Hacking Exposed; Network Security Secrets and Solutions

( 8 )

Overview

Best way to secure your network? Break in! And that's exactly what InfoWorld security watch columnists Stuart McClure and Joel Scambray plus Extreme Hacking instructor George Kurtz show you how to do in Hacking Exposed: Network Security Secrets & Solutions. Arming you with a hacker's arsenal,they help you pinpoint vulnerable areas and apply effective security countermeasures in UNIX

(including Linux),Windows NT/95/98,and Novell networks. You'll discover the "InfoWorld Security Sweet 16" the top 16 hacks the ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (52) from $1.99   
  • New (3) from $7.55   
  • Used (49) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$7.55
Seller since 2010

Feedback rating:

(117)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
1999 Trade paperback New. No dust jacket as issued. Trade paperback (US). Glued binding. 700 p. Contains: Illustrations. Audience: General/trade. Computer networks; Computer ... security; Computers; Data protection; General; Networking; Non-Fiction; Security; Security measures Read more Show Less

Ships from: Lakewood, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$31.99
Seller since 2008

Feedback rating:

(169)

Condition: New
0072121270 BRAND NEW NEVER USED IN STOCK 125,000+ HAPPY CUSTOMERS SHIP EVERY DAY WITH FREE TRACKING NUMBER

Ships from: fallbrook, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$45.00
Seller since 2014

Feedback rating:

(136)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Best way to secure your network? Break in! And that's exactly what InfoWorld security watch columnists Stuart McClure and Joel Scambray plus Extreme Hacking instructor George Kurtz show you how to do in Hacking Exposed: Network Security Secrets & Solutions. Arming you with a hacker's arsenal,they help you pinpoint vulnerable areas and apply effective security countermeasures in UNIX

(including Linux),Windows NT/95/98,and Novell networks. You'll discover the "InfoWorld Security Sweet 16" the top 16 hacks the authors themselves use to test systems and the top 15 security flaws that commonly afflict networks. In no time you'll learn how to. . .

*Repair e-mail and Web security holes

*Find and eliminate back doors,Trojan horses,viruses,and buffer overflows

*Recognize exposures from dial-up modems,modem pools,and RAS servers

*Locate and scan for vulnerable systems using Whois,Domain Name System queries,Ping sweeps,Port scans,and OS detection

*Crack accounts and passwords,escalate privilege,and exploit trusts

*And much,much more.

It's 1 a. m. . . Do You Know Who's on Your Network? Defend your network against the sneakiest hacks and latest attacks! In this must-have handbook,security experts Stuart McClure,Joel Scambray,and George Kurtz give you the full scoop on some of the most highly publicized and insidious break-ins - and show you how to implement bulletproof security on your own system. All aspects of network security are included - from informational scans and probes to password vulnerabilities,dialup networking insecurities,buffer overflows,web and email insecurities,trojans,and back doors. Hacking Exposed: Network Security Secrets &Solutions covers all security,auditing,and intrusion detection procedures for UNIX (including Linux),Windows NT/95/98,and Novell networks.

Learn to: Find,exploit,and apply countermeasures for security holes in UNIX,Linux,Windows NT/95/98,and Novell networks.

Repair email and web security holes (CGI,Perl,ASP,browsers,and hostile mobile code).

Understand how back channels and port redirection are used to circumvent firewalls.

Locate and scan for vulnerable systems using Whois,Domain Name System queries,Ping Sweeps,Port scans,and OS detection.

Enumerate users,groups,shares,file systems,and services with no authentication. Crack accounts and passwords,escalate privilege,and exploit trusts.

Find and eliminate back doors,Trojan horses,viruses,and buffer overflows.

Implement auditing and intrusion detection solutions.

Recognize vulnerabilities from dialup modems,modem pools,and RAS servers.

