舉報(bào)

會(huì)員
Practical Network Scanning
Ifyouareasecurityprofessionalwhoisresponsibleforsecuringanorganization'sinfrastructure,thenthisbookisforyou.
最新章節(jié)
- Leave a review - let other readers know what you think
- Other Books you may enjoy
- Chapter 11
- Chapter 10
- Chapter 9
- Chapter 8
品牌:中圖公司
上架時(shí)間:2021-06-25 21:01:17
出版社:Packt Publishing
本書(shū)數(shù)字版權(quán)由中圖公司提供,并由其授權(quán)上海閱文信息技術(shù)有限公司制作發(fā)行
- Leave a review - let other readers know what you think 更新時(shí)間:2022-07-12 10:44:00
- Other Books you may enjoy
- Chapter 11
- Chapter 10
- Chapter 9
- Chapter 8
- Chapter 7
- Chapter 6
- Chapter 5
- Chapter 4
- Chapter 3
- Chapter 2
- Chapter 1
- Assessment
- Further reading
- Summary
- Bring-Your-Own-Identity (BYOI)
- Software Defined Networking Firewall
- Next Gen SIEM
- AI in cyber security
- Blockchain Technology for Fighting DDoS Attacks
- DDoS scrubbing
- BGP FlowSpec
- Black hole traffic to the destination of the attack
- Black hole traffic from the source of the attack
- Remotely triggered black hole routing (RTBH)
- DDoS protection
- Summary and Scope of Security Technologies
- Further Reading
- Questions
- Summary
- Optical Network—Layer-1 Encryption
- MACsec—Layer-2 Encryption
- IPsec Layer-3 encryption
- WAN Encryption technique
- IKE V1 versus IKE V2
- VPN Design
- MPLS VPN
- SSL VPN
- Internet Protocol Security
- Secure Socket Tunneling protocol
- Layer 2 Tunneling Protocol
- Point-to-Point tunneling protocol
- Type of VPN protocol
- Classes of VPN
- Overview
- VPN and WAN Encryption
- Further Reading
- Questions
- Summary
- Debugging tools
- Detecting firewalls
- Application proxies
- Firewall management
- Firewall performance capabilities and function
- OSI model versus TCP/IP model
- DMZ to Internal Access Policy
- Demilitarized Zone
- Firewall sandwich design
- Multilayer firewall architecture
- Single firewall architecture with multiple IP subnets
- Single firewall architecture with a single IP subnet
- Single firewall architecture
- Firewall placement and design network topology
- Firewall performance
- Firewall generations
- Firewall terminology
- Firewall and design considerations
- Technical requirements
- Firewall Placement and Detection Techniques
- Further reading
- Questions
- Summary
- SSL Management tools
- OpenSSL
- Microsoft Windows and IIS
- Attacks against PKI
- Hash function
- Asymmetric encryption
- Symmetric encryption
- Public Key Infrastructure
- TLS versus SSL
- SSL certificates classes
- Intermediate certificate
- Root certificate
- SSL certificate component
- Time to say goodbye to SSL and early TLS
- Why hasn't TLS 1.3 been implemented yet?
- Current Supported Standard
- The evolution of SSL and TLS
- SSL certificate
- Why no PadLock?
- How do I know that SSL is working?
- Foundation of SSL
- Public Key Infrastructure-SSL
- Further reading
- Questions
- Summary
- Defense against port scans
- OS matching algorithms
- Understanding an Nmap fingerprint
- Don't Fragment (DF) bit
- Time-to-live (TTL)
- Type of service
- TCP initial window
- TCP ISN sampling
- The FIN probe
- TCP/UDP/IP basic
- TCP/IP fingerprinting methods supported by Nmap
- Operating system detection
- Nmap tool
- OS detection technique with Nmap
- Tailoring exploits
- Determining vulnerability of target hosts
- Network operating system inventory – trace your infrastructure
- Reasons for OS detection
- Remote OS Detection
- Further reading
- Questions
- Summary
- Sample report
- Policies
- Installation
- Nessus installation configuration and vulnerability assessment methodology
- Host-based assessment
- Network-based assessment
- Types of vulnerability assessment
- Why do we need vulnerability assessment?
