- Explore more great deals on thousands of titles in our Deals in Books store.
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
A lot of computer-security textbooks approach the subject from a defensive point of view. "Do this, and probably you'll survive a particular kind of attack," they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle. A Jane's-like catalog of the weaponry that black-hat hackers use is laid out in full. Readers see what programs are out there, get a rundown on what the programs can do, and benefit from detailed explanations of concepts (such as wardialing and rootkits) that most system administrators kind of understand, but perhaps not in detail. The book also walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.
The result of all of this familiarity with bad-guy tools is a leg up on defending against them. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective. Taking on the major network operating systems and network devices one at a time, the authors tell you exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. They spare no criticism of products with which they aren't impressed, and don't hesitate to point out inherent, uncorrectable security weaknesses where they find them. This book is no mere rehashing of generally accepted security practices. It and its companion Web site are the best way for all of you network administrators to know thine enemies. --David Wall
... Hacking Exposed, the seminal book on white-hat hacking and countermeasures. Hacking Exposed (www.hackingexposed.com) is now in its second edition, and should be required reading for anyone with a server or a network to secure. (Bill Machrone, VP, Technology for ZiffDavis Media) (PC Magazine 2001-06-26)
If you are a computer professional with an eye to the publishing world, you’re probably familiar with a big red book called Hacking Exposed. This bold book with its bold title often appears at the end of the aisle or in other easy-to-reach locations. The reason for all the attention -- and brisk sales -- is that this book really is different. For almost any computer book, you can find a clone. But not this one. Hacking Exposed is a one-of-a-kind study of the art of breaking in. The authors, a trio of security consultants for Foundstone, Inc., take the reader through a spectrum of intrusion tools and strategies. One of the biggest problems with security books is that, when you take out the OS configuration steps, most books offer little more than mundane pronouncements and recycled rules of thumb. Hacking Exposed is one of those rare books that actually show the reader how to think like an intruder. You’ll see the whole picture of the intrusion process from the top--a broad look at the phases of a network attack--to the bottom--examples of obscure Unix commands and discussions of specific hacking tools. And along the way, you’ll pick up valuable insights on how hackers think and how you can protect your network by thinking like a hacker. Hacking Exposed is also an impressive catalog of intrusion tools. You’ll find concise discussions of many tools, including information on how to obtain the tool and how to tell if the tool is currently deployed against you on your network. You’ll also find discussions of well known and lesser known attack methods, such as Trojan horses, buffer overflows, log doctoring, session hijacking, and SSL fraud. Hacking Exposed is divided into four parts. The first part, "Casing the Establishment," describes the footprinting, scanning, and enumeration phases, in which the intruder compiles a detailed map of the target network, including IP addresses, open ports, and relevant network resources. Part II, "System Hacking," describes specific techniques for hacking Windows 95/98/ME, Windows NT, Windows 2000, Novell NetWare, and Unix systems. (Error! Hyperlink reference not valid.) Part III, "Network Hacking," examines topics such as default passwords, SNMP, firewalls, denial of service, and dial-up attacks. Part IV, "Software Hacking," covers remote control vulnerabilities, Web hacking, and several advanced techniques, such as tricks with root kits and imaging tools. The best part of Hacking Exposed is the details. How many security books have you read that told you to beware of Trojan horses and then didn’t offer any specifics on what Trojan horses are out there and what to do about them? Hacking Exposed names at least a dozen specific Trojan horse programs currently operating on Windows, NetWare, and Unix systems. You’ll even find screen captures, URLs, and detection tips for each of the Trojans. This book shows clearly why you can’t assume anything is secure. You’ll learn tricks for compromising "secure" channel protocols such as SSL, IPSec, and PPTP. The details on Windows hacks are a particularly useful part of the book. You’ll learn about Registry hacks, remote access exploits, port redirection, and privilege escalation in Windows. If you ever felt inclined to believe Microsoft’s official version of Windows security, you’ll be interested in what the authors have to say about disabling auditing, clearing the Event Log, and hiding NTFS file resources. As one who has worked with computer books for many years, I can only imagine that Hacking Exposed must have evoked some secret envy from other publishers. This same book has been planned many times in many conference rooms throughout the publishing world, but in the end, it always comes down to the authors. You need creative and experienced authors with lots of energy to deliver this kind of detail and vision. If you spend enough time with Hacking Exposed, you could probably learn enough to start hacking networks yourself, although anyone else who has the book could probably learn enough to stop you. The fact is, if you really want to protect your network, you’ll need more information than any one book can hold. But if you want a head start on keeping your network safe, make sure Hacking Exposed is on your bookshelf. (Unix Review 2001-02-23) --This text refers to an out of print or unavailable edition of this title.
You will find yourself looking over your shoulder all the time in public WiFi locations to see who is trying to hack you.
Keeps your attention from cover to cover.
I read this book cover to cover and bookmarked half the pages with tips I want to use. It's not just a book on preventing hacks...it's full of great productivity tips as well. Read morePublished on March 7, 2007 by Matthew Walsh
The book touches almost every corner of hacking . As a developer i have got great knowledge from this book.. Authors have done superb job in explaining the hacking stuffs... Read morePublished on March 10, 2005 by Neo
Not a hacking how to per se but more like a really good resource for securing your network. Some people object to titles like this one because they naively and mistakenly believe... Read morePublished on December 12, 2004 by Prattle On, Boyo
I bought this book when I was starting to get into penetration testing. It gave me an idea and showed me a way of thinking. It's definately a must have. Read morePublished on October 9, 2002 by Langa F Kentane
For the security-minded professional, this book is a MUST HAVE... any security collection is simply not complete without this easy-to-use, well-written reference. Read morePublished on May 22, 2002 by Russell M. Van Tassell
This book was good, it gave some decent information and pretty much covered NetBios hacking. This book also gives you links and tips on how to hack and possibley not get caught. Read morePublished on March 1, 2002 by Lance B Seidman
I feel all IT people should read this book! I learned tons of stuff about hacking and how to guard my systems!Published on December 4, 2001 by PR
I came into this book with little knowledge of hacking methods, outside of what I had read in some other books. Boy were my eyes opened! Read morePublished on October 15, 2001 by J. J. Kwashnak