Anti-hacker Tool Kit, Fourth Edition
by Mike Shema /
2014 / English / PDF
36.2 MB Download
Defend against today's most devious attacks
Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security
arsenal,
Fully revised to include cutting-edge new tools for your security
arsenal,Anti-Hacker Tool Kit
Anti-Hacker Tool Kit, Fourth Edition reveals how
to protect your network from a wide range of nefarious exploits.
You'll get detailed explanations of each tool’s function along
with best practices for configuration and implementation
illustrated by code samples and up-to-date, real-world case
studies. This new edition includes references to short videos
that demonstrate several of the tools in action. Organized by
category, this practical guide makes it easy to quickly find the
solution you need to safeguard your system from the latest, most
devastating hacks.
, Fourth Edition reveals how
to protect your network from a wide range of nefarious exploits.
You'll get detailed explanations of each tool’s function along
with best practices for configuration and implementation
illustrated by code samples and up-to-date, real-world case
studies. This new edition includes references to short videos
that demonstrate several of the tools in action. Organized by
category, this practical guide makes it easy to quickly find the
solution you need to safeguard your system from the latest, most
devastating hacks.Demonstrates how to configure and use these and other
essential tools:
Demonstrates how to configure and use these and other
essential tools:Virtual machines and emulators: Oracle VirtualBox, VMware
Player, VirtualPC, Parallels, and open-source options
Virtual machines and emulators: Oracle VirtualBox, VMware
Player, VirtualPC, Parallels, and open-source optionsVulnerability scanners: OpenVAS, Metasploit
Vulnerability scanners: OpenVAS, MetasploitFile system monitors: AIDE, Samhain, Tripwire
File system monitors: AIDE, Samhain, TripwireWindows auditing tools: Nbtstat, Cain, MBSA, PsTools
Windows auditing tools: Nbtstat, Cain, MBSA, PsToolsCommand-line networking tools: Netcat, Cryptcat, Ncat, Socat
Command-line networking tools: Netcat, Cryptcat, Ncat, SocatPort forwarders and redirectors: SSH, Datapipe, FPipe,
WinRelay
Port forwarders and redirectors: SSH, Datapipe, FPipe,
WinRelayPort scanners: Nmap, THC-Amap
Port scanners: Nmap, THC-AmapNetwork sniffers and injectors: WinDump, Wireshark, ettercap,
hping, kismet, aircrack, snort
Network sniffers and injectors: WinDump, Wireshark, ettercap,
hping, kismet, aircrack, snortNetwork defenses: firewalls, packet filters, and intrusion
detection systems
Network defenses: firewalls, packet filters, and intrusion
detection systemsWar dialers: ToneLoc, THC-Scan, WarVOX
War dialers: ToneLoc, THC-Scan, WarVOXWeb application hacking utilities: Nikto, HTTP utilities,
ZAP, Sqlmap
Web application hacking utilities: Nikto, HTTP utilities,
ZAP, SqlmapPassword cracking and brute-force tools: John the Ripper,
L0phtCrack, HashCat, pwdump, THC-Hydra
Password cracking and brute-force tools: John the Ripper,
L0phtCrack, HashCat, pwdump, THC-HydraForensic utilities: dd, Sleuth Kit, Autopsy, Security Onion
Forensic utilities: dd, Sleuth Kit, Autopsy, Security OnionPrivacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR