
Anti-Hacker Tool Kit
Keith J. Jones, Mike Shema, Bradley C. Johnson
Résumé
This book continues the best-selling tradition of Hacking ExposedTM -- only by learning the tools and techniques of malicious hackers can you truly reduce security risk. Arm yourself today with the Anti-Hacker Tool Kit. -- Joel Scambray, Co-author of Hacking Exposed, Hacking Exposed Windows 2000, and Hacking Exposed Web Applications
Hackers beware!
Stay one step ahead of even the most cunning hackers with help from this invaluable resource. Through proper use and configuration of key security tools, youll be able to investigate and resolve existing problems within your network infrastructure with precision and a minimum of fuss. Written by experienced security professionals, this resource provides you with comprehensive coverage of the most important and up-to-date security tools in use today, explains their function, and shows you how to use each tool effectively through in-depth implementation examples and case studies. Learn to detect and prevent system misconfigurations and Web server hacks plus, discover best practices for protecting both large and small networks. Organized by category and filled with detailed explanations and proven advice, this book is critical for everyone concerned with network security.
Includes best practices for use and configuration of these key tools:
- Port scanners--Nmap, NetScan, SuperScan, IpEye
- Enumeration tools--Enum, PSTools, and User2SID
- BackDoors--NetBus, Back Orifice, and SubSeven
- Password crackers--Pwltool, SMBGrind, Jack the Ripper, and LSADump2
- Sniffers--Snort, BUTTSniffer, WinDump, and Dsniff
- System Audit tools --Nessus, STAT, ISS Internet Scanner
- Denial of Service tools--Tribe Flood network, Shaft, and Mstreams
- WardialersTHC-scan and ToneLoc
- Incident response and forensic tools--TCT, EnCase, FTK, and other file viewers
- Miscellaneous and multi-purpose tools-- Netcat, Getadmin, Fpipe, Fport, VMWare, and many more
Contents
- PART I: Overview
- Ch. 1: Necessary Basics
- Ch. 2: Commercial Tools Overview
- Ch. 3: Buffer Overflows
- Ch. 4: Basic Open Source/System Tools
- PART II: Key Security Tools
- Ch. 5: Port Scanners
- Ch. 6: Enumeration Tools
- Ch. 7: BackDoors and Remote Controlling Tools
- Ch. 8: Password Cracking/Brute Force Tools
- Ch. 9: Sniffers
- Ch. 10: Denial of Service Tools
- Ch. 11: Wireless Tools
- Ch. 12: Wardialers
- Ch. 13: Web Hacking Tools
- Ch. 14: Data Redirection
- Ch. 15: Multi-purpose Tools
- Ch. 16: Investigative Tools
- PART III: Recipes of Tools in Different Environments
- Ch. 17: Investigations
- Ch. 18: Small or Medium Sized Networks
- Ch. 19: Large or Enterprise Networks
- Ch. 20: Case Study: Web Server Intrusions
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Keith J. Jones, Mike Shema, Bradley C. Johnson |
Parution | 16/07/2002 |
Nb. de pages | 712 |
Format | 18,5 x 23 |
Couverture | Broché |
Poids | 1510g |
Intérieur | Noir et Blanc |
EAN13 | 9780072222821 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Bureautique Réseaux Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet