Hacking with Tricks

Only available on StudyMode
  • Download(s) : 106
  • Published : April 16, 2013
Open Document
Text Preview
Hack Attacks Revealed
A Complete Reference with
Custom Security Hacking Toolkit
John Chirillo

This netLibrary eBook does not include the ancillary media that was packaged with the original printed version of the book.
Publisher: Robert Ipsen
Editor: Carol A. Long
Assistant Editor: Adaobi Obi
Managing Editor: Micheline Frederick
New Media Editor: Brian Snapp
Text Design & Composition: Thomark Design
Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright © 2001 by John Chirillo. All rights reserved.

Published by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate percopy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 7508400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought.

This title is also available in print as ISBN 0-471-41624-X
For more information about Wiley products, visit our web site at www.Wiley.com

Contents
Acknowledgments

xi

A Note to the Reader

xii

Introduction

xiii

Part I:

In the Beginning

1

Chapter 1

Understanding Communication Protocols

3

A Brief History of the Internet

3

Internet Protocol

5

IP Datagrams, Encapsulation, Size, and
Fragmentation

8

IP Addresses, Classes, Subnet Masks

10

Subnetting, VLSM, and Unraveling IP the Easy
Way

11

ARP/RARP Engineering: Introduction to Physical
Hardware Address Mapping

22

ARP Encapsulation and Header Formatting

23

RARP Transactions, Encapsulation

24

RARP Service

25

Transmission Control Protocol

25

Sequencing and Windowing

26

TCP Packet Format and Header Snapshots

26

Ports, Endpoints, Connection Establishment

28

User Datagram Protocol

30

UDP Formatting, Encapsulation, and Header
Snapshots

30

Multiplexing, Demultiplexing, and Port Connections 31
Internet Control Message Protocol
ICMP Format, Encapsulation, and Delivery

32

ICMP Messages, Subnet Mask Retrieval

33

ICMP Header Snapshots

36

Moving Forward
Chapter 2

32

36

NetWare and NetBIOS Technology

37

NetWare: Introduction

37

Internetwork Packet Exchange

37

Sequenced Packet Exchange

44

SPX Format, Header Snapshots

44

Connection Management, Session Termination

45

Watchdog Algorithm

45

Error Recovery, Congestion Control

47

Wrapping Up

47

NetBIOS Technology: Introduction

47

Naming Convention, Header Snapshots

48

General, Naming, Session, and Datagram Services

48

NetBEUI: Introduction

50

NetBIOS Relationship

50

Windows and Timers

50

Conclusion

51

Part II:

Putting It All Together

53

Chapter 3

Understanding Communication Mediums

55

Ethernet Technology

55

Carrier Transmissions

56

Ethernet Design,...
tracking img