Contents

Introduction

Chapter 1. Here There Be Hackers!

Essentials First: Looking for a Target

Hacking Innocent Information

Targets of Opportunity

Are You a Target of Opportunity?

Targets of Choice

Are You a Target of Choice?

The Process of an Attack

Reconnaissance and Footprinting (a.k.a. Casing the Joint)

Scanning

Enumeration

Enumerating Windows

Gaining Access

Operating System Attacks

Application Attacks

Misconfiguration Attacks

Script Attacks

Escalating Privilege

Covering Tracks

Network Security Organizations

CERT Coordination Center

SANS

Center for Internet Security (CIS)

SCORE

Internet Storm Center

ICAT Metabase

Security Focus

Learning from the Network Security Organizations

Overview of Common Attacks and Exploits

Chapter Summary

Chapter Review

Chapter 2. Security Policies and Responses

Defining Trust

Acceptable Use Policy

Policy Overview

Purpose

Scope

General Use and Ownership

Security and Proprietary Information

Unacceptable Use

System and Network Activities

E-mail and Communications Activities

Enforcement

Conclusion

Password Policy

Overview

Purpose

Scope

General Policy

General Password Construction Guidelines

Password Protection Standards

Enforcement

Conclusion

Virtual Private Network (VPN) Security Policy

Purpose

Scope

Policy

Conclusion

Extranet Connection Policy

Purpose

Scope

Security Review

Third-Party Connection Agreement

Business Case

Point of Contact

Establishing Connectivity

Modifying or Changing Connectivity and Access

Terminating Access

Conclusion

ISO Certification and Security

Sample Security Policies on the Internet

Chapter Summary

Chapter Review

Chapter 3. Overview of Security Technologies

Security First Design Concepts

Packet Filtering via Access Control Lists (ACLs)

Grocery List Analogy

Limitations of Packet Filtering

Stateful Packet Inspection (SPI)

Detailed Packet Flow Using SPI

Limitations of Stateful Packet Inspection

Network Address Translation (NAT)

Increasing Network Security

NAT’s Limitations

Proxies and Application Level Protection

Limitations of Proxies

Content Filters

Limitations of Content Filtering

Public Key Infrastructure (PKI)

PKI’s Limitations

AAA Technologies

Authentication

Authorization

Accounting

Remote Authentication Dial-In User Service (RADIUS)

Terminal Access Controller Access Control System (TACACS)

TACACS+ Versus RADIUS

Chapter Summary

Chapter Review Questions

Chapter 4. Security Protocols

DES Encryption

Encryption Strength

Limitations of DES

Triple DES Encryption

Encryption Strength

Limitations of 3DES

Message Digest 5 Algorithm

MD5 Hash in Action

Point-to-Point Tunneling Protocol (PPTP)

PPTP Functionality

Limitations of PPTP

Layer 2 Tunneling Protocol (L2TP)

L2TP Versus PPTP

Benefits of L2TP

L2TP Operation

Secure Shell (SSH)

SSH Versus Telnet

SSH Operation

Tunneling and Port Forwarding

Limitations of SSH

Chapter Summary

Chapter Review Questions

Chapter 5. Firewalls

Firewall Frequently Asked Questions

Who Needs a Firewall?

Why Do I Need a Firewall?

Do I Have Anything Worth Protecting?

What Does a Firewall Do?

Firewalls Are “The Security Policy”

Firewall Operational Overview

Firewalls in Action

Implementing a Firewall

Determine the Inbound Access Policy

Determine Outbound Access Policy

Essentials First: Life in the DMZ

Case Studies

Case Study: To DMZ or Not to DMZ?

