-
March 2nd, 2004, 08:37 PM
#1
Senior Member
The Anti-Hacker Toolkit
I recently bought a book that I thought would help me in my future of Network Security. It is called, "The Anti-Hacker Toolkit second edition" by Mike Shema & Bradley C. Johnson. I was skeptical when I first saw the book, but then i started reading a little bit. Following is a breakdown of the book and some of the tools that come with it.
Part 1:
Multifunctional and Micellaneous Tools -- this covers the use of netcat, xwindows, and emulators
Part 2: -- Tools for Auditing and Defending the Hosts -- This covers the use of port scanners, unix and windows enumeration tools, Web hacking tools, Password cracking and brute-force tools, Host hardening, Backdorros and Remote Access Tools, Simple source Auditing Tools, and Combination System Auditing tools
part 3: Tools for Auditing and Defending Your Network -- This covers Firewalls, Network Reconnaissance tools, Port Redirection, Sniffers, Wireless tools, War Dialers, and TCP/IP stack tools
Part4: Tools for Computer Forensics and Incident Response -- This covers Creating a bootable environment and live response tool kit, Commercial frorensic duplication tool kits, Open Source forensic duplication tool kits, Tool kits to aid in Frensic Analysis, Tools to aid in Internet Activity Reconstruction, and Generalized Editors and Viewers.
Tools included on cd include but are not limited to: NMAP, NetCat, SuperScan, winfigngerpring, John the Ripper, VNC, Nessus, snort, netstumbler, toneLoc, Loggedon, EnCase, and many more...
As you can see this is a very indepth book that has alot of useful information. It is over 800 pages of text that not only tells you about the tools, but walks you step-by-step through hows and whys of the tools. It uses good examples that can be run on a local lan to show you how the too works and helps you to understand why it works, and what you can do to defend against these tools. After reading this book through, I now have a much better grasp on how attackers gain access into computers. I would recommend that anyone interested in security read this book. It also comes with a cd with most of the tools mentioned in the book.
You can find more about this book and others at www.antihackertoolkit.com
--The>kLuTz
WARNING: This information in this book is like any tool....it can be used for good or evil. What you do with the information is your own choice. It is neither mine nor the authors responsibility.
M$ support is like shooting yourself in the left foot and then putting a band-aid on the right one.
-
April 26th, 2004, 07:50 AM
#2
Junior Member
please tell me ,where can donwload this book?
thank you
-
May 8th, 2004, 08:53 PM
#3
Junior Member
That book it more like a scriptkiddie book.That jut show you how to do it,But don't tell you how it works.
-
May 9th, 2004, 12:10 PM
#4
All those tools can be downloadedd for free in the most part. I wouldnt ever buy a book like this mostly because i know I can get most of the stuff for free.
I suppose for the google shy its quite good really becuase it puts everything on a cd which makes it assessible and easy to get.
Its probably also good if your on a 56k dialup connection from hell, saves having to wait to download I suppose
i2c
-
May 10th, 2004, 04:50 AM
#5
Junior Member
please tell me ,where can donwload this book?
thanks
Great man are rarely isolated mountain-peaks;they are summits of
rangs.
For man is man and master of
his fate.
-
May 23rd, 2004, 05:13 AM
#6
Member
Aren't the authors involved with the Hacking Exposed series (which is pretty good)?
and for AnnexMicro,
You mean buy it, right.
This link will help you:
http://www.amazon.com/exec/obidos/tg...7967?v=glance.
\"Great spirits always encounter strong opposition from mediocre minds.\"
Albert Einstein
-
May 25th, 2004, 09:15 PM
#7
I think the hacking exposed series are wrote by different aurthors http://www.hackingexposed.com/about/about.html
Ive just finished reading Hacking Exposed 4 editon and found it very informative indeed.
I would recommend it to anyone intrested in the subject.
It is made to look like a book to provide sys admin's with a reference to securing their networks but when you have read it, it is very obvious it is for people who want to get involved in the hacking scene!!
It is a big time skiddie book though, but hey i cant exactly program my own port scanner or make my own version of netcat etc, so it was perfect for me!
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|