My Account Log in

3 options

Hack the stack : using Snort and Ethereal to master the 8 layers of an insecure network / Michael Gregg ... [et al.] ; technical editor, Stephen Watkins.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Contributor:
Gregg, Michael (Michael C.)
Watkins, Stephen.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Computer security.
Physical Description:
1 online resource (481 p.)
Edition:
1st edition
Other Title:
Using Snort and Ethereal to master the 8 layers of an insecure network
Place of Publication:
Rockland, MA : Syngress Pub., c2006.
Language Note:
English
System Details:
text file
Summary:
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the ""stack"" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers th
Contents:
Front Cover; Hack The Stack: Using Snort and Ethereal to Master The 8 Layers of an Insecure Network; Copyright Page; Contents; Foreword; Chapter 1. Extending OSI to Network Security; Introduction; Our Approach to This Book; Common Stack Attacks; Mapping OSI to TCP/IP; The Current State of IT Security; Using the Information in This Book; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Physical Layer; Introduction; Defending the Physical Layer; Attacking the Physical Layer; Layer 1 Security Project; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 3. Layer 2: The Data Link LayerIntroduction; Ethernet and the Data Link Layer; Understanding PPP and SLIP; Working with a Protocol Analyzer; Understanding How ARP Works; Attacking the Data Link Layer; Defending the Data Link Layer; SecuringYour Network from Sniffers; Employing Detection Techniques; Data Link Layer Security Project; Using the Auditor Security Collection to Crack WEP; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Layer 3: The Network Layer; Introduction; The IP Packet Structure; The ICMP Packet Structure; Attacking the Network Layer
Defending the Network LayerNetwork Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Layer 4: The Transport Layer; Introduction; Connection-Oriented versus Connectionless Protocols; Protocols at the Transport Layer; The Hacker's Perspective; Scanning the Network; Operating System Fingerprinting; Detecting Scans on Your Network; Defending the Transport Layer; Transport Layer Project-Setting Up Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Layer 5: The Session Layer; Introduction; Attacking the Session Layer
Defending the Session LayerSession Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Layer 6: The Presentation Layer; Introduction; The Structure of NetBIOS and SMB; Attacking the Presentation Layer; Defending the Presentation Layer; Presentation Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Notes; Chapter 8. Layer 7: The Application Layer; Introduction; The Structure of FTP; Analyzing Domain Name System and Its Weaknesses; Other Insecure Application Layer Protocols; Attacking the Application Layer
Defending the Application LayerNessus; Application-Layer Security Project: Using Nessus to Secure the Stack; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Layer 8: The People Layer; Introduction; Attacking the People Layer; Defending the People Layer; Making the Case for Stronger Security; People Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Risk Mitigation: Securing the Stack; Introduction; Physical; Data Link; Network; Transport; Session; Presentation; Application; People; Summary; Index
Notes:
Includes index.
ISBN:
9786611279776
9781281279774
1281279773
9780080507743
0080507743
9781597491457
1597491454
OCLC:
181421146

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account