Este sitio utiliza cookies propias y de terceros. Si continúa navegando consideramos que acepta el uso de cookies. OK Más Información.

Seven Deadliest Network Attacks

  • 0 Respuestas
  • 1562 Vistas

0 Usuarios y 1 Visitante están viendo este tema.

Desconectado ZanGetsu

  • *
  • Underc0der
  • Mensajes: 325
  • Actividad:
    0%
  • Reputación 0
  • I ZanGetsu
    • Ver Perfil
  • Skype: thenicox
  • Twitter: black_zangetsu
« en: Junio 25, 2017, 03:20:44 am »

Contenido:
Código: [Seleccionar]

About the Authors

Introduction

Chapter 1 Denial of Service

How Denial of Service Works

Distributed Denial of Service

Overview of a Denial of Service Attack

Launching the Attack

Dangers of Denial of Service

Defense against Denial of Service

General Advice

Strategy

Network Configuration

DDoS Appliances

IDS/IPS Systems

Reacting to DDoS Attacks

Over-Provisioning and Adaptive Provisioning

The Future of Denial of Service

Attack

Defense

Summary

Endnotes

Chapter 2 War Dialing

How War Dialing Attacks Work

Gathering Numbers for War Dialing

Sweeping for Live Modems

Modem Reply Types

War Dialing Tools

The Danger of War Dialing

Out-of-Band Support Channels

Unauthorized Employee Access

Vendor Support Modems

The Future of War Dialing

Defenses against War Dialing

Attack Surface Reduction

Modem Hardening

System Hardening

Discovery

Summary

Endnotes

Chapter 3 Penetration “Testing”

How Penetration Testing Software Works

Dangers with Penetration Testing Tools

Nessus Vulnerability Scanning

Metasploit Framework

Hydra Password Attacks

Future of Penetration Testing Tools

Defenses against Penetration Testing Software

Password Complexity, Lockouts, and Logging

Endpoint Protection

Egress Filtering and Proxies

Intrusion Detection and Prevention

Logical Access Controls

Summary

Chapter 4 Protocol Tunneling

How Protocol Tunneling Works

The Great Firewall

Setting Up a Channel with SSH

Corkscrew and SSH over HTTPS

SSH over HTTP

Automation

Dangers of Protocol Tunneling

Defending against Protocol Tunneling

Preventing Protocol Tunneling

Detecting Protocol Tunneling

The Future of Protocol Tunneling

Summary

Chapter 5 Spanning Tree Attacks

Layers of the Internet

Understanding the Spanning Tree Protocol

The Problem of Loops

Solving the Loop Problem with the Spanning Tree Protocol

How Spanning Tree Attacks Work

Capturing BPDU Traffic

Taking over the Root Bridge

Denial of Service

Man in the Middle

Forging BPDU Frames

Discovering the Network

Dangers of Spanning Tree Attacks

Defending against Spanning Tree Attacks

Disable STP

Root Guard and BPDU Guard

The Future of Spanning Tree Attacks

Summary

Endnote

Chapter 6 Man-in-the-Middle

How Man-in-the-Middle Attacks Work

Sniffing Network Traffic

Replay Attacks

Command Injection

Internet Control Message Protocol Redirect

Denial of Service

Dangers with Man-in-the-Middle Attacks

Address Resolution Protocol Cache Poisoning

Secure Sockets Layer Man-in-the-Middle

Domain Name System Spoofing

Future of Man-in-the-Middle Attacks

Defenses against Man-in-the-Middle Attacks

Knowing the Threats

Defense-in-Depth Approach

Public Key Infrastructure

Port Security

Use Encrypted Protocols

Low-Level Detection

Summary

Chapter 7 Password Replay

How Password Replay Works

Simple Password Sniffing

Password Replay

Address Resolution Protocol Poison Routing

Dangers of Password Replay

Defending against Password Replay

The Future of Password Replay

Summary

Endnote

Index


 

¿Te gustó el post? COMPARTILO!



Nmap 6 Network Exploration and Security Auditing Cookbook

Iniciado por Stuxnet

Respuestas: 5
Vistas: 3537
Último mensaje Julio 11, 2013, 03:15:44 pm
por Snifer
[LIBRO] Cisco Network Security Little Black

Iniciado por ZanGetsu

Respuestas: 0
Vistas: 1196
Último mensaje Noviembre 22, 2016, 03:28:11 pm
por ZanGetsu