3 options
Hack the stack : using Snort and Ethereal to master the 8 layers of an insecure network / Michael Gregg ... [et al.] ; technical editor, Stephen Watkins.
- Format:
- Book
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Computer security.
- Physical Description:
- 1 online resource (481 p.)
- Edition:
- 1st edition
- Other Title:
- Using Snort and Ethereal to master the 8 layers of an insecure network
- Place of Publication:
- Rockland, MA : Syngress Pub., c2006.
- Language Note:
- English
- System Details:
- text file
- Summary:
- This book looks at network security in a new and refreshing way. It guides readers step-by-step through the ""stack"" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers th
- Contents:
- Front Cover; Hack The Stack: Using Snort and Ethereal to Master The 8 Layers of an Insecure Network; Copyright Page; Contents; Foreword; Chapter 1. Extending OSI to Network Security; Introduction; Our Approach to This Book; Common Stack Attacks; Mapping OSI to TCP/IP; The Current State of IT Security; Using the Information in This Book; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Physical Layer; Introduction; Defending the Physical Layer; Attacking the Physical Layer; Layer 1 Security Project; Summary; Solutions Fast Track; Frequently Asked Questions
- Chapter 3. Layer 2: The Data Link LayerIntroduction; Ethernet and the Data Link Layer; Understanding PPP and SLIP; Working with a Protocol Analyzer; Understanding How ARP Works; Attacking the Data Link Layer; Defending the Data Link Layer; SecuringYour Network from Sniffers; Employing Detection Techniques; Data Link Layer Security Project; Using the Auditor Security Collection to Crack WEP; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Layer 3: The Network Layer; Introduction; The IP Packet Structure; The ICMP Packet Structure; Attacking the Network Layer
- Defending the Network LayerNetwork Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Layer 4: The Transport Layer; Introduction; Connection-Oriented versus Connectionless Protocols; Protocols at the Transport Layer; The Hacker's Perspective; Scanning the Network; Operating System Fingerprinting; Detecting Scans on Your Network; Defending the Transport Layer; Transport Layer Project-Setting Up Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Layer 5: The Session Layer; Introduction; Attacking the Session Layer
- Defending the Session LayerSession Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Layer 6: The Presentation Layer; Introduction; The Structure of NetBIOS and SMB; Attacking the Presentation Layer; Defending the Presentation Layer; Presentation Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Notes; Chapter 8. Layer 7: The Application Layer; Introduction; The Structure of FTP; Analyzing Domain Name System and Its Weaknesses; Other Insecure Application Layer Protocols; Attacking the Application Layer
- Defending the Application LayerNessus; Application-Layer Security Project: Using Nessus to Secure the Stack; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Layer 8: The People Layer; Introduction; Attacking the People Layer; Defending the People Layer; Making the Case for Stronger Security; People Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Risk Mitigation: Securing the Stack; Introduction; Physical; Data Link; Network; Transport; Session; Presentation; Application; People; Summary; Index
- Notes:
- Includes index.
- ISBN:
- 9786611279776
- 9781281279774
- 1281279773
- 9780080507743
- 0080507743
- 9781597491457
- 1597491454
- OCLC:
- 181421146
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.