Cyber security essentials:
"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Forma...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL [u.a.]
CRC Press
2011
|
Schriftenreihe: | An Auerbach book
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- |
Beschreibung: | XV, 325 S. Ill., graph. Darst., Kt. |
ISBN: | 9781439851234 1439851239 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039910347 | ||
003 | DE-604 | ||
005 | 20120323 | ||
007 | t | ||
008 | 120223s2011 abd| |||| 00||| eng d | ||
015 | |a GBB095780 |2 dnb | ||
020 | |a 9781439851234 |9 978-1-4398-5123-4 | ||
020 | |a 1439851239 |9 1-4398-5123-9 | ||
035 | |a (OCoLC)635486985 | ||
035 | |a (DE-599)BVBBV039910347 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Cyber security essentials |c ed. by James Graham ... |
264 | 1 | |a Boca Raton, FL [u.a.] |b CRC Press |c 2011 | |
300 | |a XV, 325 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a An Auerbach book | |
520 | |a "A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- | ||
650 | 4 | |a Computer security | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Wirtschaft | |
700 | 1 | |a Graham, James |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024769021&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024769021 |
Datensatz im Suchindex
_version_ | 1804148866498428928 |
---|---|
adam_text | Contents
A Note from the Executive Editors
xi
About the Authors
xiii
Contributors
xv
Chapter
1
Cyber Security Fundamentals
1
1.1
Network and Security Concepts
1
1.1.1
Information Assurance Fundamentals
1
1.1.1.1
Authentication
1
1.1.1.2
Authorization
2
1.1.1.3
Nonrepudiation
3
1.1.1.4
Confidentiality
3
1.1.1.5
Integrity
4
1.1.1.6
Availability
5
1.1.2
Basic Cryptography
6
1.1.3
Symmetric Encryption
11
1.1.3.1
Example of Simple Symmetric
Encryption with Exclusive OR
(XOR)
12
1.1.3.2
Improving upon Stream Ciphers
with Block Ciphers
14
1.1.4
Public Key Encryption
16
1.1.5
The Domain Name System (DNS)
20
1.1.5.1
Security and the DNS
24
1.1.6
Firewalls
25
1.1.6.1
History Lesson
25
1.1.6.2
What s in a Name?
25
1.1.6.3
Packet-Filtering Firewalls
27
VI
1.2
CONTENTS
1.1.6.4
Stateful Firewalls
28
1.1.6.5
Application Gateway Firewalls
29
1.1.6.6
Conclusions
29
1.1.7
Virtualization
30
1.1.7.1
In the Beginning, There Was
Blue...
31
1.1.7.2
The Virtualization Menu
31
1.1.7.3
Full Virtualization
33
1.1.7.4
Getting a Helping Hand from the
Processor
34
1.1.7.5
If All Else Fails, Break It to Fix It
35
1.1.7.6
Use What You Have
35
1.1.7.7
Doing It the Hard Way
36
1.1.7.8
Biting the Hand That Feeds
37
1.1.7.9
Conclusion
38
1.1.8
Radio-Frequency
Identification
38
1.1.8.1
Identify What?
39
1.1.8.2
Security and Privacy Concerns
41
Microsoft Windows
Security Principles
43
1.2.1
Windows
Tokens
43
1.2.1.1
Introduction
43
1.2.1.2
Concepts behind Windows
Tokens
43
1.2.1.3
Access Control Lists
46
1.2.1.4
Conclusions
47
1.2.2
Window Messaging
48
1.2.2.1
Malicious Uses of Window
Messages
49
1.2.2.2
Solving Problems with Window
Messages
51
1.2.3
Windows Program
Execution
51
1.2.3.1
Validation of Parameters
52
1.2.3.2
Load Image, Make Decisions
55
1.2.3.3
Creating the Process Object
56
1.2.3.4
Context Initialization
57
1.2.3.5
Windows Subsystem Post
Initialization
58
1.2.3.6
Initial Thread
...
Go!
60
1.2.3.7
Down to the Final Steps
61
1.2.3.8
Exploiting Windows Execution
for Fun and Profit
63
1.2.4
The Windows
Firewall
64
References
70
Chapter
2
Attacker Techniques and Motivations
75
2.1
How Hackers Cover Their Tracks (Antiforensics)
75
2.1.1
How and Why Attackers Use Proxies
75
CONTENTS
VII
2.1.1.1
Types of Proxies
76
2.1.1.2
Detecting the Use of Proxies
78
2.1.1.3
Conclusion
79
2.1.2
Tunneling Techniques
80
2.1.2.1
HTTP
81
2.1.2.2
DNS
83
2.1.2.3
ICMP
85
2.1.2.4
Intermediaries, Steganography,
and Other Concepts
85
2.1.2.5
Detection and Prevention
86
2.2
Fraud Techniques
87
2.2.1
Phishing, Smishing, Vishing, and Mobile
Malicious Code
87
2.2.1.1
Mobile Malicious Code
88
2.2.1.2
Phishing against Mobile Devices
89
2.2.1.3
Conclusions
91
2.2.2
Rogue
Antivirus
92
2.2.2.1
Following the Money: Payments
95
2.2.2.2
Conclusion
95
2.2.3
Click Fraud
96
2.2.3.1
Pay-per-Click
97
2.2.3.2
Click Fraud Motivations
98
2.2.3.3
Click Fraud Tactics and Detection
99
2.2.3.4
Conclusions
101
2.3
Threat Infrastructure
102
2.3.1
Botnets
102
2.3.2
Fast-Flux
107
2.3.3
Advanced Fast-Flux 111
References
116
Chapter
3
Exploitation
119
3.1
Techniques to Gain a Foothold
119
3.1.1 Shellcode 119
3.1.2
Integer Overflow Vulnerabilities
124
3.1.3
Stack-Based Buffer Overflows
128
3.1.3.1
Stacks upon Stacks
128
3.1.3.2
Crossing the Line
130
3.1.3.3
Protecting against Stack-Based
Buffer Overflows
132
3.1.3.4
Addendum: Stack-Based Buffer
Overflow Mitigation
132
3.1.4
Format String Vulnerabilities
133
3.1.5
SQL Injection
138
3.1.5.1
Protecting against SQL Injection
140
3.1.5.2
Conclusion
141
3.1.6
Malicious PDF Files
142
3.1.6.1
PDF File Format
143
VIII CONTENTS
3.1.6.2
Creating Malicious PDF Files
144
3.1.6.3
Reducing the Risks of Malicious
PDF Files
145
3.1.6.4
Concluding Comments
147
3.1.7
Race Conditions
147
3.1.7.1
Examples of Race Conditions
148
3.1.7.2
Detecting and Preventing Race
Conditions
151
3.1.7.3
Conclusion
152
3.1.8
Web Exploit Tools
152
3.1.8.1
Features for Hiding
153
3.1.8.2
Commercial Web Exploit Tools
and Services
154
3.1.8.3
Updates, Statistics, and
Administration
157
3.1.8.4
Proliferation of Web Exploit Tools
Despite Protections
158
3.1.9
DoS Conditions
159
3.1.10
Brute Force and Dictionary Attacks
164
3.1.10.1
Attack
168
3.2
Misdirection, Reconnaissance, and Disruption
Methods
171
3.2.1
Cross-Site Scripting (XSS)
171
3.2.2
Social Engineering
176
3.2.3
WarXing
182
3.2.4
DNS Amplification Attacks
186
3.2.4.1
Defeating Amplification
190
References
191
Chapter
4
Malicious Code
195
4.1
Self-Replicating Malicious Code
195
4.1.1
Worms
195
4.1.2
Viruses
198
4.2
Evading Detection and Elevating Privileges
203
4.2.1
Obfuscation
203
4.2.2
Virtual Machine Obfuscation
208
4.2.3
Persistent Software Techniques
213
4.2.3.1
Basic Input-Output System
(BlOSyComplementary Metal-
Oxide Semiconductor (CMOS)
and Master Boot Record (MBR)
Malicious Code
213
4.2.3.2
Hypervisors
214
4.2.3.3
Legacy Text Files
214
4.2.3.4
Autostart Registry Entries
215
4.2.3.5
Start Menu Startup Folder
217
4.2.3.6
Detecting Autostart Entries
217
CONTENTS
IX
4.2.4
Rootkits
219
4.2.4.1
User Mode Rootkits
219
4.2.4.2
Kernel Mode Rootkits
221
4.2.4.3
Conclusion
223
4.2.5
Spyware
223
4.2.6
Attacks against Privileged User Accounts
and Escalation of Privileges
227
4.2.6.1
Many Users Already Have
Administrator Permissions
228
4.2.6.2
Getting Administrator
Permissions
229
4.2.6.3
Conclusion
230
4.2.7
Token Kidnapping
232
4.2.8
Virtual Machine Detection
236
4.2.8.1
Fingerprints Everywhere!
237
4.2.8.2
Understanding the Rules of the
Neighborhood
238
4.2.8.3
Detecting Communication with
the Outside World
240
4.2.8.4
Putting It All Together
241
4.2.8.5
The New Hope
243
4.2.8.6
Conclusion
243
4.3
Stealing Information and Exploitation
243
4.3.1
Form Grabbing
243
4.3.2
Man-in-the-Middle Attacks
248
4.3.2.1
Detecting and Preventing MITM
Attacks
251
4.2.3.2
Conclusion
252
4.3.3
DLL Injection
253
4.3.3.1
Windows Registry DLL Injection
254
4.3.3.2
Injecting Applications
256
4.3.3.3
Reflective DLL Injections
258
4.3.3.4
Conclusion
259
4.3.4
Browser Helper Objects
260
4.3.4.1
Security Implications
261
References
264
Chapter
5
Defense and Analysis Techniques
267
5.1
Memory Forensics
267
5.1.1
Why Memory Forensics Is Important
267
5.1.2
Capabilities of Memory Forensics
268
5.1.3
Memory Analysis Frameworks
268
5.1.4
Dumping Physical Memory
270
5.1.5
Installing and Using Volatility
270
5.1.6
Finding Hidden Processes
272
5.1.7
Volatility Analyst Pack
275
5.1.8
Conclusion
275
tONÏ
tNTS
5.2
Honeypots
275
5.3
Malicious Code Naming
281
5.3.1
Concluding Comments
285
5.4
Automated Malicious Code Analysis Systems
286
5.4.1
Passive Analysis
287
5.4.2
Active Analysis
290
5.4.3
Physical or Virtual Machines
291
5.5
Intrusion Detection Systems
294
References
301
Chapter
6
iDefense Special File Investigation Tools
305
Index
315
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV039910347 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)635486985 (DE-599)BVBBV039910347 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02038nam a2200397 c 4500</leader><controlfield tag="001">BV039910347</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120323 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120223s2011 abd| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB095780</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439851234</subfield><subfield code="9">978-1-4398-5123-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439851239</subfield><subfield code="9">1-4398-5123-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)635486985</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039910347</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security essentials</subfield><subfield code="c">ed. by James Graham ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 325 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">An Auerbach book</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Graham, James</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024769021&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024769021</subfield></datafield></record></collection> |
id | DE-604.BV039910347 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:13:56Z |
institution | BVB |
isbn | 9781439851234 1439851239 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024769021 |
oclc_num | 635486985 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XV, 325 S. Ill., graph. Darst., Kt. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | CRC Press |
record_format | marc |
series2 | An Auerbach book |
spelling | Cyber security essentials ed. by James Graham ... Boca Raton, FL [u.a.] CRC Press 2011 XV, 325 S. Ill., graph. Darst., Kt. txt rdacontent n rdamedia nc rdacarrier An Auerbach book "A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"-- Computer security BUSINESS & ECONOMICS / Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Wirtschaft Graham, James Sonstige oth Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024769021&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cyber security essentials Computer security BUSINESS & ECONOMICS / Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Wirtschaft |
title | Cyber security essentials |
title_auth | Cyber security essentials |
title_exact_search | Cyber security essentials |
title_full | Cyber security essentials ed. by James Graham ... |
title_fullStr | Cyber security essentials ed. by James Graham ... |
title_full_unstemmed | Cyber security essentials ed. by James Graham ... |
title_short | Cyber security essentials |
title_sort | cyber security essentials |
topic | Computer security BUSINESS & ECONOMICS / Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Wirtschaft |
topic_facet | Computer security BUSINESS & ECONOMICS / Management COMPUTERS / Information Technology COMPUTERS / Security / General Wirtschaft |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024769021&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT grahamjames cybersecurityessentials |