|
Showing 1 - 2 of
2 matches in All Departments
Originally released in 1996, Netcat is a netowrking program
designed to read and write data across both Transmission Control
Protocol TCP and User Datagram Protocol (UDP) connections using the
TCP/Internet Protocol (IP) protocol suite. Netcat is often referred
to as a "Swiss Army knife" utility, and for good reason. Just like
the multi-function usefullness of the venerable Swiss Army pocket
knife, Netcat's functionality is helpful as both a standalone
program and a backe-end tool in a wide range of applications. Some
of the many uses of Netcat include port scanning, transferring
files, grabbing banners, port listening and redirection, and more
nefariously, a backdoor. This is the only book dedicated to
comprehensive coverage of the tool's many features, and by the end
of this book, you'll discover how Netcat can be one of the most
valuable tools in your arsenal.
* Get Up and Running with Netcat Simple yet powerful...Don't let
the trouble-free installation and the easy command line belie the
fact that Netcat is indeed a potent and powerful program.
* Go PenTesting with Netcat Master Netcat's port scanning and
service identification capabilities as well as obtaining Web server
application information. Test and verify outbound firewall rules
and avoid detection by using antivirus software and the Window
Firewall. Also, create a backdoor using Netcat.
* Conduct Enumeration and Scanning with Netcat, Nmap, and More
Netcat's not the only game in town...Learn the process of network
of enumeration and scanning, and see how Netcat along with other
tools such as Nmap and Scanrand can be used to thoroughly identify
all of the assets on your network.
* Banner Grabbing with Netcat Banner grabbing is a simple yet
highly effective method of gathering information about a remote
target, and can be performed with relative ease with the Netcat
utility.
* Explore the Dark Side of Netcat See the various ways Netcat has
been used to provide malicious, unauthorized access to their
targets. By walking through these methods used to set up backdoor
access and circumvent protection mechanisms through the use of
Netcat, we can understand how malicious hackers obtain and maintain
illegal access. Embrace the dark side of Netcat, so that you may do
good deeds later.
* Transfer Files Using Netcat The flexability and simple operation
allows Netcat to fill a niche when it comes to moving a file or
files in a quick and easy fashion. Encryption is provided via
several different avenues including integrated support on some of
the more modern Netcat variants, tunneling via third-party tools,
or operating system integrated IPsec policies.
* Troubleshoot Your Network with Netcat Examine remote systems
using Netat's scanning ability. Test open ports to see if they
really are active and see what protocls are on those ports.
Communicate with different applications to determine what problems
might exist, and gain insight into how to solve these problems.
* Sniff Traffic within a System Use Netcat as a sniffer within a
system to collect incoming and outgoing data. Set up Netcat to
listen at ports higher than 1023 (the well-known ports), so you can
use Netcat even as a normal user.
* Comprehensive introduction to the #4 most popular open source
security tool
available
* Tips and tricks on the legitimate uses of Netcat
* Detailed information on its nefarious purposes
* Demystifies security issues surrounding Netcat
* Case studies featuring dozens of ways to use Netcat in daily
tasks
The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes
and improvements over its predecessors. It not only brings a new
and redesigned interface, but also improves on many administrative
utilities and management consoles. It also enhances the system s
reliability, performance, and problem-solving tools. As
administrators, Vista will sometimes look like its predecessor,
Windows XP, and at other times, look like an all-new operating
system. How to Cheat will help you get Vista up and running as
quickly and safely as possible and provide you with a solid idea of
all the important changes and improvements the new Microsoft Vista
OS has to offer.
In the book you will:
* Automate Windows Vista Installation
See how Windows installations can be automated for large-scale
deployments using the Windows Automated Installation Kit
(WAIK).
* Install and Maintain Devices
Windows Vista contains device drivers for hundreds of PnP devices,
and the Device Manager snap-in is the main utility on a local
computer for managing them.
* Customize Appearances, Taskbars, and Toolbars
See how to use a personalization page, use the taskbar, and
customize desktop themes.
* Manage File System Formats, Partitions, and Volumes
Learn how Windows Vista supports basic and dynamic volumes and two
partition styles: MBR and GPT.
* Increase File System Performance
Learn how using tools such as disk defragging, cluster size
adjustment, removing short filename support, and compression can
help with performance.
* Administer via Remote
Remote Desktop and Windows Firewall can help administrators perform
administrative tasks on remote computers.
* Managing Services
The Services utility allows you to view the status of services, as
well as to disable nonessential services.
* Configure TCP/IP in Vista
See how to configure TCP/IP (both IPv4 and IPv6) via the user
interface or via the netsh command.
* See What s New with Wireless in Vista
Understand wireless security and learn how to install a wireless
network.
* Optimize Windows Startup, the Hard Disk, and More
Optimize memory, applications, and the network connection, and see
how to monitor performance.
Contents Include
Introducing and Installing Microsoft Vista
Installing and Maintaining Hardware Devices and Drivers
Customizing Desktop Properties
Managing File Systems and Disks
General Administration Tasks
Managing Local Networking Essentials
Managing the Wireless World and Its Security
Managing Security Essentials
Securing User Access
Tuning for Better Performance
Troubleshooting
*Provides the multi-tasked SysAdmin with the essential information
needed to perform the daily tasks
*Covers the major new release of Windows, which will create
significant challenges for IT managers
*Emphasizes best-practice security measures"
|
|