did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789727749

SANS GIAC Certification Security Essentials Toolkit (GSEC)

by ; ; ;
  • ISBN13:

    9780789727749

  • ISBN10:

    0789727749

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2002-03-18
  • Publisher: Pearson IT Certification
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.99

Summary

Master the tools of the network security trade with the official book from SANS Press! You need more than a hammer to build a house, and you need more than one tool to secure your network.Security Essentials Toolkitcovers the critical tools that you need to secure your site, showing you why, when, and how to use them. Based on the SANS Institute's renowned Global Information Assurance Certification (GIAC) program, this book takes a workbook-style approach that gives you hands-on experience and teaches you how to install, configure, and run the best security tools of the trade.

Author Biography

About the Authors

Eric Cole has worked in the information security arena for more than 10 years. He holds several professional certifications and has helped develop several of the SANS GIAC certifications and corresponding courses. Eric has a BS and MS in computer science from New York Institute of Technology and is completing his Ph.D. in network security. He has extensive experience with all aspects of information security including the following: cryptography, stenography, intrusion detection, NT security, Unix security, TCP/IP and network security, Internet security, router security, security assessment, penetration testing, firewalls, secure Web transactions, electronic commerce, SSL, TLS,IPSec, and information warfare.

Eric has created and headed up corporate security for several large organizations, built several security consulting practices, and worked for more than five years at the Central Intelligence Agency. He was an adjunct professor at New York Institute of Technology and is currently an adjunct professor at Georgetown University. Eric is author of the book Hackers Beware and contributing author to Know Thy Enemy: The HoneyNet Project. Eric teaches a wide range of courses for SANS and is actively involved with several of there search projects that SANS is performing. He led the SANS Top 20 vulnerability consensus project and is actively involved with the Cyber Defense Initiative.

Mathew Newfield serves as a Senior Security Analyst for TruSecure Corporation. His background includes penetration testing, security architecture, and design and network consulting. He currently works with several companies in securing their environments and obtaining corporate security certifications.

John M. Millican has been providing information consulting services since 1978. During that time, he has supported numerous versions of Unix, including AT&T, CTIX, SCO Unix, AIX, Unixware, and Linux. John was the first person to earn all the GIAC Level 2 Certifications offered by the SANS Institute. He is certified by SANS GIAC for Intrusion Detection In Depth (GCIA); Advanced Incident Handling and Hacking Exploits (GCIH); Firewalls, VPNs, and Perimeter Protection (GCFW); Securing Windows (GCFW); Securing Unix (GCUX); and Auditing Networks, Perimeters, and Systems (GCNA). He is currently the chairman of the SANS Unix Security Certification Board. John also assisted in the development of the SANS Security Essentials Bootcamp.

Technical Reviewers

Mike Poor is a security analyst for Compugenx, a Washington, D.C.-based consulting company. He holds SANS, GSEC, and GCIA certifications. As a security analyst, he conducts vulnerability assessments, penetration tests and security audits and administers intrusion detection systems. Previously, Mike has worked in network engineering and systems, network, and Web administration. He is currently working on merging Snort, Shadow, and ngrep to bring more analytical power to the analyst.

.

Sheila Ettinger is gainfully employed as a Unix Systems Administrator at Concordia University in Montreal. In her previous life, she worked in contract research and as a technical writer, software tester, and Windows trainer. Sheila is currently part of the design team involved in a project to reorganize Concordia's IT services. (She is being dragged kicking and screaming into the world of Active Directory. We'll let you know if she survives.)

In addition to her day job, Sheila teaches evening computer courses at Concordia's Center for Continuing Education and is a Program Consultant for the center's Computer Institute. In her down time, she enjoys playing clarinet in a number of community concert bands and taking courses in the university's music department.

David Goldsmith has been working in the computer and network industry for over 10 years, of which he has focused the last 3 on Internet connectivity and system/network security. From 1990 to 1995, he worked for the USMC as a system/network administrator and systems engineer. From 1995 to 1999, he worked for Ocean Systems Engineering Corporation providing system administration and network security support for the USMC. David currently has his own business, Rappahannock Technologies, Incorporated, which focuses on providing network security consulting services to commercial companies. He holds a degree in computer science from the University of California, San Diego.

