Organized by category, Anti-Hacker Tool Kit, Third Edition provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results.
Introduction
Part I - Multifunctional Tools
Chapter 1 - Netcat and Cryptcat
Chapter 2 - The X Window System
Chapter 3 - Virtual Machines & Emulators
Part II - Tools for Auditing and Defending the Hosts
Chapter 4 - Port Scanners
Chapter 5 - Unix Enumeration Tools
Chapter 6 - Windows Enumeration Tools
Chapter 7 - Web Hacking Tools
Chapter 8 - Password Cracking / Brute-Force Tools
Chapter 9 - Host Hardening
Chapter 10 - Backdoors and Remote Access Tools
Chapter 11 - Simple Source Auditing Tools
Chapter 12 - Combination System Auditing Tools
Part III - Tools for Auditing and Defending Your Network
Chapter 13 - Firewalls
Chapter 14 - Network Reconnaissance Tools
Chapter 15 - Port Redirection
Chapter 16 - Sniffers
Chapter 17 - Wireless Tools
Chapter 18 - War Dialers
Chapter 19 - TCP/IP Stack Tools
Part IV - Tools for Computer Forensics and Incident Response
Chapter 20 - Creating a Bootable Environment and Live Response Tool Kit
Chapter 21 - Commercial Forensic Image Tool Kits
Chapter 22 - Open-Source Forensic Duplication Tool Kits
Chapter 23 - Tool Kits to Aid in Forensic Analysis
Chapter 24 - Tools to Aid in Internet Activity Reconstruction
Chapter 25 - Generalized Editors and Viewers
Chapter 26 - Reverse Engineering Binaries
Part V - Appendixes
Appendix A - Useful Charts and Diagrams
Appendix B - Command-line Reference
This book aims to feature "best practices" for using security tools, giving background not only on how to use a tool but also on the underlying reasons of why and when to use a particular tool. Knowing about a tool's existence and its command-line options won't help today's IT professional without a fundamental understanding of the underlying security principles and concepts surrounding the tool.
Through the use of screenshots, code listings, example tool usage, and case studies, this book aims to show how each tool can be used in certain real-world situations that may mirror your own. Although the inclusion of command-line flags and configuration options also makes this book useful as a desktop reference, the additional information and fundamental concepts included in each chapter make this book much more than a "How-to" manual. It lets you familiarize yourself with the tools at your disposal so you can efficiently and effectively choose (and use) the right tools to properly complete your task.
This book is divided into four parts: multifunctional tools, tools to audit systems on the network, tools to audit the network, and tools to aid in the investigation of incidents within your infrastructure.