Most importantly, the book provides a framework for performing penetration testing and offers step-by-step descriptions of each stage in the process. The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included.Comprehensive in scope Hack I.T. provides in one convenient resource the background, strategies, techniques, and tools you need to test and protect your system--before the real hackers attack.Specific topics covered in this book include: Hacking mythsPotential drawbacks of penetration testingAnnounced versus unannounced testingApplication-level holes and defensesPenetration through the Internet, including zone transfer, sniffing, and port scanningWar dialing Enumerating NT systems to expose security holesSocial engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacksThe Windows NT Resource kitPort scanners and discovery toolsSniffers and password crackersWeb testing toolsRemote control toolsFirewalls and intrusion detection systemsNumerous DoS attacks and tools 0201719568B01042002

Share This Book: