Chapter 14. The Anatomy of an Attack

In this chapter, we will look at some of the common tricks and tools that an attacker can use to compromise your assets. This material is not intended to be a how-to on attacking a network (so please don't use it on live networks or on networks for which you do not have explicit written permission to use these techniques). Rather, it is intended to show you, the network administrator, how an attacker is likely to go about finding the points of vulnerability within your network. Here, we will focus on how you can identify the signs of an attack and what you can do to prevent it.

The initial discussions will assume that the attacker is someone outside your network perimeter who is trying to break in. We'll ...

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.