Book Image

Network Protocols for Security Professionals

By : Yoram Orzach, Deepanshu Khanna
5 (1)
Book Image

Network Protocols for Security Professionals

5 (1)
By: Yoram Orzach, Deepanshu Khanna

Overview of this book

With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the knowledge of how to find vulnerabilities and infiltrate organizations through their networks, you’ll be able to think like a hacker and safeguard your organization’s network and networking devices. Network Protocols for Security Professionals will show you how. This comprehensive guide gradually increases in complexity, taking you from the basics to advanced concepts. Starting with the structure of data network protocols, devices, and breaches, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Once you’ve covered the basics, you’ll learn about attacks that target networks and network devices. Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. As you progress, you’ll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols. By the end of this network security book, you’ll be well versed in network protocol security and security countermeasures to protect network protocols.
Table of Contents (23 chapters)
1
Part 1: Protecting the Network – Technologies, Protocols, Vulnerabilities, and Tools
7
Part 2: Network, Network Devices, and Traffic Analysis-Based Attacks
12
Part 3: Network Protocols – How to Attack and How to Protect

Questions

  1. Black box testing is when:
    1. All information about the target is known.
    2. There is no information about the target.
    3. The target is kept in the dark.
    4. Only part of the information about the target is known.
  2. Fuzz testing or fuzzing is:
    1. Guessing what the target system is
    2. Sending random data to the device under test and analyzing the results
    3. Sending predefined data to the device under test and analyzing the results
    4. Guessing passwords and trying to break into the device under test
  3. The right order to perform a fuzz test is:
    1. Identify the target, define the inputs, generate data, execute, and watch the results.
    2. Identify the target, generate data, execute, and guess the results.
    3. Try to get the password, identify the target, define the inputs, execute, and watch the results.
    4. Find the proper tools, identify the target, generate data, execute, and watch the results.
  4. A vulnerability in the OSI reference model Layer 5 could be:
    1. Connectivity failure to application protocols
    2. Session hijacking...