Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit Paperback – Apr 30 2001
There is a newer edition of this item:
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
The path to pro hackerdom is Hack Attacks Revealed, but be warned, the mark of a real hacker is serious technical expertise. Author, John Chirillo, starts with the internal details of IP, TCP, ethernet packets and the care and feeding of subnets even network sysadmins don't need to know but which anyone aiming to spoof a connection or fingerprint the hidden details of a network can't live without.
For the first third of Hack Attacks Revealed you might be forgiven for thinking you're training as a network design engineer. Even network cable types are covered. Then it gets complicated. Real hackers are real programmers. There's most of a C programming course built into the book, and you need it--and preferably Perl as well--to understand the wide range of included listings.
Much of the book is straightforward lists: port assignments, packet structures, handshaking protocols and other low level network engineering detail. Only by understanding can you hope to subvert systems--prevent others usurping them. To help there's a CD full of hacker utilities used to create and check for holes in your own security, though the demo TigerTools suite is too crippled to be useful. The lists of hardware (routers, switches), software and operating system vulnerabilities covered is awesome. The fact that fixes for most of them are available but often unimplemented is depressing.
You'll laugh, you'll cry but you'll keep reading. As a commentary on a clearly immature technology Hack Attacks Revealed is fascinating. As a wake-up call to sysadmins everywhere it should be compulsory reading. --Steve Patient
"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)
"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)
"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)
"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)
Inside This Book(Learn More)
Approximately 30 years ago, communication protocols were developed so that individual stations could be connected to form a local area network (LAN). Read the first page
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Top Customer Reviews
In short, a lot of this book may be hurried, but tolerably accurate. The truth is, if you are attempting to explain some of these topics to an individual of limited formal exposure and pressing professional need, there is no rational way to approach the task. So, if Chirillo seems to babble on occasion, it's because he has to satisfy readers' curiosities. There's a lot to cover and there's simply not enough paper handy.
Furthermore if you can think of the problem, this book probably has the solution--at least when it comes to PC and network security problems. This 1000-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of security woes, you will find pragmatic tips that can help you through an immediate crisis. And the configuration graphics, tables, and diagrams are both essential and useful additions to the text.
This is perhaps the best single overview of the real-world security issues that you'll find. And what makes the book particularly interesting is that Chirillo puts the various types computer cracking and hacking into the broader context of topics. In fact, it is hard to imagine how he was able to gather all of the incidents described and present them in a coherent manner that keeps you reading.
Before i purchased this book i bought the book 'Hacking exposed' but was disappointed to find that its content was aimed more at the intermediate to advanced security analyst. When i began reading 'Hack attacks...' i was pleased to notice that the book begins with an explanation of networks and network technologies written in such a clear and concise way that a total novice would have no problems understanding every step.
The book then continues to explain how these technnologies are used by hackers everyday and even provides all the tools necessary to experiance hands on the lessons that are to be learned from this book.
i would recommend this book to anyone who is atall interested in network security or is even curious as to how the internet works. I have shown this book to the administrator of my college network who was surprised at how much he didnt know.
I also recommend this book to budding hackers, for this book will take you on a journey from ignorant web surfer to powerful educated hacker.
Most recent customer reviews
I really don't understand this book.
The author takes too much time to say too little discerning information. Read more
This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss. Read morePublished on Oct. 13 2002 by Mario M. B. Neto
For network administrators and security managers who want to know the enemy, HACK ATTACKS REVEALED is essential reading. Don't leave your network without it.Published on Aug. 5 2002 by TB
If you are a security professional, then this book is not for you. Its content is too scattered.Published on July 30 2002 by Enjoy Life
Dated, boring, with a lot of repetitions, and full of almost useless information.
If you are really interested in 'Hack Attacks Revealed' then try the very recent 'Hack... Read more
This book is poorly written with alot of redundancy and useless information. I had to skim through alot of chaff to find any of the even remotely useful information contained... Read morePublished on Jan. 16 2002 by P. M. Franceus
Wow, what a dated conglomeration of material. I can't tell if it is meant for beginners or security experts. Read morePublished on Dec 19 2001
Anyone that is worried about securing there information, these books are a must have resource. These two books are essential information for knowing and understanding how a hacker... Read morePublished on Sept. 21 2001
Look for similar items by category
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > History & Culture > Culture
- Books > Computers & Technology > History & Culture > Security
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Operating Systems
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Textbooks > Computer Science & Information Systems > Networking