Hack Attacks Denied, Wiley Computer Publishing

E-books Shop
Hack Attacks Denied

"A Complete Guide to Network Lockdown"

Acknowledgments
Foremost I would like to thank my wife for not only proofing this book, but for her continued support and patience during its development. Next in line would be my family and friends for their encouragement and confidence. Following in the wake, I find myself grateful to Neil Ramsbottom, Mike G., Mike
Down, Shadowlord, Mindgame, John Fenton, Philip Beam, J.L. du Preez, Buck
Naked, SteRoiD, no()ne, National Institute of Standards Technology and Marianne
Swanson, Simple Nomad, The LAN God, Teiwaz, Fauzan Mirza, David
Wagner, Diceman, Craigt, Einar Blaberg, Cyberius, Jungman, RX2, itsme, Greg
Miller, John Vranesevich, Deborah Triant, Mentor, the FBI, The National Computer
Security Center, 2600.com, Fyodor, Muffy Barkocy, Wintermute, dcypher, manicx, Tsutomu Shimomura, humble, The Posse, Jim Huff, Soldier, Mike Frantzen, Tfreak, Dan Brumleve, Arisme, Georgi Guninski, Satanic Mechanic, Mnemonic, The Grenadier, Jitsu, lore, 416, all of the H4G1S members,

everyone at ValCom. As always, in order to be successful, one must surround oneself with the
finest people. With that in mind, I must thank David Fugate from Waterside
Productions and Carol Long, Mathew Cohen, Adaobi Obi, Micheline Frederick
and anyone else I forgot to mention from John Wiley & Sons..

About the Author
Now a renowned superhacker who works on award-winning projects, assisting security managers everywhere, John Chirillo began his computer career at 12, when after a one-year self-taught education in computers, he wrote a game called Dragon’s Tomb. Following its publication, thousands of copies were

sold to the Color Computer System market. During the next five years, John wrote several other software packages including, The Lost Treasure (a gamewriting tutorial), Multimanger (an accounting, inventory, and financial management software suite), Sorcery (an RPG adventure), PC Notes (GUI used to teach math, from algebra to calculus), Falcon’s Quest I and II (a graphical,Diction-intensive adventure), and Genius (a complete Windows-based pointand- click operating system), among others. John went on to become certified in numerous programming languages, including QuickBasic, VB, C++, Pascal,

Assembler and Java. John later developed the PC Optimization Kit (increasing speeds up to 200 percent of standard Intel 486 chips). John was equally successful in school. He received scholarships including one to Illinois Benedictine University. After running two businesses, Software Now and Geniusware, John became a consultant, specializing in security and analysis, to prestigious companies, where he performed security analyses, sniffer analyses, LAN/WAN design, implementation, and troubleshooting. During this period, John acquired numerous internetworking certifications, including Cisco’s CCNA, CCDA, CCNP, pending CCIE, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX, among others. He is currently a Senior Internetworking Engineer at a technology management company.

