
Network Hacking and Security
Description
Book Introduction
Learn core security techniques with 47 exercises and 5 projects!
With new security vulnerabilities constantly emerging, even staying up to date with the latest security techniques means attackers and security administrators are constantly at odds.
Therefore, you must know the core principles that will allow you to deal with any situation.
This book will help you quickly review basic network concepts and learn the core theories and techniques of network hacking and security.
It is designed to provide a foundation for responding to intelligent security threats through various attack and response exercises.
※ This book was developed as a textbook for university lectures, so it does not provide answers to practice problems.
With new security vulnerabilities constantly emerging, even staying up to date with the latest security techniques means attackers and security administrators are constantly at odds.
Therefore, you must know the core principles that will allow you to deal with any situation.
This book will help you quickly review basic network concepts and learn the core theories and techniques of network hacking and security.
It is designed to provide a foundation for responding to intelligent security threats through various attack and response exercises.
※ This book was developed as a textbook for university lectures, so it does not provide answers to practice problems.
- You can preview some of the book's contents.
Preview
index
Chapter 01 Network and Security
01 Start of the network
02 Five Elements of Network Security
summation
Practice problems
Chapter 02 Understanding Networks
01 Protocol
02 Network Hierarchy
03 Physical Layer
04 Data Link Layer
05 Network Layer
06 Transport Layer
07 Application Layer
08 Layer-by-layer packet analysis
09 Network Simulation
Practice 2-1: Installing and Learning How to Use the Packet Spinning (Capture) Tool
Exercise 2-2: Analyzing Packets at the Data Link Layer
Exercise 2-3: Analyzing Packets at the Network Layer
Exercise 2-4: Analyzing Packet Structures by Layer
Exercise 2-5: Downloading and Installing Packet Tracer
Exercise 2-6: Configuring a Data Link Layer Network Using Packet Tracer
Exercise 2-7: Configuring Network Layer Networks Using Packet Tracer
summation
Practice problems
Chapter 03 Whois and DNS Investigation
01 Whois Server and Hosts File
02 DNS
Exercise 3-1: Obtaining Information Using a Whois Server
Exercise 3-2: Resolving Names Using the Hosts File
Exercise 3-3: Searching DNS Servers to Gather Information
summation
Practice problems
Chapter 04 IP Address Tracking
01 Introduction to IP Address Tracking
02 IP tracking through mail/P2P services
03 IP tracking via web bulletin board/traceroute
Exercise 4-1: Understanding the Operational Principles of Web, DHCP, and DNS Servers Using Packet Tracer
Exercise 4-2: Checking the Routing Path Using Traceroute
summation
Practice problems
Chapter 05 Cataloging
01 Cataloging and Footprinting
02 Scan
03 Operating System Detection
04 Firewall Detection
05 SNMP
Exercise 5-1 Scanning in Various Ways
Exercise 5-2 Grabbing a Banner
Exercise 5-3: Collecting Information Using SNMP
summation
Practice problems
Chapter 06 Sniffing
01 Sniffing Attack
02 Sniffing Attack Tool
03 Sniffing in a switching environment
04 Security Measures against Sniffing Attacks
Exercise 6-1: Setting up Promiscuous Mode
Exercise 6-2: Sniffing Accounts and Passwords with TCP Dump
Exercise 6-3: Various Sniffing Attacks with dsniff
Exercise 6-4: ARP Redirect Attack
Exercise 6-5: Jamming a Switch with macof
summation
Practice problems
Chapter 07 Spoofing
01 Spoofing Attacks and Security Measures
02 ARP Spoofing Attacks and Security Measures
03 IP Spoofing Attacks and Security Measures
04 DNS Spoofing Attacks and Security Measures
