Menu
Home
Log in / Register
 
Home arrow Computer Science arrow Understanding Network Hacks
Next >
Understanding Network Hacks - Bastian Ballmann




IntroductionWho Should Read This Book?The Structure of the BookThe Most Important Security PrinciplesChapter 1 Installation1.1 The Right Operating System1.2 The Right Python Version1.3 Development Environment1.4 Python ModulesChapter 2 Network 4 Newbies2.1 Components2.2 Topologies2.3 ISO/OSI Layer Model2.4 Ethernet2.5 VLAN2.6 ARP2.7 IP2.8 ICMP2.9 TCP2.10 UDP2.11 An Example Network2.12 Architecture2.13 Gateway2.14 Router2.15 Bridge2.16 Proxies2.17 Virtual Private Networks2.18 Firewalls2.19 Man-in-the-Middle-AttacksChapter 3 Python Basics3.1 Every Start Is Simple3.2 The Python Philosophy3.3 Data Types3.4 Data Structures3.5 Functions3.6 Control Structures3.7 Modules3.8 Exceptions3.9 Regular Expressions3.10 SocketsChapter 4 Layer 2 Attacks4.1 Required Modules4.2 ARP-Cache-Poisoning4.3 ARP-Watcher4.4 MAC-Flooder4.5 VLAN Hopping4.6 Let's Play Switch4.7 ARP Spoofing Over VLAN Hopping4.8 DTP Abusing4.9 Tools4.9.1 NetCommander4.9.2 Hacker's Hideaway ARP Attack Tool4.9.3 LokiChapter 5 TCP/IP Tricks5.1 Required Modules5.2 A Simple Sniffer5.3 Reading and Writing PCAP Dump Files5.4 Password Sniffer5.5 Sniffer Detection5.6 IP-Spoofing5.7 SYN-Flooder5.8 Port-Scanning5.9 Port-Scan Detection5.10 ICMP-Redirection5.11 RST Daemon5.12 Automatic Hijack Daemon5.13 Tools5.13.1 ScapyChapter 6 WHOIS DNS?6.1 Protocol Overview6.2 Required Modules6.3 Questions About Questions6.4 WHOIS6.5 DNS Dictionary Mapper6.6 Reverse DNS Scanner6.7 DNS-Spoofing6.8 Tools6.8.1 ChaosmapChapter 7 HTTP Hacks7.1 Protocol Overview7.2 Web Services7.3 Required Modules7.4 HTTP Header Dumper7.5 Referer Spoofing7.6 The Manipulation of Cookies7.7 HTTP-Auth Sniffing7.8 Webserver Scanning7.9 SQL Injection7.10 Command Injection7.11 Cross-Site-Scripting7.12 SSL Sniffing7.13 Proxy Scanner7.14 Proxy Port Scanner7.15 Tools7.15.1 SSL Strip7.15.2 Cookie Monster7.15.3 Sqlmap7.15.4 W3AFChapter 8 Wifi Fun8.1 Protocol Overview8.2 Required Modules8.3 Wifi Scanner8.4 Wifi Sniffer8.5 Probe-Request Sniffer8.6 Hidden SSID8.7 MAC-Address-Filter8.8 WEP8.9 WPA8.10 WPA28.11 Wifi-Packet-Injection8.12 Playing Wifi Client8.13 Deauth8.14 Wifi Man-in-the-Middle8.15 Wireless Intrusion Detection8.16 Tools8.16.1 WiFuzz8.16.2 Pyrit8.16.3 AirXploitChapter 9 Feeling Bluetooth on the Tooth9.1 Protocol Overview9.2 Required Modules9.3 Bluetooth-Scanner9.4 SDP-Browser9.5 RFCOMM-Channel-Scanner9.6 OBEX9.7 Blue Snarf Exploit9.8 Blue Bug Exploit9.9 Bluetooth-Spoofing9.10 Sniffing9.11 Tools9.11.1 BlueMahoChapter 10 Bargain Box Kung Fu10.1 Required Modules10.2 Spoofing E-mail Sender10.3 DHCP Hijack10.4 IP Brute Forcer10.5 Google-Hacks-Scanner10.6 SMB-Share-Scanner10.7 Login WatcherAppendix A Scapy ReferenceA.1 ProtocolsA.2 FunctionsAppendix B Secondary Links
 
Found a mistake? Please highlight the word and press Shift + Enter  
Next >
 
Subjects
Accounting
Business & Finance
Communication
Computer Science
Economics
Education
Engineering
Environment
Geography
Health
History
Language & Literature
Law
Management
Marketing
Philosophy
Political science
Psychology
Religion
Sociology
Travel