Anti-hacker Tool Kit
Put an end to hacking. Stop hackers in their tracks using the tools and techniques described in this unique resource. Organized by category, Anti-Hacker Toolkit provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. New and updated case studies in each chapter illustrate how to implement each tool in real-world situations. Protect your network and prevent disasters using the cutting-edge security tools and exclusive information in this completely up-to-date volume. Explains how to configure and use these and other key tools: Port scanners: Nmap, SuperScan, IpEye, Scanline; Enumeration tools: smbclient, nbtstat, Winfingerprint; Web vulnerability scanners: Nikto, WebSleuth, Paros, wget; Password crackers: PAM, John the Ripper, L0phtCrack; Backdoors: VNC, Sub7, Loki, Knark; System auditing tools: Nessus, Retina, STAT, Tripwire; Packet filters and firewalls: IPFW, Netfilter/Iptables, Cisco PIX; Sniffers: snort, BUTTSniffer, TCPDump/WinDump, Ethereal; Wireless tools: NetStumbler, Wellenreiter, kismet; War dialers: ToneLoc, THC-Scan; Incident response tools: auditpol, Loggedon, NTLast; Forensics tools: EnCase, Safeback, Ghost, md5sum, FTK; Miscellaneous tools: Netcat, Fpipe, Fport, Cygwin, and many more.
84 pages matching option in this book
Results 1-3 of 84
What people are saying - Write a review
We haven't found any reviews in the usual places.
Multifunctional and Miscellaneous Tools
Choosing a Window Manager 28
27 other sections not shown
Other editions - View all
administrator allow application attacker binary buffer overflow bytes chain chapter client command-line configuration connection create Cygwin database default destination device disk display e-mail encryption ethl example executed Figure firewall flag following command FreeBSD hacker hard drive hash header host hostname hping ICMP Implementation inetd installed interface Internet Scanner IP address ipchains IPFW iptables kernel Linux LISTENING TCP login mode N/A VICTIM2K Nessus NetBIOS Netbus Netcat nmap NTFS OpenSSL operating system option output packet filter password Ping policy file port 80 port scan protocol proxy registry remote root rule script server source port specify sport=0 flags=RA STAT stunnel target TCP port tcpdump telnet tool traffic Trinux Tripwire Unix unkwn-in username victim machine vulnerability web server whois Windows workstation