Skip to content

Anti-Hacker Tool Kit

Best in textbook rentals since 2012!

ISBN-10: 0072230207

ISBN-13: 9780072230208

Edition: 2nd 2004

Authors: Mike Shema, Keith Jones, Brad Johnson

List price: $59.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This volume provides detailed, experience-based coverage on key security tools and how to use them. Each tool discussion has tips and advice on how to configure tools to get the best results.
Customers also bought

Book details

List price: $59.99
Edition: 2nd
Copyright year: 2004
Publisher: McGraw-Hill Osborne
Publication date: 12/22/2003
Binding: Mixed Media
Pages: 750
Size: 7.00" wide x 9.00" long x 1.75" tall
Weight: 3.036
Language: English

J. Keith Jones is a native of Georgia who now lives in North Carolina with his wife. As well as fiction he also studies and writes about history. A graduate of the University of South Carolina, he has spent a number of years in the computer industry. His desire to write was sparked by the encouragement of his first English professor in college. In Due Time is his first published novel.To learn more about J. Keith Jones and his upcoming projects please visit his website at www.jkjones-author.com

Acknowledgmentsp. xxi
Introductionp. xxiii
Multifunctional and Miscellaneous Tools
Netcat and Cryptcatp. 3
Netcatp. 4
Cryptcatp. 25
The X Window Systemp. 27
Choosing a Window Managerp. 28
A Client/Server Modelp. 28
How Remote X Servers and Clients Communicatep. 28
Securing X, Part I: Using xhost and xauthp. 30
Securing X, Part II: Tunneling X Traffic Through SSHp. 33
The Other Important Playersp. 34
Now You Knowp. 36
Emulatorsp. 37
VMwarep. 38
Cygwinp. 50
Tools for Auditing and Defending the Hosts
Port Scannersp. 63
Nmapp. 64
THC-Amapp. 85
NetScan Toolsp. 90
SuperScanp. 94
IPEyep. 100
ScanLinep. 101
WUPSp. 106
Udp_scanp. 107
Unix Enumeration Toolsp. 111
Samba: Server Message Block Implementation for Unixp. 112
Rpcinfop. 115
showmountp. 117
R-Toolsp. 118
Fingerp. 120
who, w, and lastp. 123
Windows Enumeration Toolsp. 127
Net Toolsp. 129
Nbtstatp. 133
Winfingerprintp. 138
GetUserInfop. 140
Enump. 142
PsToolsp. 146
HFNetChkp. 165
Web Hacking Toolsp. 169
Vulnerability Scannersp. 170
All-Purpose Toolsp. 184
Application Inspectionp. 194
Password Cracking/Brute-Force Toolsp. 207
PassFilt.dll and Windows Password Policiesp. 208
PAM and Unix Password Policiesp. 210
OpenBSD login.confp. 214
John the Ripperp. 216
L0phtCrackp. 228
Grabbing Windows Password Hashesp. 233
Active Brute-Force Toolsp. 236
Host Hardeningp. 243
Titanp. 244
Msecp. 247
Backdoors and Remote Access Toolsp. 253
VNCp. 255
Netbusp. 261
Back Orificep. 265
SubSevenp. 270
Lokip. 275
Stcpshellp. 279
Knarkp. 282
Simple Source Auditing Toolsp. 289
Flawfinderp. 290
RATSp. 295
Combination System Auditing Toolsp. 301
Nessusp. 302
STATp. 318
Retinap. 327
Internet Scannerp. 333
Tripwirep. 342
Tools for Auditing and Defending Your Network
Firewallsp. 363
Firewalls and Packet Filters--the Basicsp. 364
Freeware Firewallsp. 373
Commercial Firewallsp. 404
Network Reconnaissance Toolsp. 411
whois/fwhoisp. 412
Host, Dig, and Nslookupp. 417
Pingp. 420
Fpingp. 423
Traceroutep. 426
Hpingp. 430
Port Redirectionp. 439
Datapipep. 441
FPipep. 444
WinRelayp. 452
Sniffersp. 453
Sniffers Overviewp. 454
BUTTSnifferp. 455
Tcpdump and WinDumpp. 465
Etherealp. 478
Dsniffp. 489
Ettercapp. 496
Snort: An Intrusion-Detection Systemp. 499
Wireless Toolsp. 513
NetStumblerp. 515
AiroPeekp. 518
Wellenreiterp. 520
Kismetp. 521
War Dialersp. 531
ToneLocp. 532
THC-Scanp. 542
Beyond the CONNECT Stringp. 549
TCP/IP Stack Toolsp. 551
ISIC: IP Stack Integrity Checkerp. 552
Iptestp. 559
Nemesis: Packet-Weaving 101p. 562
Beyond the Command Linep. 568
Tools for Computer Forensics and Incident Response
Creating a Bootable Environment and Live Response Tool Kitp. 571
Trinuxp. 572
Windows Live Response Tool Kitp. 577
Unix Live Response Tool Kitp. 599
Commercial Forensic Duplication Tool Kitsp. 615
EnCasep. 616
Format: Creating a Trusted Boot Diskp. 625
PDBLOCK: Write Blocking Your Source Drivesp. 626
Safebackp. 627
SnapBackp. 637
Ghostp. 641
Open-Source Forensic Duplication Tool Kitsp. 651
dd: A Forensic Duplication Toolp. 653
dd: A Hard Drive Cleansing Toolp. 659
Losetup: Transforming a Regular File into a Device on Linuxp. 660
The Enhanced Linux Loopback Devicep. 661
Vnode: Transforming a Regular File into a Device on FreeBSDp. 664
Md5sum and md5: Validating the Evidence Collectedp. 666
Tool Kits to Aid in Forensic Analysisp. 671
The Forensic Toolkitp. 672
EnCasep. 684
The Coroner's Toolkitp. 698
Tools to Aid in Internet Activity Reconstructionp. 711
Outlook Expressp. 712
Outlookp. 714
Netscape Navigator/Communicatorp. 715
America Online Clientp. 720
Unix Mailboxesp. 724
Paraben's E-mail Examinerp. 726
IE Historyp. 730
X-Ways Tracep. 733
Generalized Editors and Viewersp. 743
The file Commandp. 744
Hexdumpp. 745
Hexeditp. 749
Vip. 753
Frhedp. 757
Xvi32p. 760
WinHexp. 761
Quick View Plusp. 765
Midnight Commanderp. 769
Appendixes
Useful Charts and Diagramsp. 779
Protocol Headersp. 780
ASCII Tablep. 785
About the CD-ROMp. 791
How to Use the CD-ROMp. 792
Security Tools on the CDp. 792
Links to More Toolsp. 793
Problems with the CDp. 793
Indexp. 795
Table of Contents provided by Ingram. All Rights Reserved.