Hack Attacks Revealed
Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box® system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.
In this highly provocative work, youll discover:
The hackers perspective on networking protocols and communication technologies
A complete hackers technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks