Counter Hack Reloaded: A Step-by-Step Guide to Computer A... and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $79.99
  • Save: $59.74(75%)
Rented from apex_media
To Rent, select Shipping State from options above
Due Date: Dec 20, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
FREE Shipping on orders over $35.
Condition: Used: Good
Access codes and supplements are not guaranteed with used items.
Add to Cart
  • List Price: $79.99
  • Save: $36.29 (45%)
In Stock.
Ships from and sold by
Gift-wrap available.
Add to Cart
Trade in your item
Get a $11.95
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) Paperback – January 2, 2006

ISBN-13: 978-0131481046 ISBN-10: 0131481045 Edition: 2nd

Buy New
Price: $43.70
Price: $20.18 - $20.25
39 New from $41.99 52 Used from $20.00
Amazon Price New from Used from
"Please retry"
"Please retry"
$41.99 $20.00


Frequently Bought Together

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) + Metasploit: The Penetration Tester's Guide
Price for both: $74.64

Buy the selected items together
  • Metasploit: The Penetration Tester's Guide $30.94


Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 748 pages
  • Publisher: Prentice Hall; 2 edition (January 2, 2006)
  • Language: English
  • ISBN-10: 0131481045
  • ISBN-13: 978-0131481046
  • Product Dimensions: 1.5 x 6.8 x 9.2 inches
  • Shipping Weight: 2.8 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (29 customer reviews)
  • Amazon Best Sellers Rank: #76,354 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Ed Skoudis is a founder and senior security consultant for the Washington, D.C.-based network security consultancy, Intelguardians Network Intelligence, LLC. His expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed information security governance and operations teams for Fortune 500 companies, and responded to computer attacks for clients in financial, high technology, health care, and other industries. Ed has demonstrated hacker techniques for the U.S. Senate and is a frequent speaker on issues associated with hacker tools and defenses. He was also awarded 2004 and 2005 Microsoft MVP awards for Windows Server Security and is an alumnus of the Honeynet Project. Prior to Intelguardians, Ed served as a security consultant with International Network Services (INS), Predictive Systems, Global Integrity, SAIC, and Bell Communications Research (Bellcore).

Tom Liston is a senior analyst for the Washington, D.C.-based network security consultancy, Intelguardians Network Intelligence, LLC. He is the author of the popular open source network tarpit, LaBrea, for which he was a finalist for eWeek and PC Magazine’s Innovations In Infrastructure (i3) award in 2002. He is one of the handlers at the SANS Institute’s Internet Storm Center, where he deals daily with cutting edge security issues and authors a popular series of articles under the title “Follow the Bouncing Malware.” Mr. Liston resides in the teeming metropolis of Johnsburg, Illinois, and has four beautiful children (who demanded to be mentioned): Mary, Maggie, Erin, and Victoria.

Excerpt. © Reprinted by permission. All rights reserved.

My flight had just landed. It was around midnight. The flight attendant announced that we could turn on our cell phones. As soon as mine booted up, it started buzzing with a frantic call from a newspaper reporter I had recently met. He quickly explained that he had obtained a copy of a manifesto written by a terrorist who had launched some pretty horrific attacks killing hundreds of innocent people a few months back. The reporter had had the text professionally translated so he could get some folks to analyze it. In this 30-page document, this very evil guy was urging his followers to alter their tactics in their struggle. To augment their physical terrorism, the plan was now to start including cyber attacks to maximize their impact on countries that oppose their terrorist agenda. The reporter wanted me to analyze the technical underpinnings of the manifesto, to determine whether it was all smoke and mirrors, or a legitimate cause for concern.

I got to my hotel room and snagged a copy of the manifesto from my e-mail. The document I read startled me. Although not technically deep, it was quite astute. Its author emphasized that the terrorist group could enhance their stature and influence and cause more terror to their enemies by undermining their economic well-being through the use of computer attacks. After this really eerie “motivational” speech introduction, the manifesto turned toward describing how different categories of attack could be used to achieve terrorist goals. Although the author didn’t include technical details, he did provide a huge number of technical references on computer attacks, pressing his faithful followers to study hard the technologies of the infidel so they could undermine them.

The following day I received an unrelated call, this time from a lawyer friend of mine. He explained that a computer attacker had broken into the network of a company and stolen over a million credit card numbers. Because the attacker had pilfered the entire magnetic stripe data stored on the company’s servers, the bad guy could create very convincing counterfeit cards, and begin selling them on the black market. My lawyer friend wanted me to look over the details of the heist and explain in nontechnical jargon how the thief was able to pull this off. I carefully reviewed the case, analyzing the bad guy’s moves, noting sadly that he had used some pretty standard attack techniques to perpetrate this big-time crime.

Given those cases on back-to-back days, I just reread the preface to the original Counter Hack book I wrote almost five years ago. Although it described a real-world attack against an ISP, it still had a fun feeling to it. The biggest worry then was the defacement of some Web sites and my buddy’s boss getting mad, certainly cause for concern, but not the end of the world. I was struck with how much things have changed in computer attacks, and not at all for the better. Five years back, we faced a threat, but it was often manifested in leisurely attacks by kids looking to have some fun. We did face a hardened criminal here and there, of course, but there was a certain whimsy to our work. Today, with organized crime and, yes, even terrorists mastering their computer attack skills, things have taken a turn for the dark and sinister. Sure, the technology has evolved, but increasingly so has the nature of our threat.

Underscoring the problem, if you place an unpatched computer on the Internet today, its average survival time before being completely compromised is less than 20 minutes. That time frame fluctuates a bit over the months, sometimes dropping to less than 10 minutes, and occasionally bumping up over 30 minutes when some particularly good patches are released and quickly deployed. However, even the upper-end number is disheartening. Given this highly aggressive threat, it’s even more important now than ever for computer professionals (system administrators, network administrators, and security personnel) and even laymen to have knowledge of how the bad guys attack and how to defend against each of their moves. If we don’t understand the bad guys’ tactics and how to thwart them, they’ll continue to have their way with our machines, resulting in some major damage. They know how to attack, and are learning more all the time. We defenders also must be equally if not better equipped. This new edition of Counter Hack represents a massive update to the original book; a lot has happened in the last five years in the evolution of computer attack technology. However, the book retains the same format and goal: to describe the attacks in a step-by-step manner and to demonstrate how to defend against each attack using time-tested, real-world techniques.

Oh, and one final note: Although the nature of the threat we face has grown far more sinister, don’t let that get you down in the dumps. A depressed or frightened attitude might make you frustrated and less agile when dealing with attacks, lowering your capabilities. If we are to be effective in defending our systems, we must keep in mind that this information security work we all do is inherently interesting and even fun. It’s incredibly important to be diligent in the face of these evolving threats; don’t get me wrong. At the same time, we must strive to keep a positive attitude, fighting the good fight, and making our systems more secure.

Preface from the First Edition

My cell phone rang. I squinted through my sleepy eyelids at the clock. Ugh! 4 AM, New Year’s Day. Needless to say, I hadn’t gotten very much sleep that night.

I picked up the phone to hear the frantic voice of my buddy, Fred, on the line. Fred was a security administrator for a medium-sized Internet Service Provider, and he frequently called me with questions about a variety of security issues.

“We’ve been hacked big time!” Fred shouted, far too loudly for this time of the morning.

I rubbed my eyes to try to gain a little coherence.

“How do you know they got in? What did they do?” I asked.

Fred replied, “They tampered with a bunch of Web pages. This is bad, Ed. My boss is gonna have a fit!”

I asked, “How did they get in? Have you checked out the logs?”

Fred stuttered, “W-Well, we don’t do much logging, because it slows down performance. I only snag logs from a couple of machines. Also, on those systems where we do gather logs, the attackers cleared the log files.”

“Have you applied the latest security fixes from your operating system vendor to your machines?” I asked, trying to learn a little more about Fred’s security posture.

Fred responded with hesitation, “We apply security patches every three months. The last time we deployed fixes was ... um ... two-and-a-half months ago.”

I scratched my aching head and said, “Two major buffer overflow attacks were released last week. You may have been hit. Have they installed any rootkits? Have you checked the consistency of critical files on the system?”

“You know, I was planning to install something like Tripwire, but just never got around to it,” Fred admitted.

I quietly sighed and said, “OK. Just remain calm. I’ll be right over so we can start to analyze your machines.”

You clearly don’t want to end up in a situation like Fred, and I want to minimize the number of calls I get at 4 AM on New Year’s Day. While I’ve changed Fred’s name to protect the innocent, this situation actually occurred. Fred’s organization had failed to implement some fundamental security controls, and it had to pay the price when an attacker came knocking. In my experience, many organizations find themselves in the same state of information security unpreparedness.

But the situation goes beyond these security basics. Even if you’ve implemented all of the controls discussed in this Fred narrative, there are a variety of other tips and tricks you can use to defend your systems. Sure, you might apply security patches, use a file integrity checking tool, and have adequate logging, but have you recently looked for unsecured modems? Or, how about activating port-level security on the switches in your critical network segments to prevent powerful, new active sniffing attacks? Have you considered implementing nonexecutable stacks to prevent one of the most common types of attacks today, the stack-based buffer overflow? Are you ready for kernel-level rootkits? If you want to learn more about these topics and more, please read on.

As we will see throughout the book, computer attacks happen each and every day, with increasing virulence. To create a good defense, you must understand the offensive techniques of your adversaries. In my career as a system penetration tester, incident response team member, and information security architect, I’ve seen numerous types of attacks ranging from simple scanning by clueless kids to elite attacks sponsored by the criminal underground. This book boils down the common and most damaging elements from these real-world attacks, while offering specific advice on how you can proactively avoid such trouble from your adversaries. We’ll zoom in on how computer attackers conduct their activities, looking at each step of their process so we can implement in-depth defenses.

The book is designed for system administrators, network administrators, and security professionals, as well as others who want to learn how computer attackers do their magic and how to stop them. The offensive and defensive techniques laid out in the book apply to all types of organizations using computers and networks today, including enterprises and service providers, ranging in size from small to gigantic.

Computer attackers are marvelous at sharing information with each other about how to attack your infrastructure. Their efficienc...

Customer Reviews

Therefore this is a very good reference book.
R. Ludwig
I would highly recommend this book to anyone interested in how attacks are executed.
Phase One covers Reconnaissance which includes tactics such as social engineering.

Most Helpful Customer Reviews

22 of 22 people found the following review helpful By Sean E. Connelly on February 11, 2006
Format: Paperback
Please note this review is for the 2nd Edition of this book
While "Counter Hack Reloaded" by Skoudis is an `Updated Edition of the Best-Seller' (per the book's cover), Counter Hack Reloaded (CHR) is really a new book in it's own right. CHR has gone through an extensive revision and is fully updated to meet today and tomorrow's emerging threats (i.e. wireless attacks). While 50% of the tools/exploits that are discussed in this book can be found in other `hack' books, the tools/exploits have been fully updated and document the latest commands. See page 21 of for a detailed explanation of CHR's updates.

Some quick points of interest for me:
* Page 228 - excellent, quick description of DNS's characteristics (when DNS uses UDP vs TCP).
* Page 264 - good explanation of UDP vs ICMP pings (something to remember when troubleshooting connectivity from different platforms).
* Chapter 7 - Gaining Access at the OS and App level - very good discussion of buffer overflows. The chapter also provides an updated list of access tools (i.e. WebGoat & password crackers).
* Chapter 8 - Gaining Access via Network Attacks - great explanation of man-in-the-middle attacks by DSniff and Ettercap. I also enjoyed the explanation of NetCat (everyone's friend).
* Chapter 9 - Denial of Service Attacks - the discussion on SYN cookies was new to me.

While I thought chapter 2, Networking, deserved it's place, I thought that chapter 3, UNIX, went a little off course. I also thought that the 2nd half of chapter 5, Reconnaissance, was of much more value than the first half of chapter 5. Page 138 had a weak description of salting. All these demotions are trivial issues, and do not distract from the overall supremacy of CHR.

Overall, I greatly enjoyed "Counter Hack Reloaded" by Skoudis. It is an update to a classic, that like the first edition, does not disappoint.

I give this book 5 pings out of 5:
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By Brian Bex Huff on July 8, 2006
Format: Paperback
I highly recommend Counter Hack Reloaded to anyone who wants to better understand the technical details of computer hacking / security / defense.

This book covers all the bases. It dives into details about networking, windows security, unix security, firewalls, google hacking, wireless security, the works!

It does a particularly excellent job of explaining the nitty gritty details of a hack attack, but in a way that's engaging and fun... not dry and pedantic. It explains all the tools that hackers use to break into systems, their methodology, and why your system probably will not stop them.

The author is, like many people these days, very pessimistic about the current state of computer security. Just as people are relying on computers more and more, they are becoming less and less secure. Skoudis calls this the golden age of hacking. And frankly, after reading this book I doubt anybody would disagree with him.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 8 people found the following review helpful By Charles Hornat - on January 25, 2006
Format: Paperback
Ed Skoudis is a recognized expert in host and network security. This is an update to Ed's previous book, Counter Hack. This time, he has enlisted the help of Tom Liston, known for his tarpit work ([...]

For those unfamiliar with the Counter Hack book, it includes details and examples on everything a security professional should know. This includes ports and protocols, UNIX need to knows, Windows need to knows, Reconnaissance, application attacks, Operating System attacks, Network attacks, Denial of Service attacks, Trojans, Backdoors, Rootkits, altering logs, covert channels, and examples of real world attacks.

For those who have not taken the Advanced hacking course at SANS, this book is the closest you will come to experiencing Ed's expertise without taking the course. Ed gives relevant, detailed examples with diagrams and charts, explains how attacks occur, what to look for, and how to defend against them. Ed's experience as a teacher allows him to explain how it all comes together in such a way that beginners and experts alike will learn.

For those familiar with Counter Hack, this book offers several updates. While there are updates throughout the entire book, the first major update is the addition of wireless hacking and war driving. Then follows a section dedicated to Bots, an expanded Web Application Attack section including new charts and graphs such as a "Web Application Manipulation Proxies" list, SQL injection attacks, and other more modern day threats. Also added are sections on Google hacking and updated sites and tools as some have changed over the years.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Jay on December 3, 2006
Format: Paperback
As a student studying information technology with goals of having a career in the information systems security field, Mr. Skoudis' book "Counter Hack Reloaded" provides me with an amazing resource that is helping me obtain the knowledge and skills I need to succeed in the Infosec field. His book is insightful and explains the complexity and workings of varius threats and risks to our networks and computer systems in a way that makes them easy to understand. The steps attackers usually take are broken down and analyzed along with ways to secure your systems from such attacks.

The book is broken down into different phases after the few first chapters go over the basics of networking and the major operating systems (Windows and Linux/Unix). Phase One covers Reconnaissance which includes tactics such as social engineering. Phase Two is scanning and the different methods of scanning networks, both wired and wireless. Phase Three covers gaining access to the network through attacks on applications, OSs, DoS attacks, and other network attacks. Phase Four covers maintaining access, which includes information on varius threats such as backdoors, trojans, rootkits, etc. Phase Five reviews covering one's tracks and hiding evidence of network intrusions, etc.

I recommend this book to anyone in my position of currently obtaining an education in any field having to deal with information systems. Even if security is not your main focus, the knowledge this book provides is valuable as a reference and as a way of better understanding the current threats to our organizations and the networks that make them up, both the technical and personnel networks.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Most Recent Customer Reviews