19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table of Contents<br />

Performing Social Engineering Attacks .......................................................70<br />

Seeking information .............................................................................70<br />

Building trust ........................................................................................73<br />

Exploiting the relationship .................................................................74<br />

Social Engineering Countermeasures .........................................................77<br />

Policies ..................................................................................................77<br />

User awareness and training ..............................................................78<br />

Chapter 6: Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81<br />

Identifying Basic Physical Security Vulnerabilities ...................................81<br />

Pinpointing Physical Vulnerabilities in Your Office ..................................84<br />

Building infrastructure ........................................................................84<br />

Utilities ..................................................................................................85<br />

Office layout and usage .......................................................................86<br />

Network components and computers ...............................................88<br />

Chapter 7: Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93<br />

Understanding Password Vulnerabilities ...................................................94<br />

Organizational password vulnerabilities ..........................................94<br />

Technical password vulnerabilities ..................................................96<br />

Cracking Passwords ......................................................................................97<br />

Cracking passwords the old-fashioned way .....................................97<br />

Cracking passwords with high-tech tools.......................................100<br />

Cracking password-protected files ..................................................108<br />

Understanding other ways to crack passwords ............................109<br />

General Password-Cracking Countermeasures .......................................114<br />

Storing passwords .............................................................................115<br />

Creating password policies ..............................................................115<br />

Taking other countermeasures ........................................................116<br />

Securing Operating Systems ......................................................................118<br />

Windows..............................................................................................118<br />

Linux and UNIX ...................................................................................119<br />

Part III: Hacking Network Hosts ................................ 121<br />

Chapter 8: Network Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123<br />

Understanding Network Infrastructure Vulnerabilities ..........................125<br />

Choosing Tools ............................................................................................126<br />

Scanners and analyzers.....................................................................126<br />

Vulnerability assessment ..................................................................127<br />

Scanning, Poking, and Prodding the Network ..........................................127<br />

Scanning ports....................................................................................128<br />

Scanning SNMP ..................................................................................133<br />

Grabbing banners ..............................................................................135<br />

Testing firewall rules .........................................................................137<br />

Analyzing network data.....................................................................139<br />

xi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!