Anti-Hacker Tool Kit

( 1 )

Overview

Get in?depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.
Read More Show Less
... See more details below
Available through our Marketplace sellers.
Other sellers (Multimedia Set)
  • All (21) from $1.99   
  • New (1) from $8.50   
  • Used (20) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$8.50
Seller since 2005

Feedback rating:

(1625)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New

Ships from: Fort Worth, TX

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Get in–depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Yes, netadmins need a high-level strategy for keeping the hackers out. But if they can’t use the “low-level” tools available to them, they’re cooked. The hacker’s own toolset can help netadmins identify their own vulnerabilities; add to that new tools for forensic analysis and incident response. Some professionals are paying over $1,000 a day for training on these tools. With Anti-Hacker Tool Kit, you can master all of them for a whole lot less.

The authors, serious “white hats,” cover essential multifunctional tools like Netcat; useful commands built into Linux/Unix systems (ping, traceroute, et al.); and dozens of tools for port scanning, network enumeration, web hacking, password cracking, backdoors, even identifying code that’s susceptible to buffer overflow. There’s a full chapter on new wireless “war driving” tools that target today’s disconcertingly vulnerable Wi-Fi networks.

You’ll also find thorough coverage of live response and forensic duplication toolkits, each with detailed case studies. The CD-ROM contains every tool covered here, so you can get rolling fast -- which would be wise. (Bill Camarda)

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

From The Critics
Explains how to use 100 plus software tools for auditing systems on a network, auditing a network, and investigating incidents. The authors also overview some of the most common hacking programs used in attacks, and how to detect them on a system. Topics include port scanners, vulnerability scanners, password crackers, and war dialers. Among the specific products described are Netcat, Nessus, Tripwire, John the Ripper, and the Forensic Toolkit. The CD-ROM contains demonstration and open source security tools. Annotation c. Book News, Inc., Portland, OR
Read More Show Less

Product Details

  • ISBN-13: 9780072222821
  • Publisher: McGraw-Hill Companies, The
  • Publication date: 6/3/2002
  • Pages: 711
  • Product dimensions: 7.33 (w) x 9.04 (h) x 1.69 (d)

Table of Contents

Acknowledgments
Introduction
1 Netcat and Cryptcat 3
2 Open Source/System Tools: The Basics 25
3 The X Window System 65
4 VMware 75
5 Cygwin 89
6 Port Scanners 103
7 Windows Enumeration Tools 143
8 Web Hacking Tools 171
9 Password Cracking/Brute-Force Tools 211
10 Backdoors and Remote Access Tools 245
11 Simple Source Auditing Tools 283
12 Combination System Auditing Tools 295
13 Port Redirection 353
14 Sniffers 367
15 Wireless Tools 415
16 War Dialers 423
17 TCP/IP Stack Tools 443
18 Building (and Using) a Windows Live Response Tool Kit 461
19 Building and Using a Unix Live Response Tool Kit 485
20 Commercial Forensic Duplication Tool Kits 505
21 A Noncommercial Forensic Duplication Tool Kit 549
22 Tool Kits to Aid in Forensic Analysis 569
23 Tools to Aid in Internet Activity Reconstruction 617
24 Generalized Editors and Viewers 643
App.: Useful Charts and Diagrams 675
Index 687
Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted May 6, 2002

    Keith Jones is a stud!

    I personally know K. Jones, one of the authors of this book, and let me tell you ladies, this man is a hottie bizottie! AND he know's his stuff! If you want a real man who is not only Don Juan sexified, but is also a premier network security specialist writing the books that you use on your network, Keith Jones is the MAN.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)