Part 3: Network Protocols – How to Attack and How to Protect
In this part of the book, we talk about network protocols and applications and how to use the methods and tools we learned in the previous parts to attack and protect these protocols.
This part of the book comprises the following chapters:
- Chapter 10, Discovering LAN, IP, and TCP/UDP-Based Attacks
- Chapter 11, Implementing Wireless Network Security
- Chapter 12, Attacking Routing Protocols
- Chapter 13, DNS Security
- Chapter 14, Securing Web and Email Services
- Chapter 15, Enterprise Applications Security – Databases and Filesystems
- Chapter 16, IP Telephony and Collaboration Services Security