Introduction -- Networking overview: pretty much everything you need to know about networking to follow the rest of this book -- Linux and UNIX overview: pretty much everything you need to know about Linux and UNIX to follow the rest of this book -- Windows NT/2000/XP/2003 overview: pretty much everything you need to know about windows to follow the rest of this book -- Phase 1: reconnaissance -- Phase 2: scanning -- Phase 3: gaining access using application and operating system attacks -- Phase 3: gaining access using network attacks -- Phase 3: denial-of-service attacks -- Phase 4: maintaining access: trojans, backdoors, and rootkits ... Oh my! -- Phase 5: covering tracks and hiding -- Putting it all together: anatomy of an attack -- The future, references, and conclusions