Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security ToolkitThe much-anticipated second edition of the bestselling book that details network security through the hacker's eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you'll discover: * The hacker's perspective on security holes in UNIX, Linux, and Windows networks * Over 170 new vulnerabilities and exploits * Advanced discovery techniques * A crash course in C for compiling hacker tools and vulnerability scanners * The top seventy-five hack attacks for UNIX and Windows * Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more * TigerSuite Professional 3.5 (full suite single license) |
Contents
Part One Technology | 1 |
Novell IPX SPX and NetBIOS Technology | 39 |
Understanding Communication Mediums | 57 |
Copyright | |
42 other sections not shown
Other editions - View all
Common terms and phrases
allow arbitrary code autoexec.bat backdoor bits Breach Detection buffer overflow bytes Cisco client command configuration connection cracker daemon datagram default Defined in RFC denial of service Denial-of-Service Attack destination devices display domain name echo error Ethernet exploit firewall frame function Hack Attack hacker header host HTTP/1.0 & vbCrLf ICMP interface Internet Intruder's Strategy IP address layer Linux login MAC address Microsoft Microsoft Windows module NetBIOS nmap node operating system options packet password PING pointer POP3 Protocol query Registry remote attacker request root access router routing running scan Scanner sendmail server server.login SMTP sniffer SNMP specific spoofing station string subnet switch Synopsis target telnet TigerSuite Token Ring transmission Trojan Type UNIX unsigned char vbCrLf & vbCrLf VLAN void vulnerability whois Windows worm x-terminal.shell