Cover image for Hack attacks revealed : a complete reference with custom security hacking toolkit
Hack attacks revealed : a complete reference with custom security hacking toolkit
Chirillo, John, 1970-
Personal Author:
Second edition.
Publication Information:
New York : Wiley, [2002]

Physical Description:
xiii, 914 pages : illustrations ; 24cm + 1 computer optical disc (4 3/4in.)
Format :


Call Number
Material Type
Home Location
Item Holds
QA76.9.A25 C48 2002 Adult Non-Fiction Central Closed Stacks

On Order



The much-anticipated second edition of the bestselling book that details network security through the hacker's eye
Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.
In this fascinating new edition, you'll discover:
* The hacker's perspective on security holes in UNIX, Linux, and Windows networks
* Over 170 new vulnerabilities and exploits
* Advanced discovery techniques
* A crash course in C for compiling hacker tools and vulnerability scanners
* The top seventy-five hack attacks for UNIX and Windows
* Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSuite Professional 3.5 (full suite single license)

Author Notes

JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

Table of Contents

Acknowledgmentsp. vii
A Note to the Readerp. viii
Introductionp. ix
Part 1 Technologyp. 1
Chapter 1 Understanding Communication Protocolsp. 3
A Brief History of the Internetp. 3
ARP/RARP Engineering: Introduction to Physical Hardware Address Mappingp. 24
Transmission Control Protocolp. 27
User Datagram Protocolp. 32
Internet Control Message Protocolp. 34
Moving Forwardp. 38
Chapter 2 Novell IPX, SPX, and NetBIOS Technologyp. 39
NetWare: Introductionp. 39
NetBIOS Technology: Introductionp. 49
NetBEUI: Introductionp. 55
Conclusionp. 56
Chapter 3 Understanding Communication Mediumsp. 57
Ethernet Technologyp. 57
Token Ring Technologyp. 64
Fiber Distributed Data Interface Technologyp. 68
Analog Technologyp. 71
Integrated Services Digital Network Technologyp. 75
Digital Subscriber Line and Cable Modemsp. 78
Wireless 802.11 Preamblep. 79
Point-to-Point Technologyp. 80
Frame Relay Technologyp. 83
Looking Aheadp. 87
Part 2 Discoveryp. 89
Intuitive Intermission: A Little Terminologyp. 91
Who Are Hackers, Crackers, Phreaks, Script Kiddies, and Cyberpunks?p. 91
Security Levelsp. 96
Kickoffp. 100
Chapter 4 Well-Known Ports and Their Servicesp. 101
A Review of Portsp. 101
Detrimental Services and Associated Portsp. 120
What's Nextp. 160
Chapter 5 Discovery and Scanning Techniquesp. 161
Discoveryp. 161
Site Port Scansp. 189
Summaryp. 214
Part 3 Penetrationp. 215
Intuitive Intermission: A Hacker's Genesisp. 217
Chapter 6 Port, Socket, and Service Vulnerability Penetrationsp. 223
Example Case Synopsisp. 223
Backdoor Kitsp. 229
Common Backdoor Methodsp. 232
Floodingp. 233
Log Bashingp. 236
Mail Bombing, Spamming, and Spoofingp. 239
Password Crackingp. 241
Password Recovery (Cisco)p. 248
Remote Controlp. 255
Routing Elements and Discovery (Cisco)p. 260
Scanning Intrusion Detection Systemsp. 270
Sniffingp. 277
Spoofing IP and DNSp. 280
Trojan Infectionp. 291
Viral/Worm Infectionp. 300
Wardialingp. 308
Web Page Hackingp. 309
Wireless LAN (WLAN) Hackingp. 319
Part 4 Vulnerabilitiesp. 325
Intuitive Intermission: A Hacker's Vocationp. 327
Chapter 7 Gateways and Routers and HTTPdp. 329
Gateways and Routersp. 330
The Internet Server Daemon HTTPdp. 343
Conclusionp. 362
Chapter 8 Operating Systemsp. 365
NIXp. 366
AIXp. 376
BSDp. 378
HP-UXp. 380
IRIXp. 383
Linuxp. 387
Macintoshp. 398
Microsoft Windowsp. 399
Novell NetWarep. 435
OS/2p. 445
SCOp. 446
Solarisp. 449
Conclusionp. 453
Chapter 9 Proxies and Firewallsp. 455
Internetworking Gatewaysp. 455
Conclusionp. 484
Chapter 10 The Top 75 Hack Attacksp. 485
Part 5 The Hacker's Toolboxp. 545
Intuitive Intermission: The Evolution of a Hackerp. 547
Chapter 11 TigerSuite: The Complete Internetworking Security Toolboxp. 557
Tiger Terminologyp. 557
Introduction to TigerSuite Professional 3.5p. 562
Program Modulesp. 567
TigerBox Toolkitp. 575
Some Real-World Discoveryp. 594
Conclusionp. 609
Chapter 12 The Hacker's Technology Handbookp. 611
Networking Conceptsp. 611
Networking Technologiesp. 637
What Routers Need to Route Effectivelyp. 657
Routing Protocolsp. 658
Virtual Local Area Networksp. 663
Looking Aheadp. 670
Chapter 13 Hacker Coding Fundamentalsp. 671
The C Programming Languagep. 671
A Crash Course in Cp. 672
C Programming Fundamentalsp. 682
Structure of Cp. 684
C Compilationp. 686
Working with Graphicsp. 781
Appendix A IP Reference Table and Subnetting Chartsp. 809
Appendix B Well-Known Ports and Servicesp. 813
Appendix C All-Inclusive Ports and Servicesp. 819
Appendix D Detrimental Ports and Servicesp. 859
Appendix E What's on the CDp. 865
Tiger Tools 2000p. 866
TigerSuite Professional 3.5p. 866
Chapter 5p. 867
Chapter 6p. 868
Chapters 7, 8, and 9p. 875
Toolsp. 876
Chapter 14p. 876
Appendix F Most Common Virusesp. 876
Appendix G Vendor Codesp. 876
Glossaryp. 877
Referencesp. 889
Indexp. 891