找回密码
 注册
搜索
热搜: java php web
查看: 529|回复: 0

Security Power Tools

[复制链接]
发表于 2009-12-20 17:52:00 | 显示全部楼层 |阅读模式
本帖最后由 石头 于 2009-12-20 17:55 编辑



作者:Bryan Burns, Jennifer Granick, Steve Manzuik, PaulGuersch, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier,Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi
出版日期:August 27, 2007
出版社:O'Reilly
页数:856
ISBN:ISBN-10: 0596009631 ISBN-13: 978-0596009632
文件格式:PDF

What if you could sit down with some of the most talented securityengineers in the world and ask any network security question youwanted? Security Power Tools lets you do exactly that! Members ofJuniper Networks’ Security Engineering team and a few guest expertsreveal how to use, tweak, and push the most popular network securityapplications, utilities, and tools available using Windows, Linux, MacOS X, and Unix platforms. Designed to be browsed, Security Power Toolsoffers you multiple approaches to network security via 23cross-referenced chapters that review the best security tools on theplanet for both black hat techniques and white hat defense tactics.It’s a must-have reference for network administrators, engineers andconsultants with tips, tricks, and how-to advice for an assortment offreeware and commercial tools, ranging from intermediate levelcommand-line operations to advanced programming of self-hidingexploits. Security Power Tools details best practices for:Reconnaissance — including tools for network scanning such as nmap;vulnerability scanning tools for Windows and Linux; LAN reconnaissance;tools to help with wireless reconnaissance; and custom packetgeneration Penetration — such as the Metasploit framework for automatedpenetration of remote computers; tools to find wireless networks;exploitation framework applications; and tricks and tools to manipulateshellcodes Control — including the configuration of several tools foruse as backdoors; and a review of known rootkits for Windows and LinuxDefense — including host-based firewalls; host hardening for Windowsand Linux networks; communication security with ssh; email security andanti-malware; anddevice security testing Monitoring — such as tools tocapture, and analyze packets; network monitoring with Honeyd and snort;and host monitoring of production servers for file changes Discovery —including The Forensic Toolkit, SysInternals and other popular forensictools; application fuzzer and fuzzing techniques; and the art of binaryreverse engineering using tools like Interactive Disassembler andOllydbg A practical and timely network security ethics chapter writtenby a Stanford University professor of law completes the suite of topicsand makes this book a goldmine of security information. Save yourself aton of headaches and be prepared for any network security dilemma withSecurity Power Tools.
About the Author
Bryan Burns is the technical editor and general project leader of thisbook. He is the Chief Security Architect for Juniper Networks with morethan a decade of experience in the security networking field and withnumerous posts at leading network security companies. All othercontributors are security engineers and researchers working at JuniperNetworks in various posts both in the security network lab and in thefield.
Steve Manzuik has more than 13 thirteen years of experience in theinformation technology and security industry. Steve founded and was thetechnical lead for Entrench Technologies. Prior to Entrench, Mr.Manzuik was a manager in Ernst & Young’s Security & TechnologySolutions practice. Steve co-authored Hack Proofing Your Network,Second Edition (Syngress, 1928994709).
Dave Killion (NSCA, NSCP) is a senior security research engineerwith Juniper Networks, Inc. Formerly with the U.S. Army’s InformationOperations Task Force as an Information Warfare Specialist, hecurrently researches, develops, and releases signatures for theNetScreen Deep Inspection and Intrusion Detection and Preventionplatforms. Dave has also presented at several security conventionsincluding DefCon and ToorCon, with a proof-of-concept networkmonitoring evasion device in affiliation with several local securityinterest groups that he helped form. Dave lives south of Silicon Valleywith his wife Dawn and two children, Rebecca and Justin.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-11-23 00:09

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表