Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Anti-Hacker Tool Kit, Third Edition
Back Cover
About
Introduction
Part I: Multifunctional Tools
Chapter 1: Netcat and Cryptcat
NETCAT6
CRYPTCAT
SBD
Chapter 2: The X Window System
CHOOSING A WINDOW MANAGER
A CLIENTSERVER MODEL
HOW REMOTE X SERVERS AND CLIENTS COMMUNICATE
SECURING X HOSTS WITH XHOST AND XAUTH
SECURING X COMMUNICATIONS WITH SECURE SHELL
THE OTHER IMPORTANT PLAYERS
NOW YOU KNOW...
Chapter 3: Virtual Machines Emulators
VIRTUAL PC
GNOPPIX
CYGWIN
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
NMAP
THC-AMAP
IPEYE
WUPS
SCANLINE
Chapter 5: Unix Enumeration Tools
FINGER
RPCINFO
SHOWMOUNT
R-TOOLS
WHO, W, AND LAST
Chapter 6: Windows Enumeration Tools
NET TOOLS
NBTSTAT
WINFINGERPRINT
GETUSERINFO
ENUM
PSTOOLS
MBSA VERSION 2
Chapter 7: Web Hacking Tools
VULNERABILITY SCANNERS
ALL-PURPOSE TOOLS
APPLICATION INSPECTION
Chapter 8: Password Cracking Brute-Force Tools
PAM AND UNIX PASSWORD POLICIES
OPENBSD LOGIN.CONF
JOHN THE RIPPER
L0PHTCRACK
GRABBING WINDOWS PASSWORD HASHES
ACTIVE BRUTE-FORCE TOOLS
Chapter 9: Host Hardening
CLAMAV
TITAN
MSEC
Chapter 10: Backdoors and Remote Access Tools
VNC
NETBUS
BACK ORIFICE
SUBSEVEN
LOKI
STCPSHELL
KNARK
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
RATS
Chapter 12: Combination System Auditing Tools
NESSUS
CAIN ABLE
AIDE
TRIPWIRE
Securing Your Files with Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
FREEWARE FIREWALLS
IPFW2
COMMERCIAL FIREWALLS
Chapter 14: Network Reconnaissance Tools
HOST, DIG, AND NSLOOKUP
PING
FPING
TRACEROUTE
HPING
Chapter 15: Port Redirection
DATAPIPE
FPIPE
WINRELAY
Chapter 16: Sniffers
SNIFFERS OVERVIEW
BUTTSNIFFER
TCPDUMP AND WINDUMP
ETHEREAL
DSNIFF
ETTERCAP
SNORT: AN INTRUSION-DETECTION SYSTEM
Chapter 17: Wireless Tools
NETSTUMBLER
AIROPEEK
WELLENREITER
KISMET
Chapter 18: War Dialers
TONELOC
THC-SCAN
SHOKDIAL
BEYOND THE CONNECT STRING
Chapter 19: TCPIP Stack Tools
IPTEST
NEMESIS: PACKET-WEAVING 101
BEYOND THE COMMAND LINE
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
TRINUX
WINDOWS LIVE RESPONSE TOOL KIT
UNIX LIVE RESPONSE TOOL KIT
Chapter 21: Commercial Forensic Image Tool Kits
ENCASE
FORMAT: CREATING A TRUSTED BOOT DISK
PDBLOCK: WRITE BLOCKING YOUR SOURCE DRIVES
SAFEBACK
SNAPBACK
FTK IMAGER
GHOST
SMART
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A FORENSIC DUPLICATION TOOL
SPLIT: BREAKING UP IMAGES ON THE FLY
DD: A HARD DRIVE CLEANSING TOOL
LOSETUP: TRANSFORMING A REGULAR FILE INTO A DEVICE ON LINUX
THE ENHANCED LINUX LOOPBACK DEVICE
VNODE: TRANSFORMING A REGULAR FILE INTO A DEVICE ON FREEBSD
MD5SUM AND MD5: VALIDATING THE EVIDENCE COLLECTED
Chapter 23: Tool Kits to Aid in Forensic Analysis
ENCASE
THE CORONER S TOOLKIT
Chapter 24: Tools to Aid in Internet Activity Reconstruction
CLIENT- AND WEB-BASED E-MAIL
OUTLOOK
READPST AND READDBX
PARABEN S E-MAIL EXAMINER
UNIX MAILBOXES
GUIDANCE SOFTWARE S ENCASE FORENSIC EDITION
ACCESSDATA S FTK
SEARCHING FOR INTERNET HISTORY
NETANALYSIS
IE HISTORY
X-WAYS TRACE
WEB HISTORIAN
Chapter 25: Generalized Editors and Viewers
THE FILE COMMAND
HEXDUMP
HEXEDIT
VI
FRHED
WINHEX
QUICK VIEW PLUS
MIDNIGHT COMMANDER
Chapter 26: Reverse Engineering Binaries
THE ANATOMY OF A COMPUTER PROGRAM
BLACK BOX ANALYSIS
GETTING YOUR HANDS DIRTY: WORKING WITH THE CODE
JAVA PROGRAMS
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII TABLE
Appendix B: Command-line Reference
TEXT FILE MANIPULATION
ARCHIVE FILE MANIPULATION
MISCELLANEOUS
How to Use the CD
List of Figures
List of Tables
List of Sidebars
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
Context Management of ERP Processes in Virtual Communities
Distributed Data Warehouse for Geo-spatial Services
Healthcare Information: From Administrative to Practice Databases
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Managing Enterprise Systems with the Windows Script Host
File Operations
Registry Operations
Regular Expressions
Messaging Operations
Exchange Server
Cisco Voice Gateways and Gatekeepers
The Role of Voice Gatekeepers
Review Questions
Security
Need for DSP Resources
Case Study: Providing Enterprise VoIP Trunking to VoIP Service of the Service Provider
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 354 Nonmetallic Underground Conduit with Conductors Type NUCC
Article 426: Fixed Outdoor Electric De-Icing and Snow-Melting Equipment
Article 503 Class III Locations
Example No. D1(a) One-Family Dwelling
Example No. D2(c) Optional Calculation for One-Family Dwelling with Heat Pump(Single-Phase, 240/120-Volt Service) (See 220.82)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Wide Area Networking
The Evolution to IP Services
Optical Networking Today and Tomorrow
DSL Technology
The Handset Revolution
Comparing, Designing, and Deploying VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Deploying IPsec VPNs: Fundamental Considerations
Summary
Deploying SSL VPNs (WebVPN) on the ASA 5500
Designing and Building SSL Remote Access VPNs (WebVPN)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies