Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Anti-Hacker Tool Kit, Third Edition
Back Cover
About
Introduction
Part I: Multifunctional Tools
Chapter 1: Netcat and Cryptcat
NETCAT6
CRYPTCAT
SBD
Chapter 2: The X Window System
CHOOSING A WINDOW MANAGER
A CLIENTSERVER MODEL
HOW REMOTE X SERVERS AND CLIENTS COMMUNICATE
SECURING X HOSTS WITH XHOST AND XAUTH
SECURING X COMMUNICATIONS WITH SECURE SHELL
THE OTHER IMPORTANT PLAYERS
NOW YOU KNOW...
Chapter 3: Virtual Machines Emulators
VIRTUAL PC
GNOPPIX
CYGWIN
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
NMAP
THC-AMAP
IPEYE
WUPS
SCANLINE
Chapter 5: Unix Enumeration Tools
FINGER
RPCINFO
SHOWMOUNT
R-TOOLS
WHO, W, AND LAST
Chapter 6: Windows Enumeration Tools
NET TOOLS
NBTSTAT
WINFINGERPRINT
GETUSERINFO
ENUM
PSTOOLS
MBSA VERSION 2
Chapter 7: Web Hacking Tools
VULNERABILITY SCANNERS
ALL-PURPOSE TOOLS
APPLICATION INSPECTION
Chapter 8: Password Cracking Brute-Force Tools
PAM AND UNIX PASSWORD POLICIES
OPENBSD LOGIN.CONF
JOHN THE RIPPER
L0PHTCRACK
GRABBING WINDOWS PASSWORD HASHES
ACTIVE BRUTE-FORCE TOOLS
Chapter 9: Host Hardening
CLAMAV
TITAN
MSEC
Chapter 10: Backdoors and Remote Access Tools
VNC
NETBUS
BACK ORIFICE
SUBSEVEN
LOKI
STCPSHELL
KNARK
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
RATS
Chapter 12: Combination System Auditing Tools
NESSUS
CAIN ABLE
AIDE
TRIPWIRE
Securing Your Files with Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
FREEWARE FIREWALLS
IPFW2
COMMERCIAL FIREWALLS
Chapter 14: Network Reconnaissance Tools
HOST, DIG, AND NSLOOKUP
PING
FPING
TRACEROUTE
HPING
Chapter 15: Port Redirection
DATAPIPE
FPIPE
WINRELAY
Chapter 16: Sniffers
SNIFFERS OVERVIEW
BUTTSNIFFER
TCPDUMP AND WINDUMP
ETHEREAL
DSNIFF
ETTERCAP
SNORT: AN INTRUSION-DETECTION SYSTEM
Chapter 17: Wireless Tools
NETSTUMBLER
AIROPEEK
WELLENREITER
KISMET
Chapter 18: War Dialers
TONELOC
THC-SCAN
SHOKDIAL
BEYOND THE CONNECT STRING
Chapter 19: TCPIP Stack Tools
IPTEST
NEMESIS: PACKET-WEAVING 101
BEYOND THE COMMAND LINE
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
TRINUX
WINDOWS LIVE RESPONSE TOOL KIT
UNIX LIVE RESPONSE TOOL KIT
Chapter 21: Commercial Forensic Image Tool Kits
ENCASE
FORMAT: CREATING A TRUSTED BOOT DISK
PDBLOCK: WRITE BLOCKING YOUR SOURCE DRIVES
SAFEBACK
SNAPBACK
FTK IMAGER
GHOST
SMART
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A FORENSIC DUPLICATION TOOL
SPLIT: BREAKING UP IMAGES ON THE FLY
DD: A HARD DRIVE CLEANSING TOOL
LOSETUP: TRANSFORMING A REGULAR FILE INTO A DEVICE ON LINUX
THE ENHANCED LINUX LOOPBACK DEVICE
VNODE: TRANSFORMING A REGULAR FILE INTO A DEVICE ON FREEBSD
MD5SUM AND MD5: VALIDATING THE EVIDENCE COLLECTED
Chapter 23: Tool Kits to Aid in Forensic Analysis
ENCASE
THE CORONER S TOOLKIT
Chapter 24: Tools to Aid in Internet Activity Reconstruction
CLIENT- AND WEB-BASED E-MAIL
OUTLOOK
READPST AND READDBX
PARABEN S E-MAIL EXAMINER
UNIX MAILBOXES
GUIDANCE SOFTWARE S ENCASE FORENSIC EDITION
ACCESSDATA S FTK
SEARCHING FOR INTERNET HISTORY
NETANALYSIS
IE HISTORY
X-WAYS TRACE
WEB HISTORIAN
Chapter 25: Generalized Editors and Viewers
THE FILE COMMAND
HEXDUMP
HEXEDIT
VI
FRHED
WINHEX
QUICK VIEW PLUS
MIDNIGHT COMMANDER
Chapter 26: Reverse Engineering Binaries
THE ANATOMY OF A COMPUTER PROGRAM
BLACK BOX ANALYSIS
GETTING YOUR HANDS DIRTY: WORKING WITH THE CODE
JAVA PROGRAMS
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII TABLE
Appendix B: Command-line Reference
TEXT FILE MANIPULATION
ARCHIVE FILE MANIPULATION
MISCELLANEOUS
How to Use the CD
List of Figures
List of Tables
List of Sidebars
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
New Design Element Features
Working in the Application Design Environment
Using the HTML Editor
Defining the Elements of a View
Real-World JavaScript Examples
Image Processing with LabVIEW and IMAQ Vision
Other Image Sources
Image Distribution
Morphology Functions
Reading Instrument Displays
Character Recognition
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Four Precall Planning and Research
Chapter Eight Creating Visions Biased to Your Solution
Chapter Twelve Controlling the Buying Process
Chapter Fourteen Getting Started with the Process
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Client and Browser Selector
An Introduction to Formula Language
Keywords
Elements of a Project Schedule
Data Management
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
Conditional Logic
Handling Script Errors
Using the Windows Registry to Configure Script Settings
Combining Different Scripting Languages
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies