Home Page Icon
Home Page
Table of Contents for
VII. References
Close
VII. References
by Anonymous
Maximum Security, Fourth Edition
Copyright
Dedication
About the Lead Author
About the Contributing Authors
Acknowledgments
We Want to Hear from You!
Reader Services
Introduction
Why Did We Write This Book?
System Requirements
Absolute Requirements
Archiving Tools
Text and Typesetting Viewers
Programming Languages
About Examples in This Book
About Links and References in This Book
A Final Note
I. Security Concepts
1. Building a Roadmap for Securing Your Enterprise
Reactive Versus Proactive Models
Understanding Your Enterprise
Workflow and Security
Risk Assessment: Evaluating Your Enterprise’s Security Posture
Identifying Digital Assets
Protecting Assets
Identifying and Removing Vulnerabilities
Standardization and Proactive Policies
Incident Response Policy
Training Users and Administrators
40,000-Foot Review
Summary
2. The State of the Net: A World at War
Hacking, Cracking, and Other Malicious Behavior
Governments at War
Can the Internet Be Used for Espionage?
Can the Internet Be Used for Terrorism?
The Threat Gets More Personal
Who Holds the Cards?
Can the United States Protect the National Information Infrastructure?
What Would an Information Attack Look Like?
The State of the Government
The National Infrastructure Protection Center (NIPC)
Summary of Government Vulnerabilities
The State of the Corporate Sector
Credit Card Theft Goes Cyber: The StarWave Incident
Credit Card Theft Hits Overdrive
The Trends
The Ernst & Young LLP/ComputerWorld Information Security Survey
A Warning
Summary
Additional Information
Internet Resources on Information Warfare
Books on Information Warfare
3. Hackers and Crackers
The Difference Between Hackers and Crackers
Tools of the Trade
Reconnaissance
Social Engineering
Port Scanners and Passive Operating System Identification
Nmap
hping2
Passive Operating System Identification Fingerprinting
Exploits and the SANS Top 20
Exploits
The SANS Top 20
Windows-Specific Exploits
Unix-Specific Exploits
Summary
4. Mining the Data Monster
Information Overload
How Much Security Do You Need?
General Sources
The Computer Emergency Response Team (CERT)
The U.S. Department of Energy Computer Incident Advisory Capability
The National Institute of Standards and Technology Computer Security Resource Clearinghouse
The BugTraq Archives
The Forum of Incident Response and Security Teams (FIRST)
Mailing Lists
Usenet Newsgroups
Vendor Security Mailing Lists, Patch Depositories, and Resources
Silicon Graphics Security Headquarters
The Sun Security Bulletin Archive
The ISS Security Center
Eugene Spafford’s Security Hotlist
SANS Institute
International Association of Computer Investigative Specialists (IACIS)
Summary
5. Internal Security
Internal Security: The Red-Headed Stepchild
Internal Risks: Types of Harm and Vectors
Well-meaning/Unwitting Employees
Scofflaw Employees
IT Employees
Risk Mitigation Policies
Physical Security
The Hiring Process
Establishing Desktop Lockdown
Restricting Content
Administrative Collaboration
Products
Desktop Management
Laptop/PDA Security
PDA Security
Laptop Security
Physical Security
Content Management
Resources
Summary
II. Hacking 101
6. A Brief TCP/IP Primer
What Is TCP/IP?
The Open Systems Interconnection (OSI) Reference Model
Network-Level Protocols
Application-Level Protocols
The History of TCP/IP
The RFCs
Implementations of TCP/IP
How Does TCP/IP Work?
The Individual Protocols
Network-Level Protocols
The Address Resolution Protocol (ARP)
The Internet Control Message Protocol (ICMP)
The Internet Protocol (IP)
IP Network Addressing
IP Routing
The Transmission Control Protocol (TCP)
TCP Connection Termination
User Datagram Protocol (UDP)
Application-Level Protocols—The Ports
Hypertext Transfer Protocol (HTTP)
Domain Name System (DNS)
Telnet
File Transfer Protocol (FTP)
Mechanical Operation of FTP
FTPD: An FTP Server Daemon
Simple Mail Transfer Protocol (SMTP)
Secure Shell Protocol (SSH)
IPsec, IPv6, VPNs, and Looking Ahead
Summary
7. Spoofing Attacks
What Is Spoofing?
Internet Security Fundamentals
Methods of Authentication
RHOSTS
The Mechanics of a Spoofing Attack
The Ingredients of a Successful Spoofing Attack
Opening a More Suitable Hole
Who Can Be Spoofed?
How Common Are Spoofing Attacks?
Spoofing/Hijacking Utilities
1644
Hunt
ipspoof
Juggernaut
rbone
Spoofit
synk4.c (Syn Flooder by Zakath)
Documents Related Specifically to IP Spoofing
How Do I Prevent IP Spoofing Attacks?
Other Strange and Offbeat Spoofing Attacks
ARP Spoofing
DNS Spoofing
Web Spoofing
The Partner Password Setup
The Referrer Setup
The Session-Specific URL Setup
A Solution
Summary
8. Personal Privacy
Degrees of Exposure
Human Intelligence
Web Browsing and Invasion of Privacy
Internet Architecture and Privacy
How User Information Is Stored on Servers
finger
Solutions for the finger Problem
MasterPlan
Beyond finger
Browser Security
IP Address and Cache Snooping
Cookies
Combating Cookies
Ads and Web Bugs
Protecting Yourself from Ads and Web Bugs
Spyware
Your Email Address and Usenet
Google Groups
The WHOIS Service
At Work
A Warning
Internet Resources
Articles and Papers and Related Web Sites
9. Dispelling Some of the Myths
When Can Attacks Occur?
How Do I Become a Hacker’s Target?
Dial-Up Versus Persistent Connections
Which Computer Operating Systems Are Vulnerable?
My Firewall Will Stop the Pesky Crackers!
What Kinds of Attackers Exist?
Script Kiddies—Your Biggest Threat?
Black Hats—“The Dark Side”
White Hats—The Good Guys
Operating Systems Used by Crackers
Windows Operating Systems
Linux/NetBSD/FreeBSD
OpenBSD
Is There a Typical Attack?
Denial-of-Service Attacks
Viruses, Trojans, and Malicious Scripts or Web Content
Web Defacement/“Tagging”
Attacks from the Inside
Who Gets Targeted Most Frequently?
Home and Small Business Internet Users
Larger Businesses and Corporations
Government and Military Institutions
Financial Institutions
What Is the Motivation Behind Attacks?
Notoriety, or the “Elite” Factor
Maliciousness and Destruction
Destructive Pranks or Lack of Cause
Disgruntled Employees
Making a Political Statement
Financial Gain
Theft or Unauthorized Transfer of Funds
Theft of Intellectual Property and Corporate Espionage
Credit Card Theft and “Carding”
Cracking for Knowledge
Breaking In to Break In
Summary
III. A Defender’s Toolkit
10. Firewalls
What Is a Firewall?
Other Features Found in Firewall Products
Firewalls Are Not Bulletproof
A Look Under the Hood of Firewalling Products
Packet Filter-Based Firewalls
Personal Firewalls
Stateful Packet Filter-Based Firewalls
Proxy-Based Firewalls
Programmers Bypassing the Firewall
Pitfalls of Firewalling
Firewall Appliances
Building Firewalls in the Real World
Identifying Topology, Application, and Protocol Needs
Analyze Trust Relationships and Communication Paths in Your Organization
Evaluate and Choose a Firewall Product
Deploying and Testing Your Firewall
Sample Failures of Firewall Technology
The “Whoops, Where Did My Web Server Go?” Problem
Using SSH to Bypass RuleSets
Commercial Firewalls
BlackICE
BorderManager
FireBOX
Firewall-1
FireWall Server
GNAT Box Firewall
Guardian
NetScreen
PIX Firewall
SideWinder
Sonicwall
Symantec Enterprise Firewall
Tiny Personal Firewall
ZoneAlarm Pro
Summary
Books and Publications
Internet Resources
11. Vulnerability Assessment Tools (Scanners)
The History of Vulnerability Scanners
How Vulnerability Scanners Work
What to Look For When Choosing a Scanner
Fundamental Shortcomings
Top Vulnerability Scanners
Retina
NetRecon
ISS Internet Scanner
Cybercop Scanner
The Open Source Nessus Project
Whisker
Other Vulnerability Scanners
HackerShield
Update
Cisco Scanner
SAINT
SARA, TARA, and WebMon
STAT
Security Analyzer
Summary
12. Intrusion Detection Systems
An Introduction to Intrusion Detection
Who Should Be Using an IDS
Network-Based IDSs
Host-Based ID Systems
Anomaly-Based IDSs
What to Look for When Choosing an IDS
Common Evaluation Criteria
Snort and Other Open Source IDS Solutions
Intrusion Detection Product Listing
Cisco Secure IDS
Computer Associates eTrust Intrusion Detection
Enterasys Dragon IDS
Intrusion SecureNet NID/SecureHost HID
IntruVert IntruShield
ISS RealSecure
ISS BlackICE
NFR Security Intrusion Detection System
nSecure Software nPatrol
Symantec NetProwler and Intruder Alert
Summary
13. Logging Tools
Why Log?