Table of Contents

Introduction 1(1)
Who Should Read This Book
1(1)
What's in This Book
2(1)
Conventions Used in This Book
2(3)
Security Overview
5(36)
Introduction to Security Tools
5(4)
Configuring Your System
9(32)
Description
9(1)
Requirements
9(1)
Challenge Procedure
10(1)
Challenge Procedure Step-by-Step
10(19)
Additional Reading
29(1)
Summary
29(1)
Acronyms List
29(12)
PART 1 SECURITY OVERVIEW
Trojans
41(14)
Trust Relationships
41(4)
Description
41(1)
Objective
42(1)
Requirements
42(1)
Challenge Procedure
42(1)
Challenge Procedure Step-by-Step
43(5)
Additional Reading
48
Summary
44(1)
Trojan Software NetBus
45(4)
Description
45(1)
Objective
45(1)
Requirements
45(1)
Challenge Procedure
45(1)
Challenge Procedure Step-by-Step
45(3)
Additional Reading
48(1)
Summary
48(1)
Trojan Software SubSeven
49(6)
Description
49(1)
Objective
49(1)
Requirements
49(1)
Challenge Procedure
49(1)
Challenge Procedure Step-by-Step
49(4)
Additional Reading
53(1)
Summary
53(2)
Host-Based Intrusion Detection
55(34)
TCP Wrappers
55(5)
Description
55(1)
Objective
56(1)
Requirements
56(1)
Challenge Procedure
56(1)
Challenge Procedure Step-by-Step
56(3)
Additional Reading
59(1)
Summary
59(1)
xinetd
60(6)
Description
60(1)
Objective
60(1)
Requirements
60(1)
Challenge Procedure
60(1)
Challenge Procedure Step-by-Step
61(4)
Additional Reading
65(1)
Summary
65(1)
Tripwire
66(8)
Description
66(1)
Objective
66(1)
Requirements
66(1)
Challenge Procedure
66(1)
Challenge Procedure Step-by-Step
67(6)
Additional Reading
73(1)
Summary
73(1)
Swatch
74(5)
Description
74(1)
Objective
74(1)
Requirements
74(1)
Challenge Procedure
74(1)
Challenge Procedure Step-by-Step
74(4)
Additional Reading
78(1)
Summary
78(1)
PortSentry
79(4)
Description
79(1)
Objective
79(1)
Requirements
79(1)
Challenge Procedure
79(1)
Challenge Procedure Step-by-Step
79(3)
Additional Reading
82(1)
Summary
82(1)
Auditing Your System
83(6)
Description
83(1)
Objective
83(1)
Requirements
83(1)
Challenge Procedure
83(1)
Challenge Procedure Step-by-Step
83(5)
Additional Reading
88(1)
Summary
88(1)
Network-Based Intrusion Detection
89(16)
Sniffing with tcpdump
89(5)
Description
89(1)
Objective
89(1)
Requirements
89(1)
Challenge Procedure
90(1)
Challenge Procedure Step-by-Step
90(3)
Additional Reading
93(1)
Summary
93(1)
Nuking a System
94(5)
Description
94(1)
Objective
94(1)
Requirements
94(1)
Challenge Procedure
94(1)
Challenge Procedure Step-by-Step
94(4)
Additional Reading
98(1)
Summary
98(1)
Snort
99(6)
Description
99(1)
Objective
99(1)
Requirements
99(1)
Challenge Procedure
99(1)
Challenge Procedure Step-by-Step
99(4)
Additional Reading
103(1)
Summary
103(2)
Firewalls
105(20)
Personal Firewalls and ZoneAlarm
105(5)
Description
105(1)
Objective
105(1)
Requirements
105(1)
Challenge Procedure
105(1)
Challenge Procedure Step-by-Step
105(4)
Additional Reading
109(1)
Summary
109(1)
Tiny Firewall
110(7)
Description
110(1)
Objective
110(1)
Requirements
110(1)
Challenge Procedure
110(1)
Challenge Procedure Step-by-Step
110(6)
Additional Reading
116(1)
Summary
116(1)
ipchains
117(8)
Description
117(1)
Objective
118(1)
Requirements
118(1)
Challenge Procedure
118(1)
Challenge Procedure Step-by-Step
118(6)
Additional Reading
124(1)
Summary
124(1)
Scanning Tools
125(28)
Scanning with Nmap
125(6)
Description
125(1)
Objective
125(1)
Requirements
125(1)
Challenge Procedure
126(1)
Challenge Procedure Step-by-Step
126(4)
Additional Reading
130(1)
Summary
130(1)
Scanning with SuperScan
131(5)
Description
131(1)
Objective
131(1)
Requirements
131(1)
Challenge Procedure
131(1)
Challenge Procedure Step-by-Step
132(3)
Summary
135(1)
Vulnerability Scanning with Nessus
136(5)
Description
136(1)
Objective
136(1)
Requirements
136(1)
Challenge Procedure
136(1)
Challenge Procedure Step-by-Step
136(4)
Additional Reading
140(1)
Summary
140(1)
Legion
141(4)
Description
141(1)
Objective
141(1)
Requirements
141(1)
Challenge Procedure
141(1)
Challenge Procedure Step-by-Step
141(3)
Summary
144(1)
hping2
145(8)
Description
145(1)
Objective
145(1)
Requirements
145(1)
Challenge Procedure
145(1)
Challenge Procedure Step-by-Step
145(3)
Additional Reading
148(1)
Summary
149(4)
PART II SECURITY CONCEPTS
Understanding Exploits
153(8)
Null Session Exploits
153(3)
Description
153(1)
Objective
153(1)
Requirements
154(1)
Challenge Procedure
154(1)
Challenge Procedure Step-by-Step
154(1)
Additional Reading
155(1)
Summary
155(1)
Extracting Infromation with DumpSec
156(5)
Description
156(1)
Objective
156(1)
Requirements
156(1)
Challenge Procedure
156(1)
Challenge Procedure Step-by-Step
156(3)
Additional Reading
159(1)
Summary
159(2)
Security Policy
161(6)
Developing a Security Policy
161(6)
Description
161(1)
Objective
161(1)
Requirements
161(1)
Challenge Procedure
161(1)
Challenge Procedure Step-by-Step
161(4)
Additional Reading
165(1)
Summary
165(2)
Password Cracking
167(10)
John the Ripper
167(4)
Description
167(1)
Objective
167(1)
Requirements
167(1)
Challenge Procedure
168(1)
Challenge Procedure Step-by-Step
168(2)
Additional Reading
170(1)
Summary
170(1)
Lopht Crack (LC3)
171(6)
Description
171(1)
Objective
171(1)
Requirements
171(1)
Challenge Procedure
171(1)
Challenge Procedure Step-by-Step
171(5)
Additional Reading
176(1)
Summary
176(1)
Forensic Backups
177(14)
Disk Imaging with Ghost
177(10)
Description
177(1)
Objective
177(1)
Requirements
177(1)
Challenge Procedure
177(1)
Challenge Procedure Step-by-Step
178(8)
Additional Reading
186(1)
Summary
186(1)
Forensics with dd
187(4)
Description
187(1)
Objective
187(1)
Requirements
187(1)
Challenge Procedure
187(1)
Challenge Procedure Step-by-Step
187(2)
Additional Reading
189(1)
Summary
190(1)
Denial of Service and Deception Attacks
191(8)
Denial of Service with TFN2K
191(4)
Description
191(1)
Objective
191(1)
Requirements
191(1)
Challenge Procedure
192(1)
Challenge Procedure Step-by-Step
192(2)
Summary
194(1)
Deception with Fragrouter
195(4)
Description
195(1)
Objective
195(1)
Requirements
195(1)
Challenge Procedure
195(1)
Challenge Procedure Step-by-Step
195(3)
Summary
198(1)
Web Security
199(18)
Web Security with BlackWidow
199(4)
Description
199(1)
Objective
199(1)
Requirements
199(1)
Challenge Procedure
200(1)
Challenge Procedure Step-by-Step
200(2)
Additional Reading
202(1)
Summary
202(1)
Web Security with WebSleuth
203(6)
Description
203(1)
Objective
203(1)
Requirements
203(1)
Challenge Procedure
203(1)
Challenge Procedure Step-by-Step
204(4)
Additional Reading
208(1)
Summary
208(1)
Finding Web Vulnerabilities with Whisker
209(8)
Description
209(1)
Objective
209(1)
Requirements
209(1)
Challenge Procedure
210(1)
Challenge Procedure Step-by-Step
210(4)
Additional Reading
214(1)
Summary
214(3)
PART III NETWORK SECURITY
Network Design
217(20)
Cisco ConfigMaker
217(20)
Description
217(1)
Objective
217(1)
Requirements
217(1)
Challenge Procedure
217(1)
Challenge Procedure Step-by-Step
218(17)
Additional Reading
235(1)
Summary
235(2)
Base Conversions, IP Addressing, and Subnetting
237(8)
Binary Conversion
237(2)
Description
237(1)
Objective
237(1)
Requirements
237(1)
Challenge Questions
237(1)
Challenge Procedure Step-by-Step
237(1)
Challenge Solution
238(1)
Additional Reading
238(1)
Summary
238(1)
Subnetting
239(6)
Description
239(1)
Objective
239(1)
Requirements
239(1)
Challenge Procedure
240(1)
Challenge Procedure Step-by-Step
240(4)
Additional Reading
244(1)
Summary
244(1)
Network Security Tools
245(28)
Router ACLs
245(4)
Description
245(1)
Objective
245(1)
Requirements
245(1)
Challenge Procedure
245(1)
Challenge Procedure Step-by-Step
