McGraw-Hill - Hacking Exposed, Hacking and IT E-Book Dump Release

[ Pobierz całość w formacie PDF ]
HACKING EXPOSED:
NETWORK SECURITY
SECRETS AND SOLUTIONS,
THIRD EDITION
STUART
McCLURE
JOEL
SCAMBRAY
GEORGE
KURTZ
Osborne/
McGraw-Hill
New York Chicago San Francisco
Lisbon London Madrid Mexico City Milan
New Delhi San Juan Seoul Singapore Sydney Toronto
Osborne/
McGraw-Hill
2600 Tenth Street
Berkeley, California 94710
U.S.A.
To arrange bulk purchase discounts for sales promotions, premiums, or fund-raisers,
please contact Osborne/
McGraw-Hill
at the above address. For information on transla-
tions or book distributors outside the U.S.A., please see the International Contact Infor-
mation page immediately following the index of this book.
Hacking Exposed: Network Security Secrets and Solutions, Third Edition
Copyright © 2001 by The McGraw-Hill Companies. All rights reserved. Printed in the
United States of America. Except as permitted under the Copyright Act of 1976, no part of
this publication may be reproduced or distributed in any form or by any means, or stored
in a database or retrieval system, without the prior written permission of the publisher,
with the exception that the program listings may be entered, stored, and executed in a
computer system, but they may not be reproduced for publication.
1234567890 CUS CUS 01987654321
Book p/n 0-07-219382-4 and CD p/n 0-07-219383-2
parts of
ISBN 0-07-219381-6
Publisher
Brandon A. Nordin
Vice President & Associate Publisher
Scott Rogers
Acquisitions Editor
Jane K. Brownlow
Project Editor
LeeAnn Pickrell
Acquisitions Coordinator
Emma Acker
Technical Editors
Tom Lee, Eric Schultze
Copy Editor
Janice A. Jue
Proofreaders
Stefany Otis, Linda Medoff,
Paul Medoff
Indexer
Karin Arrigoni
Computer Designers
Carie Abrew, Elizabeth Jang,
Melinda Lytle
Illustrators
Michael Mueller, Lyssa Wald
Series Design
Dick Schwartz, Peter F. Hancik
Cover Design
Dodie Shoemaker
This book was composed with Corel VENTURAâ„¢ Publisher.
Information has been obtained by Osborne/
McGraw-Hill
from sources believed to be reliable. However, because of the
possibility of human or mechanical error by our sources, Osborne/
McGraw-Hill
, or others, Osborne/
McGraw-Hill
does not
guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or
the results obtained from use of such information.
CHAPTER
1
3
4
Hacking Exposed: Network Security Secrets and Solutions
B
efore the real fun for the hacker begins, three essential steps must be performed.
This chapter will discuss the first one—
footprinting
—the fine art of gathering target
information. For example, when thieves decide to rob a bank, they don’t just walk
in and start demanding money (not the smart ones, anyway). Instead, they take great
pains in gathering information about the bank—the armored car routes and delivery
times, the video cameras, and the number of tellers, escape exits, and anything else that
will help in a successful misadventure.
The same requirement applies to successful attackers. They must harvest a wealth of
information to execute a focused and surgical attack (one that won’t be readily caught).
As a result, attackers will gather as much information as possible about all aspects of an
organization’s security posture. Hackers end up with a unique
footprint
or profile of their
Internet, remote access, and intranet/extranet presence. By following a structured meth-
odology, attackers can systematically glean information from a multitude of sources to
compile this critical footprint on any organization.
WHAT IS FOOTPRINTING?
The systematic footprinting of an organization enables attackers to create a complete pro-
file of an organization’s security posture. By using a combination of tools and techniques,
attackers can take an unknown quantity (Widget Company’s Internet connection) and re-
duce it to a specific range of domain names, network blocks, and individual IP addresses
of systems directly connected to the Internet. While there are many types of footprinting
techniques, they are primarily aimed at discovering information related to the following
environments: Internet, intranet, remote access, and extranet. Table 1-1 depicts these en-
vironments and the critical information an attacker will try to identify.
Why Is Footprinting Necessary?
Footprinting is necessary to systematically and methodically ensure that all pieces of in-
formation related to the aforementioned technologies are identified. Without a sound
methodology for performing this type of reconnaissance, you are likely to miss key pieces
of information related to a specific technology or organization. Footprinting is often the
most arduous task of trying to determine the security posture of an entity; however, it is
one of the most important. Footprinting must be performed accurately and in a con-
trolled fashion.
INTERNET FOOTPRINTING
While many footprinting techniques are similar across technologies (Internet and
intranet), this chapter will focus on footprinting an organization’s Internet connection(s).
Remote access will be covered in detail in Chapter 9.
5
Chapter 1:
Footprinting
Technology
Identifies
Internet
Domain name
Network blocks
Specific IP addresses of systems reachable via the Internet
TCP and UDP services running on each system identified
System architecture (for example, SPARC vs. X86)
Access control mechanisms and related access control lists (ACLs)
Intrusion detection systems (IDSes)
System enumeration (user and group names, system banners,
routing tables, SNMP information)
Intranet
Networking protocols in use (for example, IP, IPX, DecNET,
and so on)
Internal domain names
Network blocks
Specific IP addresses of systems reachable via intranet
TCP and UDP services running on each system identified
System architecture (for example, SPARC vs. X86)
Access control mechanisms and related access control lists (ACLs)
Intrusion detection systems
System enumeration (user and group names, system banners,
routing tables, SNMP information)
Remote
access
Analog/digital telephone numbers
Remote system type
Authentication mechanisms
VPNs and related protocols (IPSEC, PPTP)
Extranet
Connection origination and destination
Type of connection
Access control mechanism
Table 1-1.
Environments and the Critical Information Attackers Can Identify
It is difficult to provide a step-by-step guide on footprinting because it is an activity
that may lead you down several paths. However, this chapter delineates basic steps that
should allow you to complete a thorough footprint analysis. Many of these techniques
can be applied to the other technologies mentioned earlier.
[ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • sylwina.xlx.pl