Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition Paperback

ISBN-13: 978-0471232827 ISBN-10: 0471232823 Edition: 2nd

Amazon Price New from Used from Collectible from
Paperback
"Please retry"
$29.96 $0.16

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Hack Attacks
  • Paperback: 960 pages
  • Publisher: Wiley; 2 edition (August 21, 2002)
  • Language: English
  • ISBN-10: 0471232823
  • ISBN-13: 978-0471232827
  • Product Dimensions: 9.4 x 7.4 x 2 inches
  • Shipping Weight: 3.6 pounds
  • Average Customer Review: 3.9 out of 5 stars  See all reviews (14 customer reviews)
  • Amazon Best Sellers Rank: #624,092 in Books (See Top 100 in Books)

Editorial Reviews

Review

&well worth the read& -- r

“…well worth the read…” (Slashdot, 6 March 2003)

From the Back Cover

The much-anticipated second edition of the bestselling book that details network security through the hacker's eye

Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.

In this fascinating new edition, you'll discover:
* The hacker's perspective on security holes in UNIX, Linux, and Windows networks
* Over 170 new vulnerabilities and exploits
* Advanced discovery techniques
* A crash course in C for compiling hacker tools and vulnerability scanners
* The top seventy-five hack attacks for UNIX and Windows
* Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSuite Professional 3.5 (full suite single license)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

The thing about this book is that the information included works!
mcsei2k
This book has done nothing to dispell my theory that the information content of a book is often inversely proportional to the number of pages in the book.
A reader
This is an amazing grouping of tools to analyze and test the security of a computer network.
Kelly Larsen

Most Helpful Customer Reviews

25 of 26 people found the following review helpful By A Customer on July 11, 2003
Format: Paperback Verified Purchase
Reviewed: Hack Attacks Revealed, 2nd Edition, 2002

I must say I am thoroughly disappointed with this book. The book's description, as well as other readers' comments led me to believe that this book would have been more than just a compilation of information that could be freely obtained at the dozens of security related web sites. Sadly, this was not the case.

The bulk of the book merely describes (mostly outdated) common
attacks/vulnerabilities, without getting into much detail why they exist and the underlying explanations on how they are exploited. As such the book reads like "For Vulnerability X, Install patch Y" without getting into more detail. Heck, even Microsoft's Security Bulletins give more info that this!

Many of the "75 Top Hack Attacks" that the book promises can be freely found online (check CERT's site).

The general impression I get from reading this book is that the author tried his best to fill up space in order to deliver an impressively thick book. Was it a requirement that he include SCREENSHOTS of various hacking tools/trojans, including step-by-step INSTALL SCREENSHOTS for the included TigerSuite software? (If you don't know how to install software then you need to develop more skills before learning about hacking!). Did he HAVE to include the useless 10 year old 'how to build a modem filter' BBS textfile (which by the way doesn't filter noise on modern modems)? Did the publisher mandate that he include 9 PAGES of Decimal-to-Hex conversion tables when you could use, say, Windows Calculator to do any needed conversions?

Another thing I disliked was that Windows XP as well as Wireless networks (802.11/WEP were glossed over) were not really covered in the sort of detail that I desired.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
11 of 12 people found the following review helpful By A reader on September 22, 2004
Format: Paperback
This book has done nothing to dispell my theory that the information

content of a book is often inversely proportional to the number of pages

in the book. I'm 200 pages into it and that's as far as I'm

going to get. I expected some basic filler/theory in the first few

pages, but plowed on in the hopes that the author understood

the theory he was presenting and would use it later to explain security

exploits. However, I lost all confidence in the book when

I reached page 167, where the author demonstrates that he doesn't

understand ping and/or DNS. I don't bring this up to nitpick. I bring it up

because I think that anybody with pretensions to

being a security expert had better know the basics of how the

Internet works. How is anybody to make sense of, say, DNS spoofing,

without knowing how DNS works?

In case it's not obvious, the author confuses and muddles together

the actions of resolving a DNS domain name to an IP

address, and then using that IP address to send an ICMP echo

request to the destination. This may seem like a minor thing,

but its not just a typo (he makes the same mistake in three

different places on page 167), and security is a confusing

enough business without muddled descriptions like these.

On a more minor note, I do not see the point in filling page

after page with pretty pictures of the GUIs that hackers use

at their end. The publishers probably know better than I do

what sells today, but I don't understand why they and/or the

authors apparently feel that the thicker a book is, the better.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 10 people found the following review helpful By Kelly Larsen on October 15, 2002
Format: Paperback
I have been teaching Windows 2000 and Unix security for the U.S. Army for 3 years. I am constantly searching for a book that will provide true insight into the hacker mindset and methods. Most books dawdle in the routine and well known hacks and still leave you wanting. "Hack Attacks Revealed, 2nd edition", takes you to the next level. It is the single best security reference book that I've seen.
You rarely find a book that provides indepth coverage of Windows, Unix, and Linux security. Hack Attacks Revealed's information, tutorials, and tools provide you with everything you would need to test and secure a computer system or network. As a bonus, the fully licensed TigerSuite Professional (version 3.5) is included on the accompanying CD. This is an amazing grouping of tools to analyze and test the security of a computer network. In class, I routinely use TigerSuite to demonstrate security shortfalls. My students are so impressed that they immediately ask me where I got it and how can they get it.
"Hack Attacks Revealed" has something for every skill level, whether it is teaching you how to subnet, compile a security tool or walking you through a buffer overflow. The First edition was great and John Chirillo found a way to go it one better.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By M. Madaus on July 20, 2004
Format: Paperback
I was relieved to read that this isn't considered a very useful reference on How to Hack. Certainly Ch. seems at his most enthusiastic, frothiest, even foamiest, in talking about the wonderful world of hacking. Yeah, he repeatedly trots out the line about having to know how to attack to know how to defend, time after time, but ya' gotta' wonder where his heart lies (Okay, even Milton had this problem.)

And that certainly is irksome if you, like me, are one of the growing number of people who have reluctantly become 'security amateurs,' and find ourselves reading 900+ page books, due to invasion of our privacy by amateur criminals. Whatever its merits for security professionals, this is probably not the book for you. It assumes too much technical background and doesn't provide sufficient detail on implementing various solutions. True, this may be covered in more detail in his other book, but including that we're talking 1800 pages...

Editing would have helped, certainly. The 75 basic hack attacks are a useful overview on just how paranoid you should be, but the basic information about some of them is repeated up to 4 times, sometimes as boilerplate.

I have seen a few books more suitable for amateurs, but the truth is that they aren't detailed enough to be helpful. I think that the only real solution to the security problem in the IT industry is to wake up to the fact that caveat emptor, 'professional ethics,' and self-regulation isn't working any better there than in health and safety, restaurant sanitation, the stock market or...well, you work it out. As long as it is only sort of illegal to break into someone's house as long as you use a computer, most geeks will do it.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Product Images from Customers

Most Recent Customer Reviews

Search
ARRAY(0x9a718708)

What Other Items Do Customers Buy After Viewing This Item?