Hack_Attacks_Revealed.pdf
(
8403 KB
)
Pobierz
Hack Attacks Revealed.doc
Hack Attacks Revealed
A Complete Reference with
Custom Security Hacking Toolkit
John Chirillo
This netLibrary eBook does not include the ancillary media that was packaged with the original
printed version of the book.
Publisher: Robert Ipsen
Editor: Carol A. Long
Assistant Editor: Adaobi Obi
Managing Editor: Micheline Frederick
New Media Editor: Brian Snapp
Text Design & Composition: Thomark Design
Designations used by companies to distinguish their products are often claimed as trademarks. In all
instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial
capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies
for more complete information regarding trademarks and registration.
Copyright © 2001 by John Chirillo. All rights reserved.
Published by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the
prior written permission of the Publisher, or authorization through payment of the appropriate per-
copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-
8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the
Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012,
(212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM.
This publication is designed to provide accurate and authoritative information in regard to the subject
matter covered. It is sold with the understanding that the publisher is not engaged in professional
services. If professional advice or other expert assistance is required, the services of a competent
professional person should be sought.
This title is also available in print as ISBN 0-471-41624-X
For more information about Wiley products, visit our web site at www.Wiley.com
Contents
Acknowledgments
xi
A Note to the Reader
xii
Introduction
xiii
Part I:
In the Beginning
1
Chapter 1
Understanding Communication Protocols
3
A Brief History of the Internet
3
Internet Protocol
5
IP Datagrams, Encapsulation, Size, and
Fragmentation
8
IP Addresses, Classes, Subnet Masks
10
Subnetting, VLSM, and Unraveling IP the Easy
Way
11
ARP/RARP Engineering: Introduction to Physical
Hardware Address Mapping
22
ARP Encapsulation and Header Formatting
23
RARP Transactions, Encapsulation
24
RARP Service
25
Transmission Control Protocol
25
Sequencing and Windowing
26
TCP Packet Format and Header Snapshots
26
Ports, Endpoints, Connection Establishment
28
User Datagram Protocol
30
UDP Formatting, Encapsulation, and Header
Snapshots
30
Multiplexing, Demultiplexing, and Port Connections 31
Internet Control Message Protocol
32
ICMP Format, Encapsulation, and Delivery
32
ICMP Messages, Subnet Mask Retrieval
33
ICMP Header Snapshots
36
Moving Forward
36
Chapter 2
NetWare and NetBIOS Technology
37
NetWare: Introduction
37
Internetwork Packet Exchange
37
Sequenced Packet Exchange
44
SPX Format, Header Snapshots
44
Connection Management, Session Termination
45
Watchdog Algorithm
45
Error Recovery, Congestion Control
47
Wrapping Up
47
NetBIOS Technology: Introduction
47
Naming Convention, Header Snapshots
48
General, Naming, Session, and Datagram Services 48
NetBEUI: Introduction
50
NetBIOS Relationship
50
Windows and Timers
50
Conclusion
51
Part II:
Putting It All Together
53
Chapter 3
Understanding Communication Mediums
55
Ethernet Technology
55
Carrier Transmissions
56
Ethernet Design, Cabling, Adapters
57
Hardware Addresses, Frame Formats
60
Token Ring Technology
60
Operation
62
Token Ring Design, Cabling
62
Prioritization
62
Fault Management
63
Addresses, Frame Format
63
Fiber Distributed Data Interface Technology
64
Operation
65
FDDI Design, Cabling
66
Frame Format
66
Analog Technology
67
Problem Areas and Remedies
67
System Registry
69
Integrated Services Digital Network Technology
71
ISDN Devices
71
ISDN Service Types
72
ISDN versus Analog
72
Digital Subscriber Line
73
Point-to-Point Technology
74
PPP Operation
74
Frame Structure
75
Frame Relay Technology
76
Operation, Devices, Data-Link Connection
Identifiers, and Virtual Circuits
76
Congestion Notification and Error Checking
78
Local Management Interface
78
Plik z chomika:
Iskraa
Inne pliki z tego folderu:
How_Debuggers_Work_-_Algorithms__Data_Structures_and_Architecture.djvu
(2634 KB)
How.Internet.Works.8th_Preston.Gralla_Que_2006.chm
(60772 KB)
Wiley.Simple.Computer.Security.Disinfect.Your.PC.Jan.2007.pdf
(13050 KB)
Linux - Tworzenie Aplikacji [Eric Harlow].rar
(4527 KB)
Syngress, Hack Proofing Your E-Commerce Site.pdf
(7516 KB)
Inne foldery tego chomika:
!3d programing
!Agile - Best Practices
!AI
!AJAX
!algorytmika
Zgłoś jeśli
naruszono regulamin