Protecting Networks With Satan
Martin Freiss
- 出版商: O'Reilly
- 出版日期: 1998-05-01
- 售價: $940
- 貴賓價: 9.5 折 $893
- 語言: 英文
- 頁數: 128
- 裝訂: Paperback
- ISBN: 1565924258
- ISBN-13: 9781565924253
已絕版
買這商品的人也買了...
-
$1,240$1,178 -
$1,400$1,330 -
$2,050$1,948 -
$940$893 -
$1,240$1,178 -
$640$608 -
$590MySQL and mSQL
-
$630$599 -
$730$694 -
$1,400$1,330 -
$199Cisco Routers 24seven
-
$1,330$1,264 -
$1,550$1,473 -
$2,450$2,328 -
$1,730$1,644 -
$1,240$1,178 -
$280Mod_Perl Pocket Reference (Paperback)
-
$1,500$1,425 -
$1,550$1,473 -
$399Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$580$458 -
$350$298 -
$690$538 -
$750$675 -
$1,890$1,796
商品描述
Description:
SATAN (Security Administrator's Tool for Analyzing Networks) is a powerful aid for system administrators. It performs "security audits," scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of software because it uses the Web as its front end.
Readers should be particularly interested in SATAN because it has earned a lot of publicity -- even notoriety. The original SATAN paper reported details, for the first time outside the hacker community, on how insecure some often-used services on the Internet really are. The SATAN software provided a tool for automatic detection of such vulnerabilities. Because SATAN could be run on other sites, not only your own, many critics predicted that SATAN would wreak destruction on the Internet. The Oakland Tribune, for example, wrote: "It's like randomly mailing automatic rifles to 5000 addresses. I hope some crazy teen doesn't get a hold of one." The dire results predicted have not come to pass, and SATAN has become a useful tool in many system administrators' toolboxes.
This small book describes not only how to install and use SATAN, but also how to extend its modular structure to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
This book also discusses how you can defend your site against potential abuse by SATAN. You can configure the program to detect when a potential intruder employs the program against your host and network, and you can take appropriate measures to repel the attacks.
Table of
Contents:
Foreword
Preface
1. Security
What Is Security, Anyway?
Why Network Security?
A Network Security Audit
2. Installing SATAN
Where to Get SATAN
System Requirements
Compiling and Installing SATAN
Repent!
Running SATAN Under Linux
Things That Might Go Wrong
3. Security Audits
The Control Panel
Data Management
Configuring SATAN
Selecting and Scanning a Target
Analyzing the Scan Results
4. Scan Results and Countermeasures
What SATAN Tests
Weaknesses and Countermeasures
How Critical Are the Detected Holes?
Additional Notes
Summary
5. Extending and Adapting SATAN
Why Extend SATAN?
SATAN's Architecture
SATAN's Database Record Format
SATAN's Configuration File (satan.cf )
Examples
SATAN in Large Networks
6. Detecting and Repelling SATAN Attacks
When You Become SATAN's Target
Recognizing a SATAN Attack
Repelling SATAN and Other Attacks
7. Beyond SATAN
Security Is More Than SATAN
What SATAN Does Not Find
The Security Policy
A. Further Reading
Index