๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

HackNotes(tm) Linux and Unix Security Portable Reference

โœ Scribed by Nitesh Dhanjani


Publisher
McGraw-Hill Osborne Media
Year
2003
Tongue
English
Leaves
257
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book provides a very rare gift in the field of information security - brevity. It goes to the point. It explains many terms, some of which I had given up trying to understand, in incredibly simple sentences. Normally, halfway through a book, I've already forgotten the beginning - not with this one. Many things will finally click.

โœฆ Table of Contents


Team DDU......Page 2
CONTENTS......Page 9
Acknowledgments......Page 15
Introduction......Page 21
Reference Center......Page 25
Common Commands......Page 26
Common Ports......Page 31
Classes......Page 33
Subnet Masks......Page 35
Protocol Headers......Page 36
Hacking Tools......Page 39
Web Resources......Page 42
Conferences and Events......Page 43
Useful Netcat Commands......Page 44
ASCII Table......Page 46
HTTP Codes......Page 52
Important Files......Page 54
Part I Hacking Techniques and Defenses......Page 57
โ–  1 Footprinting......Page 59
Search Engines......Page 60
Domain Registrars......Page 64
Regional Internet Registries......Page 68
DNS Reverse-Lookups......Page 70
Mail Exchange......Page 71
Zone Transfers......Page 72
Traceroute......Page 74
Summary......Page 75
โ–  2 Scanning and Identification......Page 77
Ping Sweeping......Page 79
TCP Pinging......Page 80
TCP Connect......Page 81
TCP SYN/Half-Open......Page 82
FIN......Page 83
XMAS......Page 84
RPC......Page 85
ACK......Page 86
UDP......Page 87
Fingerprinting......Page 88
Summary......Page 90
โ–  3 Enumeration......Page 91
Enumerate Remote Services......Page 92
FTP (File Transfer Protocol): 21 (TCP)......Page 93
Telnet: 23 (TCP)......Page 94
SMTP (Simple Mail Transfer Protocol):25 (TCP)......Page 95
DNS (Domain Name System):53 (TCP/UDP)......Page 97
Finger: 79 (TCP)......Page 98
HTTP (Hypertext Transfer Protocol): 80 (TCP)......Page 99
Portmapper: 111 (TCP)......Page 101
NNTP (Network News Transfer Protocol): 119 (TCP)......Page 103
Samba: 137 to 139 (TCP and UDP)......Page 104
IMAP2/IMAP4 (Internet Message Access Protocol 2/4): 143 (TCP)......Page 105
SNMP (Simple Network Management Protocol): 161, 162 (UDP)......Page 106
HTTPS (Secure Hypertext Transfer Protocol): 443 (TCP)......Page 107
IMAPS (Secure Internet Message Access Protocol): 993 (TCP)......Page 108
MySQL: 3306 (TCP)......Page 109
Automated Banner-Grabbing......Page 110
Summary......Page 112
โ–  4 Remote Hacking......Page 113
Intrusion Tactics......Page 114
Remote Service Vulnerabilities......Page 118
Application Vulnerabilities......Page 159
Nessus......Page 160
Obtaining a Shell......Page 161
Port Redirection......Page 164
Cracking /etc/shadow......Page 165
Summary......Page 166
โ–  5 Privilege Escalation......Page 167
Group Memberships and Incorrect File Permissions......Page 168
"." in PATH......Page 170
Kernel Flaws......Page 171
Improper Input Validation......Page 172
Core Dumps......Page 173
Summary......Page 174
โ–  6 Hiding......Page 175
Shell History......Page 176
Cleaning /var......Page 177
Backdoors......Page 178
Changing a Local Account's uid to 0......Page 179
.rhosts......Page 180
SSH's authorized_keys......Page 181
Rootkits......Page 182
Summary......Page 184
Part II Host Hardening......Page 185
โ–  7 Default Settings and Services......Page 187
Remove "." from the PATH Variable......Page 188
Use TCP Wrappers......Page 189
Disable Unnecessary Services......Page 190
WU-FTPD......Page 191
Sendmail......Page 192
BIND (DNS)......Page 194
Apache (HTTP and HTTPS)......Page 195
Samba......Page 196
Summary......Page 197
โ–  8 User and File-System Privileges......Page 199
File Permissions: A Quick Tutorial......Page 200
World-Readable Files......Page 201
The umask Value......Page 202
Important Files......Page 203
Disk Partitions......Page 205
Implement the wheel Group......Page 206
Summary......Page 207
โ–  9 Logging and Patching......Page 209
Log Files......Page 210
Log Rotation......Page 212
Patching......Page 213
Summary......Page 214
Part III Special Topics......Page 215
โ–  10 Nessus Attack Scripting Language (NASL)......Page 217
Example Vulnerability......Page 218
The Plug-in......Page 219
Running the Plug-in......Page 222
Summary......Page 223
โ–  11 Wireless Hacking......Page 225
Introduction to WEP......Page 226
Antennas......Page 227
Airsnort......Page 228
Fata-Jack......Page 229
Securing Wireless Networks......Page 230
Summary......Page 231
โ–  12 Hacking with the Sharp Zaurus PDA......Page 233
Kismet......Page 234
Qpenmapfe......Page 235
OpenSSH......Page 236
Hping2......Page 237
VNC Server......Page 238
Tcpdump......Page 239
zNessus......Page 240
Dig......Page 241
Summary......Page 242
โ–  Index......Page 243
Local Disk......Page 0
file:///C|/Documents and Settings/me/ใƒ‡ใ‚นใ‚ฏใƒˆใƒƒใƒ—/desktop/pictures/getpedia.html......Page 1


๐Ÿ“œ SIMILAR VOLUMES


HackNotes(tm) Linux and Unix Security Po
โœ Nitesh Dhanjani ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› McGraw-Hill Osborne Media ๐ŸŒ English

This book provides a very rare gift in the field of information security - brevity. It goes to the point. It explains many terms, some of which I had given up trying to understand, in incredibly simple sentences. Normally, halfway through a book, I've already forgotten the beginning - not with th

HackNotes (tm) Linux and Unix Security P
โœ Nitesh Dhanjani ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› McGraw-Hill Osborne Media ๐ŸŒ English

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most t

HackNotes(tm) Network Security Portable
โœ Michael Horton, Clinton Mugge ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› McGraw-Hill Osborne Media ๐ŸŒ English

Now, let me disclaim that I am not a big fan of thin books claiming to be "comprehensive". In fact, I was deeply suspicious while getting this "Hacknotes" thing. Was I up for a pleasant surprise!! This book does deliver what it promises. It walks a fine line of being both wide and deep, which I am s

HackNotes(tm) Network Security Portable
โœ Michael Horton, Clinton Mugge ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› McGraw-Hill Osborne Media ๐ŸŒ English

Now, let me disclaim that I am not a big fan of thin books claiming to be "comprehensive". In fact, I was deeply suspicious while getting this "Hacknotes" thing. Was I up for a pleasant surprise!! This book does deliver what it promises. It walks a fine line of being both wide and deep, which I am s