The best part of this book may be two chapters, one each for Windows and Unix, which explain the essential security terms, conventions, procedures and behaviours of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall
Topics covered: How black-hat hackers work, what tools and techniques they use, and how to assess and improve your systems' defences. The author explains how Windows, Unix, and TCP/IP can be exploited for nefarious purposes and details a modus operandi that's typical of the bad guys.
My cell phone rang. I squinted through my sleepy eyelids at the clock. Ugh! 4 a.m., New Year's Day. Needless to say, I hadn't gotten very much sleep that night.
I picked up the phone to hear the frantic voice of my buddy, Fred, on the line. Fred was a security administrator for a medium-sized Internet Service Provider, and he frequently called me with questions about a variety of security issues.
"We've been hacked big time!" Fred shouted, far too loudly for this time of the morning.
I rubbed my eyes to try to gain a little coherence.
"How do you know they got in? What did they do?" I asked.
Fred replied, "They tampered with a bunch of Web pages. This is bad, Ed. My boss is gonna have a fit!"
I asked, "How did they get in? Have you checked out the logs?"
Fred stuttered, "W-Well, we don't do much logging, because it slows down performance. I only snag logs from a couple of machines. Also, on those systems where we do gather logs, the attackers cleared the log files."
"Have you applied the latest security fixes from your operating system vendor to your machines?" I asked, trying to learn a little more about Fred's security posture.
Fred responded with hesitation, "We apply security patches every three months. The last time we deployed fixes was?um?two-and-a-half months ago."
I scratched my aching head and said, "Two major buffer overflow attacks were released last week. You may have been hit. Have they installed any RootKits? Have you checked the consistency of critical files on the system?"
"You know, I was planning to install something like Tripwire, but just never got around to it," Fred admitted.
I quietly sighed and said, "OK. Just remain calm. I'll be right over so we can start to analyze your machines."
You clearly don't want to end up in a situation like Fred, and I want to minimize the number of calls I get at 4 a.m. on New Year's Day. While I've changed Fred's name to protect the innocent, this situation actually occurred. Fred's organization had failed to implement some fundamental security controls, and it had to pay the price when an attacker came knocking. In my experience, many organizations find themselves in the same state of information security unpreparedness.
But the situation goes beyond these security basics. Even if you've implemented all of the controls discussed in my Fred narrative above, there are a variety of other tips and tricks you can use to defend your systems. Sure, you may apply security patches, use a file integrity checking tool, and have adequate logging, but have you recently looked for unsecured modems? Or, how about activating port-level security on the switches in your critical network segments to prevent powerful, new active sniffing attacks? Have you considered implementing non-executable stacks to prevent one of the most common types of attacks today, the stack-based buffer overflow? Are you ready for kernel-level RootKits? If you want to learn more about these topics and more, please read on.
As we will see throughout the book, computer attacks happen each and every day, with increasing virulence. To create a good defense, you must understand the offensive techniques of your adversaries. In my career as a system penetration tester, incident response team member, and information security architect, I've seen numerous types of attacks ranging from simple scanning by clueless kids to elite attacks sponsored by the criminal underground. This book boils down the common and most damaging elements from these real-world attacks, while offering specific advice on how you can proactively avoid such trouble from your adversaries. We'll zoom in on how computer attackers conduct their activities, looking at each step of their process so we can implement in-depth defenses.
The book is designed for system administrators, network administrators, and security professionals, as well as others who want to learn how computer attackers do their magic and how to stop them. The offensive and defensive techniques laid out in the book apply to all types of organizations using computers and networks today, including enterprises and service providers, ranging in size from small to gigantic.
Computer attackers are marvelous at sharing information with each other about how to attack your infrastructure. Their efficiency at information dissemination about victims can be ruthless. It is my hope that this book can help to even the score, by sharing practical advice about how to defend your computing environment from the bad guys. By applying the defenses from this book, you can greatly improve your computer security and, perhaps, we'll both be able to sleep in late next New Year's Day.
Good book dinamic and simple. it does not use complicated words and easy to fallow.Published on March 7 2003 by pretty rosa
I am an MCSE who recently inherited several Linux machines do to downsizing at my company. I purchased several books to help me shore up my unix security knowledge. Read morePublished on Jan. 5 2003 by Nicky Boran
After reading the introduction chapter, you get excited and think that this book might actually be some what different than any other hacking book on the market. Read morePublished on Dec 16 2002 by Nigel J Clarke
This book really exposes what hacking is all about. It takes the mystery out of how attackers actually penetrate systems and the tools that they used. Read morePublished on Sept. 12 2002
Akhou sha7ta,this easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assets-whether or not they have security... Read morePublished on June 1 2002 by tony dagher
I decided to purchase this book based in large part on the fact that all the reviews at the time I was shopping gave it 5 stars. Read morePublished on May 16 2002 by Gary
This is a great book, extremely useful to anyone interested in knowing how computer attacks are done - and the tools available on the market. Read morePublished on April 28 2002 by Cyrus Wekesa
There are books, special books and VERY special books.
The STEVENS 'Tcp/Ip Illustrated Vol I', is (as you surely know) a very special book. Read more