Case Study: Firewall Deployment with Mail Server Inside the Protected (Internal)

Case Study: Firewall Deployment with Mail Server in DMZ

Firewall Limitations

Chapter Summary

Chapter Review Questions

Chapter 6. Router Security

Edge Router as a Choke Point

Limitations of Choke Routers

Edge Router as a Packet Inspector

Benefits of the Firewall Feature Set

Content-Based Packet Inspection

Intrusion Detection with Cisco IOS

When to Use the FFS IDS

FFS IDS Operational Overview

FFS Limitations

Secure IOS Template

Chapter Summary

Chapter Review Questions

Chapter 7. IPSec Virtual Private Networks (VPNs)

Analogy: VPNs Connect IsLANds Securely

VPN Overview

VPN Benefits and Goals

VPN Implementation Strategies

Split Tunneling

Overview of IPSec VPNs

Authentication and Data Integrity

Tunneling Data

Encryption Modes

Tunnel Mode

Transport Mode

IPSec Protocols

Security Associations

Internet Key Exchange (IKE)

ISAKMP Overview

IPSec Operational Overview

IKE Phase 1

IKE Phase 2

Diffie-Hellman Algorithm

Router Configuration as VPN Peer

Configuring ISAKMP

Preshared Keys

Configuring IPSec

Step 1: Create the Extended ACL

Step 2: Create the IPSec Transforms

Step 3: Create the Crypto Map

Step 4: Apply the Crypto Map to an Interface

Firewall VPN Configuration for Client Access

Chapter Summary

Chapter Review Questions

Chapter 8. Wireless Security

Essentials First: Wireless LANs

What Is Wi-Fi?

Benefits of Wireless LANs

Wireless Equals Radio Frequency

Wireless Networking

Modes of Operation

Coverage

Bandwidth Availability

WarGames Wirelessly

WarChalking

WarDriving

WarFlying

WarSpamming

WarSpying

Wireless Threats

Sniffing to Eavesdrop

Denial of Service Attacks

Rogue/Unauthorized Access Points

Attackers’ Rogue AP Deployment Guidelines

Incorrectly Configured Access Points

Network Abuses

Wireless Security

Service Set Identifier (SSID)

Device and Access Point Association

Wired Equivalent Privacy (WEP)

WEP Limitations and Weaknesses

MAC Address Filtering

Extensible Authentication Protocol (EAP)

EAP-MD5

LEAP (EAP-Cisco)

EAP-TLS

EAP-TTLS

Increasing Wireless Security

Essentials First: Wireless Hacking Tools

NetStumbler

Wireless Packet Sniffers

AirSNORT

Chapter Summary

Chapter Review Questions

Chapter 9. Intrusion Detection and Honeypots

Essentials First: Intrusion Detection

IDS Functional Overview

Network Intrusion Detection System (NIDS)

Host Intrusion Detection System (HIDS)

How Are Intrusions Detected?

Communication Stream Reassembly

Protocol Analysis

Anomaly Detection

Signature/Pattern Matching

Log Analysis

Combining Methods

Intrusion Prevention

IPS Responses and Actions

IDS Products

Snort!

Limitations of IDS

Essentials First: Honeypots

Honeypot Design Strategies

Honeypot Limitations

Chapter Summary

Chapter Review Questions

Chapter 10. Tools of the Trade

Essentials First: Vulnerability Analysis

Fundamental Attacks

IP Spoofing/Session Hijacking

Packet Sniffers

Denial of Service (DoS) Attacks

Man-in-the-Middle Attacks

Back Doors

Miscellaneous Attacks

Security Assessments and Penetration Testing

Internal Vulnerability and Penetration Assessment

Assessment Methodology

External Penetration and Vulnerability Assessment

Assessment Methodology

Physical Security Assessment

Assessment Methodology

Miscellaneous Assessments

Assessment Providers

Vulnerability Scanners

Features and Benefits of Vulnerability Scanners

Nessus

In Their Own Words

Scan and Detection Accuracy

Documentation and Support

Reporting

Vulnerability Updates

Retina

In Their Own Words

Scan and Detection Accuracy

Documentation and Support

Reporting

Vulnerability Updates

Penetration Testing Products

In Their Own Words

Scan and Detection Accuracy

Documentation

Documentation and Support

Vulnerability Updates

Core Impact In Action

Chapter Summary

Chapter Review Questions

Appendix A. Answers to Chapter Review Questions

Glossary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.143.52