Jump to ratings and reviews
Rate this book

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses

Rate this book
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks.

For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You’ll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.

Important features of this new edition include

All-new “anatomy-of-an-attack” scenarios and tools An all-new section on wireless war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and “Google hacking” New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

766 pages, Kindle Edition

First published January 2, 2005

31 people are currently reading
393 people want to read

About the author

Edward Skoudis

2 books4 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
89 (39%)
4 stars
73 (32%)
3 stars
49 (21%)
2 stars
9 (4%)
1 star
5 (2%)
Displaying 1 - 4 of 4 reviews
Profile Image for Dennis Cahillane.
115 reviews10 followers
January 27, 2018
Very practical and clear rundown of black hat operations, from initial scanning to exfiltration and cleanup. Strongly recommended.
Profile Image for Mark.
216 reviews11 followers
June 19, 2022
Excellent overview of computer and network security concepts, issues and practical user actions. The book summarizes key under-the-hood concepts as clearly and simply as possible. Anyone who wants a fundamental understanding of the risks of connecting to any network should read this book.
9 reviews3 followers
April 11, 2007
Very informative with a decent background to bring you up to speed on how to hack. I learned a great deal from this book and found his suggestions very useful in security operations.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.