Anti-Hacker Tool Kit, Third Edition
Chapter 3: Virtual Machines & Emulators
- Case Study: Creating Practice Targets
Chapter 4: Port Scanners
- Case Study: Watching the Watcher
- Case Study: Stack Anomalies
- Case Study: Command-line Advantages
Chapter 5: Unix Enumeration Tools
- Case Study: Trusted Users?
Chapter 6: Windows Enumeration Tools
- Case Study: Brute-force Attacks
- Case Study: The Danger of Unsecured NetBIOS Ports
- Case Study: Manage Multiple Servers
Chapter 7: Web Hacking Tools
- Case Study: Catching Scan Signatures
- Case Study: Password Guessing
- Case Study: Inetd Alternative
Chapter 8: Password Cracking / Brute-Force Tools
- Case Study: Attacking Password Policies
- Case Study: Finding L0phtCrack on Your System
- Case Study: Checking Password Policy
Chapter 9: Host Hardening
- Case Study: Clam Up E-mail Viruses
Chapter 10: Backdoors and Remote Access Tools
- Case Study: Process Hide and Seek
- Case Study: The Good, the Bad, and the Ugly
Chapter 11: Simple Source Auditing Tools
- Case Study: wu- ftpd 2.6.0
- Case Study: What Automated Audit Tools Miss
- Case Study: mtr 0.46
- Case Study: Copying Unsafe Data
- Case Study: Canaries in the Mist
Chapter 14: Network Reconnaissance Tools
- Case Study: How Hackers Can Abuse Ping
- Case Study: Indirect Port Scanning
Chapter 15: Port Redirection
- Case Study: Port Hopping
- Case Study: Packet Filters, Ports, and Problems
Chapter 16: Sniffers
- Case Study: Debugging Problems with Sniffers
- Case Study: Tracking Down the Insider
Chapter 17: Wireless Tools
- Case Study: Networks Without Borders
- Case Study: WEP Insecurities
Chapter 19: TCP/IP Stack Tools
- Case Study: Firewall Performance
- Case Study: Packet Injection
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
- Case Study: Using a Bootable Tool CD
- Case Study: A Windows Hacking Scenario
- Case Study: A Unix Hacking Scenario
Chapter 21: Commercial Forensic Image Tool Kits
- Case Study: Search and Seizure!
Chapter 22: Open -Source Forensic Duplication Tool Kits
- Case Study: Smuggling the Secrets
Chapter 23: Tool Kits to Aid in Forensic Analysis
- Case Study: An Inside Employee Gone Bad
Chapter 24: Tools to Aid in Internet Activity Reconstruction
- Case Study: A Vanishing Suspect
Chapter 25: Generalized Editors and Viewers
- Case Study: Deciphering the Mysterious Criminal's Files