Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit [Paperback]

John Chirillo
4.4 out of 5 stars  See all reviews (270 customer reviews)

Available from these sellers.


There is a newer edition of this item:
Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit 4.3 out of 5 stars (10)
Currently unavailable
Join Amazon Student in Canada


Book Description

April 16 2001
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.

Product Details


Product Description

From Amazon

The path to pro hackerdom is Hack Attacks Revealed, but be warned, the mark of a real hacker is serious technical expertise. Author, John Chirillo, starts with the internal details of IP, TCP, ethernet packets and the care and feeding of subnets even network sysadmins don't need to know but which anyone aiming to spoof a connection or fingerprint the hidden details of a network can't live without.

For the first third of Hack Attacks Revealed you might be forgiven for thinking you're training as a network design engineer. Even network cable types are covered. Then it gets complicated. Real hackers are real programmers. There's most of a C programming course built into the book, and you need it--and preferably Perl as well--to understand the wide range of included listings.

Much of the book is straightforward lists: port assignments, packet structures, handshaking protocols and other low level network engineering detail. Only by understanding can you hope to subvert systems--prevent others usurping them. To help there's a CD full of hacker utilities used to create and check for holes in your own security, though the demo TigerTools suite is too crippled to be useful. The lists of hardware (routers, switches), software and operating system vulnerabilities covered is awesome. The fact that fixes for most of them are available but often unimplemented is depressing.

You'll laugh, you'll cry but you'll keep reading. As a commentary on a clearly immature technology Hack Attacks Revealed is fascinating. As a wake-up call to sysadmins everywhere it should be compulsory reading. --Steve Patient

Review

"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)

"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)

"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)

"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)

Inside This Book (Learn More)
First Sentence
Approximately 30 years ago, communication protocols were developed so that individual stations could be connected to form a local area network (LAN). Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

Most helpful customer reviews
1.0 out of 5 stars Takes too much to say too little Aug. 19 2003
Format:Paperback
I really don't understand this book.
The author takes too much time to say too little discerning information.
Go with other books, this simply is too expensive and of too little value.
Was this review helpful to you?
3.0 out of 5 stars Good Book - but not quite what I 've expected Oct. 13 2002
Format:Paperback
This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss.
There are some good ones, in the beginning and at the very end, but the ones in the middle simply reprint names and usage of trojan/worm/virus kit software found on the net. Besides not being a complete list is useless since needs to be updated in a daily bases.
The good chapters explain you a lot of the protocols and how they interact, common techniques used by intruders.
If you do not have any other security/tcp-ip related book you should buy this since it's a good start. If you already have others you can safely skip this one.
Was this review helpful to you?
5.0 out of 5 stars Know the Enemy Aug. 5 2002
By TB
Format:Paperback
For network administrators and security managers who want to know the enemy, HACK ATTACKS REVEALED is essential reading. Don't leave your network without it.
Was this review helpful to you?
2.0 out of 5 stars Not all that useful for security professionals July 30 2002
Format:Paperback
If you are a security professional, then this book is not for you. Its content is too scattered.
Was this review helpful to you?
1.0 out of 5 stars NO, NO, NO ! ! ! Jan. 19 2002
Format:Paperback
Dated, boring, with a lot of repetitions, and full of almost useless information.
If you are really interested in 'Hack Attacks Revealed' then try the very recent 'Hack Proofing Your Network (2nd Edition)', quite up to date and comprehensive.
Was this review helpful to you?
1.0 out of 5 stars Very poorly written, much redundant information Jan. 16 2002
Format:Paperback
This book is poorly written with alot of redundancy and useless information. I had to skim through alot of chaff to find any of the even remotely useful information contained within.
Was this review helpful to you?
1.0 out of 5 stars Good thing it was 40% off Dec 19 2001
By A Customer
Format:Paperback
Wow, what a dated conglomeration of material. I can't tell if it is meant for beginners or security experts. The basics aren't explained simply enough for a layman, and the experienced engineer already knows the basics--like how many bits in different classes of IP addresses. Secondly, most people who are going to buy this are network security experts, so why the pages and pages of C code and other basics like port numbers, etc? What a waste of time.
Was this review helpful to you?
5.0 out of 5 stars Good book... Sept. 21 2001
By A Customer
Format:Paperback
This is a good book and i advise anyone who has is a sysadmin to read this. The chapters concerning communication protocols is very deep and it's is a lot better read then the OSI-book. This book is also nice since it shows you a lot of screenshots from hackingtools which are actually in use, this will stimulate one again to educate the users of a network not to run any emailed attachments. The list of public portnumbers and their programs is handy since some of the portnumbers are run by programs with a different name. The tutorials concerning C are a bit light if you are a serious programmer, if you are not a programmer then this is helpfull since it gives you some background one you scan the source code (which is plenty). The cd-rom is also nice because of the hacker toolkit. I've read some other 'hacker-handbooks' but this one is the best so far. My complaint with the other books is that they frequently referenced the internet. This book packs a lot of usefull and sometimes entertaining information.
Was this review helpful to you?
Want to see more reviews on this item?

Look for similar items by category


Feedback