Rating:  Summary: Great book despite a few errors Review: Can't say much work wasn't put into this new book. The book includes very good coverage of old (but still active today) and new exploits. The scanning methodologies are very well written with much detail. And it looks like the author didn't make the mistake between the Port 7 echo and ICMP "ping" echo issue, and has posted the correction on his website. The proof (page 496-497) is where the author writes about the real vulnerability of port 7 echo, thus making the distinction. Chirillo says "ICMP echo requests (as used by "ping") do not use port 7 as they are ICMP not UDP. I cannot be certain when the two separate topics became entwined, only that my original compilations did not represent the mistake. The "echo" vulnerability takes place when telnetting to port 7 (echo), transmitted characters would typically be sent (echoed) back to the source." After contacting the author from his site, I was informed that a new printing is underway that includes this correction. Regardless, the book has my vote (4/5 stars) despite a few errors.
Rating:  Summary: a good reference Review: i recently bought this book and i recommend it as a reference for those of you who's looking for a reference book ...its worthy !
Rating:  Summary: Inform and Empower Review: Being on the internet and being connected is about knowing what should and should not go on inside your PC. It seems the cyber world is full of pranksters and worse, malicious attackers that love to search, enter and destroy. John Chirillos' book, "Hack Attacks Revealed" is a must read for everybody that surfs the net. "Hack Attacks Revealed" is upfront, written in plain language that can be understood, and you don't need to be a programer (although some knowledge would help) or a propeler head to benefit from this book. The book is accompanied with a CD-Rom and together they provide a wealth of information. It is designed to inform and empower one to recognize and deal with potential and actual malicious and hostile threats. "Hack Attacks Revealed" has allowed me to take proactive control of my network, keep informed and on top. Personal computing needs a direction and means to computer privacy and asset protection. John Chirillos' work is a step to that end. Thanks John
Rating:  Summary: This book is wonderful! Review: My son bought it and I am a computer technician, so I figured he must start somewhere, and when he asked me if he could but Hack Attacks Revealed, I was a bit... worried. But this isn't like those other books, "Hacking Exposed: 2nd Edition", "The Happy Hacker", "Secrets of a Superhacker: Knightmare", and possibly others I have not read. I would recommend this book to anyone interested in beginning hacking, but you will need some practice with computers before you should even consider it. Hacking is a delicate art, and it should (not) be abused. :-) On the CD is a VERY GOOD program called "TigerSuite." It is by far better than "Genius 2", "Sam Spade", "NetLab", "net.demon", and all other programs I have used for hacking. I suppose that is all.
Rating:  Summary: Be Prepared! Review: "Know the enemy and know yourself; in a hundred battles, you will never be defeated." Sun Tzu, Art of War, 500 BC. Sun Tzu's analogy of warfare applies equally to the subject of computer security. John Chirillo's Hack Attacks Revealed is a very comprehensive analysis of the threats and vulnerabilities of computers and their networks. The subject matter is clear and unambiguous, written for both the layman and the professional. The accompanying CD ROM contains an amazing array of tools and applications, providing many examples of the issues raised within the book. Hack Attacks Revealed is a most compelling reference and is highly recommended.
Rating:  Summary: All you need to know about hacking Review: Simply put there is no better hacking book. I have been hacking for about 9 years now and thought that i knew everything but when i read the book i was suprised! I recomed it for any one who has the slitest want in become a hacker.
Rating:  Summary: You get what you pay for Review: I was reluctant at first to buy this book. What can I say, It is NOT cheap. After reading a few chapters at the bookstore, I fessed up the cash. With so much information, I'm at a loss of words. Chirillo did an EXCELLENT job with the learning primers and the tons of security exploits. I guess just like all things in life, with this book you get what you pay for.
Rating:  Summary: Not just another security book Review: Where in the world is Carmen... NO, where did this author come from? This is the most comprehensive book on security, covering (A to Z) of the techniques and exploits of hackers, crackers, phreakers, script kiddies, and cyberpunks! The book is jam-packed with tutorials, not just overviews. It's like the best of Cisco Technology Handbook, Hacking Exposed, CCNP Exam Crams IN ONE BOOK. I hope this becomes an ongoing series. Dean Kisane, CISSP
Rating:  Summary: I've read through this great book Review: I have to say that this book is really very good. The contents and technical detail are clearly unmatched. The tigertools cd is equally beneficial. I've ordered the software from the site and I've already preordered Hack Attacks Complete, I'm really looking forward to it.
Rating:  Summary: Next one Review: I bought "hacke attacks revealed" and "hacke attacks denied" and have to say they are both great hacking/security books and are more than helpful for me to under the network security issues. I am looking forward to seeing the upcoming one and hope it won't be just = "revealed" + "denied"
|