For years, Counter Hack has been the primary resource for every network/system administrator and security professional
who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security experts
Ed Skoudis and Tom Liston have thoroughly updated this best-selling guide, showing how to defeat today's newest,
most sophisticated, and most destructive attacks.
Features
Major revision to the best-selling, step-by-step guide to defending against hacker intrusions--more than 45%
new material.
Contains more than 45% new material including coverage devoted to the steps of scanning, gaining and maintaining
access, and preventing detection
All new scenarios in the anatomy of an attack chapter and tools to battle them
Author is a huge name in security. The first edition is touted as "outstanding" and the "best
of its kind"
New To This Edition
Important features of this new edition include
All-new "anatomy-of-an-attack" scenarios and tools
All-new section on wireless hacking: wardriving, warchalking, WEP attacks, and more
Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking"
New coverage of tools for gaining access, including uncovering Windows vulnerabilities with Mediasploit
New information on dangerous, hard-to-detect, kernel-level rootkits
Table of Contents
Introduction
p. 1
Networking overview : pretty much everything you need to know about networking to follow the rest of this book
p. 25
Linux and UNIX overview : pretty much everything you need to know about Linux and UNIX to follow the rest of this book
p. 91
Windows NT/2000/XP/2003 overview : pretty much everything you need to know about Windows to follow the rest of this book
p. 127
Phase 1 : reconnaissance
p. 183
Phase 2 : scanning
p. 239
Phase 3 : gaining access using application and operating system attacks