Logs from a Cracking Perspective
Forming a Logging Strategy
Network Monitoring and Data Collection
SWATCH (The System Watcher)
Watcher
lsof (List Open Files)
Private-I
WebSense
Win-Log version 1
SNIPS
Tools for Analyzing Log Files
NetTracker
LogSurfer
WebTrends for Firewalls and VPNs
Analog
Summary
14. Password Security
An Introduction to Password Cracking
Password Cryptography 101
ROT-13
DES and Crypt
The Password-Cracking Process
The Password Crackers
Password Crackers for Windows
L0phtCrack/LC4
John the Ripper by Solar Designer
NTCrack
NT Accessories
Notes on NT Password Security
Unix Password Cracking
About Unix Password Security
Crack
John the Ripper by Solar Designer
PaceCrack95 (
[email protected]
)
Star Cracker by the Sorcerer
Cracking Cisco, Application, and Other Password Types
Cracking Cisco IOS Passwords
Commercial Application Password Crackers
ZipCrack by Michael A. Quinlan
AMI Decode (Author Unknown)
PGPCrack by Mark Miller
Improving Your Site’s Passwords
Windows NT/2000
Passfilt Pro
Password Bouncer
Unix
LDAP Servers
Other Resources
Internet Resources
Publications and Reports
Summary
15. Sniffers
Sniffers as Security Risks
Local Area Networks and Data Traffic
Packet Transport and Delivery
What Level of Risk Do Sniffers Represent?
Has Anyone Actually Seen a Sniffer Attack?
What Information Do Sniffers Capture?
Where Is One Likely to Find a Sniffer?
Where Can I Get a Sniffer?
Commercial Sniffers
Sniffer Technologies and Products from Network Associates
Finisar-Systems Surveyor
PacketView by Klos Technologies
Ranger Network Probe from Network Communications
LANWatch by Precision Guesswork
EtherPeek and AiroPeek from WildPackets Inc.
NetMinder Ethernet by Neon Software
LinkView Classic Network Analyzer by Acterna
ProConvert from WildPackets, Inc.
LANdecoder32 by Triticom
Vericept
Freely Available Sniffers
Snoop
Esniff
TCPDUMP
LinSniff
Defeating Sniffer Attacks
Detecting and Eliminating Sniffers
Safe Topology
Encrypted Sessions
Summary
Further Reading on Sniffers
IV. Weapons of Mass Destruction
16. Denial-of-Service Attacks
What Is Denial of Service?
