Stealing The Network: How to Own the BoxStealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
|
Contents
2 | |
21 | |
30 | 43 |
cant disclose much about my location Lets just say its damp | 75 |
Chapter 5 | 133 |
its in the stores Theres been a fair bit of demand for it on | 134 |
Chapter 6 | 155 |
Flying the Friendly SkiesJoe Grand | 161 |
Chapter 7 | 169 |
discardMark Burnett | 181 |
Chapter 8 | 189 |
imagine the looks on their faces when they find out they were | 190 |
Chapter 9 | 211 |
Chapter 10 | 235 |
The Art of TrackingMark Burnett | 261 |
Other editions - View all
Common terms and phrases
3lph_ admin administrators algorithm anti-virus attack checklogin.asp Cisco routers client company’s configuration connection crypto cryptographers Daddo database DEF CON device disassembly Dizzy doesn’t dw0rf e-mail employees encryption exploit firewall going guess hacker hacking host IDSs install Internet IP address John the Ripper laptop Linux log entries log files login look machine mail server messages Microsoft Mobitex nmap Okay OpenBSD operating system packet password port port-scanning pretty printer probably problem protocol proxy router scan scanrand script SMTP someone SQL injection SQL Server stuff sure syslog tanzplatz target tell telnet temor TFTP there’s thing traffic tunnel username virus vulnerable Web server what’s Windows wireless worm
Popular passages
Page v - Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow, lolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product...
Page i - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...
Page v - ... deploying and supporting world-class enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson...
Page v - Mayes, John Mesjak, Peg O'Donnell, Sandra Patterson, Betty Redmond, Roy Remer, Ron Shapiro, Patricia Kelly, Andrea Tetrick, Jennifer Pascal, Doug Reil, David Dahl, Janis Carpenter, and Susan Fryer of Publishers Group West for sharing their incredible marketing experience and expertise.
References to this book
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks R.R. Brooks Limited preview - 2004 |