Buy Used
CDN$ 3.48
+ CDN$ 6.49 shipping
Used: Very Good | Details
Sold by wobcanada
Condition: Used: Very Good
Comment: The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit Paperback – Apr 30 2001

4.4 out of 5 stars 271 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 60.30 CDN$ 3.48
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 960 pages
  • Publisher: Wiley; 1 edition (April 30 2001)
  • Language: English
  • ISBN-10: 047141624X
  • ISBN-13: 978-0471416241
  • Product Dimensions: 19.2 x 5.2 x 24 cm
  • Shipping Weight: 1.6 Kg
  • Average Customer Review: 4.4 out of 5 stars 271 customer reviews
  • Amazon Bestsellers Rank: #1,833,206 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From Amazon

The path to pro hackerdom is Hack Attacks Revealed, but be warned, the mark of a real hacker is serious technical expertise. Author, John Chirillo, starts with the internal details of IP, TCP, ethernet packets and the care and feeding of subnets even network sysadmins don't need to know but which anyone aiming to spoof a connection or fingerprint the hidden details of a network can't live without.

For the first third of Hack Attacks Revealed you might be forgiven for thinking you're training as a network design engineer. Even network cable types are covered. Then it gets complicated. Real hackers are real programmers. There's most of a C programming course built into the book, and you need it--and preferably Perl as well--to understand the wide range of included listings.

Much of the book is straightforward lists: port assignments, packet structures, handshaking protocols and other low level network engineering detail. Only by understanding can you hope to subvert systems--prevent others usurping them. To help there's a CD full of hacker utilities used to create and check for holes in your own security, though the demo TigerTools suite is too crippled to be useful. The lists of hardware (routers, switches), software and operating system vulnerabilities covered is awesome. The fact that fixes for most of them are available but often unimplemented is depressing.

You'll laugh, you'll cry but you'll keep reading. As a commentary on a clearly immature technology Hack Attacks Revealed is fascinating. As a wake-up call to sysadmins everywhere it should be compulsory reading. --Steve Patient


"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)

"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)

"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)

"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)

See all Product Description

Customer Reviews

Top Customer Reviews

By A Customer on Sept. 21 2001
Format: Paperback
This is a good book and i advise anyone who has is a sysadmin to read this. The chapters concerning communication protocols is very deep and it's is a lot better read then the OSI-book. This book is also nice since it shows you a lot of screenshots from hackingtools which are actually in use, this will stimulate one again to educate the users of a network not to run any emailed attachments. The list of public portnumbers and their programs is handy since some of the portnumbers are run by programs with a different name. The tutorials concerning C are a bit light if you are a serious programmer, if you are not a programmer then this is helpfull since it gives you some background one you scan the source code (which is plenty). The cd-rom is also nice because of the hacker toolkit. I've read some other 'hacker-handbooks' but this one is the best so far. My complaint with the other books is that they frequently referenced the internet. This book packs a lot of usefull and sometimes entertaining information.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
Blessed with an extensive index, excellent organization, and a successful visual design throughout, this book is a solid guide for learning via a banquet of multiple scenarios. It will discipline users to develop first-class strategies toward the ultimate goals of basic and enhanced network security hacking.
In short, a lot of this book may be hurried, but tolerably accurate. The truth is, if you are attempting to explain some of these topics to an individual of limited formal exposure and pressing professional need, there is no rational way to approach the task. So, if Chirillo seems to babble on occasion, it's because he has to satisfy readers' curiosities. There's a lot to cover and there's simply not enough paper handy.
Furthermore if you can think of the problem, this book probably has the solution--at least when it comes to PC and network security problems. This 1000-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of security woes, you will find pragmatic tips that can help you through an immediate crisis. And the configuration graphics, tables, and diagrams are both essential and useful additions to the text.
This is perhaps the best single overview of the real-world security issues that you'll find. And what makes the book particularly interesting is that Chirillo puts the various types computer cracking and hacking into the broader context of topics. In fact, it is hard to imagine how he was able to gather all of the incidents described and present them in a coherent manner that keeps you reading.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I have recently purchased this book hoping to learn more about network security.......... i was not disappointed.
Before i purchased this book i bought the book 'Hacking exposed' but was disappointed to find that its content was aimed more at the intermediate to advanced security analyst. When i began reading 'Hack attacks...' i was pleased to notice that the book begins with an explanation of networks and network technologies written in such a clear and concise way that a total novice would have no problems understanding every step.
The book then continues to explain how these technnologies are used by hackers everyday and even provides all the tools necessary to experiance hands on the lessons that are to be learned from this book.
i would recommend this book to anyone who is atall interested in network security or is even curious as to how the internet works. I have shown this book to the administrator of my college network who was surprised at how much he didnt know.
I also recommend this book to budding hackers, for this book will take you on a journey from ignorant web surfer to powerful educated hacker.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
Hack Attacks Revealed presents highly complex information in a relaxed, informal manner to allow for ease of understanding and application. Sample configurations and illustrations are integrated throughout the book with the intent to show what security can be managed, explain hacking specifics, and instruct on alternative methods. A comprehensive analysis of protocols, communication pathways, and all the technologies in-between, the book's primary focus always circles back to the understanding and deployment of these-a unique approach of this subject today. In-between almost every part there's interesting intermissions as views from a hacker's past, present, and future. The entertainment and humor kept me yearning for more-yes I'm guilty, I did flip through and read them all before the actual subject matter. The CD in the back of the book is literally packed with coding, scripts, links to almost every known Internet security resource, tools, exploits, and a very neat hacking toolbox named Tigersuite. The companion website is an equally excellent resource for news, support, and a new project-Tiger Town for testing your hacking abilities and security implementations for FREE. I have heard some comments from people saying that the book is much too complex for the average person. This is not the case at all, the sections are explained in a very straightforward manner and information that is presented earlier in the book is used later in the book to explain new concepts. I found that I was able to quite easily keep in mind the previous examples when new ones were introduced-the book is so well written and very interesting.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most recent customer reviews