Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2/e
暫譯: 反駁駭客:電腦攻擊與有效防禦的逐步指南,第二版
Edward Skoudis, Tom Liston
- 出版商: Prentice Hall
- 出版日期: 2005-12-23
- 定價: $2,800
- 售價: 8.0 折 $2,240
- 語言: 英文
- 頁數: 748
- 裝訂: Paperback
- ISBN: 0131481045
- ISBN-13: 9780131481046
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量) (庫存=7)
買這商品的人也買了...
-
$1,225Discrete and Combinatorial Mathematics: An Applied Introduction, 5/e (IE-Paperback)
-
$2,370$2,252 -
$750$593 -
$149$149 -
$1,264Advanced Programming in the UNIX Environment, 2/e (Hardcover)
-
$880$695 -
$880$695 -
$890$757 -
$450$383 -
$580$458 -
$375Macromedia Dreamweaver 8 for Windows and Macintosh: Visual QuickStart Guide (Paperback)
-
$780$663 -
$680$578 -
$620$490 -
$580$493 -
$450$351 -
$390$304 -
$390$332 -
$650$507 -
$480$456 -
$550$468 -
$990$891 -
$1,980$1,881 -
$380$323 -
$1,750$1,663
相關主題
商品描述
Description
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security experts Ed Skoudis and Tom Liston have thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.
Table of Contents
Foreword xxi
Preface Reloaded xxiii
About the Authors xxxi
Chapter 1: Introduction 1
The Computer World and the Golden Age of Hacking 2
Why This Book? 4
The Threat: Never Underestimate Your Adversary 7
A Note on Terminology and Iconography 12
Caveat: These Tools Could Hurt You 15
Organization of Rest of the Book 19
Summary 23
Chapter 2: Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book 25
The OSI Reference Model and Protocol Layering 26
How Does TCP/IP Fit In? 28
Understanding TCP/IP 32
Transmission Control Protocol (TCP) 33
User Datagram Protocol (UDP) 41
Internet Protocol (IP) and Internet Control Message Protocol (ICMP) 44
ICMP 51
Other Network-Level Issues 53
Don’t Forget About the Data Link and Physical Layers! 66
Security Solutions for the Internet 75
Conclusion 86
Summary 87
Chapter 3: Linux and UNIX Overview: Pretty Much Everything You Need to Know About Linux and UNIX to Follow the Rest of This Book 91
Introduction 91
Architecture 95
Accounts and Groups 107
Linux and UNIX Permissions 110
Linux and UNIX Trust Relationships 115
Common Linux and UNIX Network Services 119
Conclusion 124
Summary 124
Chapter 4: Windows NT/2000/XP/2003 Overview: Pretty Much Everything You Need to Know About Windows to Follow the Rest of This Book 127
Introduction 127
A Brief History of Time 128
The Underlying Windows Operating System Architecture 133
How Windows Password Representations Are Derived 137
Kernel Mode 139
From Service Packs and Hotfixes to Windows Update and Beyond 141
Accounts and Groups 142
Privilege Control 147
Policies 149
Trust 152
Auditing 154
Object Access Control and Permissions 156
Network Security 160
Windows 2000 and Beyond: Welcome to the New Millennium 162
Conclusion 177
Summary 177
Chapter 5: Phase 1: Reconnaissance 183
Low-Technology Reconnaissance: Social Engineering, Caller ID Spoofing, Physical Break-In, and Dumpster Diving 184
Search the Fine Web (STFW) 195
Whois Databases: Treasure Chests of Information 212
The Domain Name System 220
General-Purpose Reconnaissance Tools 230
Conclusion 235
Summary 235
Chapter 6: Phase 2: Scanning 239
War Driving: Finding Wireless Access Points 240
War Dialing: Looking for Modems in All the Right Places 252
Network Mapping 261
Determining Open Ports Using Port Scanners 268
Vulnerability-Scanning Tools 307
Intrusion Detection System and Intrusion Prevention System Evasion 319
Conclusion 335
Summary 335
Chapter 7: Phase 3: Gaining Access Using Application and Operating System Attacks 339
Script Kiddie Exploit Trolling 339
Pragmatism for More Sophisticated Attackers 340
Buffer Overflow Exploits 342
Password Attacks 377
Web Application Attacks 406
Exploiting Browser Flaws 431
Conclusion 435
Summary 435
Chapter 8: Phase 3: Gaining Access Using Network Attacks 439
Sniffing 439
IP Address Spoofing 470
Session Hijacking 482
Netcat: A General-Purpose Network Tool 491
Conclusion 510
Summary 510
Chapter 9: Phase 3: Denial-of-Service Attacks 513
Locally Stopping Services 515
Locally Exhausting Resources 517
Remotely Stopping Services 518
Remotely Exhausting Resources 523
Conclusion 543
Summary 544
Chapter 10: Phase 4: Maintaining Access: Trojans, Backdoors, and Rootkits ... Oh My! 547
Trojan Horses 547
Backdoors 548
The Devious Duo: Backdoors Melded into Trojan Horses 553
Nasty: Application-Level Trojan Horse Backdoor Tools 555
Also Nasty: The Rise of the Bots 568
Additional Nastiness: Spyware Everywhere! 578
Defenses Against Application-Level Trojan Horse Backdoors, Bots, and Spyware 581
Even Nastier: User-Mode Rootkits 587
Defending Against User-Mode Rootkits 604
Nastiest: Kernel-Mode Rootkits 608
Defending Against Kernel-Mode Rootkits 616
Conclusion 623
Summary 623
Chapter 11: Phase 5: Covering Tracks and Hiding 627
Hiding Evidence by Altering Event Logs 628
Defenses Against Log and Accounting File Attacks 637
Creating Difficult-to-Find Files and Directories 641
Hiding Evidence on the Network: Covert Channels 647
Defenses Against Covert Channels 665
Conclusion 668
Summary 668
Chapter 12: Putting It All Together: Anatomy of an Attack 671
Scenario 1: Crouching Wi-Fi, Hidden Dragon 673
Scenario 2: Death of a Telecommuter 685
Scenario 3: The Manchurian Contractor 696
Conclusion 708
Summary 709
Chapter 13: The Future, References, and Conclusions 711
Where Are We Heading? 711
Keeping Up to Speed 715
Final Thoughts ... Live Long and Prosper 721
Summary 722
Index 723
商品描述(中文翻譯)
描述
多年來,《Counter Hack》一直是每位網路/系統管理員和安全專業人士的主要資源,幫助他們深入了解駭客攻擊及其對策。現在,領先的網路安全專家 Ed Skoudis 和 Tom Liston 已經全面更新了這本暢銷指南,展示如何擊敗當今最新、最複雜和最具破壞性的攻擊。
目錄
前言 xxi
序言重載 xxiii
關於作者 xxxi
第一章:介紹 1
計算機世界與駭客的黃金時代 2
為什麼選擇這本書? 4
威脅:永遠不要低估你的對手 7
術語和圖示的說明 12
警告:這些工具可能會傷害你 15
本書其餘部分的組織 19
總結 23
第二章:網路概述:跟隨本書其餘部分所需了解的幾乎所有網路知識 25
OSI 參考模型與協議分層 26
TCP/IP 如何適應? 28
理解 TCP/IP 32
傳輸控制協議 (TCP) 33
用戶數據報協議 (UDP) 41
網際協議 (IP) 和網際控制消息協議 (ICMP) 44
ICMP 51
其他網路層問題 53
不要忘記數據鏈路層和物理層! 66
互聯網的安全解決方案 75
結論 86
總結 87
第三章:Linux 和 UNIX 概述:跟隨本書其餘部分所需了解的幾乎所有 Linux 和 UNIX 知識 91
介紹 91
架構 95
帳戶和群組 107
Linux 和 UNIX 權限 110
Linux 和 UNIX 信任關係 115
常見的 Linux 和 UNIX 網路服務 119
結論 124
總結 124
第四章:Windows NT/2000/XP/2003 概述:跟隨本書其餘部分所需了解的幾乎所有 Windows 知識 127
介紹 127
時間簡史 128
底層 Windows 作業系統架構 133
Windows 密碼表示的來源 137
核心模式 139
從服務包和熱修補到 Windows 更新及更遠 141
帳戶和群組 142
特權控制 147
政策 149
信任 152
審計 154
物件存取控制和權限 156
網路安全 160
Windows 2000 及以後:歡迎來到新千年 162
結論 177
總結 177
第五章:第一階段:偵查 183
低技術偵查:社會工程、來電顯示欺騙、實體入侵和垃圾桶潛水 184
搜尋精細網路 (STFW) 195
Whois 數據庫:資訊的寶藏 212
域名系統 220
通用偵查工具 230
結論 235
總結 235
第六章:第二階段:掃描 239
戰爭駕駛:尋找無線接入點 240
戰爭撥號:在所有正確的地方尋找調製解調器 252
網路映射 261
使用端口掃描器確定開放端口 268
漏洞掃描工具 307
入侵檢測系統和入侵預防系統的規避 319
結論 335
總結 335
第七章:第三階段:使用應用程式和作業系統攻擊獲取訪問權限 339
腳本小子利用釣魚 339
對於更複雜的攻擊者的務實主義 340
緩衝區溢出利用 342
密碼攻擊 377
網頁應用攻擊 406
利用瀏覽器漏洞 431
結論 435
總結 435
第八章:第三階段:使用網路攻擊獲取訪問權限 439
嗅探 439
IP 地址欺騙 470
會話劫持 482
Netcat:通用網路工具 491
結論 510
總結 510
第九章:第三階段:拒絕服務攻擊 513
本地停止服務 515
本地耗盡資源 517
遠程停止服務 518
遠程耗盡資源 523
結論 543
總結 544
第十章:第四階段:維持訪問權限:木馬、後門和根套件……哦,我的天! 547
木馬 547
後門 548
狡猾的二人組:融合於木馬中的後門 553
討厭的:應用層木馬後門工具 555
更討厭的:機器人的崛起 568
額外的討厭:到處都是間諜軟體! 578
對抗應用層木馬後門、機器人和間諜軟體的防禦 581
更討厭的:用戶模式根套件 587
防禦用戶模式根套件 604
最討厭的:核心模式根套件 608
防禦核心模式根套件 616
結論 623
總結 623
第十一章:第五階段:掩蓋痕跡和隱藏 627
通過更改事件日誌隱藏證據 628
對抗日誌和會計文件攻擊的防禦 637
創建難以找到的文件和目錄 641
在網路上隱藏證據:隱蔽通道 647
對抗隱蔽通道的防禦 665
結論 668
總結 668
第十二章:綜合所有內容:攻擊的解剖 671
情境 1:潛伏的 Wi-Fi,隱藏的龍 673
情境 2:遠端工作者的死亡 685
情境 3:滿洲承包商 696
結論 708
總結 709
第十三章:未來、參考文獻和結論 711
我們的方向是什麼? 711
保持速度 715
最後的想法……長壽與繁榮 721
總結 722
索引 723