Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Enregistré dans:
Autres auteurs : | , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis with Tom Liston |
Édition : | 2nd edition |
Publié : |
Upper Saddle River, NJ :
Prentice Hall Professional Technical Reference
, cop. 2006 |
Description matérielle : | 1 vol. (XXXII-748 p.) |
Collection : | Radia Perlman series in computer networking and security |
Contenu : | Introduction. Networking overview: pretty much everything you need to know about networking to follow the rest of this book. Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book. Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book. Phase 1: reconnaissance. Phase 2: scanning. Phase 3: gaining access using application and operating system attacks. Phase 3: gaining access using network attacks. Phase 3: denial-of-service attacks. Phase 4: maintaining access: trojans, backdoors, and rootkits...Oh my!. Phase 5: covering tracks and hiding. Putting it all together: anatomy of an attack. The future, references, and conclusions |
Sujets : |
Chargement en cours