How Denial of Service Works
Bandwidth Consumption
Resource Saturation
System and Application Crash
Exploitation and Denial of Service
Email Bomb Resource Attacks
Email Bomb Packages
Dealing with Email Bombs
Email Bombs as Security Risks
Email Bombing Viruses
List Linking
A Word About Mail Relay
Mail Relaying Blocking Lists
Protocol Attacks
Denial-of-Service Attack Index
Recent DoS Attacks
BIND
Smurf
Fraggle
ICMP Flood
SYN Flood
UDP Flood
Historical List of Well-Known DoS Attacks
Teardrop
Bonk/Boink Attacks
Jolt2
LAND
Winnuke
DNSKiller
arnudp100.c
Distributed Denial-of-Service Attacks
Trinoo (Trin00)
Tribe Flood Network (TFN)
TFN2k
Stacheldraht
Summary
Other DoS Resources
17. Viruses and Worms
Understanding Viruses and Worms
What Is a Computer Virus?
What Is a Computer Worm?
Objects at Risk of Virus Infection
Who Writes Viruses, and Why?
How Are Viruses Created?
What Does “In the Wild” Really Mean?
How Do Viruses Work?
Boot Sector Infectors
File Viruses (Parasitic Viruses)
Multipartite Viruses
Macro Viruses
Script Viruses
Memetic Viruses
How Do Worms Work?
Virus Characteristics
Antivirus Utilities
Network Associates
Norton Anti-Virus
AVG AntiVirus
eSafe
Antigen
PC-Cillin
Sophos Anti-Virus
F-PROT Anti-Virus
Integrity Master
Future Trends in Viral Malware
Publications and Sites
Summary
18. Trojans
What Is a Trojan?
Origin of the Species
Definitions
I Didn’t Mean It
Trojan Classifications
Destructive Trojans
Privacy-Invasive Trojans
Network Trojans
Back Door Trojans
Remote Access Tools
Droppers
Jokes
Bombs
Rootkits
DDoS Agents
Worms
Where Do Trojans Come From?
How Often Are Trojans Really Discovered?
What Level of Risk Do Trojans Represent?
How Do I Detect a Trojan?
MD5
Tripwire
TAMU/TARA
On Other Platforms
Resources
Summary
V. Architecture, Platforms, and Security
19. Network Architecture Considerations
Network Architecture
Network Components
Access Devices
Security Devices
Servers and Systems
Organization and Layout
Threats
External Attacks
Internal Attacks
Physical Attacks
Approach to Network Architecture
Security Zones
The Great Beyond
Internal Networks
Intermediate Networks
Protecting the Castle
Isolation and Separation
Network Data
Segments
Switches and Hubs
Routers
Network Numbers
Physical Considerations
Network Separation
Network Management
Monitoring
Remote Access
Network Isolation
Services Differentiation
DNS
Email
Web Serving
Virtual Local Area Networks
Firewalls
Summary
20. Microsoft
Windows 9x and Windows Me
The Password List Password Scheme
Cracking PWL Files
Glide
Flushing the Password Out of Cached Memory
Summary on Windows 9x and Windows Me
Windows NT
General Windows NT Security Vulnerabilities
The Netmon Protocol Parsing Vulnerability
The Predictable LPC Message Identifier Vulnerability
The Registry Permissions Vulnerability
The Remote Registry Access Authentication Vulnerability
The Winsock Mutex Vulnerability
Other Important Vulnerabilities of Lesser Significance
Internal Windows NT Security
Internal Security in General
The RDISK Hole
Achieving Good Internal Security
A Tip on Setting Up a Secure Windows NT Server from Scratch
Summary of Windows NT
Windows 2000
Improvements to Security
Windows 2000 Distributed Security Overview
General Windows 2000 Security Vulnerabilities
The Malformed Data Transfer Request Vulnerability
The Windows 2000 Directory Service Restore Mode Password Vulnerability
The Netmon Protocol Parsing Vulnerability
The Network Dynamic Data Exchange (DDE) Agent Request Vulnerability
The Phone Book Service Buffer Overflow Vulnerability
The Telnet Client NTLM Authentication Vulnerability
The Telnet Server Flooding Vulnerability
Summary of Windows 2000
Windows XP
Windows XP Security Improvements
Modern Vulnerabilities in Microsoft Applications
Microsoft Internet Explorer
Incorrect VBScript Handling Vulnerability
The Active Setup Download Vulnerability
The Cached Web Credentials Vulnerability
The IE Script Vulnerability
The SSL Certificate Validation Vulnerability
The Unauthorized Cookie Access Vulnerability
Microsoft Exchange Server
Microsoft Exchange Encapsulated SMTP Address Vulnerability
Microsoft Exchange Malformed MIME Header Vulnerability
Microsoft Exchange NNTP Denial-of-Service Vulnerability
Microsoft Exchange SMTP Denial of Service Vulnerability
Microsoft Exchange Error Message Vulnerability
Microsoft Exchange User Account Vulnerability
Internet Information Server
Buffer Overrun in HTR ISAPI Extension Vulnerability
Cross-Site Scripting in IIS Help File Search Facility Vulnerability
The IIS Cross-Site Scripting Vulnerabilities
The IIS Malformed Web Form Submission Vulnerability
The IIS New Variant of File Fragment Reading via .HTR Vulnerability
The IIS Session ID Cookie Marking Vulnerability
The IIS Web Server File Request Parsing Vulnerability
The Invalid URL Vulnerability
The Myriad Escaped Characters Vulnerability
The Web Server Folder Traversal Vulnerability
Tools
Administrator Assistant Tool Kit
FileAdmin
Security Analyst
LANguard Network Security Scanner
LANguard Security Reporter
NT Crack
Administrator’s Pak
NTFSDOS Pro
RemoteRecover
PC Firewall ASaP
RegAdmin
Sniffer Basic
Somarsoft DumpSec
Somarsoft DumpEvt
Somarsoft DumpReg
Virtuosity
Access Control Software
Cetus StormWindow
ConfigSafe Complete Recovery v4 by imagine LAN, Inc.
DECROS Security Card by DECROS, Ltd.
Desktop Surveillance Enterprise and Personal Editions
Omniquad Detective
Windows Task-Lock by Posum LLC
WP WinSafe
Secure Shell
Good Online Sources of Information
The Windows NT Security FAQ
NTBugTraq
NTSECURITY.com for Windows 2000 and Windows NT
Expert Answers for Windows XP, Windows 2000, Windows NT, and Windows 9x/Me
Windows IT Security (Formerly NTSecurity.net)
“An Introduction to the Windows 2000 Public Key Infrastructure”
Windows and .NET Magazine Online
Securing Windows NT Installation
Checklist for Upgrading to Windows 2000 Server
The University of Texas at Austin Computation Center NT Archive
Books on Windows 2000 and Windows NT Security
Summary
21. Unix
A Whistle-Stop Tour of Unix History
Classifying Unix Distributions
Immature
Mainstream
How Secure Is Open Source?
Hardened Operating Systems
OpenBSD
Immunix
Linux Kernel Patch
Multilevel Trusted Systems
Hewlett-Packard Praesidium VirtualVault
Trusted Solaris
AIX TCSEC Evaluated C2 Security
Trusted BSD
NSA
Realities of Running TOS
Security Considerations in Choosing a Distribution
Unix Security Risks
User Accounts
Filesystem Security
File Attributes
Permissions in Practice
The set-uid/set-gid Privilege
The umask
Filesystem Risks
Filesystem Countermeasures
The set-uid Problem
Breaking set-uid Programs for Fun and Profit
Useful Tools for the Explorer
tcpdump
Ethereal
netcat
Ltrace
netsed
Subterfugue
Test Limitations
Rootkits and Defenses
Rootkit Countermeasures
Kernel Rootkits
Protecting Against Kernel Attacks
Rootkit Detection
Host Network Security
Network Services: General Purpose Versus “Fit for Purpose”
What Are Network Services?
