Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit [Paperback]

John Chirillo
4.4 out of 5 stars  See all reviews (270 customer reviews)

Available from these sellers.

There is a newer edition of this item:
Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit 4.3 out of 5 stars (10)
Currently unavailable
Join Amazon Student in Canada

Book Description

April 16 2001
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.

Product Details

Product Description

From Amazon

The path to pro hackerdom is Hack Attacks Revealed, but be warned, the mark of a real hacker is serious technical expertise. Author, John Chirillo, starts with the internal details of IP, TCP, ethernet packets and the care and feeding of subnets even network sysadmins don't need to know but which anyone aiming to spoof a connection or fingerprint the hidden details of a network can't live without.

For the first third of Hack Attacks Revealed you might be forgiven for thinking you're training as a network design engineer. Even network cable types are covered. Then it gets complicated. Real hackers are real programmers. There's most of a C programming course built into the book, and you need it--and preferably Perl as well--to understand the wide range of included listings.

Much of the book is straightforward lists: port assignments, packet structures, handshaking protocols and other low level network engineering detail. Only by understanding can you hope to subvert systems--prevent others usurping them. To help there's a CD full of hacker utilities used to create and check for holes in your own security, though the demo TigerTools suite is too crippled to be useful. The lists of hardware (routers, switches), software and operating system vulnerabilities covered is awesome. The fact that fixes for most of them are available but often unimplemented is depressing.

You'll laugh, you'll cry but you'll keep reading. As a commentary on a clearly immature technology Hack Attacks Revealed is fascinating. As a wake-up call to sysadmins everywhere it should be compulsory reading. --Steve Patient


"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)

"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)

"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)

"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)

Inside This Book (Learn More)
First Sentence
Approximately 30 years ago, communication protocols were developed so that individual stations could be connected to form a local area network (LAN). Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

