List of Case Studies

 < Day Day Up > 



Chapter 1: Netcat and Cryptcat

Case Study: Netcat as a Remote Detonator

Chapter 3: Emulators

Case Study: Using Unix in a Windows Environment

Chapter 4: Port Scanners

Case Study: Mapping Networks and Potential Targets
Case Study: Ports Painting a Picture
Case Study: Banner Identification
Case Study: OS Fingerprinting

Chapter 5: Unix Enumeration Tools

Case Study: Social Engineering 101
Case Study: Watching Your Users

Chapter 6: Windows Enumeration Tools

Case Study: Password Guessing
Case Study: Enumerating the DMZ
Case Study: Homebrew IDS

Chapter 7: Web Hacking Tools

Case Study: Catching Scan Signatures
Case Study: Password Guessing
Case Study: Inted Alternative

Chapter 8: Password Cracking / Brute-Force Tools

Case Study: Attacking Password Policies
Case Study: Finding L0phtcrack on Your System
Case Study: Checking Password Policy

Chapter 10: Backdoors and Remote Access Tools

Case Study: The Good, the Bad, and the Ugly

Chapter 11: Simple Source Auditing Tools

Case Study: wu-ftpd 2.6.0
Case Study: What Automated Audit Tools Miss
Case Study: mtr 0.46
Case Study: Canaries in the Mist

Chapter 12: Combination System Auditing Tools

Case Study: Patching the Holes

Chapter 13: Firewalls

Port Forwarding Pitfalls

Chapter 14: Network Reconnaissance Tools

Case Study: How Hackers Can Abuse Ping
Case Study: Using Hping for Advanced Port Scanning

Chapter 15: Port Redirection

Case Study: Port Hopping
Case Study: Packet Filters, Ports, and Problems

Chapter 16: Sniffers

Have I Been BUTTSniffed?
Case Study: Righteous Uses of a Sniffer
Case Study: Tracking Down the Insider

Chapter 17: Wireless Tools

Case Study: Wardriving
Case Study: WEP Insecurities

Chapter 18: War Dialers

Case Study: Improving Remote Access Security

Chapter 19: TCP/IP Stack Tools

Case Study: Firewall Performance
Case Study: Packet Injection

Chapter 20: Creating a Bootable Environment and Live Response Tool Kit

Case Study: Using a Bootable Tool CD
Case Study: A Windows Hacking Scenario
Case Study: A Unix Hacking Scenario

Chapter 21: Commercial Forensic Duplication Tool Kits

Case Study: Search and Seizure!

Chapter 22: Open-Source Forensic Duplication Tool Kits

Case Study: Smuggling the Secrets

Chapter 23: Tool Kits to Aid in Forensic Analysis

Case Study: An Inside Employee Gone Bad

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Case Study: A Vanishing Suspect

Chapter 25: Generalized Editors and Viewers

Case Study: Deciphering the Mysterious Criminal's Files



 < Day Day Up > 



Anti-Hacker Tool Kit
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net