Home > General > The Network Security Test Lab : A Step-By-Step Guide
20%
The Network Security Test Lab : A Step-By-Step Guide

The Network Security Test Lab : A Step-By-Step Guide

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

The Network Security Test Lab guides you through the security assessment and penetration testing process. This book delivers the set-up guidance needed to build your own security testing lab, with a look inside the actual attacks; decodes and will demonstrate how to run attacks in an isolated sandbox so you can understand how attackers target systems and how you can build the defenses to stop them. You will be introduced to tools such as Wireshark, Networkminer, Nmap, Metasploit and others.

About the Author

Michael Gregg, is President of Superior Solutions w/more than 20 years' experience in security, networking and Internet technologies. He developed the Advanced Security Boot Camp for Global Knowledge, the lab guide for Intense School's Professional Hacking Boot Camp and the training class, Assessing Network Vulnerabilities for ASPE. 



Table of Contents:
Introduction Chapter 1 Building a Hardware and Software Test Platform ·Why Build a Lab? ·Hardware Requirements ·Physical Hardware ·Equipment You Already Have ·New Equipment Purchases ·Used Equipment Purchases ·Online Auctions ·Thrift Stores ·Company Sales ·Virtual Hardware ·VMware ·Virtual Box ·Hacker Hardware ·Software Requirements ·Operating Systems ·Microsoft Windows ·Linux ·Navigating in Linux ·Linux Basics ·Mac OS X ·Software and Applications ·Learning Applications ·Hacking Software ·Summary ·Key Terms ·Exercises ·Equipment Checklist ·Installing VMware Workstation ·Exploring Linux Operating System Options ·Using VMware to Build a Windows Image ·Using VMware Converter to Create a Virtual Machine ·Exploring Other Operating System Options ·Running Kali from VMware ·Installing Tools on Your Windows Virtual Machine Chapter 2 Passive Information Gathering ·Starting at the Source ·Scrutinizing Key Employees ·Dumpster Diving (Electronic) ·Analyzing Web Page Coding ·Exploiting Website Authentication Methods ·Mining Job Ads and Analyzing Financial Data ·Using Google to Mine Sensitive Information ·Exploring Domain Ownership ·WHOIS ·Regional Internet Registries ·Domain Name System ·Identifying Web Server Software ·Web Server Location ·Summary ·Key Terms ·Exercises ·IP Address and Domain Identification ·Information Gathering ·Google Hacking ·Banner Grabbing ·Telnet ·Netcat ·Visual Route Chapter 3 Analyzing Network Traffic ·Why Packet Analysis is Important ·How to Capture Network Traffic ·Promiscuous Mode ·Hubs and Switches ·Hubbing Out and using Taps ·Switches ·Capturing Network Traffic ·Managed and Unmanaged Switches ·ARP Cache Poisoning ·Flooding ·DHCP Redirection ·Redirection and Interception with ICMP ·Preventing Packet Capture ·Dynamic Address Inspection ·DHCP Snooping ·Preventing VLAN Hopping ·Detecting Packet Capture ·Wireshark ·Wireshark Basics ·Filtering and Decoding Traffic ·Basic Data Capture--A Layer-by-Layer Review ·Physical--Data-Link Layer ·Network-Internet Layer ·Transport--Host-Host Layer ·Application Layer ·Other Network Analysis Tools ·Summary ·Key Terms ·Exercises ·Fun with Packets ·Packet Analysis with tcp dump ·Packet Filters ·Making a One-Way Data Cable Chapter 4 Detecting Live Systems and Analyzing Results ·TCP / IP Basics ·The Network Access Layer ·The Internet Layer ·The Host-to-Host Layer ·Transmission Control Protocol ·User Datagram Protocol ·The Application Layer ·Detecting Live Systems with ICMP ·ICMP--Ping ·Traceroute ·Port Scanning ·TCP and UDP Port Scanning ·Advanced Port-Scanning Techniques ·Idle Scan ·Analyzing Port Scans ·Port-Scanning Tools ·Nmap ·SuperScan ·Other Scanning Tools ·OS Fingerprinting ·Passive Fingerprinting ·Active Fingerprinting ·How Nmap OS Fingerprinting Works ·Scanning Countermeasures ·Summary ·Key Terms ·Exercises ·Understanding Wireshark ·Interpreting TCP Flags ·Performing an ICMP Packet Decode ·Port Scanning with Nmap ·Traceroute ·An Analysis of a Port Scan ·OS Fingerprinting Chapter 5 Enumerating Systems ·Enumeration ·Router and Firewall Enumeration ·Router Enumeration ·Firewall Enumeration ·Router and Firewall Enumeration Countermeasures ·Windows Enumeration ·Server Message Block and Interprocess Communication ·Enumeration and the IPC$ Share ·Windows Enumeration Countermeasures ·Linux / Unix Enumeration ·Enumeration of Application Layer Protocols ·Simple Network Management Protocol ·SNMP Enumeration Countermeasures ·Enumeration of Other Applications ·Advanced Enumeration ·SCADA Systems ·User Agent Strings ·Mapping the Attack Surface ·Password Speculation and Cracking ·Sniffing Password Hashes ·Exploiting a Vulnerability ·Protecting Passwords ·Summary ·Key Terms ·Exercises ·SNMP Enumeration ·Enumerating Routing Protocols ·Enumeration with DumpSec ·Identifying User Agent Strings ·Browser Enumeration Chapter 6 Automating Encryption and Tunneling Techniques ·Encryption ·Secret Key Encryption ·Data Encryption Standard ·Triple DES ·Advanced Encryption Standard ·One Way Functions (Hashes) ·MD Series ·SHA ·Public Key Encryption ·RSA ·Diffie Hellman ·El Gamal ·Elliptic Curve Cryptography ·Hybrid Cryptosystems ·Public Key Authentication ·Public Key Infrastructure ·Certificate Authority ·Registration Authority ·Certificate Revocation List ·Digital Certificates ·Certificate Distribution System ·Encryption Role in Authentication ·Password Authentication ·Password Hashing ·Challenge Response ·Session Authentication ·Session Cookies ·Basic Authentication ·Certificate Based Authentication ·Tunneling Techniques to Obscure Traffic ·Internet Layer Tunneling ·Transport Layer Tunneling ·Application Layer Tunneling ·Attacking Encryption and Authentication ·Extracting Passwords ·Password Cracking ·Dictionary Attack ·Brute Force Attack ·Rainbow Table ·Other Cryptographic Attacks ·Summary ·Key Terms ·Exercises ·CrypTool ·Extract an Email Username and Password ·Rainbow Crack ·John the Ripper Chapter 7 Automated Attack and Penetration Tools ·Why Attack and Penetration Tools Are Important ·Vulnerability Assessment Tools ·Source Code Assessment Tools ·Application Assessment Tools ·System Assessment Tools ·Attributes of a Good System Assessment Tool ·Nessus ·Automated Exploit Tools ·Metasploit ·Armitage ·Metasploit Console ·Metasploit Command Line Interface ·Updating Metasploit ·BeEF ·Core Impact ·CANVAS ·Determining Which Tools to Use ·Picking the Right Platform ·Summary ·Key Terms ·Exercises ·Exploring N Stalker, a Vulnerability Assessment Tool ·Exploring Search sploit on Kali Linux ·Metasploit Kali Chapter 8 Securing Wireless Systems ·Wi-Fi Basics ·Wireless Clients and NICs ·Wireless Access Points ·Wireless Communication Standards ·Bluetooth Basics ·Wi-Fi Security ·Wired Equivalent Privacy ·Wi-Fi Protected Access ·802.1x Authentication ·Wireless LAN Threats ·Wardriving ·Net Stumbler ·Kismet ·Eavesdropping ·Rogue and Unauthorized Access Points ·Denial of Service ·Exploiting Wireless Networks ·Finding and Assessing the Network ·Setting Up Airodump ·Configuring Aireplay ·Deauthentication and ARP Injection ·Capturing IVs and Cracking the WEP KEY ·Other Wireless Attack Tools ·Exploiting Bluetooth ·Securing Wireless Networks ·Defense in Depth ·Misuse Detection ·Summary ·Key Terms ·Exercises ·Using Net Stumbler ·Using Wireshark to Capture Wireless Traffic Chapter 9 An Introduction to Malware ·History of Malware ·Types of Malware ·Viruses ·Worms ·Logic Bombs ·Backdoors and Trojans ·Packers, Crypters and Wrappers ·Rootkits ·Crimeware Kits ·Botnets ·Advanced Persistent Threats ·Spyware and Adware ·Common Attack Vectors ·Social Engineering ·Faking It! ·Pretending through Email ·Defenses against Malware ·Antivirus ·File Integrity Verification ·User Education ·Summary ·Key Terms ·Exercises ·Virus Signatures ·Building Trojans ·Rootkits ·Finding Malware Chapter 10 Detecting Intrusions and Analyzing Malware ·An Overview of Intrusion Detection ·IDS Types and Components ·IDS Engines ·An Overview of Snort ·Platform Compatibility ·Limiting Access to the IDS ·Verification of Configuration ·Building Snort Rules ·The Rule Header ·Logging with Snort ·Rule Options ·Advanced Snort: Detecting Buffer Overflows ·Responding to Attacks and Intrusions ·Analyzing Malware ·Tracking Malware to Its Source ·Identifying Domains and Malicious Sites ·Building a Testbed ·Virtual and Physical Targets ·Operating Systems ·Network Isolation ·Testbed Tools ·Malware Analysis Techniques ·Static Analysis ·Dynamic Analysis ·Summary ·Key Terms ·Exercises ·Building a Snort Windows System ·Analyzing Malware Communication ·Analyzing Malware with Virus Total Chapter 11 Forensic Detection ·Computer Forensics ·Acquisition ·Drive Removal and Hashing ·Drive-Wiping ·Logical and Physical Copies ·Logical Copies ·Physical Copies ·Imaging the Drive ·Authentication ·Trace-Evidence Analysis ·Browser Cache ·Email Evidence ·Deleted or Overwritten Files and Evidence ·Other Trace Evidence ·Hiding Techniques ·Common File-Hiding Techniques ·Advanced File-Hiding Techniques ·Steganography ·Detecting Steganographic Tools ·Antiforensics ·Summary ·Key Terms ·Exercises ·Detecting Hidden Files ·Basic File-Hiding ·Advanced File-Hiding ·Reading Email Headers ·Use S-Tools to Embed and Encrypt a Message Index


Best Sellers


Product Details
  • ISBN-13: 9788126558148
  • Publisher: Wiley India Pvt Ltd
  • Binding: Paperback
  • No of Pages: 480
  • ISBN-10: 8126558148
  • Publisher Date: September'2015
  • Language: English

Related Categories

Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
The Network Security Test Lab : A Step-By-Step Guide
Wiley India Pvt Ltd -
The Network Security Test Lab : A Step-By-Step Guide
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

The Network Security Test Lab : A Step-By-Step Guide

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!