From Book News, Inc.
Explains how to use 100 plus software tools for auditing systems on a network, auditing a network, and investigating incidents. The authors also overview some of the most common hacking programs used in attacks, and how to detect them on a system. Topics include port scanners, vulnerability scanners, password crackers, and war dialers. Among the specific products described are Netcat, Nessus, Tripwire, John the Ripper, and the Forensic Toolkit. The CD-ROM contains demonstration and open source security tools.Book News, Inc.®, Portland, OR
Anti-Hacker Tool Kit FROM THE PUBLISHER
Stop hackers in their tracks using the tools and techniques described in this unique resource. Organized by category, Anti-Hacker Tool Kit provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. New and updated case studies illustrate how to implement each tool in real-world situations. Protect your network and prevent disasters using the cutting-edge security tools and exclusive information in this completely up-to-date volume.
SYNOPSIS
ᄑUsing these tools yourself during an audit will help you find the weaknesses in your systems. This is an excellent reference bookone I plan to keep handy.ᄑ Simple Nomad, Noted security expert and author of The Hack FAQ and Pandora
Put an End to Hacking. Stop hackers in their tracks using the tools and techniques described in this unique resource. Organized by category, Anti-Hacker Toolkit provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. New and updated case studies in each chapter illustrate how to implement each tool in real-world situations. Protect your network and prevent disasters using the cutting-edge security tools and exclusive information in this completely up-to-date volume. Explains how to configure and use these and other key tools: Port scanners: Nmap, SuperScan, IpEye, Scanline Enumeration tools: smbclient, nbtstat, Winfingerprint Web vulnerability scanners: Nikto, WebSleuth, Paros, wget Password crackers: PAM, John the Ripper, L0phtCrack Backdoors: VNC, Sub7, Loki, Knark System auditing tools: Nessus, Retina, STAT, Tripwire Packet filters and firewalls: IPFW, Netfilter/Iptables, Cisco PIX Sniffers: snort, BUTTSniffer, TCPDump/WinDump, Ethereal Wireless tools: NetStumbler, Wellenreiter, kismet War dialers: ToneLoc, THC-Scan Incident response tools: auditpol, Loggedon, NTLast Forensics tools: EnCase, Safeback, Ghost, md5sum, FTK Miscellaneous tools: Netcat, Fpipe, Fport, Cygwin, and many more
CD-ROM contains all the security tools discussed in the book
About the authors: Mike Shema is the Director of Research for NT Objectives, Inc. He is the author of HackNotes Web Security Pocket Reference and co-author of Hacking Exposed Web Applications, both from McGraw-Hill/Osborne. Bradley C. Johnson is a network security specialist with a great deal of experience designing, implementing, and maintaining secure networks. He is the co-author, with Mike Shema, of the first edition of this book.