2025-11-13 - San Diego de Alcalá y otros... |      623029155    info@evainformatica.es  Contacta

Anti-Hacker Tool Kit, Third Edition

https://evainformatica.es/biblioteca_virtual/manuales/img/anti_hacker_toolkit_3rd_edition.png

Formato: chm

Tamaño: 34.5 MB

idioma: en

Descargar

Visto: 67 veces

Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.

Anti-Hacker Tool Kit, Third Edition

Introduction

Part I - Multifunctional Tools
 Chapter 1 - Netcat and Cryptcat
 Chapter 2 - The X Window System
 Chapter 3 - Virtual Machines & Emulators

Part II - Tools for Auditing and Defending the Hosts
 Chapter 4 - Port Scanners
 Chapter 5 - Unix Enumeration Tools
 Chapter 6 - Windows Enumeration Tools
 Chapter 7 - Web Hacking Tools
 Chapter 8 - Password Cracking / Brute-Force Tools
 Chapter 9 - Host Hardening
 Chapter 10 - Backdoors and Remote Access Tools
 Chapter 11 - Simple Source Auditing Tools
 Chapter 12 - Combination System Auditing Tools

Part III - Tools for Auditing and Defending Your Network
 Chapter 13 - Firewalls
 Chapter 14 - Network Reconnaissance Tools
 Chapter 15 - Port Redirection
 Chapter 16 - Sniffers
 Chapter 17 - Wireless Tools
 Chapter 18 - War Dialers
 Chapter 19 - TCP/IP Stack Tools

Part IV - Tools for Computer Forensics and Incident Response
 Chapter 20 - Creating a Bootable Environment and Live Response Tool Kit
 Chapter 21 - Commercial Forensic Image Tool Kits
 Chapter 22 - Open-Source Forensic Duplication Tool Kits
 Chapter 23 - Tool Kits to Aid in Forensic Analysis
 Chapter 24 - Tools to Aid in Internet Activity Reconstruction
 Chapter 25 - Generalized Editors and Viewers
 Chapter 26 - Reverse Engineering Binaries

Part V - Appendixes Appendix A - Useful Charts and Diagrams Appendix B - Command-line Reference


This book aims to feature "best practices" for using security tools, giving background not only on how to use a tool but also on the underlying reasons of why and when to use a particular tool. Knowing about a tool's existence and its command-line options won't help today's IT professional without a fundamental understanding of the underlying security principles and concepts surrounding the tool.

Through the use of screenshots, code listings, example tool usage, and case studies, this book aims to show how each tool can be used in certain real-world situations that may mirror your own. Although the inclusion of command-line flags and configuration options also makes this book useful as a desktop reference, the additional information and fundamental concepts included in each chapter make this book much more than a "How-to" manual. It lets you familiarize yourself with the tools at your disposal so you can efficiently and effectively choose (and use) the right tools to properly complete your task.

This book is divided into four parts: multifunctional tools, tools to audit systems on the network, tools to audit the network, and tools to aid in the investigation of incidents within your infrastructure.