Investigate network hacking from the inside out
Source: No Starch Press
Network hacks follow the same principle as programming hacks: first understand the rules of the system, then figure out how to exploit those rules to achieve a desired result. In this sample chapter from Hacking: The Art of Exploitation, explore the technical aspects of hacking a computer network, including how hackers exploit programs and write exploits, instead of just how to run other people's exploits. After exploring the basics of networking and the OSI model, including detailed discussions of the network layer, transport layer, and data-link layer, use extensive code samples to investigate various network attacks such as network sniffing, active sniffing, TCP/IP hijacking, RST hijacking, denial of service (DoS), the Ping of Death, teardrop, ping flooding, amplification attacks, distributed DoS flooding, and SYN flooding. Then, study port scanning techniques hackers use to avoid detection, such as the stealth SYN scan, FIN, X-mas, and Null scans, spoofing decoys, and idle scanning. The chapter ends with a discussion of a simple, proactive port-scanning defense that prevents information leakage via port scans before they actually happen.
Title: Hacking: The Art of Exploitation
Published: November 2003
Author: Jon Erickson
Chapter: Chapter 3: Ox300 Networking
Published by No Starch Press