Security Power ToolsBryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch "O'Reilly Media, Inc.", 2007. gada 27. aug. - 860 lappuses What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
|
No grāmatas satura
1.–5. rezultāts no 58.
... kernel parame- ters with security in mind. In the later part of the chapter, SELinux and its indispens- able support tools are introduced. Then various ways to audit password strength are presented, from the venerable John The Ripper to ...
... kernel or use some other method of forwarding packets, the connections you sniff are half-duplex. 4.3. Dealing. with. Static. ARP. Tables. If the LAN you are sniffing uses static ARP mapping, or retains ARP information for a very long time ...
... Kernel 2.4.10-2.4.19 cisco_wifix Aironet 340,350 Linux Kernel 2.4.20+ cisco_openbsd Aironet 340,350 OpenBSD Kernel hostap Prism/2 Linux HostAP 0.4 ipw2100 Intel/Centrino 802.11b Linux ipw2100-1.0.4+ ipw2200 Intel/Centrino 802.11b/g ...
... Kernel radiotap_bsd_a Radiotap BSD Kernel radiotap_bsd_b Radiotap BSD Kernel rt2400 Ralink 2400 11b Linux rt2500 Ralink 2400 11b Linux rt2400-gpl rt2500-gpl rt8180 Realtek 8180 11b Linux rtl8180-sa2400 viha Airport OS X Viha vtar5k ...
... kernel. You can easily design something that sniffs, mangles, and sends. This is exactly what is needed for some attacks. But you will be disappointed in terms of performance or efficiency if you expect Scapy to do the job of a router ...
Saturs
Part V | 383 |
Firewalls | 385 |
Host Hardening | 421 |
Securing Communications | 455 |
Email Security and AntiSpam | 525 |
Device Security Testing | 576 |
Part VI | 605 |
Network Capture | 607 |
Metasploit | 193 |
Wireless Penetration | 225 |
Exploitation Framework Applications | 242 |
Custom Exploitation | 268 |
Part IV | 321 |
Backdoors | 323 |
Rootkits | 363 |
Network Monitoring | 640 |
Host Monitoring | 664 |
Part VII | 697 |
Forensics | 699 |
Application Fuzzing | 725 |
Binary Reverse Engineering | 749 |
Index | 783 |
Citi izdevumi - Skatīt visu
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Stisa Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |