Chapter 1, “Denial of Service,” illustrates how even sophisticated networks can
be crippled by a determined hacker with relatively few resources.
Chapter 2, “War Dialing,” illustrates how a hacker can circumvent the hardened
security perimeter of a network to access “softer” targets.
Chapter 3, “Penetration ‘Testing,’” discusses the various tools and techniques used
for penetration testing that are readily available to both the defenders and the
attackers.
Chapter 4, “Protocol Tunneling,” presents a method for deliberately subverting your
network perimeter to “tunnel” prohibited traffic into and out of your network.
Chapter 5, “Spanning Tree Attacks,” discusses the “layer 2” network responsible
for knitting together your switches, routers, and other devices into a reliable network,
and illustrates one way in which to exploit the weak security of this layer.
Chapter 6, “Man-in-the-Middle,” discusses a very common attack pattern and just
what an attacker can accomplish once he or she has inserted himself or herself
into your data stream.
Chapter 7, “Password Replay,” focuses on the security of passwords and other
static security measures and how an attacker can use various techniques to gain
unauthorized access.
30. Seven Deadliest Network Attacks
Author:
Myanmar Ebook Store
Genre:
»
Networking
Rating
Posted by Myanmar Ebook Store
Posted on
