basic Conunands
160(3)
Directories in Linux
163(1)
Installing, Configuring, and Compiling the Linux Kernel
164(1)
Step 1: Download the Latest Kernel
164(1)
Step 2: Configure the Kernel
164(1)
Step 3: Compile the Kernel
164(1)
Step 4: Clean Files Made During Compilation
164(1)
Step 5: Make a Bootable Linux Image
164(1)
Step 6: Configure the Boot Manager
164(1)
How to Install a Kernel Patch
165(1)
Compiling Programs in Linux
165(2)
GNU Compiler Collection (GCC)
165(1)
Make Files
166(1)
Linux Vulnerabilities
167(7)
Chrooting
169(1)
Why Is Linux Hacked?
170(1)
Scanning Networks
171(2)
Port Scan Detection Tools
173(1)
Password Cracking in Linux
174(1)
Firewall in Linux: IPTables
174(3)
How IPTables Works
175(1)
Tool: Netfilter
176(1)
IPTables Command
177(1)
Basic Linux Operating System Defense
177(16)
Tool: SARA (Security Auditor's Research Assistant)
178(1)
Tool: Netcat
179(1)
Tool: Tcpdump
179(1)
Tool: Snort
180(1)
Tool: SAINT
181(1)
Tool: Wireshark
182(1)
Tool: Abacus Port Sentry
183(1)
Tool: Dsniff Collection
184(1)
Tool: Hping3
184(1)
Tool: Sniffit
184(1)
Tool: Nemesis
185(1)
Tool: LSOF
185(1)
Tool: IPTraf
185(1)
Tool: LIDS
186(1)
Tool: Hunt
186(1)
Tool: TCP Wrappers
186(1)
Linux Loadable Kernel Modules
187(1)
Setuid Programs
188(1)
Trojaned System Programs
188(1)
Other Types of Backdoors
188(1)
Tool: Linux Rootkits
189(1)
Rootkits: Knark and TOrn
189(1)
Rootkits: Tuxit, Adore, and Ramen
190(1)
Rootkit: Beastkit
190(1)
Rootkit Countermeasures
190(3)
Linux Tools: Application Security
193(1)
Whisker
193(1)
Flawfinder
193(1)
Advanced Intrusion Detection Environment (AIDE)
193(1)
Linux Tools: Encryption
194(1)
Stunnel
194(1)
OpenSSH/SSH
194(1)
GnuPG
194(1)
Linux Tools: Log and Traffic Monitors
194(2)
MRTG (Multi-Router Traffic Grapher)
194(1)
Swatch
195(1)
Timbersee
195(1)
Logsurf
195(1)
IPLog
195(1)
Ntop
195(1)
Linux Security Auditing Tool (LSAT)
195(1)
Linux Security Countermeasures
196(1)
Physical Security
196(1)
Password Security
196(1)
Network Security
196(1)
Steps for Hardening Linux
197(1)
Chapter Summary
197(1)
Key Terms
197(1)
Review Questions
198(1)
Hands-On Projects
199(2)
Chapter 6 Mac OS X Hacking 201(16)
What If?
202(1)
Introduction to Mac OS X Hacking
202(1)
Introduction to Mac OS
202(1)
Vulnerabilities in Mac OS X
203(4)
Crafted URL Vulnerability
203(1)
CoreText Uninitialized Pointer Vulnerability
203(1)
ImageIO Integer Overflow Vulnerability
203(1)
DirectoryService Vulnerability
203(1)
iChat UPnP Buffer Overflow Vulnerability
204(1)
ImageIO Memory Corruption Vulnerability
204(1)
Code Execution Vulnerability in Safari
204(1)
UFS Integer Overflow Vulnerability
204(1)
Kernel "fpathconfO" System Call Vulnerability
205(1)
UserNotificationCenter Privilege Escalation Vulnerability
205(1)
Other Vulnerabilities in Mac OS
206(1)
How a Malformed Installer Package Can Crack Mac OS X
206(1)
Worms and Viruses in Mac OS X
207(2)
OSX/Leap-A Worm
207(1)
Inqtana.A: F-Secure Worm
208(1)
Viruses in Macs: Macro Viruses
208(1)
Antivirus Applications in Mac OS X
209(1)
VirusBarrier
209(1)
McAfee VirusScan for Mac
209(1)
Sophos Endpoint Security and Control
210(1)
Norton Internet Security
210(1)
Mac OS X Security Tools
210(2)
MacScan
210(1)
ClamXav
211(1)
IPNetSentryX
211(1)
FileGuard
212(1)
Countermeasures
212(1)
Chapter Summary
213(1)
Key Term
213(1)
Review Questions
213(2)
Hands-On Projects
215(2)
Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices 217(20)
What If?
