جزییات کتاب
Discover network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attacksMonitor and protect against brute-force attacks by implementing defense mechanismsBook DescriptionNetwork security plays an important role in securing IT infrastructures against attacks. The increased demand for computer systems, and the ever-evolving internet, has allowed people to find vulnerabilities and infiltrate into organizations through their network. Network Protocol Security will help you safeguard your organization's network and networking devices.This book is a comprehensive guide that begins with the basics, gradually increases in complexity, and later takes you through advanced concepts. You will start by understanding the structure of data network protocols and devices as well as breaches. In addition to this, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. After covering the basics, you will learn attacks that target networks and network devices. Next, you will perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. Toward the concluding chapters, you will understand network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.By the end of this network security book, you will have learned network protocol security and security counter-measures to protect network protocols.What you will learnUnderstand security breaches, weaknesses, and protection techniquesAttack and defend wired as well as wireless networksDiscover how to attack and defend LAN, IP, and TCP/UDP-based vulnerabilitiesFocus on encryption, authorization, and authentication principlesGain insights into implementing security protocols the right wayUse tools and scripts to perform attacks on network devicesWield Python, PyShark, and other scripting tools for packet analysisIdentify attacks on web servers to secure web and email servicesWho This Book Is ForThis book is for red team and blue team pentesters, security professionals, or bug hunters. Anyone involved in network protocol management and security will also benefit from this book. Basic experience in network security will be an added advantage.Table of ContentsData Networks Structure and Weakness PointsNetwork Protocols Structure and OperationSecurity Protocols and Their ImplementationUsing Network Security Tools, Scripts and CodesFinding Protocol VulnerabilitiesDiscovering Network-Based Attacks and ToolsAttacking on Network DevicesNetwork Traffic Analysis and EavesdroppingUsing Behavior Analysis and Anomaly DetectionDiscovering LANs, IP, and TCP/UDP-Based AttacksImplementing Wireless Networks SecurityAttacking Routing ProtocolsDNS SecuritySecuring Web and Email ServicesEnterprise Applications Security - Databases and FilesystemsIP Telephony and Collaboration Services Security