Contents

Acknowledgments ix
A Note to the Reader x
Introduction xi
Phase I Securing Ports and Services
Chapter 1 Common Ports and Services
Securing Well-Known Ports 4
Port 7: Echo 4
Port 11: Systat and Port 15: Netstat 6
Port 19: Chargen 6
Port 21: FTP 7
Port 23: Telnet 21
Port 25: SMTP 33
Port 53: Domain 36
Port 67: Bootp 37
Port 69: TFTP 38
Port 79: Finger 58
Port 80: HTTP 58
Ports 109, 110: POP 59
Ports 111, 135, 137-139 60
Port 161: SNMP 60
Ports 512-520 60
Port 540: UUCP 61
Conclusion 62
Chapter 2 Concealed Ports and Services
Local Port Scan 64
Tiger Inspect 80
Securing Unknown Ports 103
System Cleaners 104
Tiger Techniques 108
Port Watchers and Blockers 125
Conclusion 150
Chapter 3 Discovery Countermeasures
Whois Information 151
Web Site Design 158
User Anonymity 170
IP Range Scan 175
3Com Router 175
Cabletron/Enterasys 176
Checkpoint FireWall-1 176
Cisco Router 176
Cisco PIX Firewall 181
Intel Express Router 182
NetScreen Firewall 182
Social Engineering 182
Conclusion 184
Intuitive Intermission The Other Side 185
Phase II Intrusion Defense Mechanisms
Chapter 4 Safeguarding Against Penetration Attacks
Defending against Backdoor Kits 203
Virtual Connection Control 204
Insiders 208
Internal/External Vulnerabilities 209
Defending against Cookies 209
Defending against Flooding 210
Defending against Log Bashing 216
Defending against Mail Bombing and Spamming 237
Defending against Password Cracking 242
Defending against the Sniffer 245
Defending against Spoofing 261
Defending against Viral Infection 263
Defending against Web Page Hacking 264
Conclusion 276
Phase III Tiger Team Secrets
Chapter 5 Locking Down Perimeter Hardware and Service Daemons
Gateways and Routers 281
3Com 281
Ascend/Lucent 283
Cabletron/Enterasys 284
Cisco 285
Intel 288
Nortel/Bay 289
Internet Server Daemons 289
Apache HTTP 289
Lotus Domino 290
Microsoft Internet Information Server 291
Netscape Enterprise Server 292
Novell Web Server 293
O’Reilly WebSite Professional Attack 294
Operating Systems 295
AIX 295
BSD 296
HP/UX 296
IRIX 297
Linux 297
Microsoft Windows 298
Novell NetWare 308
OS/2 310
SCO 310
Solaris 310
Proxies and Firewalls 311
BorderWare 311
FireWall-1 311
Gauntlet 312
NetScreen 312
PIX 313
Raptor 313
WinGate 314
Conclusion 314
Phase IV Putting It All Together 
Intuitive Intermission Final Act: Rebirth 317
Chapter 6 Security Policies
Policy Guidelines 320
Introduction 320
Major Application or General Support System Plans 321
Purposes of Security Plans 321
Security Plan Responsibilities 321
Recommended Format 321
Advice and Comment on Plan 322
Audience 322
System Analysis 322
System Boundaries 323
System Category 323
Plan Development 325
System Identification 325
System Operational Status 326
General Description/Purpose 326
System Environment 327
System Interconnection/Information Sharing 327
Sensitivity of Information Handled 328
Management Controls 330
Risk Assessment and Management 330
Review of Security Controls 331
Rules of Behavior 332
Planning for Security in the Life Cycle 332
Authorize Processing 335
Operational Controls 336
Major Application: Operational Controls 337
Application Software Maintenance Controls 341
Major Application: Technical Controls 344
General Support System: Operational Controls 350
General Support System: Technical Controls 358
Policy Templates 364
Security Analysis 364
Seven Phases of Analysis 366
Security Analysis Deliverables 370
Discovery 370
Local Infrastructure Audit 379
WAN Audit 388
Lockdown Implementation 410
Security Analysis Review 411
Conclusion 413
Appendix A SafetyWare 415
TigerSurf 415
General Operation 416
Definition of Features 423
Tiger Web Server 430
Appendix B Template for Security Plan 433
Major Application Security Plan 433
General Support System Security Plan 444
Appendix C What’s on the CD 455
Chapter 1 456
Chapter 2 457
Chapter 3 458
Chapter 4 459
Chapters 5 and 6 460
TigerSurf 461
Port List 461
Glossary 463
References 475
Index 477

Who Should Read This Book
Hack Attacks Denied will enlighten anyone and everyone interested in or concerned about online security today, and lead to an understanding of how to best make their systems and networks as safe as they need to be. More specifically, however, Hack Attacks Denied
was written for these audiences:
The home or small home office (SOHO) Internet Enthusiast, 
whose web browsing includes secure online ordering, 
filling out forms, and/or transferring files, data, and information
The network engineer, whose world revolves and around security
The security engineer, whose intent is to become a security prodigy
The hacker, cracker, and phreak, who will find this book both educational and entertaining
The nontechnical manager, whose job may depend on the information herein
The hacking enthusiast and admirer of such films as Sneakers, The Matrix, and Hackers
The intelligent, curious teenager, whose destiny may become clear after reading these pages

 Screenshot 

E-bookss Shop

Purchase Now !
Just with Paypal



Product details
 Price
 File Size
 5,247 KB
 Pages
 506 p
 File Type
 PDF format
 ISBN
 0-471-41625-8
 Copyright
 2001 by John Chirillo  
●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●


═════ ═════

Previous Post Next Post