Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Table of Contents
BackCover
Anti-Hacker Tool Kit, Second Edition
Introduction
Part I: Multifunctional and Miscellaneous Tools
Chapter 1: Netcat and Cryptcat
Cryptcat
Chapter 2: The X Window System
A ClientServer Model
How Remote X Servers and Clients Communicate
Securing X, Part I: Using xhost and xauth
Securing X, Part II: Tunneling X Traffic Through SSH
The Other Important Players
Now You Know
Chapter 3: Emulators
VMware
Cygwin
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
Nmap
NetScanTools
SuperScan
IPEye
ScanLine
WUPS
Udp_scan
Chapter 5: Unix Enumeration Tools
Rpcinfo
Showmount
R-Tools
Finger
who, w, and last
Chapter 6: Windows Enumeration Tools
Net Tools
NBTStat
Winfingerprint
GetUserInfo
Enum
PsTools
HFNetChk
Chapter 7: Web Hacking Tools
Vulnerability Scanners
All-Purpose Tools
Application Inspection
Chapter 8: Password Cracking Brute-Force Tools
PassFilt.dll and Windows Password Policies
PAM and Unix Password Policies
OpenBSD login.conf
John the Ripper
L0phtCrack
Grabbing Windows Password Hashes
Active Brute-Force Tools
Chapter 9: Host Hardening
Titan
Msec
Chapter 10: Backdoors and Remote Access Tools
VNC
Netbus
Back Orifice
SubSeven
Loki
Stcpshell
Knark
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
Rats
Chapter 12: Combination System Auditing Tools
Nessus
STAT
Retina
Internet Scanner
Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
Freeware Firewalls
Commercial Firewalls
Chapter 14: Network Reconnaissance Tools
Host, Dig, and Nslookup
Ping
Fping
Traceroute
Hping
Chapter 15: Port Redirection
Datapipe
FPipe
WinRelay
Chapter 16: Sniffers
Sniffers Overview
BUTTSniffer
Tcpdump and WinDump
Ethereal
Dsniff
Ettercap
Snort: An Intrusion-Detection System
Chapter 17: Wireless Tools
NetStumbler
AiroPeek
Wellenreiter
Kismet
Chapter 18: War Dialers
ToneLoc
THC-Scan
Beyond the CONNECT String
Chapter 19: TCPIP Stack Tools
ISIC: IP Stack Integrity Checker
Iptest
Nemesis: Packet-Weaving 101
Beyond the Command Line
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
Trinux
Windows Live Response Tool Kit
Unix Live Response Tool Kit
Chapter 21: Commercial Forensic Duplication Tool Kits
EnCase
Format: Creating a Trusted Boot Disk
PDBLOCK: Write Blocking Your Source Drives
Safeback
SnapBack
Ghost
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A Forensic Duplication Tool
DD: A Hard Drive Cleansing Tool
Losetup: Transforming a Regular File into a Device on Linux
The Enhanced Linux Loopback Device
Vnode: Transforming a Regular File into a Device on FreeBSD
Md5sum and md5: Validating the Evidence Collected
Chapter 23: Tool Kits to Aid in Forensic Analysis
The Forensic Toolkit
EnCase
The Coroner s Toolkit
Chapter 24: Tools to Aid in Internet Activity Reconstruction
Outlook Express
Outlook
Netscape NavigatorCommunicator
America Online Client
Unix Mailboxes
Paraben s E-mail Examiner
IE History
X-Ways Trace
Chapter 25: Generalized Editors and Viewers
The file Command
Hexdump
Hexedit
Vi
Frhed
Xvi32
WinHex
Quick View Plus
Midnight Commander
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII Table
Appendix B: About the CD-ROM
How to Use the CD-ROM
Security Tools on the CD
Links to More Tools
Problems with the CD
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Case Studies
CD Content
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Cryptography
Application Security
Legal, Regulations, Compliance, and Investigations
Physical (Environmental) Security
Visual C# 2005 How to Program (2nd Edition)
Summary
Relationship between Base Classes and Derived Classes
Terminology
Terminology
Terminology
The Java Tutorial: A Short Course on the Basics, 4th Edition
Creating Classes
Example Four: LunarPhases
Appendix D. Deprecated Thread Methods
Appendix E. Reference
Java Programming Language Keywords
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Working with Application Menus
What Is Formula Language?
Links to developerWorks
Formula Language Enhancements
Miscellaneous Enhancements
Mastering Delphi 7
Building the User Interface
Delphis Database Architecture
Writing Database Components
Delphi for .NET Preview: The Language and the RTL
Appendix C Free Companion Books on Delphi
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies