Hacknotes : Network Security Portable Reference
Total Page:16
File Type:pdf, Size:1020Kb
HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 222783-4 / Color profile: Generic CMYK printer profile Composite Default screen blind folio i HACKNOTES™ “Surprisingly complete. I have found this book to be quite useful and a great time-saver. There is nothing more irritating than thrashing in a search engine trying to remember some obscure tool or an obscure tool’s obscure feature. A great reference for the working security consultant.” —Simple Nomad, Renowned Security Researcher and Author of The Hack FAQ “While a little knowledge can be dangerous, no knowledge can be deadly. HackNotes: Network Security Portable Reference covers an immense amount of information readily available that is required for network and system administrators, who need the information quickly and concisely. This book is a must-have reference manual for any administrator.” —Ira Winkler, Chief Security Strategist at HP, security keynote speaker and panelist “HackNotes puts readers in the attacker’s shoes, perhaps a little too close. Security pros will find this reference a quick and easily digestible explanation of common vulnerabilities and how hackers exploit them. The step-by-step guides are almost too good and could be dangerous in the wrong hands. But for those wearing white hats, HackNotes is a great starting point for understanding how attackers enumerate, attack and escalate their digital intrusions.” —Lawrence M. Walsh, Managing Editor, Information Security Magazine “A comprehensive security cheat sheet for those short on time. This book is ideal for the consultant on a customer site in need of a robust reference manual in a concise and easy to parse format.” —Mike Schiffman, CISSP, Researcher, Critical Infrastructure Assurance Group, Cisco Systems, creator of the Firewalk tool and author of Hacker’s Challenge 1 & 2 “Heavy firepower for light infantry; Hack Notes delivers critical network security data where you need it most, in the field.” —Erik Pace Birkholz, Principal Consultant, Foundstone, and Author of Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle. P:\010Comp\HackNote\783-4\fm.vp Monday, June 30, 2003 1:20:05 PM HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 222783-4 / Color profile: Generic CMYK printer profile Composite Default screen blind folio ii This page intentionally left blank P:\010Comp\HackNote\783-4\fm.vp Monday, June 30, 2003 1:20:05 PM HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 222783-4 / Color profile: Generic CMYK printer profile Composite Default screen blind folio iii HACKNOTES™ Network Security Portable Reference MIKE HORTON CLINTON MUGGE Enigma Sever McGraw-Hill/Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto P:\010Comp\HackNote\783-4\fm.vp Monday, June 30, 2003 1:20:05 PM Color profile: GenericHackNote CMYK printer/ HackNotes profile Network Security Portable Reference / Horton & Mugge / 222783-4 / Composite Default screen blind folio 1 McGraw-Hill/Osborne 2100 Powell Street, 10th Floor Emeryville, California 94608 U.S.A. To arrange bulk purchase discounts for sales promotions, premiums, or fund-raisers, please contact McGraw-Hill/Osborne at the above address. For information on translations or book distributors outside the U.S.A., please see the International Contact Information page immediately following the index of this book. HackNotes™ Network Security Portable Reference Copyright © 2003 by The McGraw-Hill Companies. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. 1234567890 DOC DOC 019876543 ISBN 0-07-222783-4 Publisher Proofreader Brandon A. Nordin Claire Splan Vice President & Indexer Associate Publisher Irv Hershman Scott Rogers Composition Editorial Director Tara A. Davis Tracy Dunkelberger Elizabeth Jang Executive Editor Illustrators Jane K. Brownlow Kathleen Fay Edwards Project Editor Lyssa Wald Monika Faltiss Series Design Acquisitions Coordinator Dick Schwartz Athena Honore Peter F. Hancik Technical Editor Cover Series Design John Brock Dodie Shoemaker Copy Editor Judith Brown This book was composed with Corel VENTURA™ Publisher. Information has been obtained by McGraw-Hill/Osborne and the Authors from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill/ Osborne, the Authors, or others, McGraw-Hill/Osborne and the Authors do not guarantee the accuracy, adequacy or completeness of any information and is not responsible for any errors or omissions or the results