Synopses & Reviews
The much-anticipated second edition of the bestselling book that details network security through the hacker's eye
Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.
In this fascinating new edition, you'll discover:
* The hacker's perspective on security holes in UNIX, Linux, and Windows networks
* Over 170 new vulnerabilities and exploits
* Advanced discovery techniques
* A crash course in C for compiling hacker tools and vulnerability scanners
* The top seventy-five hack attacks for UNIX and Windows
* Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSuite Professional 3.5 (full suite single license)
Review
“…well worth the read…”(Slashdot, 6 March 2003)
Synopsis
Since we published the first edition of this book, many new attacks have occurred and need to be revealed. These new attacks have been discovered on all operating systems including UNIX, Windows XP, Linux, and Palm 4.0. This 2e will be the first all-in-one hacking reference for all operating systems. We are publishing it to go up directly against the cluster of Hacking Exposed books, its major competition. Hacking Exposed does not cover UNIX in detail and it does not provide an all-in-one reference. In fact, the reader would have to buy three separate Hacking Ex-posed books for a total of $140 to get what is contained in the 2e for $60. We are keeping the same page count as the first edition by moving a significant amount of the print material on to the CD. In addition, the author is providing a new release of his custom security toolkit free on the CD.
Synopsis
Includes bibliographical references (p. 889-890) and index.
Synopsis
* TigerSuite Professional 3.5 (full suite single license)
About the Author
JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.
Table of Contents
Acknowledgments.
A Note to the Reader.
Introduction.
Part One: Technology.
Chapter 1: Understanding Communication Protocols.
A Brief History of the Internet.
ARP/RARP Engineering: Introduction to Physical.
Hardware Address Mapping Transmission Control Protocol.
User Datagram Protocol.
Internet Control Message Protocol.
Moving Forward.
Chapter 2: Novell IPX, SPX, and NetBIOS Technology.
NetWare: Introduction.
NetBIOS Technology: Introduction.
NetBEUI: Introduction.
Conclusion.
Chapter 3: Understanding Communication Mediums.
Ethernet Technology.
Token Ring Technology.
Fiber Distributed Data Interface Technology.
Analog Technology.
Integrated Services Digital Network Technology.
Digital Subscriber Line and Cable Modems.
Wireless 802.11 Preamble.
Point-to-Point Technology.
Frame Relay Technology.
Looking Ahead.
Part Two: Discovery.
Intuitive Intermission A Little Terminology.
Who Are Hackers, Crackers, Phreaks, Script Kiddies, and Cyberpunks?
Security Levels.
Kickoff.
Chapter 4: Well-Known Ports and Their Services.
A Review of Ports.
Detrimental Services and Associated Ports.
What's Next.
Chapter 5: Discovery and Scanning Techniques.
Discovery.
Site Port Scans.
Summary.
Part Three: Penetration.
Intuitive Intermission A Hacker's Genesis.
Chapter 6: Port, Socket, and Service Vulnerability Penetrations.
Example Case Synopsis.
Backdoor Kits.
Common Backdoor Methods.
Flooding.
Log Bashing.
Mail Bombing, Spamming, and Spoofing.
Password Cracking.
Password Recovery (Cisco).
Remote Control.
Routing Elements and Discovery (Cisco).
Scanning Intrusion Detection Systems.
Sniffing.
Spoofing IP and DNS.
Trojan Infection.
Viral/Worm Infection.
Wardialing.
Web Page Hacking.
Wireless LAN (WLAN) Hacking.
Part Four: Vulnerabilities.
Intuitive Intermission A Hacker's Vocation.
Chapter 7: Gateways and Routers and HTTPd.
Gateways and Routers.
The Internet Server Daemon HTTPd.
Conclusion.
Chapter 8: Operating Systems.
*NIX 366
AIX.
BSD.
HP-UX.
IRIX.
Linux.
Macintosh.
Microsoft Windows.
Novell NetWare.
OS/2.
SCO.
Solaris.
Conclusion.
Chapter 9: Proxies and Firewalls.
Internetworking Gateways.
Conclusion.
Chapter 10: The Top 75 Hack Attacks.
Part Five: The Hacker's Toolbox.
Intuitive Intermission The Evolution of a Hacker.
Chapter 11: TigerSuite: The Complete Internetworking Security Toolbox.
Tiger Terminology.
Introduction to TigerSuite Professional 3.5.
Program Modules.
TigerBox Toolkit.
Some Real-World Discovery.
Conclusion.
Chapter 12: The Hacker's Technology Handbook.
Networking Concepts.
Networking Technologies.
What Routers Need to Route Effectively.
Routing Protocols.
Virtual Local Area Networks.
Looking Ahead.
Chapter 13: Hacker Coding Fundamentals.
The C Programming Language.
A Crash Course in C.
C Programming Fundamentals.
Structure of C.
C Compilation.
Working with Graphics.
Appendix A: IP Reference Table and Subnetting Charts.
Appendix B: Well-Known Ports and Services.
Appendix C: All-Inclusive Ports and Services.
Appendix D: Detrimental Ports and Services.
Appendix E: What's on the CD.
Tiger Tools 2000.
TigerSuite Professional 3.5.
Chapter 5.
Chapter 6.
Chapters 7, 8, and 9.
Tools.
Chapter 14.
Appendix F: Most Common Viruses.
Appendix G: Vendor Codes.
Glossary.
References.
Index.