30. Seven Deadliest Network Attacks

    Author: Myanmar Ebook Store Genre: »
    Rating

    Chapter 1, “Denial of Service,” illustrates how even sophisticated networks can
    be crippled by a determined hacker with relatively few resources.

    Chapter 2, “War Dialing,” illustrates how a hacker can circumvent the hardened
    security perimeter of a network to access “softer” targets.

    Chapter 3, “Penetration ‘Testing,’” discusses the various tools and techniques used
    for penetration testing that are readily available to both the defenders and the
    attackers.

    Chapter 4, “Protocol Tunneling,” presents a method for deliberately subverting your
    network perimeter to “tunnel” prohibited traffic into and out of your network.

    Chapter 5, “Spanning Tree Attacks,” discusses the “layer 2” network responsible
    for knitting together your switches, routers, and other devices into a reliable network,
    and illustrates one way in which to exploit the weak security of this layer.

    Chapter 6, “Man-in-the-Middle,” discusses a very common attack pattern and just
    what an attacker can accomplish once he or she has inserted himself or herself
    into your data stream.

    Chapter 7, “Password Replay,” focuses on the security of passwords and other
    static security measures and how an attacker can use various techniques to gain
    unauthorized access.

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll