Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks. For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You’ll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments. Important features of this new edition include: All-new “anatomy-of-an-attack” scenarios and tools; An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more; Fully updated coverage of reconnaissance tools, including Nmap port scanning and “Google hacking” New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit; New information on dangerous, hard-to-detect, kernel-mode rootkits.
Simply magnificent. Start here to learn digital security.
By Richard Bejtlich "TaoSecurity" - November 1, 2001
I am a senior engineer for network security operations, who has taught SANS, InfraGard, and FIRST audiences. Since late 1998 I've been looking for the one book I could recommend to newcomers to the digital security realm. Ed Skoudis' "Counter Hack" is that book. My previous reviews show I don't shelter weaker books, and I reserve praise for truly deserving titles. "Counter Hack" is a solid, accessible, practical title that merits my highest recommendation.
"Counter Hack" contains all I could ask for in an introductory book. Chapters three (30 pages) and four (40 pages) provide the basics of UNIX and Windows (respectively). For each operating system, one reads about file architecture, accountability, privileges, trust, and services. Armed with this background, "Counter Hack" then explains reconnaissance, scanning, application/OS-based attacks, network-based attacks, denial of service, maintaining access, and covering tracks... read more
Learn hacking strategies and defenses and have fun reading!!
By Michael Ressler - September 3, 2001
This is a "fun to read" book that fully describes the methodology of hacking attacks. It is by far the most enjoyable book I have read on the subject. The book is not a textbook or a reference book, yet I found that I learned a lot while I read it and I have continuously referenced it for specifics of the techniques that are described. Ed starts by providing short intros to UNIX, NT and IP networking, which provide valuable info to readers who don't have good backgrounds in all three. He then walks the reader through the typical steps of an attack. Each of the sections, Reconnaissance, Scanning, Gaining and Maintaining Access and Covering Your Tracks contain well-written, up-to-the minute descriptions of the current methodologies found in the field as well as descriptions of the tools that are used. He references the authors of the tools and points to their web-sites. There is great info on Sam Spade, THC-Scan, Cheops, nmap, nessus, IDS evasion techniques, buffer... read more
Great 2nd edition to a classic book on hacking exploits
By Sean E. Connelly "Just a bithead - CCIE#17085" - February 11, 2006
Please note this review is for the 2nd Edition of this book While "Counter Hack Reloaded" by Skoudis is an `Updated Edition of the Best-Seller' (per the book's cover), Counter Hack Reloaded (CHR) is really a new book in it's own right. CHR has gone through an extensive revision and is fully updated to meet today and tomorrow's emerging threats (i.e. wireless attacks). While 50% of the tools/exploits that are discussed in this book can be found in other `hack' books, the tools/exploits have been fully updated and document the latest commands. See page 21 of for a detailed explanation of CHR's updates.
Some quick points of interest for me: * Page 228 - excellent, quick description of DNS's characteristics (when DNS uses UDP vs TCP). * Page 264 - good explanation of UDP vs ICMP pings (something to remember when troubleshooting connectivity from different platforms). * Chapter 7 - Gaining Access at the OS and App level - very good discussion of buffer... read more
The classic "how-to" textbook of special effects makeup. Fully illustrated and thoroughly explained instructions on creating a wide range of effects, including fangs, foam latex prosthetic makeups, ...