Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security ToolkitThe much-anticipated second edition of the bestselling book that details network security through the hacker's eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you'll discover: * The hacker's perspective on security holes in UNIX, Linux, and Windows networks * Over 170 new vulnerabilities and exploits * Advanced discovery techniques * A crash course in C for compiling hacker tools and vulnerability scanners * The top seventy-five hack attacks for UNIX and Windows * Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more * TigerSuite Professional 3.5 (full suite single license) |
Contents
Part One Technology | 1 |
Novell IPX SPX and NetBIOS Technology | 39 |
Understanding Communication Mediums | 57 |
Copyright | |
33 other sections not shown
Other editions - View all
Common terms and phrases
administrative Affected Systems autoexec.bat backdoor Breach Detection buffer overflow buffer overflow condition buffer overflow vulnerability bytes Chapter Cisco client Code Red Code Red worm command configuration connection Countermeasure datagram default delete denial of service Denial-of-Service Attack devices domain name execute arbitrary code exploit firewall gateway Hack Attack hacker header host hostname HTTP/1.0 & vbCrLf ICMP inetd infected interface Internet Intruder's Strategy IP address Linux login machine Microsoft Windows Multiple vulnerabilities NetBIOS NetWare nmap node operating system options packet password PING protocol proxy query reboot Registry remote attacker request router Scanner sendmail server server.login SMTP sniffer SNMP Solaris specific spoofing subnet system compromise Systems running target TCP port telnet TigerSuite Trojan Unauthorized access UNIX vbCrLf & vbCrLf vulnerabilities exist Windows NT worm x-terminal.shell