Hack Attacks Revealed, Second Edition: A CompleteReference for UNIX, Windows, and Linux withCustom Security Toolkit
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Hack Attacks Revealed, Second Edition: A CompleteReference for UNIX, Windows, and Linux withCustom Security Toolkit

English

JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

English

Acknowledgments.

A Note to the Reader.

Introduction.

Part One: Technology.

Chapter 1: Understanding Communication Protocols.

A Brief History of the Internet.

ARP/RARP Engineering: Introduction to Physical.

Hardware Address Mapping Transmission Control Protocol.

User Datagram Protocol.

Internet Control Message Protocol.

Moving Forward.

Chapter 2: Novell IPX, SPX, and NetBIOS Technology.

NetWare: Introduction.

NetBIOS Technology: Introduction.

NetBEUI: Introduction.

Conclusion.

Chapter 3: Understanding Communication Mediums.

Ethernet Technology.

Token Ring Technology.

Fiber Distributed Data Interface Technology.

Analog Technology.

Integrated Services Digital Network Technology.

Digital Subscriber Line and Cable Modems.

Wireless 802.11 Preamble.

Point-to-Point Technology.

Frame Relay Technology.

Looking Ahead.

Part Two: Discovery.

Intuitive Intermission A Little Terminology.

Who Are Hackers, Crackers, Phreaks, Script Kiddies, and Cyberpunks?

Security Levels.

Kickoff.

Chapter 4: Well-Known Ports and Their Services.

A Review of Ports.

Detrimental Services and Associated Ports.

What's Next.

Chapter 5: Discovery and Scanning Techniques.

Discovery.

Site Port Scans.

Summary.

Part Three: Penetration.

Intuitive Intermission A Hacker's Genesis.

Chapter 6: Port, Socket, and Service Vulnerability Penetrations.

Example Case Synopsis.

Backdoor Kits.

Common Backdoor Methods.

Flooding.

Log Bashing.

Mail Bombing, Spamming, and Spoofing.

Password Cracking.

Password Recovery (Cisco).

Remote Control.

Routing Elements and Discovery (Cisco).

Scanning Intrusion Detection Systems.

Sniffing.

Spoofing IP and DNS.

Trojan Infection.

Viral/Worm Infection.

Wardialing.

Web Page Hacking.

Wireless LAN (WLAN) Hacking.

Part Four: Vulnerabilities.

Intuitive Intermission A Hacker's Vocation.

Chapter 7: Gateways and Routers and HTTPd.

Gateways and Routers.

The Internet Server Daemon HTTPd.

Conclusion.

Chapter 8: Operating Systems.

*NIX 366

AIX.

BSD.

HP-UX.

IRIX.

Linux.

Macintosh.

Microsoft Windows.

Novell NetWare.

OS/2.

SCO.

Solaris.

Conclusion.

Chapter 9: Proxies and Firewalls.

Internetworking Gateways.

Conclusion.

Chapter 10: The Top 75 Hack Attacks.

Part Five: The Hacker's Toolbox.

Intuitive Intermission The Evolution of a Hacker.

Chapter 11: TigerSuite: The Complete Internetworking Security Toolbox.

Tiger Terminology.

Introduction to TigerSuite Professional 3.5.

Program Modules.

TigerBox Toolkit.

Some Real-World Discovery.

Conclusion.

Chapter 12: The Hacker's Technology Handbook.

Networking Concepts.

Networking Technologies.

What Routers Need to Route Effectively.

Routing Protocols.

Virtual Local Area Networks.

Looking Ahead.

Chapter 13: Hacker Coding Fundamentals.

The C Programming Language.

A Crash Course in C.

C Programming Fundamentals.

Structure of C.

C Compilation.

Working with Graphics.

Appendix A: IP Reference Table and Subnetting Charts.

Appendix B: Well-Known Ports and Services.

Appendix C: All-Inclusive Ports and Services.

Appendix D: Detrimental Ports and Services.

Appendix E: What's on the CD.

Tiger Tools 2000.

TigerSuite Professional 3.5.

Chapter 5.

Chapter 6.

Chapters 7, 8, and 9.

Tools.

Chapter 14.

Appendix F: Most Common Viruses.

Appendix G: Vendor Codes.

Glossary.

References.

Index.

English

“…well worth the read…” (Slashdot, 6 March 2003)
loading