Author(s) Name:  Ed Skoudis
While other hacker books explain how to detect intruders and catalogue hacker tools, this book is the most applied of hacker books. It describes the inner workings of the most popular and destructive hacker tools and provides Proven strategies for defending your site against the destructiveness of these tools. The book begins by presenting the hacker-s view of network technology and its vulnerabilities (an entire chapter devoted to “hacker-s view of TCP/IP”), describing the five phases of hacking: reconnaissance (targeting of a network), scanning for network vulnerabilities, gaining access/exploiting system, maintaining access and covering tracks.
Table of Contents
1. Introduction.
2. Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book.
3. Linux and UNIX Overview: Pretty Much Everything You Need to Know About Linux and UNIX to Follow the Rest of This Book.
4. Windows NT/000/XP/00 Overview: Pretty Much Everything You Need to Know About Windows to Follow the Rest of This Book.
5. Phase 1: Reconnaissance.
6. Phase 2: Scanning.
7. Phase 3: Gaining Access Using Application and Operating System Attacks.
8. Phase 4: Gaining Access Using Network Attacks.
9. Phase 3: Denial-of-Service Attacks.
10. Phase 4: Maintaining Access: Trojans, Backdoors, and Rootkits ... Oh My!
11. Phase 5: Covering Tracks and Hiding.
12. Putting It All Together: Anatomy of an Attack.
13. The Future, References, and Conclusions.
ISBN:  9780132704533
Publisher:  Prentice Hall PTR
Year of Publication:  2006
Book Link:  Home Page Url