HackNotes: Linux and Unix Security Portable Reference

HackNotes

About the Book:

The book in general is  about network security with the operating systems such as Linux and Unix.  In my opinion, this book reference will be  really helpful for those students who study c335 Network Security as it addresses most of the issues in that module. The book itself is divided into three parts: Hacking Techniques and Defenses,  Host Hardening and Special Topics

Part 1: Hacking Techniques and Defenses

In this part, the reader will get to know what intrusion tactics do hackers use to break into computer networks. One of the tools used for footprinting is nmap which can scan hosts on the network with an amazing speed.  With nmap and its various commands we wil know what ports and opened on the host and know what operating system is running on that box.

Besides nmap, there are many other tools introduced such as Ettercap, Wireshark (also known as Ethereal) or Dsniff for capturing the packets and also called sniffing. For wireless hacking or in other words wardriving tools like Kismet and Airsnort will be used. With the methods of privilege escalation, a hacker can access and take a whole control of the computer network by bug and flaws of the operating system or of the software. A paerticular tool used in this situation is Metasploit.

The important notes of this part is that after each tutorial on hacking there is one techniques of defenses against the actual hacking method. Therefore a reader will be able to understand deeply on how to secure the computer or network.

Part 2: Host hardening

Basically this part shows us how to harden our system in order to be secured from the intruders. The concepts of protecting the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, POP, IMAP, MySQL and VNC will be listed.

Part 3: Special Tools

Nessus is one of the tools that this chapter addrresses. Nessus is actually a vulnerability scanning tool which used to be free. This powerful tools ensures which machines on the network are vulnerable to which attacks.
This part is not only about tools but also about writing scripts for tools to process attacks like Nessus Attack Scripting Language  (NASL). Moreover, the reader will understand the latest wireless (802.11) hacking techniques and tools and be able to use those tools even on PDAs

 

Where to find the book?

Call.No: QA76.9.A25 DHA 2003

Location: East

 

Written by Ngo Minh Nam

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s