Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

Chapter 5Performing Host Reconnaissance77
Chapter 6Understanding and Attempting Session Hijacking127
Chapter 7Performing Web Server Attacks177
Chapter 8Performing Database Attacks247
Chapter 9Password Cracking279
Chapter 10Attacking the Network321
Chapter 11Scanning and Penetrating Wireless Networks349
Chapter 12Using Trojans and Backdoor Applications367
Chapter 13Penetrating UNIX, Microsoft, and Novell Servers439
Chapter 14Understanding and Attempting Buffer Overflows461
Chapter 15Denial-of-Service Attacks481
Chapter 16Case Study: A Methodical Step-By-Step Penetration Test501
Overview of Penetration Testing
CHAPTER
Defining Penetration Testing
Assessing the Need for Penetration Testing
Attack Stages
Choosing a Penetration Testing Vendor
Preparing for the Test
Summary
Ethics of Penetration Testing
Logging
To Fix or Not to Fix
Step-by-Step Plan
Open-Source Security Testing Methodology Manual
Documentation
Human Psychology
What It Takes to Be a Social Engineer
First Impressions and the Social Engineer
Tech Support Impersonation
Third-Party Impersonation
E-Mail Impersonation
End User Impersonation
Customer Impersonation
Reverse Social Engineering
Protecting Against Social Engineering
Passive Host Reconnaissance
Active Host Reconnaissance
Port Scanning
Detecting a Scan
Detecting Session Hijacking
Protecting Against Session Hijacking
Understanding Web Languages
Cookie Guessing
Brute Force Attacks
Detecting Web Attacks
Protecting Against Web Attacks
Testing Database Vulnerabilities
Securing Your SQL Server
Detecting Database Attacks
Protecting Against Database Attacks
References and Further Reading
Password Hashing
Password-Cracking Tools
Detecting Password Cracking
Protecting Against Password Cracking
Bypassing Firewalls
Evading Intruder Detection Systems
Testing Routers for Vulnerabilities
Securing the Network
History of Wireless Networks
Antennas and Access Points
Wireless Security Technologies
War Driving
Detecting Wireless Attacks
Case Study
Trojans, Viruses, and Backdoor Applications
Common Viruses and Worms
Trojans and Backdoors
Detecting Trojans and Backdoor Applications
Prevention
General Scanners
UNIX Permissions and Root Access
Microsoft Security Models and Exploits
Novell Server Permissions and Vulnerabilities
Detecting Server Attacks
Preventing Server Attacks
Memory Architecture
Types of DoS Attacks
Tools for Executing DoS Attacks
Detecting DoS Attacks
Preventing DoS Attacks
Case Study: LCN Gets Tested
INDEX
0 of .
Results for:
No results containing your search query
P. 1
Cisco.press.penetration.testing.and.Network.defense.oct.2005

Cisco.press.penetration.testing.and.Network.defense.oct.2005

Ratings: (0)|Views: 89 |Likes:
Published by palosot
Network Penetration and testing with Cisco Guys
Network Penetration and testing with Cisco Guys

More info:

Published by: palosot on Oct 03, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/05/2014

pdf

text

original

You're Reading a Free Preview
Pages 13 to 148 are not shown in this preview.
You're Reading a Free Preview
Pages 161 to 162 are not shown in this preview.
You're Reading a Free Preview
Pages 175 to 221 are not shown in this preview.
You're Reading a Free Preview
Pages 234 to 356 are not shown in this preview.
You're Reading a Free Preview
Pages 369 to 625 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->