Jump to ratings and reviews
Rate this book

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses

Rate this book
“I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn’t make any sense. I asked other people and they didn’t seem to know how these things work, or at least they couldn’t explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!”
―Stephen Northcutt, CEO, SANS Institute “Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
―Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery “Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It’s technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field.”
―From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections ; and coauthor of Network Private Communications in a Public World “What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks.”
―Lenny Zeltser, coauthor of Fighting Malicious Code “Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
―Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery “In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis’s real strength is in his ability to show complex topics in an understandable form. By the time he’s done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both.”
―William Stearns, network security expert, www.stearns.org “This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written.”
―Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks. For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You’ll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments. Important features of this new edition include

748 pages, Paperback

First published January 2, 2005

31 people are currently reading
393 people want to read

About the author

Edward Skoudis

2 books4 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
89 (39%)
4 stars
73 (32%)
3 stars
49 (21%)
2 stars
9 (4%)
1 star
5 (2%)
Displaying 1 - 4 of 4 reviews
Profile Image for Dennis Cahillane.
115 reviews10 followers
January 27, 2018
Very practical and clear rundown of black hat operations, from initial scanning to exfiltration and cleanup. Strongly recommended.
Profile Image for Mark.
216 reviews11 followers
June 19, 2022
Excellent overview of computer and network security concepts, issues and practical user actions. The book summarizes key under-the-hood concepts as clearly and simply as possible. Anyone who wants a fundamental understanding of the risks of connecting to any network should read this book.
9 reviews3 followers
April 11, 2007
Very informative with a decent background to bring you up to speed on how to hack. I learned a great deal from this book and found his suggestions very useful in security operations.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.