March 2nd, 2004, 07:37 PM
The Anti-Hacker Toolkit
I recently bought a book that I thought would help me in my future of Network Security. It is called, "The Anti-Hacker Toolkit second edition" by Mike Shema & Bradley C. Johnson. I was skeptical when I first saw the book, but then i started reading a little bit. Following is a breakdown of the book and some of the tools that come with it.
Multifunctional and Micellaneous Tools -- this covers the use of netcat, xwindows, and emulators
Part 2: -- Tools for Auditing and Defending the Hosts -- This covers the use of port scanners, unix and windows enumeration tools, Web hacking tools, Password cracking and brute-force tools, Host hardening, Backdorros and Remote Access Tools, Simple source Auditing Tools, and Combination System Auditing tools
part 3: Tools for Auditing and Defending Your Network -- This covers Firewalls, Network Reconnaissance tools, Port Redirection, Sniffers, Wireless tools, War Dialers, and TCP/IP stack tools
Part4: Tools for Computer Forensics and Incident Response -- This covers Creating a bootable environment and live response tool kit, Commercial frorensic duplication tool kits, Open Source forensic duplication tool kits, Tool kits to aid in Frensic Analysis, Tools to aid in Internet Activity Reconstruction, and Generalized Editors and Viewers.
Tools included on cd include but are not limited to: NMAP, NetCat, SuperScan, winfigngerpring, John the Ripper, VNC, Nessus, snort, netstumbler, toneLoc, Loggedon, EnCase, and many more...
As you can see this is a very indepth book that has alot of useful information. It is over 800 pages of text that not only tells you about the tools, but walks you step-by-step through hows and whys of the tools. It uses good examples that can be run on a local lan to show you how the too works and helps you to understand why it works, and what you can do to defend against these tools. After reading this book through, I now have a much better grasp on how attackers gain access into computers. I would recommend that anyone interested in security read this book. It also comes with a cd with most of the tools mentioned in the book.
You can find more about this book and others at www.antihackertoolkit.com
WARNING: This information in this book is like any tool....it can be used for good or evil. What you do with the information is your own choice. It is neither mine nor the authors responsibility.
M$ support is like shooting yourself in the left foot and then putting a band-aid on the right one.