Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more.
Learn how to beat hackers at their own game
Hack Attacks Denied
If you've read John Chirillo's provocative work, Hack Attacks Revealed, you're well on your way to understanding how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks.
Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box tools that hackers use todetect and penetrate network vulnerabilities. Drawing on his experience as a consultant hired by Fortune 1000 companies to break into their corporate networks, Chirillo covers all the necessary security steps-from system to daemon-and helps you tie the information together to create a highly effective security policy.
Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains:
- Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and discovery countermeasures
- How to detect and protect against intrusion-from backdoor and flooding attacks to mail bombing, viral infections, and Web page hacking
- Essential technical hack countermeasures pertaining to popular gateways and routers, Internet server daemons, operating systems, and proxies and firewalls