Hackers Beware, Hacking and IT E-Book Dump Release

[ Pobierz całość w formacie PDF ]
Hackers Beware
Eric Cole
Publisher: New Riders Publishing
First Edition August 13, 2001
ISBN: 0-7357-1009-0, 800 pages
A good defense starts with a thorough understanding
of your opponent’s offense.
Hackers Beware
teaches
you how hackers think, what tools they use, and the
techniques they utilize to compromise a machine. Eric
Cole, a leading expert in information security, shows
you not only how to detect these attacks, but what
you can do to protect yourself against them. When it
comes to securing your site, knowledge is power. This
book gives you the knowledge to build a proper
defense against attackers.
Copyright © 2002 by New Riders Publishing
FIRST EDITION: August, 2001
All rights reserved. No part of this book may be reproduced or transmitted
in any form or by any means, electronic or mechanical, including
photocopying, recording, or by any information storage and retrieval
system, without written permission from the publisher, except for the
inclusion of brief quotations in a review.
Library of Congress Catalog Card Number: 00102952
06 05 04 03 02 7 6 5 4 3 2 1
Interpretation of the printing code: The rightmost double-digit number is
the year of the book’s printing; the right-most single-digit number is the
number of the book’s printing. For example, the printing code 02-1 shows
that the first printing of the book occurred in 2002.
Composed in Bembo and MCPdigital by New Riders Publishing
Printed in the United States of America
Trademarks
All terms mentioned in this book that are known to be trademarks or
service marks have been appropriately capitalized. New Riders Publishing
cannot attest to the accuracy of this information. Use of a term in this
book should not be regarded as affecting the validity of any trademark or
service mark.
“
Hackers Beware
“ New Riders Publishing
1
Warning and Disclaimer
This book is designed to provide information about computer security.
Every effort has been made to make this book as complete and as
accurate as possible, but no warranty or fitness is implied.
The information is provided on an as-is basis. The authors and New Riders
Publishing shall have neither liability nor responsibility to any person or
entity with respect to any loss or damages arising from the information
contained in this book or from the use of the discs or programs that may
accompany it.
Credits
Publisher
David Dwyer
Associate Publisher
Al Valvano
Executive Editor
Stephanie Wall
Managing Editor
Kristy Knoop
Product Marketing Manager
Stephanie Layton
Publicity Manager
Susan Nixon
Acquisitions Editor
Jeff Riley
Development Editors
Katherine Pendergast
Joell Smith
“
Hackers Beware
“ New Riders Publishing
2
Project Editor
Sean Monkhouse
Copy Editors
Kelli Brooks
Sarah Cisco
Indexer
Christine Karpeles
Manufacturing Coordinator
Jim Conway
Book Designer
Louisa Klucznik
Cover Designer
Aren Howell
Proofreaders
Katherine Shull
Mitch Stark
Composition
Amy Parker
Rebecca Harmon
I would like to dedicate this book to my wonderful son, Jackson. He is a
blessing to me and brings joy and happiness to me every day.
Hackers Beware
About the Author
About the Technical Reviewers
Acknowledgments
“
Hackers Beware
“ New Riders Publishing
3
Tell Us What You Think
Introduction
1. Introduction
The Golden Age of Hacking
How Bad Is the Problem?
What Are Companies Doing?
What Should Companies Be Doing?
Defense in Depth
Purpose of This Book
Legal Stuff
What’s Covered In This Book
Summary
2. How and Why Hackers Do It
What Is an Exploit?
The Attacker’s Process
The Types of Attacks
Categories of Exploits
Routes Attackers Use to Get In
Goals Attackers Try to Achieve
Summary
3. Information Gathering
Steps for Gathering Information
Information Gathering Summary
Red Teaming
Summary
4. Spoofing
Why Spoof?
Types of Spoofing
Summary
5. Session Hijacking
Spoofing versus Hijacking
Types of Session Hijacking
TCP/IP Concepts
Detailed Description of Session Hijacking
ACK Storms
Programs That Perform Hijacking
Dangers Posed by Hijacking
Protecting Against Session Hijacking
Summary
6. Denial of Service Attacks
What Is a Denial of Service Attack?
What Is a Distributed Denial of Service Attack?
Why Are They Difficult to Protect Against?
Types of Denial of Service Attacks
Tools for Running DOS Attacks
Tools for Running DDOS Attacks
Preventing Denial of Service Attacks
Preventing Distributed Denial of Service Attacks
Summary
“
Hackers Beware
“ New Riders Publishing
4
[ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • gdziejesc.keep.pl