LEADER 05389nam 2200685 450 001 9910820372803321 005 20230912131720.0 010 $a1-118-98713-6 010 $a1-119-18343-X 010 $a1-118-98715-2 035 $a(CKB)3710000000461409 035 $a(EBL)1895190 035 $a(SSID)ssj0001599450 035 $a(PQKBManifestationID)16306052 035 $a(PQKBTitleCode)TC0001599450 035 $a(PQKBWorkID)14892303 035 $a(PQKB)11025105 035 $a(Au-PeEL)EBL4040350 035 $a(CaPaEBR)ebr11090297 035 $a(CaONFJC)MIL822790 035 $a(OCoLC)918135837 035 $a(Au-PeEL)EBL1895190 035 $a(CaSebORM)9781118987056 035 $a(MiAaPQ)EBC4040350 035 $a(MiAaPQ)EBC1895190 035 $a(PPN)194524558 035 $a(EXLCZ)993710000000461409 100 $a20150822h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe network security test lab $ea step-by-step guide /$fMichael Gregg 205 $a1st edition 210 1$aIndianapolis, Indiana :$cWiley,$d2015. 210 4$dİ2015 215 $a1 online resource (482 p.) 300 $aIncludes index. 311 $a1-118-98705-5 327 $aThe Network Security Test Lab; About the Author; Credits; Acknowledgments; Contents; Introduction; Chapter 1 Building a Hardware and Software Test Platform; Why Build a Lab?; Hardware Requirements; Physical Hardware; Equipment You Already Have; New Equipment Purchases; Used Equipment Purchases; Online Auctions; Thrift Stores; Company Sales; Virtual Hardware; VMware; VirtualBox; Hacker Hardware; Software Requirements; Operating Systems; Microsoft Windows; Linux; Navigating in Linux; Linux Basics; Mac OS X; Software and Applications; Learning Applications; Hacking Software; Summary; Key Terms 327 $aExercisesEquipment Checklist; Installing VMware Workstation; Exploring Linux Operating System Options; Using VMware to Build a Windows Image; Using VMware Converter to Create a Virtual Machine; Exploring Other Operating System Options; Running Kali from VMware; Installing Tools on Your Windows Virtual Machine; Chapter 2 Passive Information Gathering; Starting at the Source; Scrutinizing Key Employees; Dumpster Diving (Electronic); Analyzing Web Page Coding; Exploiting Website Authentication Methods; Mining Job Ads and Analyzing Financial Data; Using Google to Mine Sensitive Information 327 $aExploring Domain OwnershipWHOIS; Regional Internet Registries; Domain Name System; Identifying Web Server Software; Web Server Location; Summary; Key Terms; Exercises; IP Address and Domain Identification; Information Gathering; Google Hacking; Banner Grabbing; Telnet; Netcat; VisualRoute; Chapter 3 Analyzing Network Traffic; Why Packet Analysis Is Important; How to Capture Network Traffic; Promiscuous Mode; Hubs and Switches; Hubbing Out and Using Taps; Switches; Capturing Network Traffic; Managed and Unmanaged Switches; ARP Cache Poisoning; Flooding; DHCP Redirection 327 $aRedirection and Interception with ICMPPreventing Packet Capture; Dynamic Address Inspection; DHCP Snooping; Preventing VLAN Hopping; Detecting Packet Capture; Wireshark; Wireshark Basics; Filtering and Decoding Traffic; Basic Data Capture-A Layer-by-Layer Review; Physical-Data-Link Layer; Network-Internet Layer; Transport-Host-Host Layer; Application Layer; Other Network Analysis Tools; Summary; Key Terms; Exercises; Fun with Packets; Packet Analysis with tcpdump; Packet Filters; Making a One-Way Data Cable; Chapter 4 Detecting Live Systems and Analyzing Results; TCP/IP Basics 327 $aThe Network Access LayerThe Internet Layer; The Host-to-Host Layer; Transmission Control Protocol; User Datagram Protocol; The Application Layer; Detecting Live Systems with ICMP; ICMP-Ping; Traceroute; Port Scanning; TCP and UDP Port Scanning; Advanced Port-Scanning Techniques; Idle Scan; Analyzing Port Scans; Port-Scanning Tools; Nmap; SuperScan; Other Scanning Tools; OS Fingerprinting; Passive Fingerprinting; Active Fingerprinting; How Nmap OS Fingerprinting Works; Scanning Countermeasures; Summary; Key Terms; Exercises; Understanding Wireshark; Interpreting TCP Flags 327 $aPerforming an ICMP Packet Decode 330 $aThe ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and h 606 $aComputer networks$xSecurity measures 606 $aComputer security$xEvaluation 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security$xEvaluation. 676 $a005.8 700 $aGregg$b Michael$0884346 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910820372803321 996 $aThe network security test lab$93972957 997 $aUNINA