hacknotes - linux & unix security portable reference

256 386 0
hacknotes - linux & unix security portable reference

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... 1 +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ |Version| IHL |Type of Service| Total Length | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Identification |Flags| Fragment Offset | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Time to Live | Protocol | Header Checksum | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ ... 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Source Port | Destination Port | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Sequence Number | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Acknowledgment Number | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Data | |U|A|P|R|S|F| | |... |R|C|S|S|Y|I| Window | | | |G|K|H|T|N|N| | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Checksum | Urgent Pointer | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Options | Padding | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | data | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ Please see RFC 793 for more details:... +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Source Address | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Destination Address | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ | Options | Padding | +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ - +-+ -+ Every TCP packet is encapsulated within the Data field of an IP packet, which... book xiii This page intentionally left blank HACKNOTES: THE SERIES M cGraw-Hill/Osborne has created a brand new series of portable reference books for security professionals These are quick-study books kept to an acceptable number of pages and meant to be a truly portable reference The goals of the HackNotes series are ■ To provide quality, condensed security reference information that is easy to access... across the point of the topic Most importantly, so that these handy portable references don’t burden you with unnecessary verbiage to wade through during your busy day, we have kept the writing clear, concise, and to the point xv xvi HackNotes Linux and Unix Security Portable Reference Whether you are brand new to the information security field and need useful starting points and essential facts without... better secure wireless networks xxi xxii HackNotes Linux and Unix Security Portable Reference Chapter 12 The Sharp Zaurus PDA device runs an embedded version of the Linux operating system This chapter shows you the various security tools available for the Zaurus PDA and how easily they can be used by hackers to penetrate into wireless networks Reference Center This section is printed on blue color pages... Linux hosts, and they know exactly how to abuse them This book will amaze you with details of the craftiest hacker tactics, and it will teach you how to defend against them xix xx HackNotes Linux and Unix Security Portable Reference Don’t worry about hackers getting hold of the material presented in this book They already know it The intention of this book is to expose the tactics used by hackers today,...x HackNotes Linux and Unix Security Portable Reference rhosts SSH’s authorized_keys Trojans Rootkits ... Hping2 VNC Server Keypebble VNC Viewer xi xii HackNotes Linux and Unix Security Portable Reference Smbmount Tcpdump Wget ZEthereal . . . 50 viii HackNotes Linux and Unix Security Portable Reference HackNote / HackNotes Linux and Unix Security Portable Reference / Dhanjani / 22278 6-9 / FM P:10CompHackNote78 6-9 fm.vp Wednesday,. . . . 150 x HackNotes Linux and Unix Security Portable Reference HackNote / HackNotes Linux and Unix Security Portable Reference / Dhanjani / 22278 6-9 / FM P:10CompHackNote78 6-9 fm.vp Wednesday,. . . 187 xii HackNotes Linux and Unix Security Portable Reference HackNote / HackNotes Linux and Unix Security Portable Reference / Dhanjani / 22278 6-9 / FM P:10CompHackNote78 6-9 fm.vp Wednesday,

Ngày đăng: 25/03/2014, 11:22

Mục lục

  • HackNotes : Linux and Unix Security Portable Reference

    • Cover

    • CONTENTS

    • Acknowledgments

    • Introduction

    • Reference Center

      • Common Commands

      • Common Ports

      • IP Addressing

        • Dotted Decimal Notation

        • Classes

        • Subnet Masks

        • CIDR (Classless Inter-Domain Routing)

        • Loopback

        • Private Addresses

        • Protocol Headers

        • Online Resources

          • Hacking Tools

          • Web Resources

          • Mailing Lists

          • Conferences and Events

          • Useful Netcat Commands

          • ASCII Table

          • HTTP Codes

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan