Anti-Hacker Tool Kit, Fourth Edition

Anti-Hacker Tool Kit, Fourth Edition

by Mike Shema

NOOK Book(eBook)

$29.49 $50.00 Save 41% Current price is $29.49, Original price is $50. You Save 41%.

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Overview

Defend against today’s most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You’ll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.

Demonstrates how to configure and use these and other essential tools:


  • Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options
  • Vulnerability scanners: OpenVAS, Metasploit
  • File system monitors: AIDE, Samhain, Tripwire
  • Windows auditing tools: Nbtstat, Cain, MBSA, PsTools
  • Command-line networking tools: Netcat, Cryptcat, Ncat, Socat
  • Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay
  • Port scanners: Nmap, THC-Amap
  • Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort
  • Network defenses: firewalls, packet filters, and intrusion detection systems
  • War dialers: ToneLoc, THC-Scan, WarVOX
  • Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap
  • Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra
  • Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion
  • Privacy Tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

Mike Shema is Director of Engineering for Qualys, a leading computer and network security services firm. Regarded as one of the top Web application security experts in the world today, Shema focuses on assessment and mitigation strategies for all aspects of Web application security. Previously, he was NT OBJECTives, Inc.'s Chief Security Office and Principal Consultant at Foundstone where he performed network penetration tests, Web application security assessments, and wireless network security audits. Shema is the co-author of all three previous editions of The Anti-Hacker Tool Kit and Hacking Exposed Web Applications, Second Edition.

Product Details

ISBN-13: 9780071800167
Publisher: McGraw-Hill Education
Publication date: 02/07/2014
Sold by: Barnes & Noble
Format: NOOK Book
Pages: 624
File size: 89 MB
Note: This product may take a few minutes to download.

About the Author

Mike Shema is Director of Engineering for Qualys, a leading computer and network security services firm. Regarded as one of the top Web application security experts in the world today, Shema focuses on assessment and mitigation strategies for all aspects of Web application security. Previously, he was NT OBJECTives, Inc.'s Chief Security Office and Principal Consultant at Foundstone where he performed network penetration tests, Web application security assessments, and wireless network security audits. Shema is the co-author of all three previous editions of The Anti-Hacker Tool Kit and Hacking Exposed Web Applications, Second Edition.

Table of Contents

Part 1 Multifunctional Tools
1Netcat & Cryptcat
2Windows
3VMs & Emulators

Part 2 Tools for Auditing & Defending Hosts
4Port Scanners
5Unix Enumeration
6Windows Tools
7Web Hacking
8Password & Brute Force
9Host Hardening
10Backdoors & Remote Acess
11Simple Source Auditing Tools
12Combination Systems Auditing

Part 3 Tools for Auditing & Defending Your Network
13Firewalls
14Network Reconnaissance
15Port Redirects
16Sniffers
17Wireless Tools
18War Dialers
19TCP/IP Stacks

Part 4 Tools for Computer Forensics & Incident Response
20Creating a Bootable Environment
21Commercial Forensic Imaging
22Open-Source Forensic Duping
23Analysis Toolkits
24Internet Activity Reconstruction
25Editors and Viewers

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews