×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Anti-Hacker Tool Kit, Third Edition / Edition 3
     

Anti-Hacker Tool Kit, Third Edition / Edition 3

5.0 1
by Mike Shema, Chris Davis
 

See All Formats & Editions

ISBN-10: 0072262877

ISBN-13: 9780072262872

Pub. Date: 02/15/2006

Publisher: McGraw-Hill Professional Publishing

Stop hackers in their tracks

Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.

  • Completely revised to include the latest security tools, including wireless tools
  • New

Overview

Stop hackers in their tracks

Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.

  • Completely revised to include the latest security tools, including wireless tools
  • New tips on how to configure the recent tools on Linux, Windows, and Mac OSX
  • New on the CD-ROM — Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more
  • New case studies in each chapter

Product Details

ISBN-13:
9780072262872
Publisher:
McGraw-Hill Professional Publishing
Publication date:
02/15/2006
Edition description:
Book & CD
Pages:
800
Product dimensions:
7.40(w) x 8.20(h) x 1.70(d)

Table of Contents

Acknowledgmentsxxi
Introductionxxiii
Part IMultifunctional and Miscellaneous Tools
1Netcat and Cryptcat3
Netcat4
Cryptcat25
2The X Window System27
Choosing a Window Manager28
A Client/Server Model28
How Remote X Servers and Clients Communicate28
Securing X, Part I: Using xhost and xauth30
Securing X, Part II: Tunneling X Traffic Through SSH33
The Other Important Players34
Now You Know36
3Emulators37
VMware38
Cygwin50
Part IITools for Auditing and Defending the Hosts
4Port Scanners63
Nmap64
THC-Amap85
NetScan Tools90
SuperScan94
IPEye100
ScanLine101
WUPS106
Udp_scan107
5Unix Enumeration Tools111
Samba: Server Message Block Implementation for Unix112
Rpcinfo115
showmount117
R-Tools118
Finger120
who, w, and last123
6Windows Enumeration Tools127
Net Tools129
Nbtstat133
Winfingerprint138
GetUserInfo140
Enum142
PsTools146
HFNetChk165
7Web Hacking Tools169
Vulnerability Scanners170
All-Purpose Tools184
Application Inspection194
8Password Cracking/Brute-Force Tools207
PassFilt.dll and Windows Password Policies208
PAM and Unix Password Policies210
OpenBSD login.conf214
John the Ripper216
L0phtCrack228
Grabbing Windows Password Hashes233
Active Brute-Force Tools236
9Host Hardening243
Titan244
Msec247
10Backdoors and Remote Access Tools253
VNC255
Netbus261
Back Orifice265
SubSeven270
Loki275
Stcpshell279
Knark282
11Simple Source Auditing Tools289
Flawfinder290
RATS295
12Combination System Auditing Tools301
Nessus302
STAT318
Retina327
Internet Scanner333
Tripwire342
Part IIITools for Auditing and Defending Your Network
13Firewalls363
Firewalls and Packet Filters--the Basics364
Freeware Firewalls373
Commercial Firewalls404
14Network Reconnaissance Tools411
whois/fwhois412
Host, Dig, and Nslookup417
Ping420
Fping423
Traceroute426
Hping430
15Port Redirection439
Datapipe441
FPipe444
WinRelay452
16Sniffers453
Sniffers Overview454
BUTTSniffer455
Tcpdump and WinDump465
Ethereal478
Dsniff489
Ettercap496
Snort: An Intrusion-Detection System499
17Wireless Tools513
NetStumbler515
AiroPeek518
Wellenreiter520
Kismet521
18War Dialers531
ToneLoc532
THC-Scan542
Beyond the CONNECT String549
19TCP/IP Stack Tools551
ISIC: IP Stack Integrity Checker552
Iptest559
Nemesis: Packet-Weaving 101562
Beyond the Command Line568
Part IVTools for Computer Forensics and Incident Response
20Creating a Bootable Environment and Live Response Tool Kit571
Trinux572
Windows Live Response Tool Kit577
Unix Live Response Tool Kit599
21Commercial Forensic Duplication Tool Kits615
EnCase616
Format: Creating a Trusted Boot Disk625
PDBLOCK: Write Blocking Your Source Drives626
Safeback627
SnapBack637
Ghost641
22Open-Source Forensic Duplication Tool Kits651
dd: A Forensic Duplication Tool653
dd: A Hard Drive Cleansing Tool659
Losetup: Transforming a Regular File into a Device on Linux660
The Enhanced Linux Loopback Device661
Vnode: Transforming a Regular File into a Device on FreeBSD664
Md5sum and md5: Validating the Evidence Collected666
23Tool Kits to Aid in Forensic Analysis671
The Forensic Toolkit672
EnCase684
The Coroner's Toolkit698
24Tools to Aid in Internet Activity Reconstruction711
Outlook Express712
Outlook714
Netscape Navigator/Communicator715
America Online Client720
Unix Mailboxes724
Paraben's E-mail Examiner726
IE History730
X-Ways Trace733
25Generalized Editors and Viewers743
The file Command744
Hexdump745
Hexedit749
Vi753
Frhed757
Xvi32760
WinHex761
Quick View Plus765
Midnight Commander769
Part VAppendixes
AUseful Charts and Diagrams779
Protocol Headers780
ASCII Table785
BAbout the CD-ROM791
How to Use the CD-ROM792
Security Tools on the CD792
Links to More Tools793
Problems with the CD793
Index795

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Anti-Hacker Tool Kit, Third Edition 5 out of 5 based on 0 ratings. 1 reviews.
Anonymous More than 1 year ago