Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Anti-Hacker Tool Kit, Third Edition
Back Cover
About
Introduction
Part I: Multifunctional Tools
Chapter 1: Netcat and Cryptcat
NETCAT6
CRYPTCAT
SBD
Chapter 2: The X Window System
CHOOSING A WINDOW MANAGER
A CLIENTSERVER MODEL
HOW REMOTE X SERVERS AND CLIENTS COMMUNICATE
SECURING X HOSTS WITH XHOST AND XAUTH
SECURING X COMMUNICATIONS WITH SECURE SHELL
THE OTHER IMPORTANT PLAYERS
NOW YOU KNOW...
Chapter 3: Virtual Machines Emulators
VIRTUAL PC
GNOPPIX
CYGWIN
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
NMAP
THC-AMAP
IPEYE
WUPS
SCANLINE
Chapter 5: Unix Enumeration Tools
FINGER
RPCINFO
SHOWMOUNT
R-TOOLS
WHO, W, AND LAST
Chapter 6: Windows Enumeration Tools
NET TOOLS
NBTSTAT
WINFINGERPRINT
GETUSERINFO
ENUM
PSTOOLS
MBSA VERSION 2
Chapter 7: Web Hacking Tools
VULNERABILITY SCANNERS
ALL-PURPOSE TOOLS
APPLICATION INSPECTION
Chapter 8: Password Cracking Brute-Force Tools
PAM AND UNIX PASSWORD POLICIES
OPENBSD LOGIN.CONF
JOHN THE RIPPER
L0PHTCRACK
GRABBING WINDOWS PASSWORD HASHES
ACTIVE BRUTE-FORCE TOOLS
Chapter 9: Host Hardening
CLAMAV
TITAN
MSEC
Chapter 10: Backdoors and Remote Access Tools
VNC
NETBUS
BACK ORIFICE
SUBSEVEN
LOKI
STCPSHELL
KNARK
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
RATS
Chapter 12: Combination System Auditing Tools
NESSUS
CAIN ABLE
AIDE
TRIPWIRE
Securing Your Files with Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
FREEWARE FIREWALLS
IPFW2
COMMERCIAL FIREWALLS
Chapter 14: Network Reconnaissance Tools
HOST, DIG, AND NSLOOKUP
PING
FPING
TRACEROUTE
HPING
Chapter 15: Port Redirection
DATAPIPE
FPIPE
WINRELAY
Chapter 16: Sniffers
SNIFFERS OVERVIEW
BUTTSNIFFER
TCPDUMP AND WINDUMP
ETHEREAL
DSNIFF
ETTERCAP
SNORT: AN INTRUSION-DETECTION SYSTEM
Chapter 17: Wireless Tools
NETSTUMBLER
AIROPEEK
WELLENREITER
KISMET
Chapter 18: War Dialers
TONELOC
THC-SCAN
SHOKDIAL
BEYOND THE CONNECT STRING
Chapter 19: TCPIP Stack Tools
IPTEST
NEMESIS: PACKET-WEAVING 101
BEYOND THE COMMAND LINE
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
TRINUX
WINDOWS LIVE RESPONSE TOOL KIT
UNIX LIVE RESPONSE TOOL KIT
Chapter 21: Commercial Forensic Image Tool Kits
ENCASE
FORMAT: CREATING A TRUSTED BOOT DISK
PDBLOCK: WRITE BLOCKING YOUR SOURCE DRIVES
SAFEBACK
SNAPBACK
FTK IMAGER
GHOST
SMART
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A FORENSIC DUPLICATION TOOL
SPLIT: BREAKING UP IMAGES ON THE FLY
DD: A HARD DRIVE CLEANSING TOOL
LOSETUP: TRANSFORMING A REGULAR FILE INTO A DEVICE ON LINUX
THE ENHANCED LINUX LOOPBACK DEVICE
VNODE: TRANSFORMING A REGULAR FILE INTO A DEVICE ON FREEBSD
MD5SUM AND MD5: VALIDATING THE EVIDENCE COLLECTED
Chapter 23: Tool Kits to Aid in Forensic Analysis
ENCASE
THE CORONER S TOOLKIT
Chapter 24: Tools to Aid in Internet Activity Reconstruction
CLIENT- AND WEB-BASED E-MAIL
OUTLOOK
READPST AND READDBX
PARABEN S E-MAIL EXAMINER
UNIX MAILBOXES
GUIDANCE SOFTWARE S ENCASE FORENSIC EDITION
ACCESSDATA S FTK
SEARCHING FOR INTERNET HISTORY
NETANALYSIS
IE HISTORY
X-WAYS TRACE
WEB HISTORIAN
Chapter 25: Generalized Editors and Viewers
THE FILE COMMAND
HEXDUMP
HEXEDIT
VI
FRHED
WINHEX
QUICK VIEW PLUS
MIDNIGHT COMMANDER
Chapter 26: Reverse Engineering Binaries
THE ANATOMY OF A COMPUTER PROGRAM
BLACK BOX ANALYSIS
GETTING YOUR HANDS DIRTY: WORKING WITH THE CODE
JAVA PROGRAMS
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII TABLE
Appendix B: Command-line Reference
TEXT FILE MANIPULATION
ARCHIVE FILE MANIPULATION
MISCELLANEOUS
How to Use the CD
List of Figures
List of Tables
List of Sidebars
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Adobe After Effects 7.0 Studio Techniques
The Timeline
Film, HDR, and 32 Bit Compositing
Creating a Look with Color
Climate: Air, Water, Smoke, Clouds
Sci-Fi Weaponry
Visual C# 2005 How to Program (2nd Edition)
Summary
Introduction
Web Resources
Exercises
J.1. ATM Case Study Implementation
Competency-Based Human Resource Management
A Need for Implementing Competency-Based HR Management
Competency-Based Employee Rewards
Competency-Based Employee Development
The Transformation to Competency-Based HR Management
Competency-Based HR Management The Next Steps
802.11 Wireless Networks: The Definitive Guide, Second Edition
Frame Processing and Bridging
Control Frames
Selecting Access Points
Using Antennas to Tailor Coverage
Network Analyzers
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Programming .Net Windows Applications
Web Applications Versus Windows Applications
Modal Versus Modeless
Tabbed Pages
Up-Down Controls
Creating a DataGrid
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies