Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Anti-Hacker Tool Kit, Third Edition
Back Cover
About
Introduction
Part I: Multifunctional Tools
Chapter 1: Netcat and Cryptcat
NETCAT6
CRYPTCAT
SBD
Chapter 2: The X Window System
CHOOSING A WINDOW MANAGER
A CLIENTSERVER MODEL
HOW REMOTE X SERVERS AND CLIENTS COMMUNICATE
SECURING X HOSTS WITH XHOST AND XAUTH
SECURING X COMMUNICATIONS WITH SECURE SHELL
THE OTHER IMPORTANT PLAYERS
NOW YOU KNOW...
Chapter 3: Virtual Machines Emulators
VIRTUAL PC
GNOPPIX
CYGWIN
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
NMAP
THC-AMAP
IPEYE
WUPS
SCANLINE
Chapter 5: Unix Enumeration Tools
FINGER
RPCINFO
SHOWMOUNT
R-TOOLS
WHO, W, AND LAST
Chapter 6: Windows Enumeration Tools
NET TOOLS
NBTSTAT
WINFINGERPRINT
GETUSERINFO
ENUM
PSTOOLS
MBSA VERSION 2
Chapter 7: Web Hacking Tools
VULNERABILITY SCANNERS
ALL-PURPOSE TOOLS
APPLICATION INSPECTION
Chapter 8: Password Cracking Brute-Force Tools
PAM AND UNIX PASSWORD POLICIES
OPENBSD LOGIN.CONF
JOHN THE RIPPER
L0PHTCRACK
GRABBING WINDOWS PASSWORD HASHES
ACTIVE BRUTE-FORCE TOOLS
Chapter 9: Host Hardening
CLAMAV
TITAN
MSEC
Chapter 10: Backdoors and Remote Access Tools
VNC
NETBUS
BACK ORIFICE
SUBSEVEN
LOKI
STCPSHELL
KNARK
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
RATS
Chapter 12: Combination System Auditing Tools
NESSUS
CAIN ABLE
AIDE
TRIPWIRE
Securing Your Files with Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
FREEWARE FIREWALLS
IPFW2
COMMERCIAL FIREWALLS
Chapter 14: Network Reconnaissance Tools
HOST, DIG, AND NSLOOKUP
PING
FPING
TRACEROUTE
HPING
Chapter 15: Port Redirection
DATAPIPE
FPIPE
WINRELAY
Chapter 16: Sniffers
SNIFFERS OVERVIEW
BUTTSNIFFER
TCPDUMP AND WINDUMP
ETHEREAL
DSNIFF
ETTERCAP
SNORT: AN INTRUSION-DETECTION SYSTEM
Chapter 17: Wireless Tools
NETSTUMBLER
AIROPEEK
WELLENREITER
KISMET
Chapter 18: War Dialers
TONELOC
THC-SCAN
SHOKDIAL
BEYOND THE CONNECT STRING
Chapter 19: TCPIP Stack Tools
IPTEST
NEMESIS: PACKET-WEAVING 101
BEYOND THE COMMAND LINE
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
TRINUX
WINDOWS LIVE RESPONSE TOOL KIT
UNIX LIVE RESPONSE TOOL KIT
Chapter 21: Commercial Forensic Image Tool Kits
ENCASE
FORMAT: CREATING A TRUSTED BOOT DISK
PDBLOCK: WRITE BLOCKING YOUR SOURCE DRIVES
SAFEBACK
SNAPBACK
FTK IMAGER
GHOST
SMART
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A FORENSIC DUPLICATION TOOL
SPLIT: BREAKING UP IMAGES ON THE FLY
DD: A HARD DRIVE CLEANSING TOOL
LOSETUP: TRANSFORMING A REGULAR FILE INTO A DEVICE ON LINUX
THE ENHANCED LINUX LOOPBACK DEVICE
VNODE: TRANSFORMING A REGULAR FILE INTO A DEVICE ON FREEBSD
MD5SUM AND MD5: VALIDATING THE EVIDENCE COLLECTED
Chapter 23: Tool Kits to Aid in Forensic Analysis
ENCASE
THE CORONER S TOOLKIT
Chapter 24: Tools to Aid in Internet Activity Reconstruction
CLIENT- AND WEB-BASED E-MAIL
OUTLOOK
READPST AND READDBX
PARABEN S E-MAIL EXAMINER
UNIX MAILBOXES
GUIDANCE SOFTWARE S ENCASE FORENSIC EDITION
ACCESSDATA S FTK
SEARCHING FOR INTERNET HISTORY
NETANALYSIS
IE HISTORY
X-WAYS TRACE
WEB HISTORIAN
Chapter 25: Generalized Editors and Viewers
THE FILE COMMAND
HEXDUMP
HEXEDIT
VI
FRHED
WINHEX
QUICK VIEW PLUS
MIDNIGHT COMMANDER
Chapter 26: Reverse Engineering Binaries
THE ANATOMY OF A COMPUTER PROGRAM
BLACK BOX ANALYSIS
GETTING YOUR HANDS DIRTY: WORKING WITH THE CODE
JAVA PROGRAMS
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII TABLE
Appendix B: Command-line Reference
TEXT FILE MANIPULATION
ARCHIVE FILE MANIPULATION
MISCELLANEOUS
How to Use the CD
List of Figures
List of Tables
List of Sidebars
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Java for RPG Programmers, 2nd Edition
Structured Operations And Statements
String Manipulation
An Object Orientation
Threads
Database Access
The Java Tutorial: A Short Course on the Basics, 4th Edition
Code Samples
Advantages of Exceptions
Visual Index to Swing Components
Appendix B. Internet-Ready Applets
The APPLET Tag
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 336 Power and Control Tray Cable Type TC
Article 348 Flexible Metal Conduit Type FMC
Article 384 Strut-Type Channel Raceway
Article 702 Optional Standby Systems
Example D3(a) Industrial Feeders in a Common Raceway
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Answers and Explanations
Project PlanningFacilitating Processes
Exam Prep Questions
Answers and Explanations
Quantitative Methods in Project Management
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Quantitative Time Management
Comparing, Designing, and Deploying VPNs
Summary
Scaling and Optimizing IPsec VPNs
Ensuring High Availability in an IPsec VPN
Designing and Deploying IPsec Remote Access and Teleworker VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies