Read more
Informationen zum Autor Mike Shema is the CSO of NT Objectives and has made web application security presentations at numerous security conferences. He has conducted security reviews for a wide variety of web technologies and developed training material for application security courses. He is also a co-author of Anti-Hacker Toolkit. Klappentext Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit , Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustratedby code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source optionsVulnerability scanners: OpenVAS, MetasploitFile system monitors: AIDE, Samhain, TripwireWindows auditing tools: Nbtstat, Cain, MBSA, PsToolsCommand-line networking tools: Netcat, Cryptcat, Ncat, SocatPort forwarders and redirectors: SSH, Datapipe, FPipe, WinRelayPort scanners: Nmap, THC-AmapNetwork sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snortNetwork defenses: firewalls, packet filters, and intrusion detection systemsWar dialers: ToneLoc, THC-Scan, WarVOXWeb application hacking utilities: Nikto, HTTP utilities, ZAP, SqlmapPassword cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-HydraForensic utilities: dd, Sleuth Kit, Autopsy, Security OnionPrivacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR Zusammenfassung Featuring complete details on an unparalleled number of hacking exploits, this bestselling computer security book is fully updated to cover the latest attack types—and how to proactively defend against them. Inhaltsverzeichnis Part 1 Multifunctional Tools 1Netcat & Cryptcat 2Windows 3VMs & Emulators Part 2 Tools for Auditing & Defending Hosts 4Port Scanners 5Unix Enumeration 6Windows Tools 7Web Hacking 8Password & Brute Force 9Host Hardening 10Backdoors & Remote Acess 11Simple Source Auditing Tools 12Combination Systems Auditing Part 3 Tools for Auditing & Defending Your Network 13Firewalls 14Network Reconnaissance 15Port Redirects 16Sniffers 17Wireless Tools 18War Dialers 19TCP/IP Stacks Part 4 Tools for Computer Forensics & Incident Response 20Creating a Bootable Environment 21Commercial Forensic Imaging 22Open-Source Forensic Duping 23Analysis Toolkits 24Internet Activity Reconstruction 25Editors and Viewers ...