Security warrior

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's...

Descripción completa

Detalles Bibliográficos
Autor principal: Peikari, Cyrus (-)
Otros Autores: Chuvakin, Anton
Formato: Libro electrónico
Idioma:Inglés
Publicado: Beijing ; Sebastopol, California : O'Reilly 2004.
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626967906719
Tabla de Contenidos:
  • Security Warrior; Part I: Software Cracking; Part II: Network Stalking; Part III: Platform Attacks; Part IV: Advanced Defense; Part V: Appendix; Conventions Used in This Book; Using Code Examples; Comments and Questions; Acknowledgments; I. Software Cracking; 1.1.2. Addressing; 1.2. ASM Opcodes; 1.3. References; 2. Windows Reverse Engineering; 2.2. Reversing Tools; 2.2.2. Disassemblers; 2.2.3. Debuggers; 2.2.4. System Monitors; 2.2.5. Unpackers; 2.2.5.2. ProcDump; 2.2.6. Personal Firewalls; 2.2.7. Install Managers; 2.3. Reverse Engineering Examples; 2.3.2. Example 2: Reversing Malicious Code
  • 2.4. References3. Linux Reverse Engineering; 3.1.2. Debugging; 3.1.3. Runtime Monitoring; 3.1.4. Disassembly; 3.1.5. Hex Dumps; 3.2. A Good Disassembly; 3.2.2. Intermediate Code Generation; 3.2.3. Program Control Flow; 3.3. Problem Areas; 3.3.2. Antidisassembly; 3.4. Writing New Tools; 3.4.2. Debugging with ptrace; 3.4.3. The GNU BFD Library; 3.4.4. Disassembling with libopcodes; 3.5. References; 4. Windows CE Reverse Engineering; 4.1.2. Kernel, Processes, and Threads; 4.1.3. Memory Architecture; 4.1.4. Graphics, Windowing, and Event Subsystem (GWES); 4.2. CE Reverse Engineering Fundamentals
  • 4.2.2. ARM Opcodes4.2.2.2. Branch with Link (BL); 4.2.2.3. Move (MOV); 4.2.2.4. Compare (CMP); 4.2.2.5. Load/Store (LDR/STR); 4.2.2.6. Shifting; 4.3. Practical CE Reverse Engineering; 4.3.2. CE Cracking Techniques; 4.3.2.2. strlen and wcslen; 4.3.2.3. strcmp and CMP; 4.3.2.4. NOP sliding; 4.3.3. Disassembling a CE Program; 4.3.4. Microsoft&s eMbedded Visual Tools; 4.3.5. Using the MVT; 4.3.6. Experiencing the MVC Environment; 4.3.7. Reverse Engineering test.exe; 4.4. Reverse Engineering serial.exe; 4.4.1.2. Debugging serial.exe; 4.4.2. Step-Through Investigation; 4.4.3. Abusing the System
  • 4.4.4. The Cracks4.4.4.2. Crack 2: The NOP slide; 4.4.4.3. Crack 3: Preventive maintenance; 4.5. References; 5. Overflow Attacks; 5.2. Understanding Buffers; 5.3. Smashing the Stack; 5.4. Heap Overflows; 5.5. Preventing Buffer Overflows; 5.5.2. Compiler Add-Ons; 5.5.3. Miscellaneous Protection Methods; 5.6. A Live Challenge; 5.7. References; II. Network Stalking; 6.2. Encapsulation; 6.3. TCP; 6.3.2. TCP Packet Field Descriptions; 6.4. IP; 6.5. UDP; 6.6. ICMP; 6.7. ARP; 6.8. RARP; 6.9. BOOTP; 6.10. DHCP; 6.11. TCP/IP Handshaking; 6.12. Covert Channels; 6.13. IPv6; 6.13.2. IPv6 Addressing
  • 6.13.3. Security Aspects of IPv66.14. Ethereal; 6.15. Packet Analysis; 6.16. Fragmentation; 6.16.2. Exploiting Fragments; 6.16.3. Fragmenting with Nmap; 6.16.4. hping; 6.16.5. Fragroute; 6.17. References; 7. Social Engineering; 7.1.2. Common Misconceptions; 7.2. Performing the Attacks; 7.2.1.2. Sample 2: Impersonation and authority; 7.2.1.3. Sample 3: Blackmail; 7.2.1.4. Sample 4: Sympathy; 7.2.2. Preparing for an Attack; 7.2.3. Social Engineering Action Plan; 7.2.4. Social Engineering Information Collection Template; 7.3. Advanced Social Engineering; 7.4. References; 8. Reconnaissance
  • 8.1.1.2. Web reconnaissance