Tag Archives: AHTK4

Anti-Hacker Tool Kit 4

Warehouse 13½

Today they creep closer.

In a warehouse somewhere in the U.S., a pile of skulls waits impatiently to be unleashed upon the world. Technically, they’re printed on the book cover for the 4th edition of the Anti-Hacker Tool Kit and therefore not capable of taking part in an apocalypse of the living dead. So, they’re not quite on the level of artifacts you might find in Warehouse 13. Never the less, it should be an entertaining book.
The new edition is a comprehensive rewrite of the material that first appeared over a decade ago. Inside it you’ll find guidance on how to use a variety of tools related to information security. Each chapter starts with an explanation of the whys and wherefores of a security topic, then describes how such tools came about and what purpose they serve.

I’ll be posting supplemental details, thoughts about new tools, and helpful files on this site. For example, this previous post covered some configuration details for John the Ripper, which shows up in Chapter 15.

You can also find articles on web application security at my other site, Deadliest Web Attacks.

In the meantime, I’ll be working on more content. It takes a lot of effort to impress someone like Mrs. Frederic.

Whither the Skull?

Anti-Hacker Tool Kit 4The release of the newest edition of the Anti-Hacker Tool Kit draws nigh. The writing is done, the copy edits are finished, and the page proofs have been reviewed. It’s taken over a year to completely rewrite the content from the previous edition. For one thing, the previous edition came out in 2006 and had quaint mentions of floppy disks and wonderment at 100GB disk drives. Such references age poorly against computing’s progress. For another thing, obsolete tools needed to be removed and the chapter structure revamped. But it was all worthwhile.

The book with the skull on its cover is back. It arrives in February 2014. And it wants brains.

You can preorder it from Amazon here.

More info will appear on this site over the next few weeks. In the meantime, check out articles on web security at deadliestwebattacks.com.