𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ethical Hacking Student Guide


Publisher
Internet Security Systems, Inc.
Year
2000
Tongue
English
Leaves
258
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


...With Others in the Class......Page 11
Your Role......Page 12
Course Objectives......Page 13
Course Outline......Page 14
Company Growth......Page 16
Database Scanner......Page 17
Security Management Solutions......Page 18
Consulting and Educational Services......Page 19
ANSA - The Adaptive Network Security Alliance......Page 20
Contact Information......Page 22
Module Objectives......Page 25
International Cyber Crime......Page 26
Damage to Computer Data or Computer Programmes......Page 27
Data Protection......Page 28
How much hacking is there?......Page 29
1990 Chapter 18......Page 30
Objectives Review......Page 34
Module Objectives......Page 35
Argument......Page 36
Counterargument......Page 37
Conclusion of Ethics......Page 38
Better Response to Intrusions......Page 39
Typical scenario......Page 40
Typically Overlooked Issues......Page 41
Objectives Review......Page 42
Module Objectives......Page 43
Buffer Overflow Attacks......Page 44
The Operating System Hosting the Service......Page 45
Distributed Denial of Service (DDoS) Attacks......Page 46
Misconfigurations......Page 47
Brute Force Attacks......Page 48
CGI and WWW Services......Page 49
Command Execution......Page 50
Backdoor and Trojan Development......Page 51
Deployment......Page 52
Java......Page 53
Memory Access......Page 54
Digital Signatures......Page 55
ActiveX......Page 56
ActiveX Security Summation......Page 57
HTML Page Examination......Page 58
References......Page 59
Objectives Review......Page 60
Module Objectives......Page 61
What is Passive Information Gathering?......Page 62
Introduction......Page 63
Whois Search......Page 64
Websites that provide Whois databases......Page 65
Information that can be gleaned from Whois......Page 66
Stock Exchange Websites......Page 67
Using Sam Spade to Parse a Website......Page 68
Search Engines......Page 70
Objectives Review......Page 71
Module Objectives......Page 73
Introduction......Page 74
Introduction......Page 75
Difference between a Zone and a Domain......Page 76
Allocation by Class......Page 77
Allocation by β€œCuts”......Page 78
Example of Zone Allocation......Page 79
Zone Transfers......Page 80
Name Server Record (NS)......Page 82
Further Information......Page 83
Finding the Name Servers for a Domain......Page 84
Performing a Zone Transfer......Page 85
Finding the Name Servers for a Domain......Page 88
Performing a Zone Transfer......Page 90
Zone Transfer Query Refusal......Page 92
Objectives Review......Page 93
Module Objectives......Page 95
Stealth......Page 96
Unobtrusive Network Mapping......Page 97
IP Visibility......Page 99
Risk Level......Page 100
Risk Level......Page 101
Routers......Page 102
Risk Level......Page 103
Risk Level......Page 104
SMTP Headers......Page 105
Risk Level......Page 108
Traceroute through DNS......Page 109
Risk Level......Page 110
Network Sniffers......Page 111
Sniffing on a Switched Network......Page 112
Redirecting Traffic......Page 113
UNC Share Risk......Page 114
Network Design......Page 115
Current Security Awareness......Page 116
Bastion Hosts......Page 117
Multi-Homing......Page 118
Layering Firewalls......Page 119
Multiple Firewall Interfaces......Page 121
Availability and Reliability......Page 122
Implementations of Availability and Reliability......Page 123
Eliminating Single Points of Failure (SPF's)......Page 124
Corporate Network Example......Page 125
Conclusions......Page 127
Objectives Review......Page 128
Module Objectives......Page 129
Traceroute......Page 130
SMTP Headers......Page 132
Objectives Review......Page 136
Module Objectives......Page 137
Port Scanning......Page 138
Typical Responses......Page 139
Firewall Responses......Page 140
Firewalk......Page 141
Nessus Security Scanner......Page 142
References......Page 143
Port Scanning......Page 144
Transmission Control Protocol (TCP)......Page 145
3-Way Handshake......Page 146
TCP SYN (Half-Open)......Page 147
UDP Scanning......Page 148
Drawbacks to UDP Scanning......Page 149
Remote OS Identification......Page 150
Binaries......Page 151
SYN and FIN Scan Variance......Page 152
IP Stack Behavior......Page 153
Packets with Non-standard IP or TCP Flags......Page 154
Passive Operating System Identification......Page 155
References......Page 156
Objectives Review......Page 157
Module Objectives......Page 159
Interpreting Host Results......Page 160
TCP SYN scans......Page 162
Other TCP scans......Page 163
Vulnerability Scans......Page 164
Vetescan......Page 165
Nessus......Page 179
hping......Page 185
Firewalk......Page 186
Packet Filtering......Page 187
Packet Filtering of the Transport Layer Protocols......Page 188
Filtering of UDP......Page 189
Packet Filtering Limitations......Page 190
Trade-off: Packet Filters vs. Proxy Servers......Page 191
Proxy Servers......Page 192
Network Level Firewalls......Page 193
Circuit Level Firewalls......Page 194
Stateful Inspection......Page 195
Reference......Page 196
Objectives Review......Page 197
Module Objectives......Page 199
Fix Advisories......Page 200
Application Errors......Page 201
Buffer Overflows......Page 202
Exploit Chains......Page 203
IRC......Page 205
Research Resources......Page 206
Software Developers/Hardware Manufacturers......Page 207
Mailing Lists......Page 208
Newsgroups......Page 209
Objectives Review......Page 210
Purpose of this Module......Page 211
Web Spoofing Methodology......Page 212
Perfecting the False Web......Page 213
Conclusion......Page 214
Trin00......Page 215
TFN2k in more detail......Page 216
Defence......Page 217
Flood Packet Signatures......Page 218
Rate Filtering......Page 219
Integrate with Existing Program......Page 220
Network Security Assessment......Page 221
Correlation and Integration......Page 222
Module Objectives......Page 223
Introduction......Page 224
Overview......Page 225
Credits/References......Page 226
Example......Page 228
Credits/References......Page 229
Use of the Exploit......Page 230
Credits/References......Page 231
Example......Page 232
Credits/References......Page 233
Stack Operation......Page 234
How Overflows Work......Page 236
Session Hijacking......Page 238
Telnet Session Established......Page 239
Hijacking a Session......Page 240
Credits/Reference......Page 241
Objectives Review......Page 243
Introduction......Page 245
Passive Information Gathering......Page 246
Active Information Gathering......Page 248
Firewall and Router Assessment......Page 250
Vulnerability Exploitation......Page 251
Introduction......Page 252
Step 2: Silence the trusted server......Page 253
Step 3: Determine the TCP number generation sequence......Page 254
Step 5: Setup the Backdoor......Page 255
Step 7: System Compromise......Page 256
Conclusion......Page 257
Course Objectives......Page 258


πŸ“œ SIMILAR VOLUMES


Ethical Hacking Guide, Part 1: Comprehen
✍ Poonam Devi πŸ“‚ Library πŸ“… 2023 πŸ› BookRix 🌐 English

<p><span>Ethical hacking, also known as penetration testing or white-hat hacking, is a practice of deliberately probing and assessing the security of computer systems, networks, applications, and other digital environments in order to identify vulnerabilities and weaknesses that could potentially be

Get Set Hack: Ethical Hacking Guide
✍ Kshirsagar, krunal πŸ“‚ Library πŸ“… 2015 🌐 English

Overview: Much time in a day ,while sitting over on that crazy machine called computer , we do crazy things ! The most craziest thing about this machine is, you can do lots of things with it ,including those are already known and those which you can’t even imagine you can do. For simplicity, I calle

Ethical Hacking: A Beginners Guide To Le
✍ Lakshay Eshan πŸ“‚ Library πŸ“… 2018 πŸ› Shockwave Publishing 🌐 English

<p><b>This book is written for those people who want to hack systems to test identify the security holes and vulnerabilities of those systems.</b><p>This book outlines different tricks and techniques that an ethical hacker can use to assess the security of the systems, identify vulnerabilities and f

Ethical Hacking and Penetration Testing
✍ Rafay Baloch πŸ“‚ Library πŸ“… 2017 πŸ› Auerbach Publications 🌐 English

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking t

Ethical Hacking and Penetration Testing
✍ Rafay Baloch πŸ“‚ Library πŸ“… 2014 πŸ› Auerbach Publications 🌐 English

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking t

Ethical Hacking and Penetration Testing
✍ Rafay Baloch πŸ“‚ Library πŸ“… 2014 πŸ› Auerbach Publications,CRC Press 🌐 English

<P>Requiring no prior hacking experience, <STRONG>Ethical Hacking and Penetration Testing Guide</STRONG> supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of