List of Sidebars

Chapter 3: Virtual Machines & Emulators

Case Study: Creating Practice Targets

Chapter 4: Port Scanners

Case Study: Watching the Watcher
Case Study: Stack Anomalies
Case Study: Command-line Advantages

Chapter 5: Unix Enumeration Tools

Case Study: Trusted Users?

Chapter 6: Windows Enumeration Tools

Case Study: Brute-force Attacks
Case Study: The Danger of Unsecured NetBIOS Ports
Case Study: Manage Multiple Servers

Chapter 7: Web Hacking Tools

Case Study: Catching Scan Signatures
Case Study: Password Guessing
Case Study: Inetd Alternative

Chapter 8: Password Cracking / Brute-Force Tools

Case Study: Attacking Password Policies
Case Study: Finding L0phtCrack on Your System
Case Study: Checking Password Policy

Chapter 9: Host Hardening

Case Study: Clam Up E-mail Viruses

Chapter 10: Backdoors and Remote Access Tools

Case Study: Process Hide and Seek
Case Study: The Good, the Bad, and the Ugly

Chapter 11: Simple Source Auditing Tools

Case Study: wu- ftpd 2.6.0
Case Study: What Automated Audit Tools Miss
Case Study: mtr 0.46
Case Study: Copying Unsafe Data
Case Study: Canaries in the Mist

Chapter 14: Network Reconnaissance Tools

Case Study: How Hackers Can Abuse Ping
Case Study: Indirect Port Scanning

Chapter 15: Port Redirection

Case Study: Port Hopping
Case Study: Packet Filters, Ports, and Problems

Chapter 16: Sniffers

Case Study: Debugging Problems with Sniffers
Case Study: Tracking Down the Insider

Chapter 17: Wireless Tools

Case Study: Networks Without Borders
Case Study: WEP Insecurities

Chapter 19: TCP/IP Stack Tools

Case Study: Firewall Performance
Case Study: Packet Injection

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Case Study: Using a Bootable Tool CD
Case Study: A Windows Hacking Scenario
Case Study: A Unix Hacking Scenario

Chapter 21: Commercial Forensic Image Tool Kits

Case Study: Search and Seizure!

Chapter 22: Open -Source Forensic Duplication Tool Kits

Case Study: Smuggling the Secrets

Chapter 23: Tool Kits to Aid in Forensic Analysis

Case Study: An Inside Employee Gone Bad

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Case Study: A Vanishing Suspect

Chapter 25: Generalized Editors and Viewers

Case Study: Deciphering the Mysterious Criminal's Files


Anti-Hacker Tool Kit
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net