Security warrior
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Beijing ; Sebastopol, California :
O'Reilly
2004.
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626967906719 |
Tabla de Contenidos:
- Security Warrior; Part I: Software Cracking; Part II: Network Stalking; Part III: Platform Attacks; Part IV: Advanced Defense; Part V: Appendix; Conventions Used in This Book; Using Code Examples; Comments and Questions; Acknowledgments; I. Software Cracking; 1.1.2. Addressing; 1.2. ASM Opcodes; 1.3. References; 2. Windows Reverse Engineering; 2.2. Reversing Tools; 2.2.2. Disassemblers; 2.2.3. Debuggers; 2.2.4. System Monitors; 2.2.5. Unpackers; 2.2.5.2. ProcDump; 2.2.6. Personal Firewalls; 2.2.7. Install Managers; 2.3. Reverse Engineering Examples; 2.3.2. Example 2: Reversing Malicious Code
- 2.4. References3. Linux Reverse Engineering; 3.1.2. Debugging; 3.1.3. Runtime Monitoring; 3.1.4. Disassembly; 3.1.5. Hex Dumps; 3.2. A Good Disassembly; 3.2.2. Intermediate Code Generation; 3.2.3. Program Control Flow; 3.3. Problem Areas; 3.3.2. Antidisassembly; 3.4. Writing New Tools; 3.4.2. Debugging with ptrace; 3.4.3. The GNU BFD Library; 3.4.4. Disassembling with libopcodes; 3.5. References; 4. Windows CE Reverse Engineering; 4.1.2. Kernel, Processes, and Threads; 4.1.3. Memory Architecture; 4.1.4. Graphics, Windowing, and Event Subsystem (GWES); 4.2. CE Reverse Engineering Fundamentals
- 4.2.2. ARM Opcodes4.2.2.2. Branch with Link (BL); 4.2.2.3. Move (MOV); 4.2.2.4. Compare (CMP); 4.2.2.5. Load/Store (LDR/STR); 4.2.2.6. Shifting; 4.3. Practical CE Reverse Engineering; 4.3.2. CE Cracking Techniques; 4.3.2.2. strlen and wcslen; 4.3.2.3. strcmp and CMP; 4.3.2.4. NOP sliding; 4.3.3. Disassembling a CE Program; 4.3.4. Microsoft&s eMbedded Visual Tools; 4.3.5. Using the MVT; 4.3.6. Experiencing the MVC Environment; 4.3.7. Reverse Engineering test.exe; 4.4. Reverse Engineering serial.exe; 4.4.1.2. Debugging serial.exe; 4.4.2. Step-Through Investigation; 4.4.3. Abusing the System
- 4.4.4. The Cracks4.4.4.2. Crack 2: The NOP slide; 4.4.4.3. Crack 3: Preventive maintenance; 4.5. References; 5. Overflow Attacks; 5.2. Understanding Buffers; 5.3. Smashing the Stack; 5.4. Heap Overflows; 5.5. Preventing Buffer Overflows; 5.5.2. Compiler Add-Ons; 5.5.3. Miscellaneous Protection Methods; 5.6. A Live Challenge; 5.7. References; II. Network Stalking; 6.2. Encapsulation; 6.3. TCP; 6.3.2. TCP Packet Field Descriptions; 6.4. IP; 6.5. UDP; 6.6. ICMP; 6.7. ARP; 6.8. RARP; 6.9. BOOTP; 6.10. DHCP; 6.11. TCP/IP Handshaking; 6.12. Covert Channels; 6.13. IPv6; 6.13.2. IPv6 Addressing
- 6.13.3. Security Aspects of IPv66.14. Ethereal; 6.15. Packet Analysis; 6.16. Fragmentation; 6.16.2. Exploiting Fragments; 6.16.3. Fragmenting with Nmap; 6.16.4. hping; 6.16.5. Fragroute; 6.17. References; 7. Social Engineering; 7.1.2. Common Misconceptions; 7.2. Performing the Attacks; 7.2.1.2. Sample 2: Impersonation and authority; 7.2.1.3. Sample 3: Blackmail; 7.2.1.4. Sample 4: Sympathy; 7.2.2. Preparing for an Attack; 7.2.3. Social Engineering Action Plan; 7.2.4. Social Engineering Information Collection Template; 7.3. Advanced Social Engineering; 7.4. References; 8. Reconnaissance
- 8.1.1.2. Web reconnaissance