Most helpful customer reviews
5.0 out of 5 stars Good book... Sept. 21 2001
By A Customer
This is a good book and i advise anyone who has is a sysadmin to read this. The chapters concerning communication protocols is very deep and it's is a lot better read then the OSI-book. This book is also nice since it shows you a lot of screenshots from hackingtools which are actually in use, this will stimulate one again to educate the users of a network not to run any emailed attachments. The list of public portnumbers and their programs is handy since some of the portnumbers are run by programs with a different name. The tutorials concerning C are a bit light if you are a serious programmer, if you are not a programmer then this is helpfull since it gives you some background one you scan the source code (which is plenty). The cd-rom is also nice because of the hacker toolkit. I've read some other 'hacker-handbooks' but this one is the best so far. My complaint with the other books is that they frequently referenced the internet. This book packs a lot of usefull and sometimes entertaining information.
Was this review helpful to you?
Blessed with an extensive index, excellent organization, and a successful visual design throughout, this book is a solid guide for learning via a banquet of multiple scenarios. It will discipline users to develop first-class strategies toward the ultimate goals of basic and enhanced network security hacking.
In short, a lot of this book may be hurried, but tolerably accurate. The truth is, if you are attempting to explain some of these topics to an individual of limited formal exposure and pressing professional need, there is no rational way to approach the task. So, if Chirillo seems to babble on occasion, it's because he has to satisfy readers' curiosities. There's a lot to cover and there's simply not enough paper handy.
Furthermore if you can think of the problem, this book probably has the solution--at least when it comes to PC and network security problems. This 1000-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of security woes, you will find pragmatic tips that can help you through an immediate crisis. And the configuration graphics, tables, and diagrams are both essential and useful additions to the text.
This is perhaps the best single overview of the real-world security issues that you'll find. And what makes the book particularly interesting is that Chirillo puts the various types computer cracking and hacking into the broader context of topics. In fact, it is hard to imagine how he was able to gather all of the incidents described and present them in a coherent manner that keeps you reading.
Was this review helpful to you?
4.0 out of 5 stars Preferance for this reference........ Sept. 19 2001
I have recently purchased this book hoping to learn more about network security.......... i was not disappointed.
Before i purchased this book i bought the book 'Hacking exposed' but was disappointed to find that its content was aimed more at the intermediate to advanced security analyst. When i began reading 'Hack attacks...' i was pleased to notice that the book begins with an explanation of networks and network technologies written in such a clear and concise way that a total novice would have no problems understanding every step.
The book then continues to explain how these technnologies are used by hackers everyday and even provides all the tools necessary to experiance hands on the lessons that are to be learned from this book.
i would recommend this book to anyone who is atall interested in network security or is even curious as to how the internet works. I have shown this book to the administrator of my college network who was surprised at how much he didnt know.
I also recommend this book to budding hackers, for this book will take you on a journey from ignorant web surfer to powerful educated hacker.
Was this review helpful to you?
5.0 out of 5 stars A fascinating and unique view of security topics Sept. 19 2001
By A Customer
Hack Attacks Revealed presents highly complex information in a relaxed, informal manner to allow for ease of understanding and application. Sample configurations and illustrations are integrated throughout the book with the intent to show what security can be managed, explain hacking specifics, and instruct on alternative methods. A comprehensive analysis of protocols, communication pathways, and all the technologies in-between, the book's primary focus always circles back to the understanding and deployment of these-a unique approach of this subject today. In-between almost every part there's interesting intermissions as views from a hacker's past, present, and future. The entertainment and humor kept me yearning for more-yes I'm guilty, I did flip through and read them all before the actual subject matter. The CD in the back of the book is literally packed with coding, scripts, links to almost every known Internet security resource, tools, exploits, and a very neat hacking toolbox named Tigersuite. The companion website is an equally excellent resource for news, support, and a new project-Tiger Town for testing your hacking abilities and security implementations for FREE. I have heard some comments from people saying that the book is much too complex for the average person. This is not the case at all, the sections are explained in a very straightforward manner and information that is presented earlier in the book is used later in the book to explain new concepts. I found that I was able to quite easily keep in mind the previous examples when new ones were introduced-the book is so well written and very interesting.
Was this review helpful to you?
Want to see more reviews on this item?
Most recent customer reviews
1.0 out of 5 stars Takes too much to say too little
I really don't understand this book.
The author takes too much time to say too little discerning information. Read more
Published on Aug. 19 2003 by Eric Kent
3.0 out of 5 stars Good Book - but not quite what I 've expected
This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss. Read more
Published on Oct. 13 2002 by Mario M. B. Neto
5.0 out of 5 stars Know the Enemy
For network administrators and security managers who want to know the enemy, HACK ATTACKS REVEALED is essential reading. Don't leave your network without it.
Published on Aug. 5 2002 by TB
2.0 out of 5 stars Not all that useful for security professionals
If you are a security professional, then this book is not for you. Its content is too scattered.
Published on July 30 2002 by Enjoy Life
1.0 out of 5 stars NO, NO, NO ! ! !
Dated, boring, with a lot of repetitions, and full of almost useless information.
If you are really interested in 'Hack Attacks Revealed' then try the very recent 'Hack... Read more
Published on Jan. 19 2002 by Marco De Vivo
1.0 out of 5 stars Very poorly written, much redundant information
This book is poorly written with alot of redundancy and useless information. I had to skim through alot of chaff to find any of the even remotely useful information contained... Read more
Published on Jan. 16 2002 by P. M. Franceus
1.0 out of 5 stars Good thing it was 40% off
Wow, what a dated conglomeration of material. I can't tell if it is meant for beginners or security experts. Read more
Published on Dec 19 2001
5.0 out of 5 stars Best books out there!
Anyone that is worried about securing there information, these books are a must have resource. These two books are essential information for knowing and understanding how a hacker... Read more
Published on Sept. 21 2001
5.0 out of 5 stars Truly fascinating
An ambitious, comprehensive, and compelling investigation of the Underground. Truly a fascinating study of security evolution in action.
Published on Sept. 20 2001
5.0 out of 5 stars Good books, lots of goodies
These are big books, whose value is in the hints & tips and graphical examples. The CDroms are loaded with goodies and some folks will find it useful to have all you need in... Read more
Published on Sept. 20 2001 by D. Marksman
Search Customer Reviews
Only search this product's reviews

Look for similar items by category