A network security breach (a hack, crack or other invasion) occurs when unauthorized access to the network is achieved, and havoc results. A good defence is an offensive strategy that allows regular testing of a network to reveal the vulnerabilities before a hack learns of them. This text offers step-by-step guidance so that an IT professional may test his/her own network security with customized software. John Chirillo provides readers with detailed information on how to build and operate a reliable security analysis/monitoring system.
Table of Contents
Acknowledgments. Introduction. PART 1: BUILDING A MULTISYSTEM TIGER BOX. Chapter 1. Basic Windows 2000/Windows 2000 Server Installation and Configuration. Chapter 2. Basic Linux and Solaris Installations and Configurations. Chapter 3. Mac OS X Tiger Box Solutions. Chapter 4. Installing and Configuring a Testing Target. PART 2: USING SECURITY ANALYSIS TOOLS FOR YOUR WINDOWS-BASED TIGER BOX OPERATING SYSTEM. Chapter 5. Cerberus Internet Scanner. Chapter 6. CyberCop Scanner. Chapter 7. Internet Scanner. Chapter 8. Security Threat Avoidance Technology Scanner. Chapter 9. TigerSuite 4.0. PART 3: USING SECURITY ANALYSIS TOOLS FOR NIX AND MAC OS X. Chapter 10. hping/2. Chapter 11. Nessus Security Scanner. Chapter 12. Nmap. Chapter 13. SAINT. Chapter 14. SARA. PART 4: VULNERABILITY ASSESSMENT . Chapter 15. Comparative Analysis. Appendix A. Linux/Unix Shortcuts and Commands. Appendix B. What's on the CD-ROM. Index.
JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer systems and more than five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.