ABSTRACT

This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

chapter Chapter 1|12 pages

Introduction: The Chess Game

part I|298 pages

Foundation Material

chapter Chapter 2|15 pages

Case Study in Subversion

chapter Chapter 3|25 pages

Know Your Opponent

chapter Chapter 4|45 pages

Anatomy of an Attack

chapter Chapter 5|85 pages

Your Defensive Arsenal

chapter Chapter 6|40 pages

Programming

chapter Chapter 7|41 pages

IP and Layer 2 Protocols

chapter Chapter 8|40 pages

The Protocols

part II|292 pages

System and Network Penetration

chapter Chapter 9|38 pages

Domain Name System (DNS)

chapter Chapter 10|60 pages

Directory Services

chapter Chapter 11|52 pages

Simple Mail Transfer Protocol (SMTP)

chapter Chapter 12|40 pages

Hypertext Transfer Protocol (HTTP)

chapter Chapter 13|26 pages

Database Hacking and Security

chapter Chapter 14|21 pages

Malware and Viruses

chapter Chapter 15|52 pages

Network Hardware

part III|222 pages

Consolidation

chapter Chapter 16|122 pages

Consolidating Gains

chapter Chapter 17|66 pages

After the Fall

chapter Chapter 18|32 pages

Conclusion