Register your product to gain access to bonus material or receive a coupon.
The practical guide to simulating, detecting, and responding to network attacks
Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.
Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization’s network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks.
Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks.
Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources.
“This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade.”
–Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems®
|
12 of 16 people found the following review helpful
By
This review is from: Penetration Testing and Network Defense (Paperback)
Penetration testing is becoming a hot topic again, but the available books on the subject continue to underwhelm. Penetration Testing and Network Defense (PTAND), published in the fall of 2005, would be a four star book if it had been published two years earlier. Stephen Northcutt, unlike all other reviewers, noticed this fact as well. When you combine this problem with PTAND with several other deficiencies, the result is a book you can unfortunately skip.I usually try to avoid reading and reviewing books that I expect not to like. However, PTAND looked promising. I have several excellent Cisco Press books, like Cisco Router Firewall Security. A major problem with PTAND is that it is largely out of date. For example, Ch 12 discusses malware, but uses B02K, SubSeven, the Melissa virus, and Brown Orifice as examples. In Ch 6, session hijacking is done with Hunt and Juggernaut, but ignores Ettercap, Cain and Abel, and Yersinia. (I found it funny that p 131 of this... Read more
4 of 5 people found the following review helpful
By
This review is from: Penetration Testing and Network Defense (Paperback)
Andrew Whitaker and Daniel Newman show how to protect a network by showing how to attack it. Penetration Testing and Network Defense, written for network security professionals, has strong disclosures that warn against the temptation to try some of the techniques taught in the book without written permission from those who own target systems. If you have been administering a network or consulting, you will already be familiar with much of the contents of the book. However, the book saves the reader the time of going many places to acquire all this information.There are a few non-technical parts to the book. Chapter 4, Performing Social Engineering, should be ready by practically everyone who works with computers or lives in the information age for that matter. The authors almost had me thinking like a criminal. But this is a necessary exercise to stay one step ahead of the bad guys. Appendix A walks the reader through preparing a security policy. Most of... Read more
4 of 5 people found the following review helpful
This review is from: Penetration Testing and Network Defense (Paperback)
First of all, I want to say that the authors did a superb job writing Penetration Testing and Network Defense. Overall, I was very pleased with the book. It is definitely an asset to all areas of Information Technology and Information Security. The book appears to have been written for any experience level or even job level for that matter. There is a good balance between theory, best practices, demonstrations, and case studies.Personally, I found that the book was easy to read. The thing that is seen with most security books is that the material is often dry and boring. I didn't find this to be true with this book. Although technical terms are used in introducing particular tools, explanations are easy to understand as metaphors/analogies are used to simplify the concepts for inexperienced users. The authors were able to clearly demonstrate tools by using real world examples which the reader can relate to. Another thing I found helpful was the fact that... Read more |
Penetration Testing and Network Defense
Reviewer Name: John Ainsworth, Network Administrator
Reviewer Certification: CCNP
Rating: ***** out of *****
Andrew Whitaker and Daniel Newman show how to protect a network by showing how to attack it. Penetration Testing and Network Defense, written for network security professionals, has strong disclosures that warn against the temptation to try some of the techniques taught in the book without written permission from those who own target systems. If you have been administering a network or consulting, you will already be familiar with much of the contents of the book. However, the authors present the material very well. The book saves the reader the time of going many places to acquire all this information.
There are a few non-technical parts to the book. Chapter 4, Performing Social Engineering, should be read by practically everyone who works with computers or lives in the information age for that matter. This was the scary part for me. The authors almost had me thinking like a criminal. But this is a necessary exercise to stay one step ahead of the bad guys. There is apparently an emotional high for some to see what they can get away with. And then there is financial incentive as well. Appendix A walks the reader through preparing a security policy.
Most of the book is written directly to those who already have a working knowledge of networking and the TCP/IP protocol. For over 10 chapters the authors cover many techniques for stealing data or taking down a network. The perspective of this guide flip-flops from hacker to security administrator, showing both how to defend and how to get around that defense. There is mention of many of the newer features available in systems today, such as Flood Defender for Cisco PIX firewall. All of the best tools are listed, both free and commercial, for evaluating the security of a network. I give Penetration Testing and Network Defense five stars because it is easy to read and has excellent real world examples. I learned several new things and got some old questions answered. The book reinforces one of life's most important lessons I try to teach my kids. Respect other people: respect other people's things.
Download - 122 KB -- Index
Appendix B: Tools (PDF)
Foreword
Introduction
Part I Overview of Penetration Testing
Chapter 1 Understanding Penetration Testing
Defining Penetration Testing
Assessing the Need for Penetration Testing
Proliferation of Viruses and Worms
Wireless LANs
Complexity of Networks Today
Frequency of Software Updates
Availability of Hacking Tools
The Nature of Open Source
Reliance on the Internet
Unmonitored Mobile Users and Telecommuters
Marketing Demands
Industry Regulations
Administrator Trust
Business Partnerships
Hacktivism
Attack Stages
Choosing a Penetration Testing Vendor
Preparing for the Test
Summary
Chapter 2 Legal and Ethical Considerations
Ethics of Penetration Testing
Laws
U.S. Laws Pertaining to Hacking
1973 U.S. Code of Fair Information Practices
1986 Computer Fraud and Abuse Act (CFAA)
State Laws
Regulatory Laws
1996 U.S. Kennedy-Kasselbaum Health Insurance Portability and Accountability
Act (HIPAA)
Graham-Leach-Bliley (GLB)
USA PATRIOT ACT
2002 Federal Information Security Management Act (FISMA)
2003 Sarbanes-Oxley Act (SOX)
Non-U.S. Laws Pertaining to Hacking
Logging
To Fix or Not to Fix
Summary
Chapter 3 Creating a Test Plan
Step-by-Step Plan
Defining the Scope
Social Engineering
Session Hijacking
Trojan/Backdoor
Open-Source Security Testing Methodology Manual
Documentation
Executive Summary
Project Scope
Results Analysis
Summary
Appendixes
Summary
Part II Performing the Test
Chapter 4 Performing Social Engineering
Human Psychology
Conformity Persuasion
Logic Persuasion
Need-Based Persuasion
Authority-Based Persuasion
Reciprocation-Based Social Engineering
Similarity-Based Social Engineering
Information-Based Social Engineering
What It Takes to Be a Social Engineer
Using Patience for Social Engineering
Using Confidence for Social Engineering
Using Trust for Social Engineering
Using Inside Knowledge for Social Engineering
First Impressions and the Social Engineer
Tech Support Impersonation
Third-Party Impersonation
E-Mail Impersonation
End User Impersonation
Customer Impersonation
Reverse Social Engineering
Protecting Against Social Engineering
Case Study
Summary
Chapter 5 Performing Host Reconnaissance
Passive Host Reconnaissance
A Company Website
EDGAR Filings
NNTP USENET Newsgroups
User Group Meetings
Business Partners
Active Host Reconnaissance
NSLookup/Whois Lookups
SamSpade
Visual Route
Port Scanning
TCP Connect() Scan
SYN Scan
NULL Scan
FIN Scan
ACK Scan
Xmas-Tree Scan
Dumb Scan
NMap
NMap Switches and Techniques
Compiling and Testing NMap
Fingerprinting
Footprinting
Detecting a Scan
Intrusion Detection
