Minggu, 29 Desember 2013

Ebook Hacker's Challenge 2: Test Your Network Security & Forensic Skills

Leave a Comment

Ebook Hacker's Challenge 2: Test Your Network Security & Forensic Skills

Based upon some encounters of many people, it is in truth that reading this Hacker's Challenge 2: Test Your Network Security & Forensic Skills could help them making better option as well as give even more experience. If you wish to be one of them, allow's purchase this book Hacker's Challenge 2: Test Your Network Security & Forensic Skills by downloading guide on web link download in this site. You can obtain the soft file of this book Hacker's Challenge 2: Test Your Network Security & Forensic Skills to download and also deposit in your available electronic gadgets. What are you waiting for? Let get this publication Hacker's Challenge 2: Test Your Network Security & Forensic Skills on the internet and read them in at any time as well as any kind of place you will read. It will not encumber you to bring hefty book Hacker's Challenge 2: Test Your Network Security & Forensic Skills within your bag.

Hacker's Challenge 2: Test Your Network Security & Forensic Skills

Hacker's Challenge 2: Test Your Network Security & Forensic Skills


Hacker's Challenge 2: Test Your Network Security & Forensic Skills


Ebook Hacker's Challenge 2: Test Your Network Security & Forensic Skills

Introducing a new hobby for other people may inspire them to join with you. Reading, as one of mutual hobby, is considered as the very easy hobby to do. But, many people are not interested in this hobby. Why? Boring is the reason of why. However, this feel actually can deal with the book and time of you reading. Yeah, one that we will refer to break the boredom in reading is choosing Hacker's Challenge 2: Test Your Network Security & Forensic Skills as the reading material.

Often, individuals may think that reading will be so great as well as awesome. Additionally, people that are reading are considered as a very creative individuals. Is that right? Maybe! One that can be remembered is that reading routine does not just do by the brilliant people. Most of smart people also feel lazy to review, in addition to read Hacker's Challenge 2: Test Your Network Security & Forensic Skills It's seemly that people who have analysis routine have various personality.

You could choose to this book due to the fact that it is basic points to overcome. It implies that words as well as language to make use of in this Hacker's Challenge 2: Test Your Network Security & Forensic Skills come in simpleness. This prospective publication will certainly assist you easily to make far better idea of brand-new thought and also updated information. When you actually intend to get this book, juts find it in this internet site. We will aid you to see the book link then get it as your own. This doesn't indicate to overwhelm you to be in tight spot.

Making you feel pleased for concerning this book, you can see as well as ask for others concerning this publication. The assurance is that you can obtain the book easily and also get this terrific publication for your life. Reviewing book is very should do. When you think it will certainly not work in the meantime, it will offer far more priceless things, even often. By reading this book, you could really feel that it's extremely required to obtain guide in this site as a result of the easy methods supplied.

Hacker's Challenge 2: Test Your Network Security & Forensic Skills

From the Back Cover

"Awesome....Incredibly informative, insightful, as well as a lot of fun to read. Recommended for anyone who values the integrity and security of their network." --Shawn Bracken, Principal Research Engineer, Cenzic, Inc. Do you have what it takes to keep hackers out of your network? This unique volume tests your computer forensics and response skills with 20 brand-new, real-life security incidents as told by top-tier security experts. In an entertaining and informative style, this book addresses key security topics, including Denial of Service, malicious code, Web application attacks, wireless technologies, insider and outsider attacks, and more. Each challenge unfolds like a chapter from a novel and includes details of the incident--how the break-in was detected, evidence, and background such as log files and network diagrams--and is followed by a series of questions for you to solve. In Part II, you'll find a detailed explanation of exactly what was happening in each incident and the answers to the questioned posed in Part I, along with prevention and mitigation techniques. Excerpt from "One Thing Leads to Another": The Challenge: John is the I.T. Manager for a movie company working on the special effects for a hit film.... But the fan site has just posted an unauthorized clip of one of the most anticipated scenes in the movie.... A postproduction team member put the clip on the server but no one accessed it after that, at least not via FTP.... Then it happened again: more footage was released.... The Web master of the fan site supplied the e-mail address from which he received the files. John checked the ssh logs and the Web server logs.... He found an IP address he had not seen before.... He pinged the IP address then checked his arp table to get the machine's MAC address.... He began tracing the cable back to its source: the proxy server, which had not been used in 8 months.... The Solution: After reviewing the log files included in the challenge, propose your assessment: How could the employees have approached the initial investigation differently that may have helped them get to the culprit sooner? What does the lack of evidence in the ftp and ssh logs reveal? Was John's method of tracking down the proxy server the best method? What is the best solution to solve the vulnerability? Then, turn to the experts' answers to find out what really happened.

Read more

About the Author

Mike Schiffman, CISSP, has been involved in most every technical arena computer security has to offer. He has researched and developed many cutting edge technologies including tools such as firewalk and tracerx as well as the ubiquitously used low-level packet shaping library libnet. Mike has led audit teams through engagements for fortune 500 companies in the banking, automotive and manufacturing industries. He has spoken in front of several institutions and government agencies such as: NSA, CIA, DOD, AFWIC, SAIC, and army intelligence. Mike is the lead author of Hacker’s Challenge, and has written for numerous technical journals such as Software Magazine and has written articles for securityfocus.com, and authored many security white papers. Currently, Mike is the Director of Security Architecture for @stake, the leading provider of professional security services. Previous to @stake, Mike was the Director of Research and Development for Guardent, Inc. Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hacker’s Challenge. David Pollino Director of the Wireless Center of Excellence at @stake, Inc., conducts leading research into wireless security issues. He is a respected information security consultant with an extensive networking background. His wireless and network security expertise is published in magazines and books. David speaks on security issues at several industry events. David was a contributing author to several chapters of the original Hacker’s Challenge.

Read more

Product details

Series: Hacking Exposed

Paperback: 352 pages

Publisher: McGraw-Hill Osborne Media; 2nd edition (December 18, 2002)

Language: English

ISBN-10: 9780072226300

ISBN-13: 978-0072226300

ASIN: 0072226307

Product Dimensions:

7.3 x 0.8 x 9.1 inches

Shipping Weight: 12.6 ounces

Average Customer Review:

4.8 out of 5 stars

12 customer reviews

Amazon Best Sellers Rank:

#2,107,345 in Books (See Top 100 in Books)

Easy to read for beginners and tests your skills at all levels. This is a must in our library and anyone concerned about security should add it as well.Great read!

Great!!!!As advertised...

Yes, Slightly better than the first edition.However, if you need or like this kind of books give first a try to "Stealing the Network: How to Own the Box" by Ryan Russell, the same idea, but a lot more illustrative and easy to read (still with the same level of very up to date information).Some extra bucks to spend ?. . . OK, then try both, they complement each other very well.

great book series, was sent what was ordered in a reasonable time period with minimal ware on the used book.

Great book for a curious security beginner.. You can learn cases of real world from here, rare book in malaysia.. Arrived beautifully

Besides being very entertaining this book offers a great deal of knowledge. If you are able to recognize all the concepts inside, it will serve as a perfect reference and starting point book.Very, very nice book.

The second "The Hacker's Challenge" brought with it another sleepless night of fun security reading. 19 attack cases with solutions and mitigation and prevention strategies are described by a team of known expert authors led by Mike Schiffman.Impressive wireless DoS attack, social engineering penetrations (including one case with no technical penetration whatsoever), mysterious web defacements, SQL injection, DNS tunneling case and router attack inform and educate, just as the first book did. Authors' mildly perverse sense of humor keeps the reader in a good mood. The book begs to be read in one helping (and then reread, as needed)! "The Challenge 2" again covers a wide range of victims and attack methods.An interesting case asks for writing an exploit and provides a walkthrough for a simple local buffer overflow attack, a novel feature of this edition.At about scenario 12, things start to heat up and solving the case starts to require some thinking. Harder to crack cases and more sophisticated attackers up the fun level and value of information learned. Just as in the first book, solving the case usually takes some log analysis, some security knowledge and careful reading about character actions and observations.In addition to technology-astute readers, the book will also satisfy the hard-core security policy fans. Some of the questions asked about the cases involve policy decisions.As for the book minor blemishes, it suffers a bit from a "sequel syndrome". Namely, since the first book was so amazingly good, it is very hard to beat it and most people will compare it to the first one. Let's say that "The Challenge 2" is almost as good as its predecessor. A couple of scenarios sound somewhat ridiculous (e.g. one on "wireless terrorists"). Another couple is painfully obvious (few people are impressed by a /bin/sh bound to a port in inetd.conf or by a default router password nowadays). In addition, the scenario names often give out a hint that spoils the fun of "cracking" the story ("Freeloader" and some others).Overall, the book is a must have, both for its educational and entertainment value. The Hacker Challenge books fuse fun storyline, mystery and technical information in one great package, that makes for awesome reading for all technical readers, in security field and beyond. It was clearly a great idea to invent such a "security thriller" book.Anton Chuvakin, Ph.D., GCIA is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org

I read and reviewed the original "Hacker's Challenge" in Nov 01, and gave that book four stars. Mike Schiffman and crew have recaptured the magic and published another winner: "Hacker's Challenge 2" (HC2). This is the sort of book that needs to be used when interviewing new hires or promoting technical staff. If the candidate has read the book and knows the answers to the challenges, she at least demonstrates her commitment to learning, as well as an ability to remember what she reads. If she can solve the challenges without having read the book, she shows a higher level of skill. If she has no clue how to respond to the challenges, you can move on to the next candidate.The majority of HC2 involves three subjects. Challenges 1,3,7, and 16 revolve around wireless insecurities. Challenges 2,5,6,15, and 17 discuss network-based attacks. Solving the mysteries of challenges 4,11,12,14,18, and 19 require log analysis. A few other issues are sprinkled through the text: social engineering (ch. 8), host-based digital forensics (ch. 9), a man-in-the-middle attack against SSH (ch. 13), and a crafty buffer overflow tutorial (ch. 10). None of the material struck me as being exceptionally original, although this accurately reflects the sorts of cases handled by most consultants! I was impressed by the level of explanation offered by challenge 17, where vulnerabilities associated with VLAN 1 were exposed.HC2 has a few weaknesses. I was sorry to see Peter Lemonjello fired in challenge 5, but he appeared to strike again in challenge 11. Pages 126-8 featured some of the oddest techno-babble in print, offering obscure references to Rabindranath Tagore and condescending dialogue with a tech support staffer. I've given up on seeing Mike Schiffman correctly abbreviate the Air Force Information Warfare Center as "AFIWC" in his biography. His use of "AFWIC" must refer to the UN's AFrican Women In Crisis program and not the talk he gave to the AFIWC in Apr 99!HC2 is the first must-buy of 2003, but it leaves some room for improvement. Future editions should provide greater details in the solutions, like explanations of the fields in various firewall logs. I'd also like to see the author's names on the challenges, as appeared in the first HC book. The bottom line is that HC2 is a fast read that will entertain, and more importantly, educate.

Hacker's Challenge 2: Test Your Network Security & Forensic Skills PDF
Hacker's Challenge 2: Test Your Network Security & Forensic Skills EPub
Hacker's Challenge 2: Test Your Network Security & Forensic Skills Doc
Hacker's Challenge 2: Test Your Network Security & Forensic Skills iBooks
Hacker's Challenge 2: Test Your Network Security & Forensic Skills rtf
Hacker's Challenge 2: Test Your Network Security & Forensic Skills Mobipocket
Hacker's Challenge 2: Test Your Network Security & Forensic Skills Kindle

Hacker's Challenge 2: Test Your Network Security & Forensic Skills PDF

Hacker's Challenge 2: Test Your Network Security & Forensic Skills PDF

Hacker's Challenge 2: Test Your Network Security & Forensic Skills PDF
Hacker's Challenge 2: Test Your Network Security & Forensic Skills PDF

0 komentar:

Posting Komentar