computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 8
Chapter 8 –  Penetrating Computer Systems and Networks
     Chey Cobb
     Stephen Cobb, CISSP
     M. E. Kabay, PhD, CISSP

Chapter Contents:

   8.1    Security: More Than a Technical Issue
   8.1.1    Organizational Culture
   8.1.2    Chapter Organization
   8.2    Nontechnical Penetration Techniques
   8.2.1    Misrepresentation (Social Engineering)
   8.2.1.1    Lying
   8.2.1.2    Subversion
   8.2.2    Human Target Range
   8.2.3    Incremental Information Leveraging
   8.2.4    Data Scavenging
   8.3    Technical Penetration Techniques
   8.3.1    Data Leakage: A Fundamental Problem
   8.3.2    Intercepting Communications
   8.3.2.1    Wiretapping
   8.3.2.2    LAN Packet Capture
   8.3.2.3    Optical Fiber
   8.3.2.4    Wireless Communications
   8.3.2.5    Van Eck Freakin
   8.3.2.6    Trapping Login Information
   8.3.3    Breaching Access Controls
   8.3.3.1    Brute-Force Attacks
   8.3.3.2    Intelligent Guesswork
   8.3.3.3    Stealing
   8.3.3.4    Dumpster Diving
   8.3.3.5    Discarded Magnetic Media
   8.3.4    Spying
   8.3.5    Penetration Testing, Toolkits, and Techniques
   8.3.5.1    Common Tools
   8.3.5.2    Common Scans
   8.3.5.3    Basic Exploits
   8.3.5.4    Rootkits
   8.3.6    Penetration via Web sites
   8.3.6.1    Web System Architecture
   8.3.6.2    Input Validation Exploits
   8.3.6.3    File System Exploits
   8.4    Political and Legal Issues
   8.4.1    Exchange of System Penetration Information
   8.4.2    Full Disclosure
   8.4.3    Sources
   8.4.3.1    Bulletin Board Systems
   8.4.3.2    Usenet Groups
   8.4.3.3    Publications
   8.4.3.4    Hacker Support Groups
   8.4.4    The Future of Penetration
   8.5    Summary
   8.6    Notes
   8.7    For Further Reading
   8.7.1    Web sites
   8.7.2    Books

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved