Flylib.com
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Table of Contents
BackCover
Anti-Hacker Tool Kit, Second Edition
Introduction
Part I: Multifunctional and Miscellaneous Tools
Chapter 1: Netcat and Cryptcat
Cryptcat
Chapter 2: The X Window System
A ClientServer Model
How Remote X Servers and Clients Communicate
Securing X, Part I: Using xhost and xauth
Securing X, Part II: Tunneling X Traffic Through SSH
The Other Important Players
Now You Know
Chapter 3: Emulators
VMware
Cygwin
Part II: Tools for Auditing and Defending the Hosts
Chapter 4: Port Scanners
Nmap
NetScanTools
SuperScan
IPEye
ScanLine
WUPS
Udp_scan
Chapter 5: Unix Enumeration Tools
Rpcinfo
Showmount
R-Tools
Finger
who, w, and last
Chapter 6: Windows Enumeration Tools
Net Tools
NBTStat
Winfingerprint
GetUserInfo
Enum
PsTools
HFNetChk
Chapter 7: Web Hacking Tools
Vulnerability Scanners
All-Purpose Tools
Application Inspection
Chapter 8: Password Cracking Brute-Force Tools
PassFilt.dll and Windows Password Policies
PAM and Unix Password Policies
OpenBSD login.conf
John the Ripper
L0phtCrack
Grabbing Windows Password Hashes
Active Brute-Force Tools
Chapter 9: Host Hardening
Titan
Msec
Chapter 10: Backdoors and Remote Access Tools
VNC
Netbus
Back Orifice
SubSeven
Loki
Stcpshell
Knark
Chapter 11: Simple Source Auditing Tools
FLAWFINDER
Rats
Chapter 12: Combination System Auditing Tools
Nessus
STAT
Retina
Internet Scanner
Tripwire
Part III: Tools for Auditing and Defending Your Network
Chapter 13: Firewalls
Freeware Firewalls
Commercial Firewalls
Chapter 14: Network Reconnaissance Tools
Host, Dig, and Nslookup
Ping
Fping
Traceroute
Hping
Chapter 15: Port Redirection
Datapipe
FPipe
WinRelay
Chapter 16: Sniffers
Sniffers Overview
BUTTSniffer
Tcpdump and WinDump
Ethereal
Dsniff
Ettercap
Snort: An Intrusion-Detection System
Chapter 17: Wireless Tools
NetStumbler
AiroPeek
Wellenreiter
Kismet
Chapter 18: War Dialers
ToneLoc
THC-Scan
Beyond the CONNECT String
Chapter 19: TCPIP Stack Tools
ISIC: IP Stack Integrity Checker
Iptest
Nemesis: Packet-Weaving 101
Beyond the Command Line
Part IV: Tools for Computer Forensics and Incident Response
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
Trinux
Windows Live Response Tool Kit
Unix Live Response Tool Kit
Chapter 21: Commercial Forensic Duplication Tool Kits
EnCase
Format: Creating a Trusted Boot Disk
PDBLOCK: Write Blocking Your Source Drives
Safeback
SnapBack
Ghost
Chapter 22: Open-Source Forensic Duplication Tool Kits
DD: A Forensic Duplication Tool
DD: A Hard Drive Cleansing Tool
Losetup: Transforming a Regular File into a Device on Linux
The Enhanced Linux Loopback Device
Vnode: Transforming a Regular File into a Device on FreeBSD
Md5sum and md5: Validating the Evidence Collected
Chapter 23: Tool Kits to Aid in Forensic Analysis
The Forensic Toolkit
EnCase
The Coroner s Toolkit
Chapter 24: Tools to Aid in Internet Activity Reconstruction
Outlook Express
Outlook
Netscape NavigatorCommunicator
America Online Client
Unix Mailboxes
Paraben s E-mail Examiner
IE History
X-Ways Trace
Chapter 25: Generalized Editors and Viewers
The file Command
Hexdump
Hexedit
Vi
Frhed
Xvi32
WinHex
Quick View Plus
Midnight Commander
Part V: Appendixes
Appendix A: Useful Charts and Diagrams
ASCII Table
Appendix B: About the CD-ROM
How to Use the CD-ROM
Security Tools on the CD
Links to More Tools
Problems with the CD
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Case Studies
CD Content
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Introduction to IMAQ Vision Builder
Image Acquisition
Line-Scan Cameras
CMOS Image Sensors
Camera Interfaces and Protocols
Visual C# 2005 How to Program (2nd Edition)
Terminology
Mouse-Event Handling
Reading and Deserializing Data from a Sequential-Access Text File
Self-Review Exercises
Stacks
Postfix: The Definitive Guide
The Role of Postfix
Additional Information and How to Obtain Postfix
Important Configuration Considerations
External Databases
C.5. Compiling Add-on Packages
C & Data Structures (Charles River Media Computer Engineering)
Function
Strings
Structures
Problems in Stacks and Queues
Problems in Trees
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 10. Control XMMS with Bluetooth
Hack 17. Choose a Cellular Data Plan
Hack 24. Discover Networks with NetStumbler
Hack 88. Primestar Dish with Biquad Feed
Hack 96. Establish Line of Sight
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #2 Bank One Bigger… Now Better
Phase 1 Readiness Assessment
Phase 2 Engagement (Creating Pull)
Phase 4 Performance and Control
Service Process Challenges
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies