- Series: Hack Attacks
- Paperback: 960 pages
- Publisher: Wiley; 2 edition (August 21, 2002)
- Language: English
- ISBN-10: 0471232823
- ISBN-13: 978-0471232827
- Product Dimensions: 7.6 x 2 x 9.2 inches
- Shipping Weight: 3.6 pounds
- Average Customer Review: 10 customer reviews
- Amazon Best Sellers Rank: #3,625,931 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
"Neverworld Wake" by Marisha Pessl
Read the absorbing new psychological suspense thriller from acclaimed New York Times bestselling author Marisha Pessl. Learn more
&well worth the read& -- r
“…well worth the read…” (Slashdot, 6 March 2003)
From the Back Cover
The much-anticipated second edition of the bestselling book that details network security through the hacker's eye
Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.
In this fascinating new edition, you'll discover:
* The hacker's perspective on security holes in UNIX, Linux, and Windows networks
* Over 170 new vulnerabilities and exploits
* Advanced discovery techniques
* A crash course in C for compiling hacker tools and vulnerability scanners
* The top seventy-five hack attacks for UNIX and Windows
* Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSuite Professional 3.5 (full suite single license)
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
And that certainly is irksome if you, like me, are one of the growing number of people who have reluctantly become 'security amateurs,' and find ourselves reading 900+ page books, due to invasion of our privacy by amateur criminals. Whatever its merits for security professionals, this is probably not the book for you. It assumes too much technical background and doesn't provide sufficient detail on implementing various solutions. True, this may be covered in more detail in his other book, but including that we're talking 1800 pages...
Editing would have helped, certainly. The 75 basic hack attacks are a useful overview on just how paranoid you should be, but the basic information about some of them is repeated up to 4 times, sometimes as boilerplate.
I have seen a few books more suitable for amateurs, but the truth is that they aren't detailed enough to be helpful. I think that the only real solution to the security problem in the IT industry is to wake up to the fact that caveat emptor, 'professional ethics,' and self-regulation isn't working any better there than in health and safety, restaurant sanitation, the stock market or...well, you work it out. As long as it is only sort of illegal to break into someone's house as long as you use a computer, most geeks will do it.
The ISPs aren't taking this seriously because they know people aren't much more likely to stop using e-mail than to stop using the phone, and most companiues were only kidding when they said they were interested in your problems.
Once there are some laws with real teeth and real fines and real jail time, those who aspire to the appearance of respectability will go back to their regularly scheduled activities including tale bearing, beating the old lady, bothering the women (men) at work just enough to stay on the right side of the law, bitching about how the old lady (old man) doesn't want to screw, kicking the dog, pulling the wings off flies, and complaining how much better everything was in the good old days.
content of a book is often inversely proportional to the number of pages
in the book. I'm 200 pages into it and that's as far as I'm
going to get. I expected some basic filler/theory in the first few
pages, but plowed on in the hopes that the author understood
the theory he was presenting and would use it later to explain security
exploits. However, I lost all confidence in the book when
I reached page 167, where the author demonstrates that he doesn't
understand ping and/or DNS. I don't bring this up to nitpick. I bring it up
because I think that anybody with pretensions to
being a security expert had better know the basics of how the
Internet works. How is anybody to make sense of, say, DNS spoofing,
without knowing how DNS works?
In case it's not obvious, the author confuses and muddles together
the actions of resolving a DNS domain name to an IP
address, and then using that IP address to send an ICMP echo
request to the destination. This may seem like a minor thing,
but its not just a typo (he makes the same mistake in three
different places on page 167), and security is a confusing
enough business without muddled descriptions like these.
On a more minor note, I do not see the point in filling page
after page with pretty pictures of the GUIs that hackers use
at their end. The publishers probably know better than I do
what sells today, but I don't understand why they and/or the
authors apparently feel that the thicker a book is, the better.