Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Anti-Hacker Tool Kit, Third Edition
Back Cover
About
Introduction
Part I: Multifunctional Tools
Chapter 1: Netcat and Cryptcat
NETCAT6
CRYPTCAT
SBD
Chapter 2: The X Window System
CHOOSING A WINDOW MANAGER
A CLIENTSERVER MODEL
HOW REMOTE X SERVERS AND CLIENTS COMMUNICATE
SECURING X HOSTS WITH XHOST AND XAUTH
SECURING X COMMUNICATIONS WITH SECURE SHELL
THE OTHER IMPORTANT PLAYERS
NOW YOU KNOW...
Chapter 3: Virtual Machines Emulators
VIRTUAL PC
GNOPPIX
CYGWIN
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
NMAP
THC-AMAP
IPEYE
WUPS
SCANLINE
Chapter 5: Unix Enumeration Tools
FINGER
RPCINFO
SHOWMOUNT
R-TOOLS
WHO, W, AND LAST
Chapter 6: Windows Enumeration Tools
NET TOOLS
NBTSTAT
WINFINGERPRINT
GETUSERINFO
ENUM
PSTOOLS
MBSA VERSION 2
Chapter 7: Web Hacking Tools
VULNERABILITY SCANNERS
ALL-PURPOSE TOOLS
APPLICATION INSPECTION
Chapter 8: Password Cracking Brute-Force Tools
PAM AND UNIX PASSWORD POLICIES
OPENBSD LOGIN.CONF
JOHN THE RIPPER
L0PHTCRACK
GRABBING WINDOWS PASSWORD HASHES
ACTIVE BRUTE-FORCE TOOLS
Chapter 9: Host Hardening
CLAMAV
TITAN
MSEC
Chapter 10: Backdoors and Remote Access Tools
VNC
NETBUS
BACK ORIFICE
SUBSEVEN
LOKI
STCPSHELL
KNARK
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
RATS
Chapter 12: Combination System Auditing Tools
NESSUS
CAIN ABLE
AIDE
TRIPWIRE
Securing Your Files with Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
FREEWARE FIREWALLS
IPFW2
COMMERCIAL FIREWALLS
Chapter 14: Network Reconnaissance Tools
HOST, DIG, AND NSLOOKUP
PING
FPING
TRACEROUTE
HPING
Chapter 15: Port Redirection
DATAPIPE
FPIPE
WINRELAY
Chapter 16: Sniffers
SNIFFERS OVERVIEW
BUTTSNIFFER
TCPDUMP AND WINDUMP
ETHEREAL
DSNIFF
ETTERCAP
SNORT: AN INTRUSION-DETECTION SYSTEM
Chapter 17: Wireless Tools
NETSTUMBLER
AIROPEEK
WELLENREITER
KISMET
Chapter 18: War Dialers
TONELOC
THC-SCAN
SHOKDIAL
BEYOND THE CONNECT STRING
Chapter 19: TCPIP Stack Tools
IPTEST
NEMESIS: PACKET-WEAVING 101
BEYOND THE COMMAND LINE
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
TRINUX
WINDOWS LIVE RESPONSE TOOL KIT
UNIX LIVE RESPONSE TOOL KIT
Chapter 21: Commercial Forensic Image Tool Kits
ENCASE
FORMAT: CREATING A TRUSTED BOOT DISK
PDBLOCK: WRITE BLOCKING YOUR SOURCE DRIVES
SAFEBACK
SNAPBACK
FTK IMAGER
GHOST
SMART
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A FORENSIC DUPLICATION TOOL
SPLIT: BREAKING UP IMAGES ON THE FLY
DD: A HARD DRIVE CLEANSING TOOL
LOSETUP: TRANSFORMING A REGULAR FILE INTO A DEVICE ON LINUX
THE ENHANCED LINUX LOOPBACK DEVICE
VNODE: TRANSFORMING A REGULAR FILE INTO A DEVICE ON FREEBSD
MD5SUM AND MD5: VALIDATING THE EVIDENCE COLLECTED
Chapter 23: Tool Kits to Aid in Forensic Analysis
ENCASE
THE CORONER S TOOLKIT
Chapter 24: Tools to Aid in Internet Activity Reconstruction
CLIENT- AND WEB-BASED E-MAIL
OUTLOOK
READPST AND READDBX
PARABEN S E-MAIL EXAMINER
UNIX MAILBOXES
GUIDANCE SOFTWARE S ENCASE FORENSIC EDITION
ACCESSDATA S FTK
SEARCHING FOR INTERNET HISTORY
NETANALYSIS
IE HISTORY
X-WAYS TRACE
WEB HISTORIAN
Chapter 25: Generalized Editors and Viewers
THE FILE COMMAND
HEXDUMP
HEXEDIT
VI
FRHED
WINHEX
QUICK VIEW PLUS
MIDNIGHT COMMANDER
Chapter 26: Reverse Engineering Binaries
THE ANATOMY OF A COMPUTER PROGRAM
BLACK BOX ANALYSIS
GETTING YOUR HANDS DIRTY: WORKING WITH THE CODE
JAVA PROGRAMS
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII TABLE
Appendix B: Command-line Reference
TEXT FILE MANIPULATION
ARCHIVE FILE MANIPULATION
MISCELLANEOUS
How to Use the CD
List of Figures
List of Tables
List of Sidebars
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Reliability and Validity
Checklist
Reliability Models
Code Integration Pattern
Criteria for Model Evaluation
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
Internet Protocol (IP) Basics
Internet Protocol (IP) Routing
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Retransmission and Time-Out
Introduction to 80x86 Assembly Language and Computer Architecture
Elements of Assembly Language
Procedures
Bit Manipulation
Input/Output
Appendix B Useful MS-DOS Commands
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 4. Find Your House on an Aerial Photograph
Hack 30. Plot a Great Circle on a Flat Map
Hack 46. Map Global Weather Conditions
Hack 75. Share Your GRASS Maps with the World
Hack 77. Become a GRASS Ninja
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Cause and Effect
Exaggeration Equals Characterization
Making Movies from Stills
Atmosphere, Film, and Noise Effects
Motion Titling Effects
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Creating a Fire-Now Trigger
Implementing a Listener
What Is Workflow?
Quick Introduction to OSWorkflow
Configuring a TriggerListener
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies