Wednesday, November 29, 2006

Specialized Solutions - Certified Ethical Hacker

The Certified Ethical Hacker certification from Specialized solutions enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate network. This allows system administrator to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.

• Ethics and Legal Issues
• Footprinting Techniques
• Scanning
• Enumeration
• System Hacking
• Trojans and Backdoors
• Sniffers
• Denial of Service
• Social Engineering
• Session Hijacking
• CEH Hacking Web Servers
• Web Application Vulnerabilities
• Web Based Password Cracking
• SQL Injection
• Hacking Wireless Networks
• Virus and Worms
• Hacking Novell
• Hacking Linux
• IDS, Firewalls and Honeypots
• Buffer Overflows
• Cryptography
• Penetration Testing Methodologies Download

Download Links:

Part 01 | Part 02 | Part 03 | Part 04 | Part 05 | Part 06 | Part 07 | Part 08

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

Paperback: 1200 pages
Publisher: Addison-Wesley Professional; 1st edition (November 20, 2006)
Language: English
ISBN: 0321444426
“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”
–Halvar Flake, CEO and head of research, SABRE Security GmbH
The Definitive Insider’s Guide to Auditing Software Security

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.

The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry’s highest-profile applications.

Coverage includes

• Code auditing: theory, practice, proven methodologies, and secrets of the trade
• Bridging the gap between secure software design and post-implementation review
• Performing architectural assessment: design review, threat modeling, and operational review
• Identifying vulnerabilities related to memory management, data types, and malformed data
• UNIX/Linux assessment: privileges, files, and processes
• Windows-specific issues, including objects and the filesystem
• Auditing interprocess communication, synchronization, and state
• Evaluating network software: IP stacks, firewalls, and common application protocols
• Auditing Web applications and technologies

This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.

Contents
ABOUT THE AUTHORS xv
PREFACE xvii
ACKNOWLEDGMENTS xxi
I Introduction to Software Security Assessment
1 SOFTWARE VULNERABILITY FUNDAMENTALS 3
2 DESIGN REVIEW 25
3 OPERATIONAL REVIEW 67
4 APPLICATION REVIEW PROCESS 91
II Software Vulnerabilities
5 MEMORY CORRUPTION 167
6 C LANGUAGE ISSUES 203
7 PROGRAM BUILDING BLOCKS 297
8 STRINGS ANDMETACHARACTERS 387
9 UNIX I: PRIVILEGES AND FILES 459
10 UNIX II: PROCESSES 559
11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625
12 WINDOWS II: INTERPROCESS COMMUNICATION 685
13 SYNCHRONIZATION AND STATE 755
III Software Vulnerabilities in Practice
14 NETWORK PROTOCOLS 829
15 FIREWALLS 891
16 NETWORK APPLICATION PROTOCOLS 921
17 WEB APPLICATIONS 1007
18 WEB TECHNOLOGIES 1083
BIBLIOGRAPHY 1125
INDEX 1129
http://mihd.net/1ozxtdhttp://upload2.net/page/download/lHAO7IuQGW6hSia/The.Art.of.Software.Security.Assessment+-+0321444426.rar.html

http://up-file.com/download/c32765214189/The.Art.of.Software.Security.Assessment—0321444426.rar.html

http://rapidshare.com/files/2884582/Art.of.Software.Security.Assessment-0321444426.chm

Network Security Hacks: Tips & Tools for Protecting Your Privacy

Network Security Hacks: Tips & Tools for Protecting Your Privacy

Paperback: 455 pages
Publisher: O’Reilly Media; 2 edition (October 30, 2006)
Language: English
ISBN: 0596527632

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.
This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.
In fact, this “roll up your sleeves and get busy” security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

Source: www.ebooks-share.info

http://rapidshare.com/files/4088482/OReilly.Network.Security.Hacks.2nd.Edition.Oct.2006.chm
http://mihd.net/rv1kef

Configure Oracle over SSL

Configure ORACL with one way SSL


Create Wallet
● Create new Standalone wallet
● Create new certificate request. Give server computer name as common name
● Take Verisign trial certificate for 14 days from certification request
● Make Autologin enable
● Save Wallet


Configure Oracle Net Manager – oracle Advance Security

● open oracle net Manager
● Click profile
● select “Oracle Advance Security” from top drop down list
● Click SSL node
● Give Wallet directory where Wallet saved
● Checked “Configure SSL for Server”
● Select Require SSL version as SSL 3.0

Configure Oracle Net Manager – Listener

● Click Listener
● from Edit menu click New
● Select “Listening Locations”
● Click “Add Address”
● Select Protocol as TCP/IP with SSL
● Host as Server name – should be same as common name in certificate
● Server Port – oracle recommends 2484

● Select Other services from drop down
● Program name : extproc
● SID - PLSExtProc
● Provide Oracle Home directory location

● Select “Database Service” from drop down list
● global databasename : ORCL
● Oracle Homedirectory :
● SID: ORCL

Start Listener

Go to /bin
Type lsnrctl command

lsnrctl> Start
lsnrctl> Stop
lsnrctl> Service

Configure tnsnames.ora as follows

ORCLS =
(DESCRIPTION =
(ADDRESS_LIST =
(ADDRESS = (PROTOCOL = TCPS)(HOST = )(PORT = 2484))
)
(CONNECT_DATA =
(SERVER = DEDICATED)
(SERVICE_NAME = orcl)
)
)

Connect to Database

● Start SQL*PLS
● connect username/password@orcls

Monday, November 27, 2006

CISSP webcast @ SearchSecurity

SeachSecurity.com is a good resource for any security professional. Following are the CISSP webcast provided by them. This is a best resource before you start preparing for CISSP

CISSP CBK Domains :-

1) Lesson/Domain 1 -- Security management practices
2) Access control
3) Cryptography
4) Security models and architecture
5) Telecommunications and networking
6) Domain 6: Application and system development
7) Business continuity
8) Law, investigation and ethics
9) physical security
10) operations security

Sunday, November 26, 2006

.Net security - APress

.Net Security - APress

When you use .NET to create client-and server-side applications, you have to address a new and large set of security issues. .NET Security shows you what you need to know by covering the different aspects of the .NET security model through detailed discussions about the key namespaces. The authors not only demonstrate how to write .NET code that can create secure systems within the .NET Framework, but also discuss ways that someone may try to break the security model in .NET, and how .NET prevents such intrusions.
.NET Security is a tutorial about how to use the .NET security and cryptographic classes as well as a reference for any developer who wants to understand how security is implemented in the .NET Framework. The .NET Framework requires understanding in many new areas such as managed code, permissions, and evidence–and this book covers them all.
Download Here
Password: www.ebooksportal.org

Security In Computing - Fourth Edition

Security In Computing - Fourth Edition
Contributed by pcoutlet | 351 Views
A sweeping revision of the classic computer security text. This book provides end-to-end, detailed coverage of the state of the art in all aspects of computer security. Starting with a clear, in-depth review of cryptography, it also covers specific options for securing software and data against malicious code and intruders; the special challenges of securing networks and distributed systems; firewalls; ways to administer security on personal computers and UNIX systems; analyzing security risks and benefits; and the legal and ethical issues surrounding computer security.

Download here

Password: www.ebooksportal.org