Security warrior: [know your enemy]
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2004
|
Ausgabe: | 1. ed. |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012777932&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Literaturangaben |
Umfang: | XVII, 531 S. Ill., graph. Darst. |
ISBN: | 0596005458 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV019310103 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t| | ||
008 | 040601s2004 gw ad|| |||| 00||| eng d | ||
020 | |a 0596005458 |9 0-596-00545-8 | ||
035 | |a (OCoLC)314401946 | ||
035 | |a (DE-599)BVBBV019310103 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-706 |a DE-522 |a DE-634 |a DE-29 |a DE-188 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Peikari, Cyrus |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security warrior |b [know your enemy] |c Cyrus Peikari and Anton Chuvakin |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2004 | |
300 | |a XVII, 531 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a TCP/IP |0 (DE-588)4197538-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Reverse Engineering |0 (DE-588)4391935-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebssystem |0 (DE-588)4006216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Reverse Engineering |0 (DE-588)4391935-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a TCP/IP |0 (DE-588)4197538-8 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Betriebssystem |0 (DE-588)4006216-8 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Chuvakin, Anton |e Verfasser |4 aut | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012777932&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-012777932 |
Datensatz im Suchindex
_version_ | 1819259286377725952 |
---|---|
adam_text | SECURITY WARRIOR CYRUS PEIKARI AND ANTON CHUVAKIN O REILLY BEIJING *
CAMBRIDGE * FARNHAM * KBLN * PARIS * SEBASTOPOL * TAIPEI * TOKYO TABLE
OF CONTENTS PREFACE XIII PART I. SOFTWARE CRACKING 1. ASSEMBLY LANGUAGE
3 REGISTERS 4 ASM OPCODES 7 REFERENCES 8 2. WINDOWS REVERSE ENGINEERING
9 HISTORY OF RCE 10 REVERSING TOOLS 11 REVERSE ENGINEERING EXAMPLES 23
REFERENCES 32 3. LINUX REVERSE ENGINEERING 33 BASIC TOOLS AND TECHNIQUES
34 A GOOD DISASSEMBLY 54 PROBLEM AREAS 69 WRITING NEW TOOLS 74
REFERENCES 116 4. WINDOWS CE REVERSE ENGINEERING 118 WINDOWS CE
ARCHITECTURE 119 CE REVERSE ENGINEERING FUNDAMENTALS 123 PRACTICAL CE
REVERSE ENGINEERING 131 VII REVERSE ENGINEERING SERIAL.EXE 147
REFERENCES 160 5. OVERFLOW AHACKS 161 BUFFER OVERFLOWS 161 UNDERSTANDING
BUFFERS 162 SMASHING THE STACK 165 HEAP OVERFLOWS 166 PREVENTING BUFFER
OVERFLOWS 167 A LIVE CHALLENGE 168 REFERENCES 175 PART II. NETWORK
STALKING 6. TCP/IP ANALYSIS 179 A BRIEF HISTORY OF TCP/IP 179
ENCAPSULATION 179 TCP 180 IP 182 UDP 184 ICMP 185 ARP 185 RARP 186 BOOTP
186 DHCP 186 TCP/IP HANDSHAKING 186 COVERT CHANNELS 188 IPV6 188
ETHEREAL 190 PACKET ANALYSIS 191 FRAGMENTATION 192 REFERENCES 198 7.
SOCIAL ENGINEERING 199 BACKGROUND 200 PERFORMING THE ATTACKS 202
ADVANCED SOCIAL ENGINEERING 209 REFERENCES 211 VIII I TABLE OF CONTENTS
8. RECONNAISSANCE 212 ONLINE RECONNAISSANCE 212 CONCLUSION 224
REFERENCES 224 9. OS FINGERPRINTING 225 TELNET SESSION NEGOTIATION 225
TCP STACK FINGERPRINTING 226 SPECIAL-PURPOSE TOOLS 229 PASSIVE
FINGERPRINTING 229 FUZZY OPERATING SYSTEM FINGERPRINTING 232 TCP/IP
TIMEOUT DETECTION 234 REFERENCES 235 10. HIDING THE TRACKS 236 FROM WHOM
ARE YOU HIDING? 236 POSTATTACK CLEANUP 237 FORENSIC TRACKS 243
MAINTAINING COVERT ACCESS 248 REFERENCES 254 PART III. PLATFORM ATTACKS
11. UNIXDEFENSE 257 UNIX PASSWORDS 257 FILE PERMISSIONS 261 SYSTEM
LOGGING 264 NETWORK ACCESS IN UNIX 267 UNIX HARDENING 270 UNIX NETWORK
DEFENSE 285 REFERENCES 298 12. UNIXATTACKS 299 LOCAL ATTACKS 299 REMOTE
ATTACKS 307 UNIX DENIAL-OF-SERVICE ATTACKS 321 REFERENCES 328 TABLE OF
CONTENTS | IX 13. WINDOWS CLIENT ATTACKS 329 DENIAL-OF-SERVICE ATTACKS
329 REMOTE ATTACKS 339 REMOTE DESKTOP/REMOTE ASSISTANCE 343 REFERENCES
349 14. WINDOWS SERVER ATTACKS 350 RELEASE HISTORY 350 KERBEROS
AUTHENTICATION ATTACKS 351 KERBEROS AUTHENTICATION REVIEW 351 DEFEATING
BUFFER OVERFLOW PREVENTION 356 ACTIVE DIRECTORY WEAKNESSES 357 HACKING
PKI 359 SMART CARD HACKING 360 ENCRYPTING FILE SYSTEM CHANGES 363
THIRD-PARTY ENCRYPTION 365 REFERENCES 367 15. SOAP XML WEB SERVICES
SECURITY 369 XML ENCRYPTION 369 XML SIGNATURES 372 REFERENCE 373 16. SQL
INJECTION 374 INTRODUCTION TO SQL 374 SQL INJECTION ATTACKS 377 SQL
INJECTION DEFENSES 383 PHP-NUKE EXAMPLES 387 REFERENCES 390 17. WIRELESS
SECURITY 391 REDUCING SIGNAL DRIFT 391 PROBLEMS WITH WEP 393 CRACKING
WEP 393 PRACTICAL WEP CRACKING 399 VPNS 399 TKIP 400 SSL 401 X | TABLE
OF CONTENTS AIRBORNE VIRUSES 401 REFERENCES 406 PART IV. ADVANCED
DEFENSE 18. AUDIT TRAIL ANALYSIS 409 LOG ANALYSIS BASICS 409 LOG
EXAMPLES 410 LOGGING STATES 418 WHEN TO LOOK AT THE LOGS 419 LOG
OVERFLOW AND AGGREGATION 420 CHALLENGE OF LOG ANALYSIS 421 SECURITY
INFORMATION MANAGEMENT 421 GLOBAL LOG AGGREGATION 422 REFERENCES 423 19.
INTRUSION DETECTION SYSTEMS 424 IDS EXAMPLES 425 BAYESIAN ANALYSIS 430
HACKING THROUGH IDSS 435 THE FUTURE OF IDSS 437 SNORT IDS CASE STUDY 439
IDS DEPLOYMENT ISSUES 443 REFERENCES 445 20. HONEYPOTS 446 MOTIVATION
447 BUILDING THE INFRASTRUCTURE 448 CAPTURING ATTACKS 457 REFERENCES 458
21. INCIDENT RESPONSE 459 CASE STUDY: WORM MAYHEM 459 DEFINITIONS 460
INCIDENT RESPONSE FRAMEWORK 462 SMALL NETWORKS 466 MEDIUM-SIZED NETWORKS
471 LARGE NETWORKS 473 REFERENCES 477 TABLE OF CONTENTS 22. FORENSICS
AND ANTIFORENSICS 478 HARDWARE REVIEW 478 INFORMATION DETRITUS 480
FORENSICS TOOLS 481 BOOTABLE FORENSICS CD-ROMS 486 EVIDENCE ELIMINATOR
490 FORENSICS CASE STUDY: FTP ATTACK 497 REFERENCES 506 PARTV. APPENDIX
APPENDIX: USEFUL SOFTLCE COMMANDS AND BREAKPOINTS 509 INDEX 517 XII |
TABLE OF CONTENTS
|
any_adam_object | 1 |
author | Peikari, Cyrus Chuvakin, Anton |
author_facet | Peikari, Cyrus Chuvakin, Anton |
author_role | aut aut |
author_sort | Peikari, Cyrus |
author_variant | c p cp a c ac |
building | Verbundindex |
bvnumber | BV019310103 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)314401946 (DE-599)BVBBV019310103 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02120nam a2200553 c 4500</leader><controlfield tag="001">BV019310103</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">040601s2004 gw ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596005458</subfield><subfield code="9">0-596-00545-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)314401946</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019310103</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Peikari, Cyrus</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security warrior</subfield><subfield code="b">[know your enemy]</subfield><subfield code="c">Cyrus Peikari and Anton Chuvakin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 531 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Betriebssystem</subfield><subfield code="0">(DE-588)4006216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chuvakin, Anton</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012777932&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-012777932</subfield></datafield></record></collection> |
id | DE-604.BV019310103 |
illustrated | Illustrated |
indexdate | 2024-12-20T11:57:45Z |
institution | BVB |
isbn | 0596005458 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-012777932 |
oclc_num | 314401946 |
open_access_boolean | |
owner | DE-706 DE-522 DE-634 DE-29 DE-188 |
owner_facet | DE-706 DE-522 DE-634 DE-29 DE-188 |
physical | XVII, 531 S. Ill., graph. Darst. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | O'Reilly |
record_format | marc |
spellingShingle | Peikari, Cyrus Chuvakin, Anton Security warrior [know your enemy] TCP/IP (DE-588)4197538-8 gnd Reverse Engineering (DE-588)4391935-2 gnd Betriebssystem (DE-588)4006216-8 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4197538-8 (DE-588)4391935-2 (DE-588)4006216-8 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4011144-1 |
title | Security warrior [know your enemy] |
title_auth | Security warrior [know your enemy] |
title_exact_search | Security warrior [know your enemy] |
title_full | Security warrior [know your enemy] Cyrus Peikari and Anton Chuvakin |
title_fullStr | Security warrior [know your enemy] Cyrus Peikari and Anton Chuvakin |
title_full_unstemmed | Security warrior [know your enemy] Cyrus Peikari and Anton Chuvakin |
title_short | Security warrior |
title_sort | security warrior know your enemy |
title_sub | [know your enemy] |
topic | TCP/IP (DE-588)4197538-8 gnd Reverse Engineering (DE-588)4391935-2 gnd Betriebssystem (DE-588)4006216-8 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | TCP/IP Reverse Engineering Betriebssystem Rechnernetz Computersicherheit Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012777932&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT peikaricyrus securitywarriorknowyourenemy AT chuvakinanton securitywarriorknowyourenemy |