Hack Attacks Revealed: A Complete Reference withCustom Security Hacking Toolkit
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Hack Attacks Revealed: A Complete Reference withCustom Security Hacking Toolkit

English

JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.

English

Acknowledgments.

A Note to the Reader.

Introduction.

IN THE BEGINNING.

Understanding Communication Protocols.

NetWare and NetBIOS Technology.

PUTTING IT ALL TOGETHER.

Understanding Communication Mediums.

UNCOVERING VULNERABILITIES.

Intuitive Intermission: A Little Terminology.

Well-Known Ports and Their Services.

Discovery and Scanning Techniques.

HACKING SECURITY HOLES.

Intuitive Intermission: A Hacker's Genesis.

The Hacker's Technology Handbook.

Hacker Coding Fundamentals.

Port, Socket, and Service Vulnerability Penetrations.

VULNERABILITY HACKING SECRETS.

Intuitive Intermission: A Hacker's Vacation.

Gateways and Routers and Internet Server Daemons.

Operating Systems.

Proxies and Firewalls.

THE HACKER'S TOOLSBOX.

Intuitive Intermission: The Evolution of a Hacker.

TigerSuite: The Complete Internetworking Security Toolbox.

Appendix A: IP Reference Table and Subnetting Charts.

Appendix B: Well-Known Ports and Services.

Appendix C: All-Inclusive Ports and Services.

Appendix D: Detrimental Ports and Services.

Appendix E: What's on the CD.

Appendix F: Most Common Viruses.

Appendix G: Vendor Codes.

Glossary.

References.

Index.

English

"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)

"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)

"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)

"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)
loading