Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Table of Contents
BackCover
Anti-Hacker Tool Kit, Second Edition
Introduction
Part I: Multifunctional and Miscellaneous Tools
Chapter 1: Netcat and Cryptcat
Cryptcat
Chapter 2: The X Window System
A ClientServer Model
How Remote X Servers and Clients Communicate
Securing X, Part I: Using xhost and xauth
Securing X, Part II: Tunneling X Traffic Through SSH
The Other Important Players
Now You Know
Chapter 3: Emulators
VMware
Cygwin
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
Nmap
NetScanTools
SuperScan
IPEye
ScanLine
WUPS
Udp_scan
Chapter 5: Unix Enumeration Tools
Rpcinfo
Showmount
R-Tools
Finger
who, w, and last
Chapter 6: Windows Enumeration Tools
Net Tools
NBTStat
Winfingerprint
GetUserInfo
Enum
PsTools
HFNetChk
Chapter 7: Web Hacking Tools
Vulnerability Scanners
All-Purpose Tools
Application Inspection
Chapter 8: Password Cracking Brute-Force Tools
PassFilt.dll and Windows Password Policies
PAM and Unix Password Policies
OpenBSD login.conf
John the Ripper
L0phtCrack
Grabbing Windows Password Hashes
Active Brute-Force Tools
Chapter 9: Host Hardening
Titan
Msec
Chapter 10: Backdoors and Remote Access Tools
VNC
Netbus
Back Orifice
SubSeven
Loki
Stcpshell
Knark
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
Rats
Chapter 12: Combination System Auditing Tools
Nessus
STAT
Retina
Internet Scanner
Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
Freeware Firewalls
Commercial Firewalls
Chapter 14: Network Reconnaissance Tools
Host, Dig, and Nslookup
Ping
Fping
Traceroute
Hping
Chapter 15: Port Redirection
Datapipe
FPipe
WinRelay
Chapter 16: Sniffers
Sniffers Overview
BUTTSniffer
Tcpdump and WinDump
Ethereal
Dsniff
Ettercap
Snort: An Intrusion-Detection System
Chapter 17: Wireless Tools
NetStumbler
AiroPeek
Wellenreiter
Kismet
Chapter 18: War Dialers
ToneLoc
THC-Scan
Beyond the CONNECT String
Chapter 19: TCPIP Stack Tools
ISIC: IP Stack Integrity Checker
Iptest
Nemesis: Packet-Weaving 101
Beyond the Command Line
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
Trinux
Windows Live Response Tool Kit
Unix Live Response Tool Kit
Chapter 21: Commercial Forensic Duplication Tool Kits
EnCase
Format: Creating a Trusted Boot Disk
PDBLOCK: Write Blocking Your Source Drives
Safeback
SnapBack
Ghost
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A Forensic Duplication Tool
DD: A Hard Drive Cleansing Tool
Losetup: Transforming a Regular File into a Device on Linux
The Enhanced Linux Loopback Device
Vnode: Transforming a Regular File into a Device on FreeBSD
Md5sum and md5: Validating the Evidence Collected
Chapter 23: Tool Kits to Aid in Forensic Analysis
The Forensic Toolkit
EnCase
The Coroner s Toolkit
Chapter 24: Tools to Aid in Internet Activity Reconstruction
Outlook Express
Outlook
Netscape NavigatorCommunicator
America Online Client
Unix Mailboxes
Paraben s E-mail Examiner
IE History
X-Ways Trace
Chapter 25: Generalized Editors and Viewers
The file Command
Hexdump
Hexedit
Vi
Frhed
Xvi32
WinHex
Quick View Plus
Midnight Commander
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII Table
Appendix B: About the CD-ROM
How to Use the CD-ROM
Security Tools on the CD
Links to More Tools
Problems with the CD
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Case Studies
CD Content
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Competency-Based Human Resource Management
Competency-Based Employee Recruitment and Selection
Competency-Based Performance Management
Competency-Based Employee Rewards
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix C Examples of Life-Career Assessment Exercises
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Objectives of this book
Part I: SOA and Web Services Fundamentals
Common tangible benefits of SOA
Anatomy of a service-oriented architecture
A.3. The Oasis Car Wash
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 39. Track Your Every Move with Google Earth
Hacks 4250: Introduction
Hack 50. Geoblog with Google Maps in Thingster
Hack 52. Put a Map and HTML into Your Info Windows
Hack 70. Will the Kids Barf? (and Other Cool Ways to Use Google Maps)
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
LAN Interconnection and Internetworking
The Optical Edge
Broadband Access Alternatives
5G: Intelligent Technologies
The Handset Revolution
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Risk-Adjusted Financial Management
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies