About the Book:
The book in general is about network security with the operating systems such as Linux and Unix. In my opinion, this book reference will be really helpful for those students who study c335 Network Security as it addresses most of the issues in that module. The book itself is divided into three parts: Hacking Techniques and Defenses, Host Hardening and Special Topics
Part 1: Hacking Techniques and Defenses
In this part, the reader will get to know what intrusion tactics do hackers use to break into computer networks. One of the tools used for footprinting is nmap which can scan hosts on the network with an amazing speed. With nmap and its various commands we wil know what ports and opened on the host and know what operating system is running on that box.
Besides nmap, there are many other tools introduced such as Ettercap, Wireshark (also known as Ethereal) or Dsniff for capturing the packets and also called sniffing. For wireless hacking or in other words wardriving tools like Kismet and Airsnort will be used. With the methods of privilege escalation, a hacker can access and take a whole control of the computer network by bug and flaws of the operating system or of the software. A paerticular tool used in this situation is Metasploit.
The important notes of this part is that after each tutorial on hacking there is one techniques of defenses against the actual hacking method. Therefore a reader will be able to understand deeply on how to secure the computer or network.
Part 2: Host hardening
Basically this part shows us how to harden our system in order to be secured from the intruders. The concepts of protecting the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, POP, IMAP, MySQL and VNC will be listed.
Part 3: Special Tools
Nessus is one of the tools that this chapter addrresses. Nessus is actually a vulnerability scanning tool which used to be free. This powerful tools ensures which machines on the network are vulnerable to which attacks.
This part is not only about tools but also about writing scripts for tools to process attacks like Nessus Attack Scripting Language (NASL). Moreover, the reader will understand the latest wireless (802.11) hacking techniques and tools and be able to use those tools even on PDAs
Where to find the book?
Call.No: QA76.9.A25 DHA 2003
Written by Ngo Minh Nam