Détails bibliographiques
Autres auteurs : |
Skoudis Ed
(Auteur),
Liston Tom
(Auteur) |
Format : |
Livre |
Langue : |
anglais |
Titre complet : |
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis with Tom Liston |
Édition : |
2nd edition |
Publié : |
Upper Saddle River, NJ :
Prentice Hall Professional Technical Reference
, cop. 2006
|
Description matérielle : |
1 vol. (XXXII-748 p.) |
Collection : |
Radia Perlman series in computer networking and security
|
Contenu : |
Introduction. Networking overview: pretty much everything you need to know about networking to follow the rest of this book. Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book. Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book. Phase 1: reconnaissance. Phase 2: scanning. Phase 3: gaining access using application and operating system attacks. Phase 3: gaining access using network attacks. Phase 3: denial-of-service attacks. Phase 4: maintaining access: trojans, backdoors, and rootkits...Oh my!. Phase 5: covering tracks and hiding. Putting it all together: anatomy of an attack. The future, references, and conclusions |
Sujets : |
|