Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Attack Analysis part7

Attack Analysis part7

Ratings:

5.0

(1)
|Views: 28 |Likes:
Published by Sir Hacks alot

More info:

Published by: Sir Hacks alot on Oct 30, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/31/2010

pdf

text

original

 
LESSON 7ATTACK ANALYSIS
 
“License for Use” Information
The following lessons and workbooks are open and publicly available under the followingterms and conditions of ISECOM:All works in the Hacker Highschool project are provided for non-commercial use withelementary school students, junior high school students, and high school students whether in apublic institution, private institution, or a part of home-schooling. These materials may not bereproduced for sale in any form. The provision of any class, course, training, or camp withthese materials for which a fee is charged is expressly forbidden without a license includingcollege classes, university classes, trade-school classes, summer or computer camps, andsimilar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page atwww.hackerhighschool.org/license.The HHS Project is a learning tool and as with any learning tool, the instruction is the influenceof the instructor and not the tool. ISECOM cannot accept responsibility for how anyinformation herein is applied or abused.The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship.All works copyright ISECOM, 2004.
2
 
 
LESSON 7 – ATTACK ANALYSIS
 
Table of Contents
“License for Use” Information..................................................................................................................2Contributors................................................................................................................................................47.0 Introduction..........................................................................................................................................57.1 Netstat and Host Application Firewalls............................................................................................67.1.1 Netstat............................................................................................................................................67.1.2 Firewalls..........................................................................................................................................77.1.3 Exercises.........................................................................................................................................87.2 Packet Sniffers......................................................................................................................................97.2.1 Sniffing............................................................................................................................................97.2.2 Decoding Network Traffic.........................................................................................................117.2.3 Sniffing Other Computers..........................................................................................................127.2.4 Intrusion Detection Systems......................................................................................................137.2.5 Exercises.......................................................................................................................................137.3 Honeypots and Honeynets..............................................................................................................147.3.1 Types of Honeypots....................................................................................................................147.3.2 Building a Honeypot..................................................................................................................157.3.3 Exercises.......................................................................................................................................15Further Reading........................................................................................................................................17Glossary.....................................................................................................................................................18
3
 
LESSON 7 – ATTACK ANALYSIS

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->