Hacking Linux Exposed / Edition 2

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (18) from $1.99   
  • New (2) from $29.92   
  • Used (16) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: fallbrook, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2008

Feedback rating:


Condition: New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


Tighten holes and maintain security on your Linux system! From the publisher of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes this must-have security handbook for anyone running Linux. This up-to-date edition shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Remember when people used to say Linux was inherently secure because all bugs are shallow, including security bugs -- and, anyhow, the “black hats” only hate Microsoft? Yeah, right! Unfortunately, you do need Hacking Linux Exposed, Second Edition.

Authors Brian Hatch and James Lee have added 200 pages of new content to this edition -- and they’ve overhauled everything else to reflect the latest Linux exploits, cracking tools, and countermeasures. To help you set priorities on defense, every exploit is rated from 0 to 10 on popularity, simplicity, impact, and overall risk.

We found the sections on break-ins particularly useful. You’ll find everything here from “Mitnick-ian” social engineering to physical and network attacks. For example, you probably know that systems running LILO are susceptible to being booted to single-user mode without passwords; you may not realize that newer systems using GRUB have their own vulnerabilities. Hatch and Lee offer countermeasures for both.

You’ll learn how to prevent insecure program execution, buffer overflows, race conditions, and symlink attacks; how to validate user input; and how to create temporary files securely. There are updated chapters on email and FTP security; web servers and dynamic content; and denial-of-service attacks.

There’s also an entirely new three-chapter section on what crackers do after they’ve broken in. You’ll learn how they cover their tracks -- from removing log entries through replacing your binaries with versions that don’t betray their presence. There’s a detailed chapter on backdoors, and another on kernel changes and other advanced methods for hiding one’s activities. If you’re running Linux for anything that matters, this book’s a must. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9780072225648
  • Publisher: McGraw-Hill Osborne
  • Publication date: 12/1/2002
  • Series: Security Series
  • Edition description: Second Edition
  • Edition number: 2
  • Pages: 712
  • Product dimensions: 7.78 (w) x 8.78 (h) x 1.65 (d)

Meet the Author

Brian Hatch is a UNIX/Linux security consultant, administrator, and expert hacker with Onsight, Inc. He has taught various courses at Northwestern University and is the co-maintainer of Stunnel, a widely used secure SSL wrapper.

James Lee is a Perl hacker, Linux administrator, security consultant, and open-source advocate. James is the founder and CEO of Onsight Inc., a consulting firm specializing in Perl training and web development.

Read More Show Less

Read an Excerpt

Chapter 1: Linux Security Overview

This chapter introduces you to some of the security features of the Linux operating system. We will also cover aspects of Linux that differ from other UNIX-like operating systems. This chapter covers the basics of Linux security; if you are a seasoned Linux administrator, you will more than likely find much of this chapter familiar territory.

The highest-level user on a Linux machine is named root (you'll learn more about users later). The root user has complete and total control over all aspects of the machine-you can't hide anything from root, and root can do whatever root wants to do. Therefore, for a hacker to "root your box" means the hacker becomes the root user, thereby gaining complete control over your machine.

There are kernel patches such as LIDS (discussed in Chapter 2) that can contain the all-powerful nature of root and make your machine more secure, even in the event of a root compromise.

A common misconception of many Linux users is that their Linux machine is not important enough to be hacked. They think, "But I don't have anything important on my machine; who would want to hack me?"

This type of user is exactly who hackers want to hack. Why? Because hacking is easy. And usually, the hacker's ultimate goal is not the machine he or she has hacked, but other, more important machines.

They Want Your Bandwidth Hackers may want to hack your machine to use it as a stepping stone. In other words, they will hack your machine and do evil deeds from your machine so it appears as though you are doing it, thereby hiding their trail.

Or they may want to use your machine as a stepping stone to another machine, and from that machine move to another machine, and from that machine move to another machine, and so on, on their way to obtaining root on a . gov machine. Or they may want to use your machine as part of a group of computers they have compromised with the purpose of using them together to perform distributed denial-of-service (DDoS) attacks, such as those that took down eBay at the beginning of 2000.

Or they may want access to your machine so that they can then have access to your employer's machine. Or your friend's machine. Or your kid's machine, especially if your child has a more sophisticated computer than you do.

They Want Your CPU Hackers may want to hack your machine to use your CPU to execute their programs. Why waste their own resources cracking the numerous password files they procure when they can have your machine do it for them?

They Want Your Disk Hackers may want to store data on your machine so they don't use up their own disk space. Perhaps they have pirated software (warez) they'd like to make available, or maybe they just want to store MPEGs of questionable moral content.

They Want Your Data Hackers may want your business' trade secrets for personal use or to sell. Or they may want your bank records. Or they may want your credit card numbers. Or they may want to make you look like a hacker when they launch from your machine.

Or they may just want to wreak havoc on you. The sad fact is that there are people in the world who like to sabotage other people's computer systems for no other reason than that they can. And maybe they think it is cool. And maybe they have destructive personalities. And maybe it brings them some sort of bizarre pleasure. And maybe they want to impress their hacker friends. And maybe they are bored and have nothing better to do with their lives. Who knows why they want to hack your machine? But the fact is: they do want to hack your machine. My machine. Our machines.

Therefore, it is up to us to educate ourselves on their tactics, strategies, and methods and protect ourselves from them.

Linux is part of what is now known as the open source movement. The Linux operating system is free, but more important, Linux is open. That means that the source code for the operating system is available-anyone can view the source code and examine it, modify it, and suggest and make changes to it. There are many programs that are part of the open source movement, and some of the programs are the most popular programs used around the world:

Apache A web server that is used on approximately two-thirds of all web sites on the Internet.

  • Perl A popular programming language used to solve all sorts of problems.
  • Sendmail The most popular mail transfer program used to route 80 percent of the email on the Internet.
  • Netscape A previously closed source program that became open source; a popular web browser.
Each of these programs are available on almost all distributions of Linux.

Open Source and Security

Proponents of open source claim that the nature of open source software makes it more secure. Critics of open source claim that open software is less secure.

Plusses of the Open Source Model

Open source is more secure because anyone can view it. And anyone can improve it. And in the case of the Linux kernel and applications, thousands of people do just that. In 1997, Eric Raymond wrote a watershed paper titled "The Cathedral and the Bazaar" (ht tp : //www. tuxedo. org/-esr/writ ings/cathedral-bazaar/)...

Read More Show Less

Table of Contents

1 Linux Security Overview 3
2 Proactive Measures and Recovering from a Break-In 23
3 Mapping Your Machine and Network 69
4 Social Engineering, Trojans, and Other Hacker Trickery 129
5 Physical Attacks 155
6 Attacking Over the Network 177
7 Abusing the Network Itself 211
8 Elevating User Privileges 247
9 Password Cracking 283
10 How Hackers Maintain Access 315
11 Mail and FTP Security 369
12 Web Servers and Dynamic Content 417
13 Access Control and Firewalls 459
App. A Keeping Your Programs Current 491
App. B Turning Off Unneeded Services 501
App. C: Online Resources 509
App. D: Case Studies 513
Index 543
Read More Show Less

Customer Reviews

Average Rating 4.5
( 7 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 7 Customer Reviews
  • Anonymous

    Posted December 21, 2002

    second edition rocks!

    I got the new version of Hacking Linux Exposed yesterday and read it straight through. I've been using the first edition since I bought it last year, but this one really blows the first one out of the water. It has a ton of new information - I particularly liked the stuff about wireless attacks and how to create a secure wireless network using VPNs so you don't need to rely on the wireless protocols that don't work correctly. Also the info about web hacks helped me find MANY bugs in our company's website that could have been used against us -- now we've got to see if we've been hacked before and start cleaning up.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 10, 2002

    Linux Exposed Really Tells All

    This book really gives you tons of very valuble information. Most of witch you do not need to be a super advanced computer wizard to comprehend. I have learned a lot and my knowledge of the subjects covered has been exponentialy expanded. I highly recommend this book for anyone who is looking for computer safty from hackers and/or computer knowledge of highly used systems.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 20, 2001

    Hacking Linux Exposed

    I used to put 'Hacking Exposed' at the top of my security/hacking list, but it has finally been defeated. Not suprising it was by another in the same line. Hacking Linux Exposed delves much more than HE was able to (given that it covered so much). Want to learn how to secure your Linux machine by seeing into the hacker's eyes? Hacking Linux Exposed is for you.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 8, 2001

    Hacking Linux Exposed

    I flipped through this book at a friends house, and was shocked to see how much networking info was here. In spite of the fact that we don't have too many Linux machines at my office, I bought this book. The covered a ton of things that helped get our network into shape. We now have a dedicated Linux machine as a firewall and mail gateway protecting our other machines, and are logging (and denying) all the attacks we didn't know about before. We had no idea how vulnerable we were.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 12, 2001

    Hacking Linux Exposed

    just got my copy in the mail and can't put it down. this book rocks. easy to read, well organized, and very detailed. it really shows you what hacks look like, and gives you the solution that'll keep you safe now and in the future.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 17, 2001

    Best Linux Hacking book out there

    I've bought most of the linux books that have been written, and this is the only one I haven't given away after reading it. I find this to be an excellent resource, unlike most of the books low on content and high in scare tactics and pretty pictures. This book gives you the nitty gritty -- real code, real problems, and real answers. You want to keep the bad guys off your machine, this is the book you need. Forget the rest.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 16, 2001

    OK, book!

    This book has many hacking exposures, and utils. If your an above average security keeper, then theres no REAL need for this book. It does provide with great points and ways to keep hackers out, but not leet hackers ;)~~~ Every hacker needs to know anything there is and will be in computer security or exposures, so buy the book! not with a credit card though, go to the book store and buy with IN CASH! (keep the FBI off of you)

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 7 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)