Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Buy Now $27.99
Standard view
Full view
of .
Look up keyword or section
Like this
4Activity

Table Of Contents

Preface
Chapter 1
CHAPTER 1
Network Security Assessment
IP: The Foundation of the Internet
Classifying Internet-Based Attackers
Assessment Service Definitions
Network Security Assessment Methodology
Bulk Network Scanning and Probing
The Cyclic Assessment Approach
Enumeration Countermeasures
Chapter 4
CHAPTER 4
IP Network Scanning
ICMP Probing
Identifying Subnet Broadcast Addresses
TCP Port Scanning
Stealth TCP Scanning Methods
Proxy bounce scanning
Sniffer-based spoofed scanning
IP ID header scanning
UDP Port Scanning
IDS Evasion and Filter Circumvention
• Strict Source and Route Record (SSRR)
Low-Level IP Assessment
Passively Monitoring ICMP Responses
Network Scanning Recap
Inverse TCP port scanning
Network Scanning Countermeasures
Chapter 5
CHAPTER 5
Assessing Remote Information Services
Remote Information Services
systat and netstat
auth
SNMP
Compromising Devices by Reading from SNMP
Compromising Devices by Writing to SNMP
LDAP
rwho
RPC rusers
Remote Information Services Countermeasures
Chapter 6
CHAPTER 6
Assessing Web Services
Web Services
Identifying the Web Service
Identifying Subsystems and Components
Default IIS ISAPI Extensions
Investigating Web Service Vulnerabilities
IIS ASP sample scripts and tools
HTTP Proxy Component Exposures
Accessing Poorly Protected Information
Assessing CGI Scripts and Custom ASP Pages
URL query-string manipulation
User cookie manipulation
Error-Handling Problems
Web Services Countermeasures
Chapter 7
CHAPTER 7
Assessing Remote Maintenance Services
Remote Maintenance Services
SSH Brute-Force Password Grinding
SSH1 CRC32 compensation vulnerability
OpenSSH challenge-response vulnerability
Telnet
Telnet Brute-Force Password-Grinding
R-Services
X Windows
Take screenshots of specific open windows
Microsoft Remote Desktop Protocol
RDP Brute-Force Password Grinding
VNC Brute-Force Password Grinding
Circumventing Stateful Filters Using FTP
FTP Process Manipulation Attacks
ProFTPD Vulnerabilities
FTP Services Countermeasures
Database Services
Microsoft SQL Server
Oracle
ORACLE
Oracle Brute-Force and Post-Authentication Issues
MySQL
MySQL Process-Manipulation Vulnerabilities
Database Services Countermeasures
Chapter 9
CHAPTER 9
Assessing Windows Networking Services
Microsoft Windows Networking Services
Microsoft RPC Services
Enumerating System Information
The NetBIOS Name Service
The NetBIOS Datagram Service
The NetBIOS Session Service
The CIFS Service
Unix Samba Vulnerabilities
Windows Networking Services Countermeasures
Assessing Email Services
Email Service Protocols
SMTP
SMTP Open Relay Testing
POP-2 and POP-3
POP-3 Brute-Force Password-Grinding
Qualcomm QPOP process-manipulation vulnerabilities
IMAP
Email Services Countermeasures
Chapter 11
CHAPTER 11
Assessing IP VPN Services
IPsec VPNs
Attacking IPsec VPNs
Check Point VPN Security Issues
Microsoft PPTP
VPN Services Countermeasures
Assessing Unix RPC Services
Enumerating Unix RPC Services
RPC Service Vulnerabilities
Unix RPC Services Countermeasures
Application-Level Risks
The Fundamental Hacking Concept
The Reasons Why Software Is Vulnerable
Network Service Vulnerabilities and Attacks
Memory Manipulation Attacks
Classic Buffer-Overflow Vulnerabilities
Heap Wrap-Around Attacks
Format String Bugs
Memory Manipulation Attacks Recap
Mitigating Process Manipulation Risks
Recommended Secure Development Reading
Example Assessment Methodology
Network Scanning
IP ID sequence generation
Accessible Network Service Identification
• FrontPage Server Extensions
• Outlook Web Access (OWA)
Investigation of Known Vulnerabilities
Network Service Testing
Methodology Flow Diagram
Recommendations
Long-Term Recommendations
Closing Comments
TCP, UDP Ports, and ICMP Message Types
TCP Ports
UDP Ports
ICMP Message Types
Sources of Vulnerability Information
Security Mailing Lists
Vulnerability Databases and Lists
Underground Web Sites
Security Events and Conferences
Index
P. 1
Network Security Assessment: Know Your Network

Network Security Assessment: Know Your Network

Ratings:

4.0

(1)
|Views: 2,941|Likes:

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup.If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start?Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed.This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup.If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start?Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed.This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.

More info:

Publish date: Mar 3, 2008
Added to Scribd: May 16, 2009
Copyright:Traditional Copyright: All rights reservedISBN:9780596520809
List Price: $27.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
See more
See less

07/09/2015

398

9780596520809

$27.99

USD

You're Reading a Free Preview
Pages 16 to 32 are not shown in this preview.
You're Reading a Free Preview
Pages 60 to 141 are not shown in this preview.
You're Reading a Free Preview
Pages 157 to 204 are not shown in this preview.
You're Reading a Free Preview
Pages 220 to 398 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->