Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit - Softcover

Chirillo, John

 
9780471416241: Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Synopsis

Network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. This book describes in detail the tools and techniques used by network hackers and how they work to exploit security loopholes.

"synopsis" may belong to another edition of this title.

Review

The path to pro hackerdom is Hack Attacks Revealed, but be warned, the mark of a real hacker is serious technical expertise. Author, John Chirillo, starts with the internal details of IP, TCP, ethernet packets and the care and feeding of subnets even network sysadmins don't need to know but which anyone aiming to spoof a connection or fingerprint the hidden details of a network can't live without.

For the first third of Hack Attacks Revealed you might be forgiven for thinking you're training as a network design engineer. Even network cable types are covered. Then it gets complicated. Real hackers are real programmers. There's most of a C programming course built into the book, and you need it--and preferably Perl as well--to understand the wide range of included listings.

Much of the book is straightforward lists: port assignments, packet structures, handshaking protocols and other low level network engineering detail. Only by understanding can you hope to subvert systems--prevent others usurping them. To help there's a CD full of hacker utilities used to create and check for holes in your own security, though the demo TigerTools suite is too crippled to be useful. The lists of hardware (routers, switches), software and operating system vulnerabilities covered is awesome. The fact that fixes for most of them are available but often unimplemented is depressing.

You'll laugh, you'll cry but you'll keep reading. As a commentary on a clearly immature technology Hack Attacks Revealed is fascinating. As a wake-up call to sysadmins everywhere it should be compulsory reading. --Steve Patient

Review

"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!" (Kelly M. Larsen, C2Protect, DoD Security Instructor) "Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems." (L. Peterson, AFCERT) "[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review) "Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)

"About this title" may belong to another edition of this title.