Anomaly Detection Systems
Misuse Detection System
Host-Based IDSs
Network-Based IDSs
Network Switches
Examples of Scan Detection
Detecting a TCP Connect() Scan
Detecting a SYN Scan
Detecting FIN, NULL, and Xmas-Tree Scans
Detecting OS Guessing
Case Study
Summary
Chapter 6 Understanding and Attempting Session Hijacking
Defining Session Hijacking
Nonblind Spoofing
Blind Spoofing
TCP Sequence Prediction (Blind Hijacking)
Tools
Juggernaut
Hunt
TTY-Watcher
T-Sight
Other Tools
Beware of ACK Storms
Kevin Mitnick’s Session Hijack Attack
Detecting Session Hijacking
Detecting Session Hijacking with a Packet Sniffer
Configuring Ethereal
Watching a Hijacking with Ethereal
Detecting Session Hijacking with Cisco IDS
Signature 1300: TCP Segment Overwrite
Signature 3250: TCP Hijack
Signature 3251: TCP Hijacking Simplex Mode
Watching a Hijacking with IEV
Protecting Against Session Hijacking
Case Study
Summary
Resources
Chapter 7 Performing Web Server Attacks
Understanding Web Languages
HTML
DHTML
XML
XHTML
JavaScript
JScript
VBScript
Perl
ASP
CGI
PHP Hypertext Preprocessor
ColdFusion
Java Once Called Oak
Client-Based Java
Server-Based Java
Website Architecture
E-Commerce Architecture
Apache HTTP Server Vulnerabilities
IIS Web Server
Showcode.asp
Privilege Escalation
Buffer Overflows
Web Page Spoofing
Cookie Guessing
Hidden Fields
Brute Force Attacks
Brutus
HTTP Brute Forcer
Detecting a Brute Force Attack
Protecting Against Brute Force Attacks
Tools
NetCat
Vulnerability Scanners
IIS Xploit
execiis-win32.exe
CleanIISLog
IntelliTamper
Web Server Banner Grabbing
Hacking with Google
Detecting Web Attacks
Detecting Directory Traversal
Detecting Whisker
Protecting Against Web Attacks
Securing the Operating System
Securing Web Server Applications
IIS
Apache
Securing Website Design
Securing Network Architecture
Case Study
Summary
Chapter 8 Performing Database Attacks
Defining Databases
Oracle
Structure
SQL
MySQL
Structure
SQL
SQL Server
Structure
SQL
Database Default Accounts
Testing Database Vulnerabilities
SQL Injection
System Stored Procedures
xp_cmdshell
Connection Strings
Password Cracking/Brute Force Attacks
Securing Your SQL Server
Authentication
Service Accounts
Public Role
Guest Account
Sample Databases
Network Libraries
Ports
Detecting Database Attacks
Auditing
Failed Logins
System Stored Procedures
SQL Injection
Protecting Against Database Attacks
Case Study
Summary
References and Further Reading
Chapter 9 Password Cracking
Password Hashing
Using Salts
Microsoft Password Hashing
UNIX Password Hashing
Password-Cracking Tools
John the Ripper
Pwdump3
L0phtcrack
Nutcracker
Hypnopædia
Snadboy Revelation
Boson GetPass
RainbowCrack
Detecting Password Cracking
Network Traffic
System Log Files
Account Lockouts
Physical Access
Dumpster Diving and Key Logging
Social Engineering
Protecting Against Password Cracking
Password Auditing
Logging Account Logins
Account Locking
Password Settings
Password Length
Password Expiration
Password History
Physical Protection
Employee Education and Policy
Case Study
Summary
Chapter 10 Attacking the Network
Bypassing Firewalls
Evading Intruder Detection Systems
Testing Routers for Vulnerabilities
CDP
HTTP Service
Password Cracking
Modifying Routing Tables
Testing Switches for Vulnerabilities
VLAN Hopping
Spanning Tree Attacks
MAC Table Flooding
ARP Attacks
VTP Attacks
Securing the Network
Securing Firewalls
Securing Routers
Disabling CDP
Disabling or Restricting the HTTP Service
Securing Router Passwords
Enabling Authentication for Routing Protocols
Securing Switches
Securing Against VLAN Hopping
Securing Against Spanning Tree Attacks
Securing Against MAC Table Flooding and ARP Attacks
Securing Against VTP Attacks
Case Study
Summary
Chapter 11 Scanning and Penetrating Wireless Networks
History of Wireless Networks
Antennas and Access Points
Wireless Security Technologies
Service Set Identifiers (SSIDs)
Wired Equivalent Privacy (WEP)
MAC Filtering
802.1x Port Security
IPSec
War Driving
Tools
NetStumbler
StumbVerter
DStumbler
Kismet
GPSMap
AiroPeek NX
AirSnort
WEPCrack
Detecting Wireless Attacks
Unprotected WLANs
DoS Attacks
Rogue Access Points
MAC Address Spoofing
Unallocated MAC Addresses
Preventing Wireless Attacks
Preventing Man-in-the-Middle Attacks
Establishing and Enforcing Standards for Wireless Networking
Case Study
Summary
Chapter 12 Using Trojans and Backdoor Applications
Trojans, Viruses, and Backdoor Applications
Common Viruses and Worms
Chernobyl
I Love You
Melissa
BugBear
MyDoom
W32/Klez
Blaster
SQL Slammer
Sasser
Trojans and Backdoors
Back Orifice 2000
Tini
Donald Dick
Rootkit
NetCat
SubSeven
Brown Orifice
Beast
Beast Server Settings
Beast Client
Detecting Trojans and Backdoor Applications
MD5 Checksums
Monitoring Ports Locally
Netstat
fport
TCPView
Monitoring Ports Remotely
Anti-virus and Trojan Scanners Software
Intrusion Detection Systems
Prevention
Case Study
Summary
Chapter 13 Penetrating UNIX, Microsoft, and Novell Servers
General Scanners
Nessus
SAINT
SARA
ISS
NetRecon
UNIX Permissions and Root Access
Elevation Techniques
Stack Smashing Exploit
rpc.statd Exploit
irix-login.c
Rootkits
Linux Rootkit IV
Beastkit
Microsoft Security Models and Exploits
Elevation Techniques
PipeUpAdmin
HK
Rootkits
Novell Server Permissions and Vulnerabilities
Pandora
NovelFFS
Detecting Server Attacks
Preventing Server Attacks
Case Study
Summary
Chapter 14 Understanding and Attempting Buffer Overflows
Memory Architecture
Stacks
Heaps
NOPs
Buffer Overflow Examples
Simple Example
Linux Privilege Escalation
Windows Privilege Escalation
Preventing Buffer Overflows
Library Tools to Prevent Buffer Overflows
Compiler-Based Solutions to Prevent Buffer Overflows
Using a Non-Executable Stack to Prevent Buffer Overflows
Case Study
Summary
Chapter 15 Denial-of-Service Attacks
Types of DoS Attacks
Ping of Death
Smurf and Fraggle
LAND Attack
SYN Flood
Tools for Executing DoS Attacks
Datapool
Jolt2
Hgod
Other Tools
Detecting DoS Attacks
Appliance Firewalls
Host-Based IDS
Signature-Based Network IDS
Network Anomaly Detectors
Preventing DoS Attacks
Hardening
Network Hardening
Application Hardening
Intrusion Detection Systems
Case Study
Summary
Chapter 16 Case Study: A Methodical Step-By-Step Penetration Test
Case Study: LCN Gets Tested
Planning the Attack
Gathering Information
Scanning and Enumeration
External Scanning
Wireless Scanning
Gaining Access
Gaining Access via the Website
Gaining Access via Wireless
Maintain Access
Covering Tracks
Writing the Report
DAWN Security
Executive Summary
Objective
Methodology
Findings
Summary
Graphical Summary
Technical Testing Report
Black-Box Testing
Presenting and Planning the Follow-Up
Part III Appendixes
Appendix A Preparing a Security Policy
Appendix B Tools
Glossary
Download - 544 KB -- Chapter 5: Performing Host Reconnaissance
Errata -- 26 KB

This book includes free shipping!
This book includes free shipping!
eBook (Watermarked)
$56.00
$44.80
This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.
The eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.