The Risks of Running Network Services
Securing Network Services
Disabling Network Services
A Word About Privileged Ports
Protecting Against Service Hijacking Attacks
Detecting Fake Servers
Telnet
TELNET Protocol Risks
Information Leakage
I Spy with My Little Eye
Remote Determination of Network Service Versions
Remote Operating System Identification
Securing Telnet
An Essential Tool: Secure Shell
The SSH Protocols
SSH Servers
SSH Clients
SSH Resources
FTP
FTP Risks
Securing FTP
The r Services
r Services Risks
Countermeasures
REXEC
REXECREXEC Risks
Securing REXEC
SMTP
SMTP Risks
Securing SMTP
DNS
DNS Risks
Securing DNS
finger
SNMP
SNMP Risks
Securing SNMP
Network File System
NFS Risks
Securing NFS
The Caveats of chroot
Better the Daemon You Know…
Assessing Your Unix Systems for Vulnerabilities
Host Lockdown
Host-Hardening Resources
Sun Solaris
YAASP (Yet Another Solaris Security Package)
TITAN (Toolkit for Interactively Toughening Advanced Networks and Systems)
GNU/Linux
Bastille Linux
Hewlett-Packard HP-UX
IBM AIX
FreeBSD
Summary
22. Novell NetWare
The OS Facts of Life
Watching the Big Three
Server Environment
Physical Security
Securing an Insecure Console
NetWare 4.11 Console Lock
RCONSOLE
Unix Compatibility Utilities
WWW Services
NETBASIC.NLM
Server Environment Parameters
Bindery Context
Client Environment
Windows: The Weakest Link
Novell Directory Services (NDS) Environment
A Good Start: Intruder Detection
User Names: Admin
Guest and Other No-Password Users
Enforcing User Authentication Policies
Understanding and Applying NDS “Best Practices”
Unintended Consequences of Container Rights
NDS Auditing Tools
AuditWare for NDS
bv-Control for NDS
JRButils
LT Auditor+ 8.0
Commercial Secure Remote Control Products
SecureConsole for NetWare 3.4
AdRem sfConsole
Useful Freeware
BURGLAR.NLM
HOBJLOC.NLM
REMOTE.EXE
SETPWD.NLM
Further Reading
Summary
23. Routers, Switches, and Hubs
The Problems with Infrastructure Equipment
Keeping Up with OS Revisions
Securing Hubs
Securing Switches
Securing and Configuring Routers
Securing Login Points
Keeping Administrators Accountable
Disabling Unnecessary Services
Network Management Considerations
Centralizing Logging
Password Storage Considerations
Time Synchronization
SNMP Considerations
Preventing Spoofing and Other Packet Games
Egress Filtering
Ingress Filtering
Stopping Silly Packet Games
Summary
Further Reading and Reference
24. Macintosh
Mac OS X—Apple’s New Operating System
Establishing the Macintosh as a Server
WebSTAR Server Suite Recruited by U.S. Army
Hotline for Sharing Ideas and Files
Mac OS X Server Ability
Vulnerabilities on the Macintosh Platform
AtEase Access Bug
AtEase PowerBook 3400 Bug
Denial of Service by Port Over flow
DiskGuard Security
FWB Hard Disk Toolkit 2.5 Vulnerability
MacDNS Bug
Network Assistant
Password Security on Mac OS 8.0 Upgrades
Sequence of Death and WebSTAR
Mac OS X Software Vulnerabilities
Localhost Security Concern
About File Sharing and Security
Mac OS 9 File Security
Mac OS X File Security
Server Management and Security
EtherPeek
InterMapper 3.6
MacAnalysis
MacSniffer—Mac OS X
ettercap
HenWen with Snort
StreamEdit
MacRadius
Network Security Guard
Oyabun Tools
Silo 1.03
Nmap
Timbuktu Notes
Firewall Protection
IPNetSentry
NetBarrier
Norton Personal Firewall
Internal Security
Mac OS X Screensaver Password Protection
Mac OS X Login
BootLogger
DiskLocker
Empower
Ferret
Filelock
FullBack
Invisible Oasis
TypeRecorder
KeysOff and KeysOff Enterprise
LockOut
OnGuard Emergency Passwords
Password Key
Password Security Control Panel Emergency Password
Aladdin Secure Delete
SecurityWare Locks
Stealth Signal
Mac OS X Single User Root Mode
Super Save 2.02
SubRosa Utilities
Open Firmware Password Protection
Password Crackers and Related Utilities
FMP Password Viewer Gold 2.0
FMProPeeker 1.1
Macintosh Hacker’s Workshop
John the Ripper
Killer Cracker
MacKrack
MagicKey 3.2.3a
MasterKeyII
McAuthority
Meltino
Password Killer
Anonymous Email and Mailbombing
Caem
Bomba
NailMail X
Spic & Spam
ATT Blitz
Macintosh Viruses, Worms, and Antivirus Solutions
MacVirus.Info
.Mac
Norton Anti-Virus
Intego VirusBarrier
Disinfectant
AutoStart Worm Remover
The Little Dutch Moose
Mac OS X Virus Overview
Spyware and Detection
MacScan
Resources
Books and Reports
Sites with Tools and Munitions
E-Zines and Web Sites
25. Policies, Procedures, and Enforcement
The Importance of Security Policies
Site and Infrastructure Security Policy
Facilities and Physical Security Considerations
Infrastructure and Computing Environment
Physical Access to Computer Systems and Facilities
Physical Security Considerations for Laptop Computers and PDAs
Voice and Data Network Security
Remote Network Access
Security Monitoring and Auditing
Authentication and Access Control
Acceptable Use
Administrative Security Policies
Acceptable Use Policies for Users
Enforcement of Policy
Summary
Password Security
Audits and Analysis
Site Security Policies
Incident Handling
System Configuration
VI. Security and Integrated Services
26. Secure Application Development, Languages, and Extensions
Security and Software
What Is a Secure Application?
The Enemy Within (Your Code)
Configuration Issues
Race Conditions
Buffer Overflows
Data Protection
Temporary Storage
Denial of Service
Input and Output Methods
A Security Architecture
Components of a Security Architecture
Set the Stage for Security
Consider the Functionality Not Provided
Come Here for Guaranteed Security
Security Requirements
To Secure or Not to Secure
Assessing Authentication and Access Control Requirements
Requirements for Data Storage
Network and Entry Point Security Requirements
Network, Application, and System Interactions
Operating System Interactions
Throw Away That Security Blanket
Identification of the Risk Areas
Security Response
Security-Aware Designs
Design Phase Analysis
The Global Viewpoint
Case Study Phase I
The Organizational Viewpoint
Case Study Phase II
The Component Viewpoint
Case Study Phase III
Secure Coding Practices
Pitfalls by the C
A Perl of an Application
Mi Java Es Su Java
C#/.NET
The Shell Game and Unix
Internet Appliances
Summary
27. Wireless Security Auditing
Wireless LAN Topology
Access Points
Linksys WAP11 Access Point
Tech Specs
NetGear ME102 Access Point
Tech Specs
Antennas
Radome-Enclosed Yagi Antenna: HyperLink HG2415Y
Tech Specs
Parabolic Grid Antenna: HyperLink HG2419G
Tech Specs
SigMax Omni-Directional: Signull SMISMCO10
Tech Specs
SigMax Circular Yagi: Signull SMISMCY12
Tech Specs
TechnoLab Log Periodic Yagi
Tech Specs
Wireless Networking Cards
ORiNOCO PC Card
Handheld Devices
Compaq iPAQ
Tech Specs
Constructing a Wireless Test Lab
Wireless Attacks
Surveillance
War Driving
Client-to-Client Hacking
Rogue Access Points
Jamming (Denial of Service)
Practical WEP Cracking
Summary
VII. References
A. Security Bibliography—Further Reading
General Internet Security
TCP/IP
On NetWare
B. How to Get More Information
Establishment Resources
Sites on the WWW
Reports and Publications
General
Java
Databases and Security
Articles
Tools
Windows
Macintosh Security Tools
Password Crackers
Scanners and Related Utilities
Mail Bombers
Intrusion Detectors
Technical Reports, Government Standards, and Papers
The Rainbow Books and Related Documentation
Other Governmental Security Documents and Advisories
Intrusion Detection
Mailing Lists
Underground Resources
C. Vendor Information and Security Standards
Vendor Security Information
Hewlett-Packard
IBM
Linux
Caldera
Debian
Red Hat
SuSE
Microsoft
Sun Microsystems
RFC Documents Relevant to Security
D. What’s on the CD-ROM
Glossary
28. CD-ROM
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
27. Wireless Security Auditing
Next
Next Chapter
A. Security Bibliography—Further Reading
Part VII. References
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset