| Table of Contents |
| | Anti-Hacker Tool Kit, Third Edition |
| | Introduction |
| Part I - Multifunctional Tools |
| | Chapter 1 | - | Netcat and Cryptcat |
| | Chapter 2 | - | The X Window System |
| | Chapter 3 | - | Virtual Machines & Emulators |
| Part II - Tools for Auditing and Defending the Hosts |
| | Chapter 4 | - | Port Scanners |
| | Chapter 5 | - | Unix Enumeration Tools |
| | Chapter 6 | - | Windows Enumeration Tools |
| | Chapter 7 | - | Web Hacking Tools |
| | Chapter 8 | - | Password Cracking / Brute-Force Tools |
| | Chapter 9 | - | Host Hardening |
| | Chapter 10 | - | Backdoors and Remote Access Tools |
| | Chapter 11 | - | Simple Source Auditing Tools |
| | Chapter 12 | - | Combination System Auditing Tools |
| Part III - Tools for Auditing and Defending Your Network |
| | Chapter 13 | - | Firewalls |
| | Chapter 14 | - | Network Reconnaissance Tools |
| | Chapter 15 | - | Port Redirection |
| | Chapter 16 | - | Sniffers |
| | Chapter 17 | - | Wireless Tools |
| | Chapter 18 | - | War Dialers |
| | Chapter 19 | - | TCP/IP Stack Tools |
| Part IV - Tools for Computer Forensics and Incident Response |
| | Chapter 20 | - | Creating a Bootable Environment and Live Response Tool Kit |
| | Chapter 21 | - | Commercial Forensic Image Tool Kits |
| | Chapter 22 | - | Open-Source Forensic Duplication Tool Kits |
| | Chapter 23 | - | Tool Kits to Aid in Forensic Analysis |
| | Chapter 24 | - | Tools to Aid in Internet Activity Reconstruction |
| | Chapter 25 | - | Generalized Editors and Viewers |
| | Chapter 26 | - | Reverse Engineering Binaries |
| Part V - Appendixes |
| | Appendix A | - | Useful Charts and Diagrams |
| | Appendix B | - | Command-line Reference |
| | How to Use the CD |
| | List of Figures |
| | List of Tables |
| | List of Sidebars |