| Table of Contents |
| Anti-Hacker Tool Kit, Second Edition |
| Introduction |
| Part I - Multifunctional and Miscellaneous Tools |
| Chapter 1 | - | Netcat and Cryptcat |
| Chapter 2 | - | The X Window System |
| Chapter 3 | - | Emulators |
| Part II - Tools for Auditing and Defending the Hosts |
| Chapter 4 | - | Port Scanners |
| Chapter 5 | - | Unix Enumeration Tools |
| Chapter 6 | - | Windows Enumeration Tools |
| Chapter 7 | - | Web Hacking Tools |
| Chapter 8 | - | Password Cracking / Brute-Force Tools |
| Chapter 9 | - | Host Hardening |
| Chapter 10 | - | Backdoors and Remote Access Tools |
| Chapter 11 | - | Simple Source Auditing Tools |
| Chapter 12 | - | Combination System Auditing Tools |
| Part III - Tools for Auditing and Defending Your Network |
| Chapter 13 | - | Firewalls |
| Chapter 14 | - | Network Reconnaissance Tools |
| Chapter 15 | - | Port Redirection |
| Chapter 16 | - | Sniffers |
| Chapter 17 | - | Wireless Tools |
| Chapter 18 | - | War Dialers |
| Chapter 19 | - | TCP/IP Stack Tools |
| Part IV - Tools for Computer Forensics and Incident Response |
| Chapter 20 | - | Creating a Bootable Environment and Live Response Tool Kit |
| Chapter 21 | - | Commercial Forensic Duplication Tool Kits |
| Chapter 22 | - | Open-Source Forensic Duplication Tool Kits |
| Chapter 23 | - | Tool Kits to Aid in Forensic Analysis |
| Chapter 24 | - | Tools to Aid in Internet Activity Reconstruction |
| Chapter 25 | - | Generalized Editors and Viewers |
| Part V - Appendixes |
| Appendix A | - | Useful Charts and Diagrams |
| Appendix B | - | About the CD-ROM |
| Index |
| List of Figures |
| List of Tables |
| List of Case Studies |
| CD Content |