- Remediation
- Report
- Vulnerability scan
- Network discovery
- Plan
- What is vulnerability assessment?
- Infrastructure concerns
- Vulnerability Assessment
- Further reading
- Questions
- Summary
- SIEM commercial products
- Log management
- Automation
- Dashboards
- Reporting and Alerting
- Correlation
- Event and log collection or data aggregation
- Event generator sensors
- How do SIEM systems work?
- What is a data breach?
- What is a security incident?
- What is an event?
- SIEM—Event versus incident and data breach
- Security information and event management
- How to choose an EDR solution ?
- Security policy
- Case Study – Why EDR system is required?
- Endpoint Detection and Response (EDR) system
- What’s an endpoint
- Endpoint threat detection
- NetFlow vs. IPFIX
- Threat detection with Netflow/IPFIX
- Network capture solution
- Types of IDSs
- Intrusion detection system
- Detection methods
- Network threat detection
- Threat Detection and Response
- Further reading
- Questions
- Summary
- Introduce a bug bounty program
- Server security
- Vulnerabilities scan
- Use cookies securely
- Preventing an authentication hacking attack
- Secure protocol
- Signing algorithm
- SSL/TLS key size
- SSL/TLS deployment
- Web application security
- HTTP versus HTTPS
- Using HTTPS for everything
- Which is better?
- Benefit and disadvantage of whitelisting
- What is whitelisting?
- Benefit and disadvantage of blacklisting
- What is blacklisting?
- Blacklisting and whitelisting
- WAF protection against common web attacks
- WAFs
- Finding vulnerabilities
- Limit database privileges
- Deploying a Web Application Firewall
- Employing comprehensive data sanitization
- Prevention of SQL Injection attack on web applications
- SQL Injection
- Encryption
- Access to data
- Getting consent
- GDPR
- Application Security Design
- Further reading
- Questions
- Summary
- Exploited system vulnerabilities
- Data loss prevention
- DDoS attack protection
- Virtual web application firewalls
- Virtual Router
- Virtual TAP vTAP
- Firewall Virtual Appliance
- Network security devices for IaaS
- Hybrid data center and cloud network
- Traditional enterprise network model
- Security approach for cloud computing
- Shared technology and shared danger
- Public SaaS versus private SaaS
- Public PaaS versus private PaaS
- Public IaaS versus private IaaS
- Public versus private
- SaaS
- PaaS
- IaaS
- Cloud offerings
- Cloud Security Design
- Further reading
- Questions
- Summary
- Local security policies
- Server antivirus and malware protection
- Server-level permissions
- Password policies
- Authentication NTLM versus Kerberos
- Document the host information
- Implement activity logging
- Secure and encrypt remote access
- Password policies
- Check the installed packages
- BIOS protection
- Hard disk encryption
- Disable USB
- System update
- System firewall configuration
- Check for open ports or services
- Hardening server security
- What is encryption at rest?
- Cloud VM disk encryption
- Encrypt your Hyper-V Guest VMs
- Virtual Trusted Platform Module – vTPM
- Bitlocker
- Full-disk encryption
- Disk encryption
- Physical security
- Classification of data
- Server-Level Security
- Further reading
- Questions
- Summary
- Two factor authentication
- Mitigation
- DNS protocol attacks
- How does DNS work?
- DNS vulnerabilities
- Mitigation
- Ping sweeps and Port scans
- Anti-spoofing using RPF checks
- Encryption
- Anti-spoofing using access lists
- IP spoofing
- Low-rate attacks
- Application layer attacks
- Volume-based attacks
- DoS and DDoS attacks
- Hardening your TCP/IP stack
- Network protection consideration and design
- Segmentation strategy steps
- Network segmentation
- Network management and security design
- Authentication authorization and accounting
- Asset classification and physical security
- Access control
- Secure Network Design
- Further reading
- Questions
- Summary
- Using unencrypted or weak encryption for a website
- Security policy weaknesses
- Configuration weaknesses
- Technology weaknesses
- Security vulnerabilities
- Human threats
- Natural disasters
- Security and threats
- Security Risk-Border Gateway Protocol
- Computer security risk
- IoT security risk
- Security issues threats and attacks
- Phishing protection
- Beware of phishing phone calls
- Phishing
- System upgrade and updates
- Password
- Internet security
- Multitier topology
- Intrusion detection systems / intrusion prevention systems
- Firewalls
- Network security
- Computer security
- Building blocks of information security
- Why security?
- Fundamental Security Concepts
- Reviews
- Get in touch
- Conventions used
- Download the color images
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt is searching for authors like you
- About the reviewer
- About the author
- PacktPub.com
- Why subscribe?
- Packt Upsell
- 版權(quán)信息
- 封面
- 封面
- 版權(quán)信息
- Packt Upsell
- Why subscribe?
- PacktPub.com
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Fundamental Security Concepts
- Why security?
- Building blocks of information security
- Computer security
- Network security
- Firewalls
- Intrusion detection systems / intrusion prevention systems
- Multitier topology
- Internet security
- Password
- System upgrade and updates
- Phishing
- Beware of phishing phone calls
- Phishing protection
- Security issues threats and attacks
- IoT security risk
- Computer security risk
- Security Risk-Border Gateway Protocol
- Security and threats
- Natural disasters
- Human threats
- Security vulnerabilities
- Technology weaknesses
- Configuration weaknesses
- Security policy weaknesses
- Using unencrypted or weak encryption for a website
- Summary
- Questions
- Further reading
- Secure Network Design
- Access control
- Asset classification and physical security
- Authentication authorization and accounting
- Network management and security design
- Network segmentation
- Segmentation strategy steps
- Network protection consideration and design
- Hardening your TCP/IP stack
- DoS and DDoS attacks
- Volume-based attacks
- Application layer attacks
- Low-rate attacks
- IP spoofing
- Anti-spoofing using access lists
- Encryption
- Anti-spoofing using RPF checks
- Ping sweeps and Port scans
- Mitigation
- DNS vulnerabilities
- How does DNS work?
- DNS protocol attacks
- Mitigation
- Two factor authentication
- Summary
- Questions
- Further reading
- Server-Level Security
- Classification of data
- Physical security
- Disk encryption
- Full-disk encryption
- Bitlocker
- Virtual Trusted Platform Module – vTPM
- Encrypt your Hyper-V Guest VMs
- Cloud VM disk encryption
- What is encryption at rest?
- Hardening server security
- Check for open ports or services
- System firewall configuration
- System update
- Disable USB
- Hard disk encryption
- BIOS protection
- Check the installed packages
- Password policies
- Secure and encrypt remote access
- Implement activity logging
- Document the host information
- Authentication NTLM versus Kerberos
- Password policies
- Server-level permissions
- Server antivirus and malware protection
- Local security policies
- Summary
- Questions
- Further reading
- Cloud Security Design
- Cloud offerings
- IaaS
- PaaS
- SaaS
- Public versus private
- Public IaaS versus private IaaS
- Public PaaS versus private PaaS
- Public SaaS versus private SaaS
- Shared technology and shared danger
- Security approach for cloud computing
- Traditional enterprise network model
- Hybrid data center and cloud network
- Network security devices for IaaS
- Firewall Virtual Appliance
- Virtual TAP vTAP
- Virtual Router
- Virtual web application firewalls
- DDoS attack protection
- Data loss prevention
- Exploited system vulnerabilities
- Summary
- Questions
- Further reading
- Application Security Design
- GDPR
- Getting consent
- Access to data
- Encryption
- SQL Injection
- Prevention of SQL Injection attack on web applications
- Employing comprehensive data sanitization
- Deploying a Web Application Firewall
- Limit database privileges
- Finding vulnerabilities
- WAFs
- WAF protection against common web attacks
- Blacklisting and whitelisting
- What is blacklisting?
- Benefit and disadvantage of blacklisting
- What is whitelisting?
- Benefit and disadvantage of whitelisting
- Which is better?
- Using HTTPS for everything
- HTTP versus HTTPS
- Web application security
- SSL/TLS deployment
- SSL/TLS key size
- Signing algorithm
- Secure protocol
- Preventing an authentication hacking attack
- Use cookies securely
- Vulnerabilities scan
- Server security
- Introduce a bug bounty program
- Summary
- Questions
- Further reading
- Threat Detection and Response
- Network threat detection
- Detection methods
- Intrusion detection system
- Types of IDSs
- Network capture solution
- Threat detection with Netflow/IPFIX
- NetFlow vs. IPFIX
- Endpoint threat detection
- What’s an endpoint
- Endpoint Detection and Response (EDR) system
- Case Study – Why EDR system is required?
