Penetration Testing and Network Defense

Penetration Testing and Network Defense
ISBN-10
1587052083
ISBN-13
9781587052088
Category
Computers
Pages
598
Language
English
Published
2006
Publisher
Pearson Education
Authors
Andrew Whitaker, Daniel P. Newman

Description

The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems�

Other editions

Similar books

  • Red Team Testing
    By Chris Nickerson

    Red Team Testing

  • Hands-On Ethical Hacking and Network Defense
    By Michael T. Simpson, Nicholas Antill

    This text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker.

  • Hack I.T.: Security Through Penetration Testing
    By T. J. Klevinsky, Scott Laliberte, Ajay Gupta

    The binaries for each platform normally work fine , but we always recommend being wary of binaries unless you are confident of the source and its contents . Use : To use John the Ripper , you first need a password file .

  • Penetration Testing: A Hands-On Introduction to Hacking
    By Georgia Weidman

    In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

  • Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
    By William Easttom II

    Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets–and expand your career options.

  • Advanced Penetration Testing for Highly-Secured Environments
    By Lee Allen, Kevin Cardwell

    Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book Learn how to build your own pentesting lab environment to practice advanced techniques Customize your own scripts, and ...

  • Hands-on Ethical Hacking and Network Defense
    By Michael T. Simpson, Kent Backman, James E. Corley

    If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field.

  • Applied Network Security
    By Arthur Salmon, Warun Levesque, Michael McLafferty

    Master the art of detecting and averting advanced network security attacks and techniques About This Book Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and ...

  • Advanced Penetration Testing: Hacking the World's Most Secure Networks
    By Wil Allsopp

    Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and ...

  • Mastering Kali Linux for Advanced Penetration Testing
    By Vijay Kumar Velu

    About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and ...