Anti-Hacker Tool Kit

Keith Jones, Bradley C. Johnson, Mike Shema

  • 出版商: McGraw-Hill Osborne Media
  • 出版日期: 2002-06-25
  • 定價: $1,920
  • 售價: 9.7$1,863
  • 貴賓價: 9.2$1,770
  • 語言: 英文
  • 頁數: 711
  • 裝訂: Paperback
  • ISBN: 0072222824
  • ISBN-13: 9780072222821
  • 相關分類: Hack 駭客





This book continues the best-selling tradition of Hacking Exposed--only by learning the tools and techniques of malicious hackers can you truly reduce security risk. Arm yourself today with the Anti-Hacker Tool Kit. -- Joel Scambray, Co-author of Hacking Exposed, Hacking Exposed Windows 2000, and Hacking Exposed Web Applications

Stay one step ahead of even the most cunning hackers with help from this invaluable resource. Through proper use and configuration of key security tools, youll be able to investigate and resolve existing problems within your network infrastructure with precision and a minimum of fuss. Written by experienced security professionals, this resource provides you with comprehensive coverage of the most important and up-to-date security tools in use today, explains their function, and shows you how to use each tool effectively through in-depth implementation examples and case studies. Learn to detect and prevent system misconfigurations and Web server hacks plus, discover best practices for protecting both large and small networks.

Includes best practices for use and configuration of these key tools:

  • Port scanners--Nmap, NetScan, SuperScan, IpEye
  • Enumeration tools--Enum, PSTools, and User2SID
  • BackDoors--NetBus, Back Orifice, and SubSeven
  • Password crackers--Pwltool, SMBGrind, Jack the Ripper, and LSADump2
  • Sniffers--Snort, BUTTSniffer, WinDump, and Dsniff
  • System Audit tools --Nessus, STAT, ISS Internet Scanner
  • Denial of Service tools--Tribe Flood network, Shaft, and Mstreams
  • Wardialers­­THC-scan and ToneLoc
  • Incident response and forensic tools--TCT, EnCase, FTK, and other file viewers
  • Miscellaneous and multi-purpose tools-- Netcat, Getadmin, Fpipe, Fport, VMWare, and many more


   Part I: Multifunctional Tools
    1: Netcat and Cryptcat
    2: Open Source/System Tools: The Basics
    3: The X Window System
    4: VMware
    5: Cygwin

   Part II: Tools for Attacking and Auditing Systems on the Net
    6: Port Scanners
    7: Windows Enumeration Tools
    8: Web Hacking Tools
    9: Password Cracking/Brute-Force Tools
    10: Backdoors and Remote Access Tools
    11: Simple Source Auditing Tools
    12: Combination System Auditing Tools

   Part III: Tools for Attacking and Auditing the Network
    13: Port Redirection
    14: Sniffers
    15: Wireless Tools
    16: War Dialers
    17: TCP/IP Stack Tools

   Part IV: Tools Used in Forensics and Incident Response
    18: Building (and Using) a Windows Live Response Tool Kit
    19: Building and Using a Unix Live Response Tool Kit
    20: Commercial Forensic Duplication Tool Kits
    21: A Noncommercial Forensic Duplication Tool Kit
    22: Tool Kits to Aid in Forensic Analysis
    23: Tools to Aid in Internet Activity Reconstruction
    24: Generalized Editors and Viewers

    Appendix: Useful Charts and Diagrams