- Security policy
- How to choose an EDR solution ?
- Security information and event management
- SIEM—Event versus incident and data breach
- What is an event?
- What is a security incident?
- What is a data breach?
- How do SIEM systems work?
- Event generator sensors
- Event and log collection or data aggregation
- Correlation
- Reporting and Alerting
- Dashboards
- Automation
- Log management
- SIEM commercial products
- Summary
- Questions
- Further reading
- Vulnerability Assessment
- Infrastructure concerns
- What is vulnerability assessment?
- Plan
- Network discovery
- Vulnerability scan
- Report
- Remediation
- Why do we need vulnerability assessment?
- Types of vulnerability assessment
- Network-based assessment
- Host-based assessment
- Nessus installation configuration and vulnerability assessment methodology
- Installation
- Policies
- Sample report
- Summary
- Questions
- Further reading
- Remote OS Detection
- Reasons for OS detection
- Network operating system inventory – trace your infrastructure
- Determining vulnerability of target hosts
- Tailoring exploits
- OS detection technique with Nmap
- Nmap tool
- Operating system detection
- TCP/IP fingerprinting methods supported by Nmap
- TCP/UDP/IP basic
- The FIN probe
- TCP ISN sampling
- TCP initial window
- Type of service
- Time-to-live (TTL)
- Don't Fragment (DF) bit
- Understanding an Nmap fingerprint
- OS matching algorithms
- Defense against port scans
- Summary
- Questions
- Further reading
- Public Key Infrastructure-SSL
- Foundation of SSL
- How do I know that SSL is working?
- Why no PadLock?
- SSL certificate
- The evolution of SSL and TLS
- Current Supported Standard
- Why hasn't TLS 1.3 been implemented yet?
- Time to say goodbye to SSL and early TLS
- SSL certificate component
- Root certificate
- Intermediate certificate
- SSL certificates classes
- TLS versus SSL
- Public Key Infrastructure
- Symmetric encryption
- Asymmetric encryption
- Hash function
- Attacks against PKI
- Microsoft Windows and IIS
- OpenSSL
- SSL Management tools
- Summary
- Questions
- Further reading
- Firewall Placement and Detection Techniques
- Technical requirements
- Firewall and design considerations
- Firewall terminology
- Firewall generations
- Firewall performance
- Firewall placement and design network topology
- Single firewall architecture
- Single firewall architecture with a single IP subnet
- Single firewall architecture with multiple IP subnets
- Multilayer firewall architecture
- Firewall sandwich design
- Demilitarized Zone
- DMZ to Internal Access Policy
- OSI model versus TCP/IP model
- Firewall performance capabilities and function
- Firewall management
- Application proxies
- Detecting firewalls
- Debugging tools
- Summary
- Questions
- Further Reading
- VPN and WAN Encryption
- Overview
- Classes of VPN
- Type of VPN protocol
- Point-to-Point tunneling protocol
- Layer 2 Tunneling Protocol
- Secure Socket Tunneling protocol
- Internet Protocol Security
- SSL VPN
- MPLS VPN
- VPN Design
- IKE V1 versus IKE V2
- WAN Encryption technique
- IPsec Layer-3 encryption
- MACsec—Layer-2 Encryption
- Optical Network—Layer-1 Encryption
- Summary
- Questions
- Further Reading
- Summary and Scope of Security Technologies
- DDoS protection
- Remotely triggered black hole routing (RTBH)
- Black hole traffic from the source of the attack
- Black hole traffic to the destination of the attack
- BGP FlowSpec
- DDoS scrubbing
- Blockchain Technology for Fighting DDoS Attacks
- AI in cyber security
- Next Gen SIEM
- Software Defined Networking Firewall
- Bring-Your-Own-Identity (BYOI)
- Summary
- Further reading
- Assessment
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Other Books you may enjoy
- Leave a review - let other readers know what you think 更新時(shí)間:2022-07-12 10:44:00