Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.
"Sinopsis" puede pertenecer a otra edición de este libro.
Mike Schiffman has hit upon a great formula for Hacker's Challenge. Rather than try to research, fully understand, and adequately explain attacks that have taken place on other people's networks--the approach taken by too many writers of books about computer security--Schiffman lets network administrators and security experts tell their stories first-hand. This is good. What's better is that Schiffman has edited each of their war stories into two sections: one that presents the observations the sysadmin or security consultant made at the time of the attack, and another (in a separate part of the book) that ties the clues together and explains exactly what was going on. The challenge in the title is for you to figure out what the bad guys were doing--and how best to stop them--before looking at the printed solution. Let's call this book what it is: an Encyclopedia Brown book for people with an interest in network security.
It doesn't really matter, from a value-for-money standpoint, whether your skills are up to the challenge or not. The accounts of intrusions--these are no-kidding, real-life attacks that you can probably learn from, by the way--are written like chapters from a novel (though log file listings, network diagrams, and performance graphs appear alongside the narrative text). Recall every time you've seen a movie or read a book with computer scenes so technically inaccurate they made you wish for a writer with a clue. Schiffman and Hacker's Challenge is what you wished for. --David Wall
Topics covered: The sorts of attacks that black-hat hackers (everyone from script kiddies to accomplished baddies) launch against Internet-linked computers and networks. Everything is presented from the perspective of the defenders--i.e., the network administrators--who have to look at log files and process activity to figure out what's going on.From the Back Cover:
"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.
Excerpt from "The Insider":
Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....
After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.
Contributing authors include:
Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción McGraw-Hill Osborne Media, 2001. Softcover. Estado de conservación: New. Estado de la sobrecubierta: No Dust Jacket. Softcover is New, Laurie 3, ; 0.94 x 8.98 x 7.4 Inches; 300 pages. Nº de ref. de la librería 25380
Descripción McGraw-Hill Osborne Media. PAPERBACK. Estado de conservación: New. 0072193840 Ships promptly. Nº de ref. de la librería GSM4830JLGG030717H0199
Descripción McGraw-Hill Osborne Media. PAPERBACK. Estado de conservación: New. 0072193840 . Nº de ref. de la librería HCI3391.2DKGG053017H0405P
Descripción McGraw-Hill Osborne Media. PAPERBACK. Estado de conservación: New. 0072193840 Ships from Tennessee, usually the same or next day. Nº de ref. de la librería GBO9998LJGG080917H0485C
Descripción McGraw-Hill Osborne Media, 2001. Paperback. Estado de conservación: New. book. Nº de ref. de la librería M0072193840
Descripción McGraw-Hill Education - Europe, 2001. PAP. Estado de conservación: New. New Book. Shipped from US within 10 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. de la librería IQ-9780072193848
Descripción Paperback. Estado de conservación: New. This item is printed on demand. Item doesn't include CD/DVD. Nº de ref. de la librería 1707304
Descripción McGraw-Hill Osborne Media 2001-10, 2001. Estado de conservación: New. This item is printed on demand. Brand new book, sourced directly from publisher. Dispatch time is 24-48 hours from our warehouse. Book will be sent in robust, secure packaging to ensure it reaches you securely. Nº de ref. de la librería NU-LSI-06998390
Descripción McGraw-Hill Osborne Media, 2017. Paperback. Estado de conservación: New. Never used! This item is printed on demand. Nº de ref. de la librería 0072193840
Descripción McGraw-Hill Education - Europe, United States, 2001. Paperback. Estado de conservación: New. Language: English . Brand New Book ***** Print on Demand *****. Hacker s Challenge will consist of 20-25 hacking scenarios followed by the solution for each. The challenges/chapters are organized by increasing levels of complexity, and covers many hot topics, including Web content, VPNs, Denial of Service, wireless issues, e-commerce, email attacks and more. It includes input from top names in the industry - in addition to Mike Schiffman, consultants from the top security firms, such as Guardent, Foundstone, , In-Q-Tel, Arbor Networks, LoudCloud and more contribute their expertise. It is intended for a broad audience - Hacker s Challenge is for anyone who wants to solve the latest hacking challenges. It is a great companion to Hacking Exposed - an entire book of hands-on scenarios that compliment the Hacking Exposed text. Nº de ref. de la librería AAV9780072193848