Darwine ontwikkelt websites waar mensen met elkaar kennis maken of kennis met elkaar delen: mooi maatwerk.

We tonen u graag een aantal van onze succesvolle projecten.

link Referenties
link Route

ADRES
's-Gravenweg 190
3062 ZL Rotterdam
KvK 24348991 0000

tel 010-2133996
mob (Inne) 06-42804208
info@darwine.nl

<  >  naar bron Anatomy Of A Hack—The Rise And Fall Of Your Network


bron artikelOne of the great mysteries in security management is the modus operandi of an attacker. What is it that attackers do, and how do they do it? As with all great mysteries, this one generates a lot of interest, accounting for the phenomenal success of books and classes on how to actually attack networks. Although attacking networks can be fun and informative—not to mention illegal if you do not have all the proper permissions—the fact remains that the vast majority of us do not need to know how to do so. Frankly, becoming a good penetration tester (pen tester) takes more than a week-long class. It takes commitment, dedication, intuition, and technical savvy, not to mention a blatant disregard for the rules and the right way to do things. Those are not skills that most security administrators have, or need in many cases. In most cases, it is cheaper and more effective to hire someone to perform penetration tests. Professional penetration testers are going to be much more capable of finding problems, as well as articulating what led to those problems. Then, why is it that books and courses on attacking networks are so popular? Well, frankly, primarily because of the mystique and perceived coolness of it all. There is also some value in a system administrator being able to perform rudimentary penetration tests. The focus in this chapter is a bit different, however. While the narrative is somewhat vague on the specific details of how the attack works, we will be very clear on the operational practices that led to the problem in the first place. This is highly deliberate. The important part here is not to show how to attack something, but to show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.

Before we start, however, let us make one thing absolutely clear: We neither condone nor will we ever aid or defend those who attack networks or systems they do not own or that they have not been asked to attack.
  1. What a Penetration Test Will Not Tell You
  2. Why You Need To Understand Hacking
  3. Target Network
  4. Network Footprinting
  5. Initial Compromise
  6. Elevating Privileges
  7. Hacking Other Machines
  8. Taking Over the Domain
  9. Post-mortem
  10. How to Get an Attacker Out of Your Network
  11. Summary
  12. What You Should Do Today
Gevonden via Slashdot


• ALGEMEEN •
2005-07-05, door
Inne ten Have



Geen commentaren

GEEF ZELF COMMENTAAR OP DIT ARTIKEL

DOORZOEK WEBLOG



In het archief staan alle publicaties geordend op datum.
LAATSTE COMMENTAREN
MEESTE COMMENTAREN OP...