You are previewing The Network Security Test Lab: A Step-by-Step Guide.
O'Reilly logo
The Network Security Test Lab: A Step-by-Step Guide

Book Description

The ultimate hands-on guide to IT security and proactive defense

The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills.

Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers.

  • Get acquainted with your hardware, gear, and test platform

  • Learn how attackers penetrate existing security systems

  • Detect malicious activity and build effective defenses

  • Investigate and analyze attacks to inform defense strategy

  • The Network Security Test Lab is your complete, essential guide.

    Table of Contents

    1. Introduction
      1. Overview of the Book and Technology
      2. How This Book Is Organized
      3. Who Should Read This Book
      4. Tools You Will Need
      5. What’s on the Wiley Website
      6. Summary (From Here, Up Next, and So On)
    2. Chapter 1: Building a Hardware and Software Test Platform
      1. Why Build a Lab?
      2. Hardware Requirements
      3. Software Requirements
      4. Summary
      5. Key Terms
      6. Exercises
    3. Chapter 2: Passive Information Gathering
      1. Starting at the Source
      2. Mining Job Ads and Analyzing Financial Data
      3. Using Google to Mine Sensitive Information
      4. Exploring Domain Ownership
      5. Summary
      6. Key Terms
      7. Exercises
    4. Chapter 3: Analyzing Network Traffic
      1. Why Packet Analysis Is Important
      2. How to Capture Network Traffic
      3. Wireshark
      4. Other Network Analysis Tools
      5. Summary
      6. Key Terms
      7. Exercises
    5. Chapter 4: Detecting Live Systems and Analyzing Results
      1. TCP/IP Basics
      2. Detecting Live Systems with ICMP
      3. Port Scanning
      4. OS Fingerprinting
      5. Scanning Countermeasures
      6. Summary
      7. Key Terms
      8. Exercises
    6. Chapter 5: Enumerating Systems
      1. Enumeration
      2. Advanced Enumeration
      3. Mapping the Attack Surface
      4. Summary
      5. Key Terms
      6. Exercises
    7. Chapter 6: Automating Encryption and Tunneling Techniques
      1. Encryption
      2. Encryption Role in Authentication
      3. Tunneling Techniques to Obscure Traffic
      4. Attacking Encryption and Authentication
      5. Summary
      6. Key Terms
      7. Exercises
    8. Chapter 7: Automated Attack and Penetration Tools
      1. Why Attack and Penetration Tools Are Important
      2. Vulnerability Assessment Tools
      3. Automated Exploit Tools
      4. Determining Which Tools to Use
      5. Picking the Right Platform
      6. Summary
      7. Key Terms
      8. Exercises
    9. Chapter 8: Securing Wireless Systems
      1. Wi-Fi Basics
      2. Wi-Fi Security
      3. Wireless LAN Threats
      4. Exploiting Wireless Networks
      5. Securing Wireless Networks
      6. Summary
      7. Key Terms
      8. Exercises
    10. Chapter 9: An Introduction to Malware
      1. History of Malware
      2. Types of Malware
      3. Common Attack Vectors
      4. Defenses Against Malware
      5. Summary
      6. Key Terms
      7. Exercises
    11. Chapter 10: Detecting Intrusions and Analyzing Malware
      1. An Overview of Intrusion Detection
      2. IDS Types and Components
      3. IDS Engines
      4. An Overview of Snort
      5. Building Snort Rules
      6. Advanced Snort: Detecting Buffer Overflows
      7. Responding to Attacks and Intrusions
      8. Analyzing Malware
      9. Summary
      10. Key Terms
      11. Exercises
    12. Chapter 11: Forensic Detection
      1. Computer Forensics
      2. Acquisition
      3. Authentication
      4. Trace-Evidence Analysis
      5. Hiding Techniques
      6. Summary
      7. Key Terms
      8. Exercises
    13. EULA