Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Table of Contents
BackCover
Anti-Hacker Tool Kit, Second Edition
Introduction
Part I: Multifunctional and Miscellaneous Tools
Chapter 1: Netcat and Cryptcat
Cryptcat
Chapter 2: The X Window System
A ClientServer Model
How Remote X Servers and Clients Communicate
Securing X, Part I: Using xhost and xauth
Securing X, Part II: Tunneling X Traffic Through SSH
The Other Important Players
Now You Know
Chapter 3: Emulators
VMware
Cygwin
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
Nmap
NetScanTools
SuperScan
IPEye
ScanLine
WUPS
Udp_scan
Chapter 5: Unix Enumeration Tools
Rpcinfo
Showmount
R-Tools
Finger
who, w, and last
Chapter 6: Windows Enumeration Tools
Net Tools
NBTStat
Winfingerprint
GetUserInfo
Enum
PsTools
HFNetChk
Chapter 7: Web Hacking Tools
Vulnerability Scanners
All-Purpose Tools
Application Inspection
Chapter 8: Password Cracking Brute-Force Tools
PassFilt.dll and Windows Password Policies
PAM and Unix Password Policies
OpenBSD login.conf
John the Ripper
L0phtCrack
Grabbing Windows Password Hashes
Active Brute-Force Tools
Chapter 9: Host Hardening
Titan
Msec
Chapter 10: Backdoors and Remote Access Tools
VNC
Netbus
Back Orifice
SubSeven
Loki
Stcpshell
Knark
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
Rats
Chapter 12: Combination System Auditing Tools
Nessus
STAT
Retina
Internet Scanner
Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
Freeware Firewalls
Commercial Firewalls
Chapter 14: Network Reconnaissance Tools
Host, Dig, and Nslookup
Ping
Fping
Traceroute
Hping
Chapter 15: Port Redirection
Datapipe
FPipe
WinRelay
Chapter 16: Sniffers
Sniffers Overview
BUTTSniffer
Tcpdump and WinDump
Ethereal
Dsniff
Ettercap
Snort: An Intrusion-Detection System
Chapter 17: Wireless Tools
NetStumbler
AiroPeek
Wellenreiter
Kismet
Chapter 18: War Dialers
ToneLoc
THC-Scan
Beyond the CONNECT String
Chapter 19: TCPIP Stack Tools
ISIC: IP Stack Integrity Checker
Iptest
Nemesis: Packet-Weaving 101
Beyond the Command Line
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
Trinux
Windows Live Response Tool Kit
Unix Live Response Tool Kit
Chapter 21: Commercial Forensic Duplication Tool Kits
EnCase
Format: Creating a Trusted Boot Disk
PDBLOCK: Write Blocking Your Source Drives
Safeback
SnapBack
Ghost
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A Forensic Duplication Tool
DD: A Hard Drive Cleansing Tool
Losetup: Transforming a Regular File into a Device on Linux
The Enhanced Linux Loopback Device
Vnode: Transforming a Regular File into a Device on FreeBSD
Md5sum and md5: Validating the Evidence Collected
Chapter 23: Tool Kits to Aid in Forensic Analysis
The Forensic Toolkit
EnCase
The Coroner s Toolkit
Chapter 24: Tools to Aid in Internet Activity Reconstruction
Outlook Express
Outlook
Netscape NavigatorCommunicator
America Online Client
Unix Mailboxes
Paraben s E-mail Examiner
IE History
X-Ways Trace
Chapter 25: Generalized Editors and Viewers
The file Command
Hexdump
Hexedit
Vi
Frhed
Xvi32
WinHex
Quick View Plus
Midnight Commander
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII Table
Appendix B: About the CD-ROM
How to Use the CD-ROM
Security Tools on the CD
Links to More Tools
Problems with the CD
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Case Studies
CD Content
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Troubleshooting Basic Cisco IPC Express Features
Conference Failures
Integrating Cisco CME with Cisco Unity Voice Mail
Troubleshooting Transcoding
Appendix C. Cisco Unity Express Database Schema
Network Security Architectures
Applied Knowledge Questions
Components of a Hardening Strategy
High-End Resilient Campus Security Design
University of Insecurity
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 38. Graph Your Wireless Performance
Hack 44. Authenticate Wireless Users
Hack 52. Add an External Antenna
Hack 55. Increase the Range of a PowerBook
Hack 65. Protect Your Bridge with a Firewall
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
When Companies Start Using Lean Six Sigma
Six Things Managers Must Do: How to Support Lean Six Sigma
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Volatility, Durability, and Recoverability
Creating a Fire-Now Trigger
Using Persistent JobStores
Listeners as Extension Points
Creating the RMI Client
Python Standard Library (Nutshell Handbooks) with
The atexit Module
The md5 Module
The xmllib Module
The SocketServer Module
The wave Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies