• Complain

Bastian Ballmann - Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition

Here you can read online Bastian Ballmann - Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Bastian Ballmann Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition
  • Book:
    Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition
  • Author:
  • Publisher:
    Springer
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book explains how to see ones own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

Bastian Ballmann: author's other books


Who wrote Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition? Find out the surname, the name of the author of the book and a list of all author's works by series.

Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Understanding Network Hacks Bastian Ballmann Understanding - photo 1
Book cover of Understanding Network Hacks
Bastian Ballmann
Understanding Network Hacks
Attack and Defense with Python 3
2nd ed. 2021
Logo of the publisher Bastian Ballmann Uster Switzerland ISBN - photo 2
Logo of the publisher
Bastian Ballmann
Uster, Switzerland
ISBN 978-3-662-62156-1 e-ISBN 978-3-662-62157-8
https://doi.org/10.1007/978-3-662-62157-8
Springer-Verlag GmbH Germany, part of Springer Nature 2015, 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Responsible Editor: Martin Brger

This Springer imprint is published by the registered company Springer-Verlag GmbH, DE part of Springer Nature.

The registered company address is: Heidelberger Platz 3, 14197 Berlin, Germany

For data travelers, knowledge hungry, curious, network-loving lifeforms who like to explore and get to the bottom of thing.

Foreword

Doesnt this book explain how to break into a computer system? Isnt that illegal and a bad thing at all?

I would like to answer both questions with no (at least the second one). Knowledge is never illegal nor something bad, but the things you do with it.

You as an admin, programmer, IT manager or just an interested reader cannot protect yourself if you dont know the techniques of the attackers. You cannot test the effectiveness of your firewalls and intrusion detection systems or other security related software if you are not able to see your IT infrastructure through the eyes of an attacker. You cannot weigh up the danger to costs of possible security solutions if you dont know the risks of a successful attack. Therefore it is necessary to understand how attacks on computer networks really work.

The book presents a selection of possible attacks with short source code samples to demonstrate how easy and effectively and maybe undetected a network can be infiltrated. This way you can not only learn the real techniques, but present them to your manager or employer and help them in the decision if it would make sense to care a little bit more about IT security. At the end of the book you should be able to not only understand how attacks on computer networks really work, but also to modify the examples to your own environment and your own needs.

Sure, the book also tells those bad guys how to crack the net and write their own tools, but IT security is a sword with two sharp blades. Both sides feed themselves off the same pot of knowledge and it is an continuous battle, which the protecting side can never dream of winning if it censors itself or criminalizes their knowledge!

Introduction
Who should Read this Book?

This book addresses interested Python programmers who want to learn about network coding and to administrators, who want to actively check the security of their systems and networks. The content should also be useful for white, gray and black hat hackers, who prefer Python for coding, as well as for curious computer users, who want to get their hands on practical IT security and are interested in learning to see their network through the eyes of an attacker.

You neither need deep knowledge on how computer networks are build up nor in programming. You will get throught all the knowledge you need to understand the source codes of the book in Chaps. and start having fun at their device.

Of course a book like this needs a disclaimer and the author would be happy if all readers only play on systems they are allowed to do so and use the information of this book only for good and ethical actions otherwise you maybe breaking a law depending on the country your device is connected in.

The length of the book doesnt allow for in depth discussion of all topics. You will only get somewhat more than the basics. If you want to dig deeper you should afterwards get some special lecture in your special field of interest.

The Structure of the Book

The different hacks are grouped by network protocols and every chapters content is ordered by difficulty. You can read the book in the order you like except the both introduction chapters about networks (Chap. ).

The code samples are printed unshortened therefore you can just copy and use them without worrying about incremental changes or addons. All source codes presented in this book can also be found on Github at https://github.com/balle/python-network-hacks .

At the end of each chapter you will find a selection of tools also written in Python that attack the described protocol in a more detailed way.

Thanks to the basic knowledge learned in the chapter it shouldnt be too hard to read and understand the source code of the tools.

The Most Important Security Principles
The most important principles in building a secure network of the authors point of view are:
  1. Security solutions should be simple. A firewall rule-set that no one understands, is a guarantee for security holes. Software thats complex has more bugs than simple code.

  2. Less is more. More code, more systems, more services provide more possibilities of attack.

  3. Security solutions should be Open Source. You can easier search for security problems if you have access to the source code. If the vendor disagrees to close an important security hole you or someone else can fix it and you dont have to wait for six or more months till the next patch day. Proprietary software can have build in backdoors sometimes called Law Interception Interface. Companies like Cisco (see RFC 3924), Skype (US-Patent-No 20110153809) and Microsoft (e.g. _NSAKEY http://en.wikipedia.org/wiki/NSAKEY ) are only popular examples.

  4. A firewall is a concept not a box that you plug in and you are safe.

  5. Keep all your systems up to date! A system thats considered secure today can be unprotected a few hours later. Update all systems, also smart phones, printer and switches!

  6. The weakest device defines the security of the complete system and that doesnt necessarily have to be a computer it can also be a human (read about social engineering).

  7. There is no such thing as 100% secure. Even a computer that is switched off can be infiltrated by a good social engineer. The aim should be to build that much layers that the attacker falls over one tripwire and leaves traces and that the value he or she can gain from a successful infiltration is much lower than the effort to attack or that it exceeds the intruders skills.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition»

Look at similar books to Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition»

Discussion, reviews of the book Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.