Friday, June 27, 2008

Hack attacks testing

The objective of this book is to fill a gap found in most books on security: How security
examinations can be conducted via illustrations and virtual simulations. Auditing tools
with simple graphical user interfaces (GUIs) and automation are becoming increasingly
prevalent, and most claim to be the all-inclusive solution for administrators and security
consultants to use for their networks’ security testing. In practice, however, typically
a combination of tools, embraced by the Tiger Box analysis/monitoring system,
is necessary for accurate, up-to-date assessments. In a nutshell, a Tiger Box is a system
designed to provide the necessary tools designed to reveal potential security weaknesses
by discovering, scanning, and in some cases penetrating security vulnerabilities.
Covering Windows in addition to Unix- and Linux-flavored (*NIX) dual-bootconfigurations,
this book explains how to build and operate your own vulnerability
analysis system by using exclusively the top-quality and most popular tools available
Step by step, the book covers how-to drilldowns for setting up your Tiger Box operating
systems, installations, and configurations for some of the most popular auditing
software suites. It discusses both common and custom uses, as well as the scanning
methods and reporting routines of each. It inspects individual vulnerability scanner
results and compares them in an evaluation matrix against a select group of intentional
security holes on a target network.