List of Figures - Building.Open.Source.Network.Security.Tools.Components.And.Techniques [Electronic resources] نسخه متنی

This is a Digital Library

With over 100,000 free electronic resource in Persian, Arabic and English

Building.Open.Source.Network.Security.Tools.Components.And.Techniques [Electronic resources] - نسخه متنی

Mike D. Schiffman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

List of Figures

Chapter 1: The Network Security Tool Paradigm

Figure 1.1: The modular model of network security tool design.



Figure 1.2: Components.



Figure 1.3: Techniques.



Figure 1.4: Traceroute.



Figure 1.5: The modular model of network security tool design and the software development lifecycle.



Chapter 3: The Libnet Library

Figure 3.1: Libnet packet creation.



Figure 3.2: Libnet-supported protocols and their relationships.



Chapter 5: The Libsf Library

Figure 5.1: Libsf TCP packet with options shown exploded.



Chapter 8: Passive Reconnaissance Techniques

Figure 8.1: Demultiplexing of an Ethernet frame.



Figure 8.2: Scoop packet sniffer.



Chapter 9: Active Reconnaissance Techniques

Figure 9.1: Full-open TCP port scan.



Figure 9.2: FTP bounce prot scan.



Figure 9.3: Half-open TCP port scan.



Figure 9.4: UDP port scan.



Figure 9.5: Fragmented port scan.



Figure 9.6: IP expiry.



Figure 9.7: Firewalking host breakdown.



Figure 9.8: Firewalking phase one: hopcount ramping.



Figure 9.9: Firewalking phase two: a packet passes the ACL



Figure 9.10: Firewalking phase two: a packet violates the ACL.



Figure 9.11: Early filtering of a firewalk probe.



Figure 9.12: Adjacent target and metric



Figure 9.13: Knock port scanner.



Chapter 10: Attack and Penetration Techniques

Figure 10.1: Vulnerability scanner breakdown.



Figure 10.2: Sift DNS vulnerability scanner.



Chapter 11: Defensive Techniques

Figure 11.1: Descry network intrusion detection tool.



Figure 11.2: Descry program logic.



Chapter 12: Tying Everything Together—Firewalk

Figure 12.1: Firewalk



Figure 12.2: Firewalk top-level flowchart.



Figure 12.3: Firewalk initialization flowchart.



Figure 12.4: Firewalk context.



Figure 12.5: Firewalk context after initialization.



Figure 12.6: Firewalk ramping phase flowchart.



Figure 12.7: Firewalk scanning phase flowchart.



Figure 12.8: Firewalk packet capture flowchart.



Figure 12.9: Firewalk packet verification (ramping phase) flowchart.



Figure 12.10: Firewalk packet verification (scanning phase) flowchart.



/ 135