Anti-Hacker Tool Kit
Keith Jones, Bradley C. Johnson, Mike Shema
- 出版商: McGraw-Hill Education
- 出版日期: 2002-06-25
- 售價: $2,210
- 貴賓價: 9.5 折 $2,100
- 語言: 英文
- 頁數: 711
- 裝訂: Paperback
- ISBN: 0072222824
- ISBN-13: 9780072222821
-
相關分類:
駭客 Hack
已過版
買這商品的人也買了...
-
$1,205TCP/IP Illustrated, Volume 1: The Protocols (Hardcover)
-
$1,200$1,176 -
$1,029Fundamentals of Data Structures in C
-
$2,610$2,480 -
$960Software Engineering: A Practitioner's Approach, 5/e
-
$149$118 -
$970Introduction to Algorithms, 2/e
-
$1,150$1,127 -
$168$133 -
$1,710$1,625 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,030$1,009 -
$1,600$1,568 -
$560$504 -
$450$351 -
$620$558 -
$580$458 -
$650$553 -
$580$458 -
$590$466 -
$280$221 -
$690$538 -
$720$562 -
$720$569
相關主題
商品描述
This book continues the best-selling tradition of Hacking Exposed--only by learning the tools and techniques of malicious hackers can you truly reduce security risk. Arm yourself today with the Anti-Hacker Tool Kit. -- Joel Scambray, Co-author of Hacking Exposed, Hacking Exposed Windows 2000, and Hacking Exposed Web Applications
Stay one step ahead of even the most cunning hackers with help from this
invaluable resource. Through proper use and configuration of key security tools,
youll be able to investigate and resolve existing problems within your network
infrastructure with precision and a minimum of fuss. Written by experienced
security professionals, this resource provides you with comprehensive coverage
of the most important and up-to-date security tools in use today, explains their
function, and shows you how to use each tool effectively through in-depth
implementation examples and case studies. Learn to detect and prevent system
misconfigurations and Web server hacks plus, discover best practices for
protecting both large and small networks.
Includes best practices for use and configuration of these key tools:
- Port scanners--Nmap, NetScan, SuperScan, IpEye
- Enumeration tools--Enum, PSTools, and User2SID
- BackDoors--NetBus, Back Orifice, and SubSeven
- Password crackers--Pwltool, SMBGrind, Jack the Ripper, and LSADump2
- Sniffers--Snort, BUTTSniffer, WinDump, and Dsniff
- System Audit tools --Nessus, STAT, ISS Internet Scanner
- Denial of Service tools--Tribe Flood network, Shaft, and Mstreams
- WardialersTHC-scan and ToneLoc
- Incident response and forensic tools--TCT, EnCase, FTK, and other file
viewers
- Miscellaneous and multi-purpose tools-- Netcat, Getadmin, Fpipe, Fport,
VMWare, and many more
Contents
Part I: Multifunctional Tools
1: Netcat and Cryptcat
2: Open Source/System Tools: The
Basics
3: The X Window System
4:
VMware
5: Cygwin
Part II: Tools for
Attacking and Auditing Systems on the Net
6: Port
Scanners
7: Windows Enumeration
Tools
8: Web Hacking Tools
9:
Password Cracking/Brute-Force Tools
10: Backdoors and
Remote Access Tools
11: Simple Source Auditing
Tools
12: Combination System Auditing
Tools
Part III: Tools for Attacking and Auditing the
Network
13: Port Redirection
14:
Sniffers
15: Wireless Tools
16:
War Dialers
17: TCP/IP Stack Tools
Part IV: Tools Used in Forensics and Incident Response
18: Building (and Using) a Windows Live Response Tool
Kit
19: Building and Using a Unix Live Response Tool
Kit
20: Commercial Forensic Duplication Tool
Kits
21: A Noncommercial Forensic Duplication Tool
Kit
22: Tool Kits to Aid in Forensic
Analysis
23: Tools to Aid in Internet Activity
Reconstruction
24: Generalized Editors and
Viewers
Appendix: Useful Charts and
Diagrams