Read More Show Less

What People Are Saying

Mike D. Schiffman
The authors have put together an excellent up-to-date resource on modern security vulnerabilities. More than a how-to manual, it's a how to do it right manual. A book like this has been needed for quite some time now.
Mike D. Schiffman ("Route"), security researcher and author of the Firewalk tool
Mudge of the LOpht
Understanding how to mount and create attacks is the only way you can protect against existing and, more importantly, future attacks. The information contained herein arms those on the defensive (security admin, network architects, software developers, etc) with this knowledge. It is refreshing to see this sort of material finally being made available to the general public.
Mudge of the L0pht security research group, developers of the L0phtcrack NT password auditing tool
Simple Nomad
Destined to be a classic! The underground already knows this stuff, and now the sys admins will see their systems through the intruder's eyes.
¾Simple Nomad, Renowned Security Researcher and Author of The Hack FAQ
Read More Show Less

Product Details

  • ISBN-13: 9780072121278
  • Publisher: Osborne/ Mc-Graw Hill
  • Publication date: 9/28/1999
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 484
  • Product dimensions: 7.39 (w) x 9.08 (h) x 1.29 (d)

Meet the Author


Stuart McClure and Joel Scambray write the Security Watch column for InfoWorld magazine. Stuart McClure is a Senior Manager and Joel Scambray is a Manager at Ernst & Young's eSecurity Solutions group. They have managed information on security in academic, corporate, and government environments for the past nine years.

George Kurtz, Extreme Hacking instructor and renowned Black Hat speaker, is a Senior Manager at Ernst & Young's eSecurity Solutions group and the Attack and Penetration director within their Profiling service line. George has performed hundreds of firewall, network, and eCommerce related security assessments throughout his security consulting career. Additionally, he has written several articles for various security related publications.

Read More Show Less

Read an Excerpt


Chapter 4: Hacking Windows 95/98

Introduction

The most important thing for a network administrator or end user to realize about Windows 95/98 (hereafter Win 9x) is that it was not designed to be a secure operating system like its cousin Windows NT. In fact, it seems that Microsoft went out of its way in many instances to sacrifice security for ease of use when planning the architecture of Windows 9x.

This becomes double jeopardy for administrators and security-unaware end users. Not only is Win 9x easy to configure, but the people most likely to be configuring it are unlikely to take proper precautions (like good password selection).

Furthermore, that unwary end user could be providing a back door into your corporate LAN, or could be storing sensitive information on a home PC connected to the Internet. With the increasing adoption of cable and DSL high-speed, always-on Internet connectivity, this problem is only going to get worse. Whether you are an administrator or you use Win 9x to surf the Net and access your company's network from home, you need to understand the tools and techniques that will likely be deployed against you.

Fortunately, Win 9x's simplicity also works to its advantage security-wise. Because it was not designed to be a true multiuser operating system, it has extremely limited remote administration features. It is impossible to execute commands remotely on Win 9x systems using built-in tools, and remote access to the Win9x Registry is only possible if access requests are first passed through a security provider such as a Windows NT or Novell NetWare server. This is called user-level security, versus the locally stored, username/password-based share-level security that is the default behavior of Win 9x. (Win 9x cannot act as a user-level authentication server.)

Thus, there are only two ways for attackers to "own" a Win 9x system (that is, gain complete control over it): trick the system's operator into executing code of their choice, or gain physical access to the system's console. We have divided this chapter according to these two approaches, remote and local.

In the first section, we will see that Win 9x's architecture makes it nearly impossible to attack from a remote location unless the system owner makes key errors. The second part of the chapter, on local Win 9x exploits, will demonstrate that if someone gains physical access to your Win 9x system, many other wonderful options become available to attackers.

Win 9X Remote Exploits

Remote exploitation techniques for Win 9x fall into four basic categories: direct connection to a shared resource (including dial-up resources), installation of backdoor server daemons, exploitation of known server application vulnerabilities, and denial of service. Note that three of these situations require some misconfiguration or poor judgment on the part of the Win 9x system user or administrator, and are thus easily remedied.

System Hacking Case Study: The Art of Gaining Access

The first leg of our journey through the catacombs of hackerdom is complete: we've seen how targets are selected, probed for vulnerabilities, and gradually exposed for takeover. Once the crust has been pierced, there's nothing left but the cream filling, right? Wrong-contrary to popular accounts, information systems can be difficult to break into if configured properly. After all, they are only cold-hearted machines that do not easily yield to cajolery, trickery, bribery, brute force, or the threat thereof. In the following pages, however, we will see that human thoughtlessness, laziness, or just plain ignorance lead to most system compromises. Only occasionally do inherent architectural flaws give easy access to a system, and usually they are quickly patched (although we'll talk about some that aren't, since they are invariably present on most networks).

Perhaps the most common security flaw encountered is poor username/password management. Usernames and passwords are the most widely deployed keys to the information kingdom, and most approaches to system hacking involve trying to get at them in any way possible.

One of the most renowned hackers of our time, Kevin Mitnick, understood this paradigm well. Often regarded as a technical genius, Mitnick was probably just as skilled at nontechnical means of obtaining user credentials on systems he targeted. He is alleged to have broken into computers at Digital Equipment Corp., Sun Microsystems Inc., Motorola Inc., Netcom On-Line Communication Services, Inc., an eclectic ISP known as The Well in Northern California, and perhaps many more. As with most hacks, many of the techniques he employed are not public knowledge, but what does seem clear is that he collected and leveraged lists of usernames and passwords from all the systems he penetrated. The 1996 federal indictment against him was primarily based on his unauthorized possession of passwords for computers at Sun, the University of Southern California, Novell Inc., Motorola, Fujitsu Ltd., and NEC Ltd. See http://www.kevinmitnick.com/ for more information about Kevin Mitnick, or pick up the excellent book The Fugitive Game, by Jonathan Littman.

Once infested, a network is extremely difficult to rid of such an unauthorized presence. Mitnick's infiltration of The Well was rumored to be so extensive that he caused system slowdowns with the resources he consumed. He reportedly attained root, or superuser, status on critical systems.

This should be warning enough to motivate system administrators to tighten password policies and regularly audit user compliance. If you still aren't convinced, read on to see how easy it can be to crack entire networks once a single user account has been compromised.

Direct Connection to Win 9x Shared Resources

This is the most obvious and easily breached doorway into a remote Win 9x system. There are three mechanisms Win 9x provides for direct access to the system: file and print sharing, the optional dial-up server, and remote Registry manipulation. Of these, remote Registry access requires fairly advanced custornization and user-level security, and is rarely encountered on systems outside of a corporate LAN.

One skew on the first mechanism of attack is to observe the credentials passed by a remote user connecting to a shared resource on a Win 9x system. Since users frequently reuse such passwords, this often yields valid credentials on the remote box as well. Even worse, it exposes other systems on the network to attack.

Hacking Win 9x File and Print Sharing
Popularity: 8
Simplicity: 9
Impact: 8
Risk Rating: 8

We aren't aware of any techniques to take advantage of Win 9x print sharing (not considering joyriding on the target system's shared printer), so this section will deal exclusively with Win 9x file sharing.

We've already covered some tools and techniques that intruders might use for scanning networks for Windows disk shares (see Chapter 3), and noted that some of these also have the capability to attempt password-guessing attacks on these potential entry points. One of those is Legion from the Rhino9 group. Besides the ability to scan an IP address range for Windows shares, Legion also comes with a "BF tool" that will guess passwords provided in a text file and automatically map those that it correctly guesses. BF stands for "brute force," but this is more correctly called a dictionary attack since it is based on a password list. One tip: the Save Text button in the main Legion scanning interface dumps found shares to a text file list, facilitating cut and paste into the BF tool's Path parameter text box, as Figure 4-1 shows.

The damage that intruders can do depends on the directory that is now mounted. Critical files may exist in that directory, or some users may have shared out their entire root partition, making the life of the hackers easy indeed. They can simply plant devious executables into the %systemroot%\Start Menu\Programs\Startup. At the next reboot, this code will be launched (see upcoming sections in this chapter on Back Orifice for an example of what malicious hackers might put in this directory). Or, the PWL file(s) can be obtained for cracking (see later in this chapter).

FILE SHARE HACKING COUNTERMEASURES Fixing this problem is easy-turn off file sharing on Win 9x machines! For the system administrator who's worried about keeping tabs on a large number of systems, we suggest using the System Policy Editor (POLEDIT.EXE) utility to disable file and print sharing across all systems. POLEDIT.EXE, shown in Figure 4-2, is available with the Windows 9x Resource Kit, or Win 9x RK, but can also be found in the \tools\reskit\netadmin\ directory on most Win 9x CD-ROMs, or at http://support.microsoft.com/support/kb/articles/Q135/3/15.asp.

If you must enable file sharing, use a complex password of eight alphanumeric characters (this is the maximum allowed by Win 9x) and include metacharacters (such as [ ! @ # $ % &) or non-printable ASCII characters. It's also wise to append a $ symbol, as Figure 4-3 shows, to the name of the share to prevent it from appearing in the Network Neighborhood, in the output of net view commands, and even in the results of a Legion scan.

Replaying the Win 9x Authentication Hash
Popularity: 8
Simplicity: 3
Impact: 9
Risk Rating: 7

On January 5, 1999, the group known as the LOpht released a security advisory that pointed out a flaw in the Windows 9x network file sharing authentication routines (see http://www.10pht.com/ advisories/95replay.txt). While testing the new release of their notorious LOphtcrack password eavesdropping and cracking tool (see Chapter 5), they noted that Win 9x with file sharing enabled reissues the same "challenge" to remote connection requests during a given 15-minute period. Since Windows uses a combination of the username and this challenge to hash (cryptographically scramble) the password of the remote user, and the username is sent in cleartext, attackers could simply resend an identical hashed authentication request within the 15-minute interval and successfully mount the share on the Win 9x system. In that time period, the hashed password value will be identical.

Although this is a classic cryptographic mistake that Microsoft should have avoided, it is difficult to exploit. The LOpht advisory alludes to the possibility of modifying the popular Samba Windows networking client for UNIX (http://www.samba.org/) to manually reconstruct the necessary network authentication traffic. The programming skills inherent in this endeavor, plus the requirement for access to the local network segment to eavesdrop on the specific connection, probably set too high a barrier for widespread exploitation of this problem. Perhaps this is why Microsoft has not issued a fix, but that shouldn't ever be an excuse. So, try not to lose too much sleep over all those defenseless Win 9x shares out there, OK?

Hacking Win 9x Dial-Up Servers
Popularity: 8
Simplicity: 9
Impact: 8
Risk Rating: 8

The Windows Dial-Up Server applet included with Win 9x, shown in Figure 4-4, is another one of those mixed blessings for sys admins. Any user can become a back door into the corporate LAN by attaching a modem and installing the inexpensive Microsoft Plus! for Windows 95 add-on package that includes the Dial-Up Server components (it now comes with the standard Win 98 distribution).

A system so configured is almost certain to have file sharing enabled, since this is the most common way to perform useful work on the system. It is possible to enumerate and guess passwords (if any) for the shares on the other end of the modem, just as we demonstrated over the network in the previous section on file share hacking, assuming that no dial-up password has been set.

Win 9xDIAL-UP HACKING COUNTERMEASURES Not surprisingly, the same defenses hold true: don't use the Win 9x Dial-Up Server, and enforce this across multiple systems with the System Policy Editor. If dial-up capability is absolutely necessary, set a password for dial-in access, require that it be encrypted using the Server Type dialog box in the Dial-Up Server Properties, or authenticate using user-level security (that is, pass through authentication to a security provider such as a Windows NT domain controller or NetWare server). Set further passwords on any shares (using good password complexity rules), and hide them by appending the $ symbol to the share name.

Intruders who successfully crack a Dial-Up Server and associated share passwords are free to pillage whatever they find. However, they will be unable to progress further into the network because Win 9x cannot route network traffic. It's also important to remember that Dial-Up Networking (DUN) isn't just for modems anymore-Microsoft bundles Virtual Private Networking (VPN) capabilities (see Chapter 8) in with DUN, so we thought we'd touch on one of the key security upgrades available for Win 9x's built-in VPN capabilities. It's called Dial-Up Networking Update 1.3 (DUN 1.3), and it allows Win 9x to connect more securely with Windows NT VPN servers. This is a no-brainer: if you use Microsoft's VPN technology, get DUN 1.3. If you are a North American user, we recommend getting the 128-bit version from http://mssecure.www.conxion.com/cgi-bin/ntitar.pl. Win 95 users must first download the 40-bit DUN 1.3 from http://www.microsoft.com/windows95/downloads/, and then obtain the 128-bit upgrade utility from the previous site. DUN 1.3 is also critical for protecting against denial of service (DoS) attacks, as we shall see shortly. We'll discuss other dial-up and VPN vulnerabilities in Chapter 8.

Remotely Hacking the Win 9x Registry
Popularity: 2
Simplicity: 3
Impact: 8
Risk Rating: 4

Unlike Windows NT, Win 9x does not provide the built-in capability for remote access to the Registry. However, it is possible if the Microsoft Remote Registry Service is installed (found in the \admin\nettools\remotreg directory on the Windows 9x distribution CD-ROM). The Remote Registry Service also requires user-level security to be enabled, and thus will at least require a valid username for access. If attackers were lucky enough to stumble upon a system with the Remote Registry installed, access to a writeable shared directory, and were furthermore able to guess the proper credentials to access the Registry, they'd basically be able to do anything they wanted to the target system. Does this hole sound easy to seal? Heck, it sounds hard to create to us-if you're going to install the Remote Registry Service, pick a good password. Otherwise, don't install the service, and sleep tight knowing that remote Win 9x Registry exploits just aren't going to happen in your shop.

Win 9x and Network Management Tools
Popularity: 3
Simplicity: 9
Impact: 1
Risk Rating: 4

Last but not least of the potential remote exploits uses the Simple Network Management Protocol (SNMP). In Chapter 3, we touched on how SNMP can be used to enumerate information on Windows NT systems running SNMP agents configured with default community strings like public. Win 9x will spill similar information if the SNMP agent is installed (from the \tools\reskit\netadmin\snmp directory on Win 9x media). Unlike NT, however, Win 9x does not include Windows-specific information such as user accounts and shares in its SNMP version 1 MIB. Opportunities for exploitation are limited via this avenue.

Read More Show Less

Table of Contents

Part I: Casing the Establishment.
Part II: System Hacking.
Part III: Network Hacking.
Part IV: Software Hacking.
Part V: Appendixes.
Index.
Read More Show Less

Foreword

My experience in securing systems is that most users are shocked when they find out how vulnerable they really are. Perhaps this book will shock you. No matter what, it will educate you.
Read More Show Less

Customer Reviews

Average Rating 5
( 8 )
Rating Distribution

5 Star

(6)

4 Star

(2)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 8 Customer Reviews
  • Anonymous

    Posted August 2, 2001

    Everything You Need To Know

    This book has everything you need to know. About the 'cyber' problems out there. Buy it especialy all you lamers and others who are worried about their Network and Security. Not me though I bought it for the 'reading'.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 13, 2000

    From the eyes of a webmaster.

    This is not a book, but moreso, a bible. If you live in fear that your network or personal computer is being invaded by hackers, this book is for you. All webmasters, network administrators, and PC owners must read this valuable resource. Only then will you be safe from hackers. This book explains in detail, all their tricks and techniques. It will make your network inpenatrable to the select few who wish to venture into forbidden places. No sooner had i read this book, that to my horror, it was discovered that other people were taking advantage of my network! Being a webmaster, a hacker is my worst nightmare, and greatest enemy. I know how to close the tiny loop holes that they use to gain entry. I am positive you will enjoy this book.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 7, 2000

    Like Giving the Plans for the Atomic Bomb

    I couldn't believe it when I saw this book - I thought 'Oh, sure, and your also going to tell me how to make money in real estate.' I do penetration testing as a side business and this book pretty much outlines my 'attack' methods. I also picked up some tips and tools from the book that will help me secure my customers networks.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 28, 2000

    Greate book!

    I found this book very interesting and cogent. This book is great for sys. admins. as well as for people who are interested in computer security and networking in general. This book wastes no time explaning basic aspects of programming!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 18, 2000

    Overall pretty good

    This is a really good book for the beginner in computers or hacking or whatever. But not just destructive content good for sys. admins. to show how vulnerable they really are. Great book a definate purchase for anyone into computers period.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 5, 2000

    GOOD BOOK

    IT was really good book, not only teaching you how much computer security is neede, but also tells you how you can break into certain networks, so you can beef up your computer, A must have for any computer nerd

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 1, 2000

    Finally a good hackers guide with no BS!!

    This book gives an excellent overview of networks, hacking webpages, and tools of the trade, along with great examples.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 19, 1999

    BUY IT NOW!

    I Bought This Book, And I Am Glad I Did. This Is A How-To From The Basics On How To Protect Your Webpage And Network! One Of The Best!

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 8 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)