246(2)
Additional Reading
248(1)
Summary
248(1)
Exercise 2: Scanning Hosts with Ping War
249(4)
Description
249(1)
Objective
249(1)
Requirements
249(1)
Challenge Procedure
249(1)
Challenge Procedure Step-by-Step
249(3)
Additional Reading
252(1)
Summary
252(1)
Exercise 3: Analysis with Ethereal
253(20)
Description
253(1)
Objective
254(1)
Requirements
254(1)
Challenge Procedure
254(1)
Challenge Procedure Step-by-Step
254(15)
Summary
269(4)
PART IV SECURE COMMUNICATIONS
Secure Communications
273(18)
PGP
273(5)
Description
273(1)
Objective
273(1)
Requirements
273(1)
Challenge Procedure
274(1)
Challenge Procedure Step-by-Step
274(3)
Additional Reading
277(1)
Summary
277(1)
Steganography with JPHS
278(7)
Description
278(1)
Objective
278(1)
Requirements
278(1)
Challenge Procedure
278(1)
Challenge Procedure Step-by-Step
278(6)
Summary
284(1)
Steganography with S-Tools
285(6)
Description
285(1)
Objective
285(1)
Requirements
285(1)
Challenge Procedure
285(1)
Challenge Procedure Step-by-Step
285(3)
Additional Reading
288(1)
Summary
288(3)
PART V WINDOWS
Windows Security
291(42)
Security Configuration and Analysis
291(6)
Description
291(1)
Objective
291(1)
Requirements
291(1)
Challenge Procedure
291(1)
Challenge Procedure Step-by-Step
292(4)
Additional Reading
296(1)
Summary
296(1)
Startup Cop
297(3)
Description
297(1)
Objective
297(1)
Requirements
297(1)
Challenge Procedure
297(1)
Challenge Procedure Step-by-Step
297(2)
Summary
299(1)
Hfnetchk
300(5)
Description
300(1)
Objective
300(1)
Requirements
300(1)
Challenge Procedure
300(1)
Challenge Procedure Step-by-Step
300(4)
Additional Reading
304(1)
Summary
304(1)
MPSA
305(3)
Description
305(1)
Objective
305(1)
Requirements
305(1)
Challenge Procedure
305(1)
Challenge Procedure Step-by-Step
305(2)
Summary
307(1)
How to Baseline and Audit' Your System
308(7)
Description
308(1)
Objective
308(1)
Requirements
308(1)
Challenge Procedure
308(1)
Challenge Procedure Step-by-Step
308(6)
Additional Reading
314(1)
Summary
314(1)
Backups
315(7)
Description
315(1)
Objective
315(1)
Requirements
315(1)
Challenge Procedure
315(1)
Challenge Procedure Step-by-Step
315(5)
Additional Reading
320(1)
Summary
321(1)
IIS Lockdown
322(4)
Description
322(1)
Objective
322(1)
Requirements
322(1)
Challenge Procedure
322(1)
Challenge Procedure Step-by-Step
322(3)
Additional Reading
325(1)
Summary
325(1)
Socket80
326(7)
Description
326(1)
Objective
326(1)
Requirements
326(1)
Challenge Procedure
326(1)
Challenge Procedure Step-by-Step
326(3)
Additional Reading
329(1)
Summary
329(4)
PART VI UNIX
Unix
333(20)
The Unix File System
333(6)
Description
333(1)
Objective
333(1)
Requirements
333(1)
Challenge Procedure
333(1)
Challenge Procedure Step-by-Step
333(5)
Additional Reading
338(1)
Summary
338(1)
Sudo
339(4)
Description
339(1)
Objective
339(1)
Requirements
339(1)
Challenge Procedure
339(1)
Challenge Procedure Step-by-Step
339(3)
Additional Reading
342(1)
Summary
342(1)
Unix Permissions
343(3)
Description
343(1)
Objective
343(1)
Requirements
343(1)
Challenge Procedure
343(1)
Challenge Procedure Step-by-Step
343(2)
Additional Reading
345(1)
Summary
345(1)
Unix Network Commands
346(2)
Description
346(1)
Objective
346(1)
Requirements
346(1)
Challenge Procedure
346(1)
Challenge Procedure Step-by-Step
346(1)
Additional Reading
347(1)
Summary
347(1)
Log Files
348(3)
Description
348(1)
Objective
348(1)
Requirements
348(1)
Challenge Procedure
348(1)
Challenge Procedure Step-by-Step
348(2)
Additional Reading
350(1)
Summary
350(1)
tar
351(2)
Description
351(1)
Objective
351(1)
Requirements
351(1)
Challenge Procedure
351(1)
Challenge Procedure Step-by-Step
351(1)
Additional Reading
352(1)
Summary
352(1)
Summary
353(2)
Index 355

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program