Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

John Chirillo

Beat hackers at their own game — The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed

Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box® system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.

In this highly provocative work, you’ll discover:

• The hacker’s perspective on networking protocols and communication technologies

• A complete hacker’s technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks

• Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities

• Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks

JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.

Table of Contents

  • Target Audience.
  • About the Author.
  • Acknowledgements.
  • Introduction.
  • UNDERSTANDING COMMUNICATION PROTOCOLS.
  • TCP/IP.
  • IPX/SPX.
  • NetBios vs. NetBEUI.
  • UNDERSTANDING COMMUNICATION MEDIUMS.
  • Ethernet.
  • Token Ring.
  • FDDI.
  • Analog.
  • ISDN vs. xDSL.
  • Point-To-Point Links.
  • Frame Relay.
  • UNCOVERING VULNERABILITIES.
  • COMMON PORT AND SERVICE LIABILITIES.
  • CONCEALED PORT AND SERVICE LIABILITIES.
  • Discovery.
  • Site Scans.
  • HACKING SECURITY HOLES.
  • INTUITIVE INTERMISSION ACT II: A HACKER'S GENESIS.
  • THE HACKERS' TECHNOLOGY HANDBOOK.
  • Port, Socket and Service Vulnerability Penetrations.
  • INTUITIVE INTERMISSION ACT III: A HACKER'S VOCATION.
  • Vulnerability Hacking Secrets.
  • INTUITIVE INTERMISSION ACT IV: THE LIFE AND DEATH OF A HACKER.
  • THE HACKER'S TOOLBOX.
  • The Complete Internetworking Security Toolbox.
  • Conclusion.
  • Appendix A: IP Reference Table and Subnetting Charts.
  • Appendix B: Well-Known Ports and Services.
  • Appendix C: All-Inclusive Ports and Services.
  • Appendix D: Concealed Ports and Services.
  • Appendix E: What's on the CD.
  • Appendix F: The Underground Community.

Online Ordering

Quantity:

Other ordering options are available.

Copyright © 2000 John Wiley & Sons, Wiley Computer Books

cover

List Price: $59.99
0-471-41624-X
960 Pages
Published: 04/16/2001

More Books About:
Security