The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.
Beat hackers at their own game - The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed
Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.
In this highly provocative work, you'll discover:
- The hacker's perspective on networking protocols and communication technologies
- A complete hacker's technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
- Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
- Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks