Applied Network Security


Applied Network Security
by Arthur Salmon,Michael McLafferty,Warun Levesque
pages 页数: 350 pages
Publisher Finelybook 出版社: Packt Publishing (28 April 2017)
Language 语言: English
ISBN-10 书号: 1786466279
ISBN-13 书号: 9781786466273
B01N0R0FT2


Key Features
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2,MetaSploit,Nmap,and Wireshark
Become an expert in cracking WiFi passwords,penetrating anti-virus networks,sniffing the network,and USB hacks
This step-by-step guide shows you how to confidently and quickly detect vulnerabilities for your network before the hacker does

Book Description
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore,so it is very important to gain expertise in securing your network.
The book begins by showing you how to identify malicious network behaviour and improve your wireless security. We will teach you what network sniffing is,the various tools associated with it,and how to scan for vulnerable wireless networks. Then we’ll show you how attackers hide the payloads and bypass the victim’s antivirus.
Furthermore,we’ll teach you how to spoof IP / MAC address and perform an SQL injection attack and prevent it on your website. We will create an evil twin and demonstrate how to intercept network traffic. Later,you will get familiar with Shodan and Intrusion Detection and will explore the features and tools associated with it. Toward the end,we cover tools such as Yardstick,Ubertooth,Wifi Pineapple,and Alfa used for wireless penetration testing and auditing.
This book will show the tools and platform to ethically hack your own network whether it is for your business or for your personal home Wi-Fi.

What you will learn
Use SET to clone webpages including the login page
Understand the concept of Wi-Fi cracking and use PCAP file to obtain passwords
Attack using a USB as payload injector
Familiarize yourself with the process of trojan attacks
Use Shodan to identify honeypots,rogue access points,vulnerable webcams,and other exploits found in the database
Explore various tools for wireless penetration testing and auditing
Create an evil twin to intercept network traffic
Identify human patterns in networks attacks
Contents
Chapter 1. Introduction to Network Security
Chapter 2. Hackers (and their types) defined
Chapter 3. The hacking process
Chapter 4. Ethical hacking issues
Chapter 5. Current technologies
Chapter 6. Recent events and statistics of network attacks
Chapter 7. Security for individuals versus companies
Chapter 8. Mitigation against threats
Chapter 9. Building an assessment
Chapter 10. Summary
Chapter 11. References
Chapter 12. Summary
Chapter 13. Injectable Devices
Chapter 14. The Internet of Things
Chapter 15. Detection Systems
Chapter 16. Summary
Chapter 17. Offensive Security and Threat Hunting
主要特征
通过利用诸如Kali Linux 2,MetaSploit,Nmap和Wireshark等工具,深入了解高级网络安全攻击和技术
成为破解WiFi密码,穿透防毒网络,嗅探网络和USB黑客的专家
这个分步指南显示了如何在骇客之前自信和快速地检测到您的网络的漏洞
图书说明
计算机网络以指数速度增长,组织目前面临的最具挑战性的因素是网络安全。违反网络不再被认为是一个巧妙的工作,所以在保护网络方面获得专业知识非常重要。
本书首先介绍如何识别恶意网络行为并提高无线安全性。我们将教你什么网络嗅探,与之相关的各种工具,以及如何扫描易受攻击的无线网络。然后我们将向您展示攻击者如何隐藏有效载荷并绕过受害者的防病毒软件。
此外,我们将教你如何欺骗IP / MAC地址,并执行SQL注入攻击并阻止您的网站。我们将创建一个邪恶的双胞胎,并演示如何拦截网络流量。之后,您将熟悉Shodan和入侵检测,并将探索与之相关的功能和工具。最后,我们涵盖了诸如Yardstick,Ubertooth,Wifi Pineapple和Alfa等用于无线渗透测试和审核的工具。
这本书将展示用于道德窃取您自己的网络的工具和平台,无论是为您的业务还是为您的个人家庭Wi-Fi。
你会学到什么
使用SET来克隆包括登录页面在内的网页
了解Wi-Fi破解的概念,并使用PCAP文件获取密码
使用USB作为有效载荷喷射器
熟悉木马攻击的过程
使用Shodan来识别蜜罐,流氓接入点,易受攻击的网络摄像头以及数据库中发现的其他漏洞
探索用于无线渗透测试和审核的各种工具
创建一个邪恶的双胞胎拦截网络流量
识别网络攻击中的人类模式
目录
第1章网络安全简介
黑客(及其类型)定义
第3章黑客进程
第四章伦理黑客问题
第五章现有技术
第六章网络攻击近期事件和统计
第七章个人与公司的安全
第8章减轻威胁
第九章建立评估
第10章总结
参考文献
第十二章总结
第13章注射装置
第十四章物联网
第15章检测系统
第16章总结
第17章进攻安全和威胁狩猎

下载地址 Download
打赏
未经允许不得转载:finelybook » Applied Network Security

相关推荐

  • 暂无文章

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫打赏

微信扫一扫打赏