Table of Contents
Anti-Hacker Tool Kit, Third Edition
Introduction
Part I - Multifunctional Tools
Chapter 1 - Netcat and Cryptcat
Chapter 2 - The X Window System
Chapter 3 - Virtual Machines & Emulators
Part II - Tools for Auditing and Defending the Hosts
Chapter 4 - Port Scanners
Chapter 5 - Unix Enumeration Tools
Chapter 6 - Windows Enumeration Tools
Chapter 7 - Web Hacking Tools
Chapter 8 - Password Cracking / Brute-Force Tools
Chapter 9 - Host Hardening
Chapter 10 - Backdoors and Remote Access Tools
Chapter 11 - Simple Source Auditing Tools
Chapter 12 - Combination System Auditing Tools
Part III - Tools for Auditing and Defending Your Network
Chapter 13 - Firewalls
Chapter 14 - Network Reconnaissance Tools
Chapter 15 - Port Redirection
Chapter 16 - Sniffers
Chapter 17 - Wireless Tools
Chapter 18 - War Dialers
Chapter 19 - TCP/IP Stack Tools
Part IV - Tools for Computer Forensics and Incident Response
Chapter 20 - Creating a Bootable Environment and Live Response Tool Kit
Chapter 21 - Commercial Forensic Image Tool Kits
Chapter 22 - Open-Source Forensic Duplication Tool Kits
Chapter 23 - Tool Kits to Aid in Forensic Analysis
Chapter 24 - Tools to Aid in Internet Activity Reconstruction
Chapter 25 - Generalized Editors and Viewers
Chapter 26 - Reverse Engineering Binaries
Part V - Appendixes
Appendix A - Useful Charts and Diagrams
Appendix B - Command-line Reference
How to Use the CD
List of Figures
List of Tables
List of Sidebars