218(1)
Introduction to Hacking Mobile Phones, PDAs, and Handheld Devices
218(1)
Types of Handheld Devices
218(4)
Smartphone: BlackBerry
219(1)
Smartphone: iPhone
219(1)
Smartphone: Samsung Galaxy Series
219(1)
iPod
220(1)
iPad
221(1)
Microsoft Surface
221(1)
Amazon Kindle and Kindle Fire
221(1)
MP3 Players
221(1)
Flash Drives
221(1)
Common Operating Systems in Handheld Devices
222(1)
Mobile Phone Operating Systems
222(1)
Vulnerabilities in Handheld Devices
223(1)
Evolution of the Mobile Threat
223(1)
Mobile Vulnerabilities
224(1)
Hacking Handheld Devices
224(6)
Mobile Malware Propagation
224(1)
Spyware
225(1)
Malware
225(1)
BlackBerry Attacks: Blackjacking
226(1)
iPhone Attacks
226(2)
PDA Attacks
228(1)
Trojans and Viruses
229(1)
Defending Handheld Devices
230(3)
Best Practices
230(1)
Protecting an Organization from Mobile Vulnerabilities
231(1)
Antivirus Software
232(1)
Security Tools
233(1)
Chapter Summary
233(1)
Key Terms
234(1)
Review Questions
234(2)
Hands-On Projects
236(1)
Chapter 8 Hacking Portable Devices 237(24)
Section 1: Hacking USB Devices
237(1)
What If?
238(1)
Introduction to Hacking USB Devices
238(1)
Introduction to USB Devices
238(1)
USB Transfer Rates
238(1)
USB Attacks
239(1)
Electrical Attack
239(1)
Software Attack
239(1)
Windows Buffer Overflow Attack
240(1)
Countermeasures
240(1)
Windows USB Blocker
240(1)
Section 2: Bluetooth Hacking
241(1)
What If?
241(1)
Introduction to Bluetooth Hacking
242(1)
Bluetooth Security Issues
242(1)
Attacks Against Bluetooth
243(3)
Bluejacking
243(1)
Bluesnarfing
243(1)
Bluebugging
243(1)
Short Pairing Code Attacks
243(1)
Man-in-the-Middle Attack
244(1)
Online PIN Cracking Attack
244(1)
BTKeylogging Attack
245(1)
BTVoiceBugging Attack
245(1)
Blueprinting
245(1)
Bluesmacking
245(1)
Denial-of-Service Attack
245(1)
Bluedumping Attack
245(1)
Bluediving
246(1)
Countermeasures
246(1)
Section 3: RFID Hacking
247(1)
What If?
247(1)
Introduction to RFID Hacking
248(1)
RFID (Radio Frequency Identification)
248(1)
Components of RFID Systems
248(2)
Tags
248(1)
Tag Readers
249(1)
RFID Tag Antenna
249(1)
RFID Controller
249(1)
RFID Premises Server
250(1)
RFID Integration Server
250(1)
RFID Collisions
250(1)
RFID Tag Collision
250(1)
RFID Reader Collision
250(1)
RFID Risks
251(4)
Business Process Risk
251(1)
Business Intelligence Risk
252(1)
Privacy Risk
252(2)
Externality Risk
254(1)
RFID Security and Privacy Threats
255(2)
Sniffing
255(1)
Tracking
255(1)
Spoofing
255(1)
Replay Attacks
256(1)
Denial-of-Service Attacks
256(1)
Vulnerabilities in RFID-Enabled Credit Cards
256(1)
Countermeasures Used to Avoid RFID Attacks
257(1)
RSA Blocker Tags
257(1)
Kill Switches
257(1)
Cryptography
257(1)
Detection and Evasion
257(1)
Temporary Deactivation
257(1)
Other Techniques
258(1)
Chapter Summary
258(1)
Key Terms
259(1)
Review Questions
259(1)
Hands-On Projects
260(1)
Chapter 9 Cryptography 261(32)
What If?
262(1)
Introduction to Cryptography
262(1)
Public-Key Cryptography
262(5)
Digital Signature
264(1)
Encryption Algorithms
265(2)
Message-Digest (Hash) Functions
267(2)
MD2, MD4, and MD5
268(1)
SHA-1 (Secure Hash Algorithm)
268(1)
SSL (Secure Sockets Layer)
269(2)
SSL Sessions
270(1)
SSL Handshake Protocol Flow
270(1)
Secure Shell (SSH)
271(1)
Disk Encryption
272(1)
Encryption-Breaking Initiatives
272(1)
RSA Factoring Challenge
272(1)
Distributed.net
273(1)
Encryption Countermeasures
273(3)
Code-Breaking Methodologies
273(1)
Cryptography Attacks
274(2)
Tools
276(3)
Encryption-Cracking Tools
276(1)
Data-Protection Tools
277(1)
PGP (Pretty Good Privacy)
277(2)
Chapter Summary
279(1)
Key Terms
280(1)
Review Questions
280(2)
Hands-On Projects
282(11)
Glossary 293(2)
Index 295