obtained from use of such information. P:\010Comp\HackNote\783-4\fm.vp Monday, June 30, 2003 1:20:06 PM HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 222783-4 / Color profile: Generic CMYK printer profile Composite Default screen blind folio 1 To my family, loved ones, and friends who encouraged me and put up with the seemingly endless long work days and weekends over the months. —Mike To Michelle and Jacob for supporting short weekends together and long nights apart. —Clinton P:\010Comp\HackNote\783-4\fm.vp Monday, June 30, 2003 1:20:06 PM HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 222783-4 / FM Color profile: Generic CMYK printer profile Composite Default screen vi HackNotes Network Security Portable Reference About the Authors Mike Horton A principal consultant with Foundstone, Inc., Mike Horton specializes in secure network architecture design, network penetration assess- ments, operational security program analysis, and physical security as- sessments. He is the creator of the HackNotes book series and the founder of Enigma Sever security research (www.enigmasever.com). His background includes over a decade of experience in corporate and industrial security, Fortune 500 security assessments, and Army counterintelligence. Before joining Foundstone, Mike held positions as a security inte- gration consultant for firewall and access control systems; a senior con- sultant with Ernst & Young e-Security Services, performing network penetration assessments; a chief technology officer with a start-up working on secure, real-time communication software; and a counterintelligence agent for the U.S. Army. Mike has a B.S. from City University in Seattle, Washington and has also held top secret/SCI clearances with the military. Clinton Mugge As director of consulting for Foundstone’s operations on the West Coast, Clinton Mugge defines and oversees delivery of strategic ser- vices, ranging from focused network assessments to complex enter- prise-wide risk management initiatives. Clinton’s career began as a counterintelligence agent assigned to the special projects group of the Army’s Information Warfare branch. His investigative days provided di- rect experience in physical, operational, and IT security measures. After leaving the Army he worked at Ernst & Young within the e-Security Solu- tions group, managing and performing network security assessments. Clinton has spoken at Blackhat, USENIX, CSI, and ISACA. He contributed to the Hacking Exposed series of books, Windows XP Profes- sional Security (McGraw-Hill/Osborne, 2002), and he is the technical editor on Incident Response, Investigating Computer Crime (McGraw-Hill/ Osborne, 2001). Clinton holds a B.S. from Southern Illinois University, an M.S. from the University of Maryland, and the designation of CISSP. P:\010Comp\HackNote\783-4\fm.vp Monday, June 30, 2003 1:20:06 PM HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 222783-4 / FM Color profile: Generic CMYK printer profile Composite Default screen vii About the Contributing Authors Vijay Akasapu As an information security consultant for Foundstone, Vijay Akasapu, CISSP, specializes in product reviews, web application assessments, and security architecture design. Vijay has previously worked on secu- rity architectures for international telecom providers, as well as secure application development with an emphasis on cryptography, and Internet security. He graduated with an M.S. from Michigan State Uni- versity and has an undergraduate degree from the Indian Institute of Technology, Madras. Nishchal Bhalla As an information security consultant for Foundstone, Nishchal Bhalla specializes in product testing, IDS architecture setup and design, and web application testing. Nish has performed numerous security re- views for many major software companies, banks, insurance, and other Fortune 500 companies. He is a contributing author to Windows XP Professional Security (McGraw-Hill/Osborne, 2002) and a lead instructor for Foundstone’s Ultimate Web Hacking and Ultimate Hacking courses. Nish has seven years of experience in systems and network admin- istration and has worked with securing a variety of systems including Solaris, AIX, Linux, and Windows NT. His prior experience includes network attack and penetration testing, host operating system harden- ing, implementation of host and network-based intrusion detection sys- tems, access control system design and deployment, as well as policy and procedure