05 Email Spoofing Attacks and Security Measures
Exercise 7-1: Collecting the System's IP and MAC Addresses
Exercise 7-2 Sniffing with ARP Spoofing
Exercise 7-3: DNS Spoofing Attack
Exercise 7-4: E-mail Spoofing Attack
summation
Practice problems
Chapter 08 Tunneling
01 Tunneling and VPN
02 Covert Channel
Exercise 8-1: Setting Up a VPN in Packet Tracer
Exercise 8-2: SSH Tunneling
Exercise 8-3: Installing and Using a Shell Backdoor
summation
Practice problems
Chapter 09 Session Hijacking
01 Session Hijacking Attack
02 TCP Session Hijacking
03 MITM Attack
Exercise 9-1: Hijacking a Telnet Session
Exercise 9-2: MITM Attacks on the Web
Exercise 9-3: SSL Sniffing Attack
Exercise 9-4: SSL Strip Attack
summation
Practice problems
Chapter 10 Wireless LAN Security
01 Features of Wireless LAN
02 Wireless LAN Security Measures
Exercise 10-1: Detecting Wireless LANs
Exercise 10-2: Cracking the WEP Key
Exercise 10-3: Cracking the WPA-PSK Key
Exercise 10-4: Hijacking a Wireless LAN Session
summation
Practice problems
Chapter 11 DoS and DDoS Attacks
01 DoS attack
02 DDoS Attack
03 DoS and DDoS Attack Security Measures
Practice 11-1 Attacking with Ping of Death
Exercise 11-2 SYN Flooding Attack
Practice 11-3 Attacking Teardrop
Practice 11-4 Attacking Land
Exercise 11-5 Attacking the Smurfs
Exercise 11-6: DoS Attack on a Web Application
summation
Practice problems
Chapter 12 Firewall
01 Basic functions and structure of the firewall
02 Additional Firewall Features
Exercise 12-1: Allowing/Denying Pings to Specific Hosts Using Standard ACLs
Exercise 12-2: Allowing/Blocking IP/ICMP Protocols Using a Firewall
Exercise 12-3 Setting up NAT
summation
Practice problems
Chapter 13 Security Settings for Network Equipment
01 ACL (Access Control List)
02 VLAN
03 NAC
Exercise 13-1: Denying Access to Specific Hosts Using Extended ACLs
Exercise 13-2 Setting up VLANs
summation
Practice problems
Chapter 14 Intrusion Detection and Monitoring
01 Intrusion Detection System
02 Intrusion Prevention System
03 Honeypot
04 Integrated Security Management System
Exercise 14-1: Installing an Intrusion Prevention System (IPS)
summation
Practice problems
Appendix A: Building a Practice Environment and Project
01 Building a Practice Environment
02 Attack and Response Scenario Project
Scenario 1: Exploiting a vulnerability in the wireless LAN to penetrate the internal network.
Scenario 2: Gather information from your internal network.
Scenario 3: Hijack a network session and infiltrate the server.
Scenario 4: Bypass the firewall and secure a server connection.
Scenario 5: Block Web Server Connections
01 Start of the network
02 Five Elements of Network Security
summation
Practice problems
Chapter 02 Understanding Networks
01 Protocol
02 Network Hierarchy
03 Physical Layer
04 Data Link Layer
05 Network Layer
06 Transport Layer
07 Application Layer
08 Layer-by-layer packet analysis
09 Network Simulation
Practice 2-1: Installing and Learning How to Use the Packet Spinning (Capture) Tool
Exercise 2-2: Analyzing Packets at the Data Link Layer
Exercise 2-3: Analyzing Packets at the Network Layer
Exercise 2-4: Analyzing Packet Structures by Layer
Exercise 2-5: Downloading and Installing Packet Tracer
Exercise 2-6: Configuring a Data Link Layer Network Using Packet Tracer
Exercise 2-7: Configuring Network Layer Networks Using Packet Tracer
summation
Practice problems
Chapter 03 Whois and DNS Investigation
01 Whois Server and Hosts File
02 DNS
Exercise 3-1: Obtaining Information Using a Whois Server
Exercise 3-2: Resolving Names Using the Hosts File
Exercise 3-3: Searching DNS Servers to Gather Information
summation
Practice problems
Chapter 04 IP Address Tracking
01 Introduction to IP Address Tracking
02 IP tracking through mail/P2P services
03 IP tracking via web bulletin board/traceroute
Exercise 4-1: Understanding the Operational Principles of Web, DHCP, and DNS Servers Using Packet Tracer
Exercise 4-2: Checking the Routing Path Using Traceroute
summation
Practice problems
Chapter 05 Cataloging
01 Cataloging and Footprinting
02 Scan
03 Operating System Detection
04 Firewall Detection
05 SNMP
Exercise 5-1 Scanning in Various Ways
Exercise 5-2 Grabbing a Banner
Exercise 5-3: Collecting Information Using SNMP
summation
Practice problems
Chapter 06 Sniffing
01 Sniffing Attack
02 Sniffing Attack Tool
03 Sniffing in a switching environment
04 Security Measures against Sniffing Attacks
Exercise 6-1: Setting up Promiscuous Mode
Exercise 6-2: Sniffing Accounts and Passwords with TCP Dump
Exercise 6-3: Various Sniffing Attacks with dsniff
Exercise 6-4: ARP Redirect Attack
Exercise 6-5: Jamming a Switch with macof
summation
Practice problems
Chapter 07 Spoofing
01 Spoofing Attacks and Security Measures
02 ARP Spoofing Attacks and Security Measures
03 IP Spoofing Attacks and Security Measures
04 DNS Spoofing Attacks and Security Measures
05 Email Spoofing Attacks and Security Measures
Exercise 7-1: Collecting the System's IP and MAC Addresses
Exercise 7-2 Sniffing with ARP Spoofing
Exercise 7-3: DNS Spoofing Attack
Exercise 7-4: E-mail Spoofing Attack
summation
Practice problems
Chapter 08 Tunneling
01 Tunneling and VPN
02 Covert Channel
Exercise 8-1: Setting Up a VPN in Packet Tracer
Exercise 8-2: SSH Tunneling
Exercise 8-3: Installing and Using a Shell Backdoor
summation
Practice problems
Chapter 09 Session Hijacking
01 Session Hijacking Attack
02 TCP Session Hijacking
03 MITM Attack
Exercise 9-1: Hijacking a Telnet Session
Exercise 9-2: MITM Attacks on the Web
Exercise 9-3: SSL Sniffing Attack
Exercise 9-4: SSL Strip Attack
summation
Practice problems
Chapter 10 Wireless LAN Security
01 Features of Wireless LAN
02 Wireless LAN Security Measures
Exercise 10-1: Detecting Wireless LANs
Exercise 10-2: Cracking the WEP Key
Exercise 10-3: Cracking the WPA-PSK Key
Exercise 10-4: Hijacking a Wireless LAN Session
summation
Practice problems
Chapter 11 DoS and DDoS Attacks
01 DoS attack
02 DDoS Attack
03 DoS and DDoS Attack Security Measures
Practice 11-1 Attacking with Ping of Death
Exercise 11-2 SYN Flooding Attack
Practice 11-3 Attacking Teardrop
Practice 11-4 Attacking Land
Exercise 11-5 Attacking the Smurfs
Exercise 11-6: DoS Attack on a Web Application
summation
Practice problems
Chapter 12 Firewall
01 Basic functions and structure of the firewall
02 Additional Firewall Features
Exercise 12-1: Allowing/Denying Pings to Specific Hosts Using Standard ACLs
Exercise 12-2: Allowing/Blocking IP/ICMP Protocols Using a Firewall
Exercise 12-3 Setting up NAT
summation
Practice problems
Chapter 13 Security Settings for Network Equipment
01 ACL (Access Control List)
02 VLAN
03 NAC
Exercise 13-1: Denying Access to Specific Hosts Using Extended ACLs
Exercise 13-2 Setting up VLANs
summation
Practice problems
Chapter 14 Intrusion Detection and Monitoring
01 Intrusion Detection System
02 Intrusion Prevention System
03 Honeypot
04 Integrated Security Management System
Exercise 14-1: Installing an Intrusion Prevention System (IPS)
summation
Practice problems
Appendix A: Building a Practice Environment and Project
01 Building a Practice Environment
02 Attack and Response Scenario Project
Scenario 1: Exploiting a vulnerability in the wireless LAN to penetrate the internal network.
Scenario 2: Gather information from your internal network.
Scenario 3: Hijack a network session and infiltrate the server.
Scenario 4: Bypass the firewall and secure a server connection.
Scenario 5: Block Web Server Connections
Detailed image
.jpg)
GOODS SPECIFICS
- Date of issue: January 30, 2023
- Page count, weight, size: 516 pages | 188*235*35mm
- ISBN13: 9791156646198
- ISBN10: 1156646197
You may also like
카테고리
korean
korean