Anti-hacker Tool Kit, Fourth Edition

Anti-hacker Tool Kit, Fourth Edition
by Mike Shema / / / PDF


Read Online 36.2 MB Download


Defend against today's most devious attacks

Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal,

Fully revised to include cutting-edge new tools for your security arsenal,Anti-Hacker Tool Kit

Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.

, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.Demonstrates how to configure and use these and other essential tools:

Demonstrates how to configure and use these and other essential tools:Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options

Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source optionsVulnerability scanners: OpenVAS, Metasploit

Vulnerability scanners: OpenVAS, MetasploitFile system monitors: AIDE, Samhain, Tripwire

File system monitors: AIDE, Samhain, TripwireWindows auditing tools: Nbtstat, Cain, MBSA, PsTools

Windows auditing tools: Nbtstat, Cain, MBSA, PsToolsCommand-line networking tools: Netcat, Cryptcat, Ncat, Socat

Command-line networking tools: Netcat, Cryptcat, Ncat, SocatPort forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay

Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelayPort scanners: Nmap, THC-Amap

Port scanners: Nmap, THC-AmapNetwork sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort

Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snortNetwork defenses: firewalls, packet filters, and intrusion detection systems

Network defenses: firewalls, packet filters, and intrusion detection systemsWar dialers: ToneLoc, THC-Scan, WarVOX

War dialers: ToneLoc, THC-Scan, WarVOXWeb application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap

Web application hacking utilities: Nikto, HTTP utilities, ZAP, SqlmapPassword cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra

Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-HydraForensic utilities: dd, Sleuth Kit, Autopsy, Security Onion

Forensic utilities: dd, Sleuth Kit, Autopsy, Security OnionPrivacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

views: 896