Network Security Assessment
暫譯: 網路安全評估

Chris McNab

  • 出版商: O'Reilly
  • 出版日期: 2004-03-01
  • 售價: $1,570
  • 貴賓價: 9.5$1,492
  • 語言: 英文
  • 頁數: 400
  • 裝訂: Paperback
  • ISBN: 059600611X
  • ISBN-13: 9780596006112
  • 相關分類: 資訊安全
  • 已過版

買這商品的人也買了...

相關主題

商品描述

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup.

If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start?

Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed.

This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.

Table of Contents:

Foreword

Preface

1. Network Security Assessment
     The Business Benefits
     IP: The Foundation of the Internet
     Classifying Internet-Based Attackers
     Assessment Service Definitions
     Network Security Assessment Methodology
     The Cyclic Assessment Approach

2. The Tools Required
     The Operating Systems
     Free Network Scanning Tools
     Commercial Network Scanning Tools
     Protocol-Dependent Assessment Tools

3. Internet Host and Network Enumeration
     Web Search Engines
     NIC Querying
     DNS Querying
     Enumeration Technique Recap
     Enumeration Countermeasures

4. IP Network Scanning
     ICMP Probing
     TCP Port Scanning
     UDP Port Scanning
     IDS Evasion and Filter Circumvention
     Low-Level IP Assessment
     Network Scanning Recap
     Network Scanning Countermeasures

5. Assessing Remote Information Services
     Remote Information Services
     systat and netstat
     DNS
     finger
     auth
     SNMP
     LDAP
     rwho
     RPC rusers
     Remote Information Services Countermeasures

6. Assessing Web Services
     Web Services
     Identifying the Web Service
     Identifying Subsystems and Components
     Investigating Web Service Vulnerabilities
     Accessing Poorly Protected Information
     Assessing CGI Scripts and Custom ASP Pages
     Web Services Countermeasures

7. Assessing Remote Maintenance Services
     Remote Maintenance Services
     SSH
     Telnet
     R-Services
     X Windows
     Microsoft Remote Desktop Protocol
     VNC
     Citrix
     Remote Maintenance Services Countermeasures

8. Assessing FTP and Database Services
     FTP
     FTP Banner Grabbing and Enumeration
     FTP Brute-Force Password Guessing
     FTP Bounce Attacks
     Circumventing Stateful Filters Using FTP
     FTP Process Manipulation Attacks
     FTP Services Countermeasures
     Database Services
     Microsoft SQL Server
     Oracle
     MySQL
     Database Services Countermeasures

9. Assessing Windows Networking Services
     Microsoft Windows Networking Services
     Microsoft RPC Services
     The NetBIOS Name Service
     The NetBIOS Datagram Service
     The NetBIOS Session Service
     The CIFS Service
     Unix Samba Vulnerabilities
     Windows Networking Services Countermeasures

10. Assessing Email Services
     Email Service Protocols
     SMTP
     POP-2 and POP-3
     IMAP
     Email Services Countermeasures

11. Assessing IP VPN Services
     IPsec VPNs
     Attacking IPsec VPNs
     Check Point VPN Security Issues
     Microsoft PPTP
     VPN Services Countermeasures

12. Assessing Unix RPC Services
     Enumerating Unix RPC Services
     RPC Service Vulnerabilities
     Unix RPC Services Countermeasures

13. Application-Level Risks
     The Fundamental Hacking Concept
     The Reasons Why Software Is Vulnerable
     Network Service Vulnerabilities and Attacks
     Classic Buffer-Overflow Vulnerabilities
     Heap Overflows
     Integer Overflows
     Format String Bugs
     Memory Manipulation Attacks Recap
     Mitigating Process Manipulation Risks
     Recommended Secure Development Reading

14. Example Assessment Methodology
     Network Scanning
     Accessible Network Service Identification
     Investigation of Known Vulnerabilities
     Network Service Testing
     Methodology Flow Diagram
     Recommendations
     Closing Comments

A. TCP, UDP Ports, and ICMP Message Types
     TCP Ports
     UDP Ports
     ICMP Message Types

B. Sources of Vulnerability Information
     Security Mailing Lists
     Vulnerability Databases and Lists
     Underground Web Sites
     Security Events and Conferences

Index

商品描述(中文翻譯)

有數百種——如果不是成千上萬種——技術被用來攻擊 Windows 和 Unix 基礎系統。惡意程式碼和新的漏洞利用腳本每天都在發布,每一次演變變得越來越複雜。跟上駭客在野外使用的各種系統是一項艱鉅的任務,急於修補每一個潛在的漏洞或逐一應對每一個新攻擊,就像用紙杯清空大西洋一樣。

如果你是一名網路管理員,保護你的系統免受攻擊的壓力就落在你身上。但除了將你的生活奉獻給成為安全專家之外,你能做些什麼來確保你的關鍵任務系統的安全?你該從哪裡開始?

《網路安全評估》使用專業安全分析師和顧問所列出的步驟來識別和評估風險,提供了一個高效的測試模型,管理員可以採用、改進並重複使用,以創建主動防禦策略來保護他們的系統免受現有威脅以及尚在開發中的威脅。

這本全面且深刻的指南通過從攻擊和防禦的角度對攻擊技術進行分組和分析,幫助管理員設計和部署對攻擊性漏洞、工具和腳本免疫的網路。需要開發和實施安全評估計劃的網路管理員將在這本省時的新書中找到他們所需的一切——一種經過驗證的、專家測試的方法論,作為他們自己全面計劃的基礎。