Shop top categories that ship internationally
Buy used:
$2.36
$19.98 delivery January 31 - February 24. Details
Used: Very Good | Details
Condition: Used: Very Good
Comment: Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc...
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Other sellers on Amazon
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses 1st Edition

4.5 4.5 out of 5 stars 26 ratings

There is a newer edition of this item:

This informal, step-by-step guide will empower every network and system administrator to defend their network assets, whether or not they have security experience. It covers both Unix and Windows platforms, presenting in-depth descriptions of the inner workings of the most destructive hacker tools, and proven, step-by-step countermeasures. Skoudis begins by presenting the hacker's view of networks and their vulnerabilities, with especially detailed coverage of how hackers view the TCP/IP protocol suite. He introduces all five phases of hacking: reconnaissance (targeting of a network); scanning for network vulnerabilities; gaining access and exploiting the system; maintaining access; and preventing detection. Counter Hack presents in-depth descriptions of the most widespread and dangerous attack scenarios, and the most widely-used hacker tools, including war dialers, port scanners, firewall scanners, sniffers, session hijackers, and more. For all system administrators, network administrators, security specialists, and others directly involved in protecting network and computing infrastructure.

Editorial Reviews

Amazon.com Review

In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies." The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.

The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall

Topics covered: How black-hat hackers work, what tools and techniques they use, and how to assess and improve your systems' defenses. The author explains how Windows, Unix, and TCP/IP can be exploited for nefarious purposes, and details a modus operandi that's typical of the bad guys.

From the Back Cover

The Next Generation Hacker Book

The step-by-step guide to defending against hacker intrusions!

  • Defend against today's most powerful hacker attacks!
  • Hands-on, step-by-step techniques for UNIX/Linux and Windows environments
  • Intrusion detection: New evasion techniques—and countermeasures
  • By the security expert who demonstrated hacking to the U.S. Senate!

This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assets—whether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics-and specific, proven countermeasures for both UNIX and Windows environments. Skoudis covers all this and more:

  • Know your adversary: from script kiddies to elite attackers
  • A hacker's view of networks, TCP/IP protocols, and their vulnerabilities
  • Five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection
  • The most dangerous and widespread attack scenarios—explained in depth
  • Key hacker tools: port scanners, firewall scanners, sniffers, session hijackers, RootKits, and more
  • How hackers build elegant attacks from simple building blocks
  • Detecting and preventing IP spoofing, covert channels, denial of service attacks, and other key attacks
  • How hackers cover their tracks—and how you can uncover their handiwork
  • A preview of tomorrow's hacker tools, attacks, and countermeasures

Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right now—and long-term strategies that will improve security for years to come.

Product details

  • Publisher ‏ : ‎ Prentice Hall PTR; 1st edition (January 1, 2002)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 564 pages
  • ISBN-10 ‏ : ‎ 0130332739
  • ISBN-13 ‏ : ‎ 978-0130332738
  • Item Weight ‏ : ‎ 2.5 pounds
  • Dimensions ‏ : ‎ 7 x 1.5 x 9.2 inches
  • Customer Reviews:
    4.5 4.5 out of 5 stars 26 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.5 out of 5 stars
26 global ratings

Review this product

Share your thoughts with other customers

Top reviews from the United States

  • Reviewed in the United States on May 17, 2002
    I decided to purchase this book based in large part on the fact that all the reviews at the time I was shopping gave it 5 stars. I was also looking for something that seemed a good introduction without being either totally non-technical or overwhelming technical.
    I'm well into the book now and can tell you that it definitely lives up to all those 5 star ratings. As others have said, it is an easy, enjoyable, and very informative read. Depending on your ultimate objectives you may eventually want to get even deeper into the technical aspects of security but for starters and for a good long term reference this book is excellent.
    Buy it. You won't be disappointed.
    3 people found this helpful
    Report
  • Reviewed in the United States on March 9, 2013
    The fundamental ideas of how to stave off hacks likely won't change for years to come (though some individual methods or protocols do), so this book is a decent guide to help start out anyone interested in network security.
    One person found this helpful
    Report
  • Reviewed in the United States on March 7, 2003
    Good book dinamic and simple. it does not use complicated words and easy to fallow.
    One person found this helpful
    Report
  • Reviewed in the United States on December 16, 2002
    After reading the introduction chapter, you get excited and think that this book might actually be some what different than any other hacking book on the market. It really isn't.
    If you have experience, the first 144 pages are a complete waste.
    The author provides a review of TCP/IP, Unix and NT in 144 pages.
    I have no doubt that the author is a seasoned professional. He even makes mention of the fact that he provides advice to the groups of authors who make the SANS security publications. Maybe he does, but this book is not written very well.
    If you actually read this entire book, you'll find yourself
    saying "I've read this somewhere else". Don't get me wrong, buy the book only if you have not read other security books. There are others that you should get before you read this one.
    16 people found this helpful
    Report
  • Reviewed in the United States on September 6, 2001
    For those of you out there who are new to computer security, or who understand theory and concepts and want some practical explanations about what's out there, this is a book you cannot do without. If you are really serious about wanting to know details about what you are up against when protecting your organization, or your PC from attacks you will not just want to glance through the book but read it from cover to cover. The is not a book that will teach you theory about encryption, PKI and all the mathamatical and computer science concepts that Computer Science or Computer Engineering majors usually learn. There are plenty of good books out there for that. This book is more of a practical hands-on approach to how attacks are executed and how to stop and defend against them.
    Ed Skoudis has really done a phenomenal job presenting the material in an organized, easy-to-follow format without making it like a 'security for dummies' type of book. He gives you knowledge and techniques you can apply. Ed begins with 3 chapters on the basics of TCP/IP, UNIX and Windows NT/2000. I found these three chapter very helpful in preparing for the rest of the book even though I have read books on and worked with all three before. Ed presents a few ideas about the vulnerabilities of these systems without going into detail. That comes later. Then he serves up the main course. The 5 phases of an attack are outlined and the following is a brief description:
    Phase 1: How do attackers do research on their targets ? This includes web sites where they look up their info, social engineering techniques, etc.
    Phase 2: How do they find vulnerable systems ? This includes war dialers, port scanners, network mappers etc. He also gives you detailed information about where you can find these tools how to use the most popular ones and how they actually work internally.
    Phase 3: What can an attacker actually do once he has found the vulnerabilities in your system and breached security ? This tells you about cracking passwords in UNIX and NT, how to attack web apps by finding bad cgi scripts, stack buffer overflows, packet sniffing, IP spoofing, etc. This once again has detailed explanations on where to get the tools and how they are used.
    Phase 4: How does the attacker maintain access to the system ? This tells you about trojan horses, back doors, Rootkits, etc
    Phase 5: How does the attacker cover his tracks ?

    Ed finally ties it all together by describing attacks using the phases and tools he talks about above with examples along with a discussion of mistakes made by system admins. I should also mention that for all the attacks mentioned in the book, Ed always fills you in on how to defend against them so you don't feel like you are fighting a losing battle as a system admin. The book is written in a way that is very easy to follow. It is almost like someone standing in front of you in a classroom and explaining things to you. Ed uses personal experiences along with light-hearted comments about system administrators and hackers that will make you smile so that the reading doesn't stay too serious.
    This book is worth reading and keeping as a reference. I gave it 5 stars because it is the best book I have seen on practical computer security.
    14 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • tamo
    4.0 out of 5 stars 豊富な図、例、具体的な解説
    Reviewed in Japan on October 4, 2004
    Windows と Unix の基本構造から始まり、
    IDS や sniffer の基本的な仕組みを経て、
    バックドアを仕掛けたあとの攻撃者の行動パターンまで考慮する本。
    攻撃者の心理、利点、弱点を考えてから対処策を解説する形式。
    攻撃者が IDS を避けるためのフラグメンテーションなどの仕組みを、
    TCP/IP の細かい規定などには触れずに、
    豊富な図とともに簡明に解説していたのが印象に残っている。
    全体的に図や例が多くて具体的であるが、将来の脅威にも
    対応できるように、一般性を失うことなく書かれている。
    私は自分のコンピュータに侵入された経験がないので、
    読む前は「どんな攻撃があるのか」「攻略されたあとにどうなるか」
    「侵入されたことに気付いたあとはどうすれば良いか」
    いずれもわからないで漠然とした不安だけがあったのだが、
    著者の見てきた実際の被害やアングラ情報に基づく解説によって、
    脅威と対策を実際的に考慮することができるようになった。
    私が「暗号の秘密とウソ」のような一般論を読んだあとで
    この本を読んだのは、偶然であるが最適な順序だったと考えている。
    セキュリティの考え方と、正確かつ最新の知識、いずれも
    重要である。ある程度セキュリティの概要をつかんだあとは、
    本書でひととおり攻撃と防御の手段を学ぶようお勧めする。
    厚い本だが、類書をいくつも読むより時間の節約になると思う。