Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community


For centuries, military organizations have depended on scouts to gather intelligence on the enemy. Specifically, who the enemy was, what they were doing, how they may attack, the weapons they use, and their ultimate objectives. Time and again this information has proven critical in defending against and defeating the enemy.

For information security, this scout has never existed. Very few organizations know who their enemy is, how they may attack, what the enemy does once they ...

See more details below
Available through our Marketplace sellers.
Other sellers (Multimedia Set)
  • All (24) from $1.99   
  • New (2) from $15.00   
  • Used (22) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: fallbrook, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2014

Feedback rating:


Condition: New
2001 Paperback Brand new and still sealed. Next working day dispatch from the UK (Mon-Fri). Please contact us with any queries. *****PLEASE NOTE: This item is shipping from an ... authorized seller in Europe. In the event that a return is necessary, you will be able to return your item within the US. To learn more about our European sellers and policies see the BookQuest FAQ section***** Read more Show Less

Ships from: Hereford, United Kingdom

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by
Sending request ...


For centuries, military organizations have depended on scouts to gather intelligence on the enemy. Specifically, who the enemy was, what they were doing, how they may attack, the weapons they use, and their ultimate objectives. Time and again this information has proven critical in defending against and defeating the enemy.

For information security, this scout has never existed. Very few organizations know who their enemy is, how they may attack, what the enemy does once they compromise a system, and why they attack. The Honeynet Project is changing this. A research organization of thirty security professionals, we are dedicated to learning the tools, tactics and motives of the blackhat community. Just as with scouts in the military, our mission is to gather intelligence on the enemy.

The primary weapon of the Honeynet Project is the Honeynet, a unique solution designed to capture and study the blackhat's every move. In this book you will learn in detail not only what we have discovered about this adversary, but how we built and used Honeynets to gather this critical information.

Know Your Enemy includes:

  • The Honeynet: Description of a honeynet, and how to plan, build, and maintain one. Also covers risks and issues involved.
  • The Analysis: Step-by-step instructions on how to capture and analyze data from a honeynet.
  • The Enemy: Presents what the project learned about the blackhat community, including documented compromised systems.
Aimed at both security professionals and those with a non-technical background, this book teaches the technical skills needed to study a blackhat attack and learn from it. The CD includes examples of network traces, code, system binaries, and logs used by intruders from the blackhat community.
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
If you're responsible for protecting networks against crackers, you need to clearly understand your adversary. But there's an enormous amount of misinformation and disinformation about the "blackhats." What's the best way to learn how they really work? With a "honeynet": a live network built specifically to attract bad guys and wired to control, capture, and contain their traffic, so it can be tracked and analyzed.

Some 30 security professionals created the Honeynet Project to build such a network. This book tells you what they've learned, and it's fascinating reading. Over two years, they've been able to extrapolate a remarkable amount of knowledge about the blackhats' tools, techniques, motives, and psychology ("the social structure of the blackhat community is a robust, strong, complex meritocracy with very stable characteristics"). Especially fascinating is Know Your Enemy's chapter full of annotated IRC conversations from a group of crackers who took over Spitzer's honeynet, notably "D1ck," an overweight 17-year-old living with his parents in Karachi, Pakistan.

You may find the honeynet concept so intriguing that you'd want to build your own. Know Your Enemy shows you how. Lance Spitzer covers each element of a honeynet, walks through constructing one that looks sufficiently real without putting actual corporate IT assets at risk, and then shows how to analyze the traces your "friends" leave behind. There's even a CD-ROM full of network traces, logs, images of actual compromises, and source code for your very own 21st-century "Spy vs.Spy" initiative. (Bill Camarda)

Bill Camarda is a consultant, writer, and web/multimedia content developer with nearly 20 years' experience in helping technology companies deploy and market advanced software, computing, and networking products and services. He served for nearly ten years as vice president of a New Jersey–based marketing company, where he supervised a wide range of graphics and web design projects. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9780201746136
  • Publisher: Pearson Education
  • Publication date: 8/31/2001
  • Edition description: Older Edition
  • Pages: 352
  • Product dimensions: 7.41 (w) x 9.24 (h) x 0.91 (d)

Meet the Author

The Honeynet Project is a group of thirty security professionals dedicated to learning the tools, tactics, and motives of blackhats and sharing those lessions learned. Each individual in the group has unique skills, experiences, and backgrounds that contribute to the project.
Read More Show Less

Read an Excerpt

Chapter 1: The Battleground

My commander used to tell me that to defend against the enemy, you have to first know who your enemy is: their methods of attack, tools and tactics, and objective. This military doctrine readily applies to network security just as it did in the Army. The blackhat community is the adversary; we must defend against this threat. However, to be successful, we must first know our enemy.

When I first entered the field of network security, I was frustrated by the lack of information about the blackhat community. It was easy to find technical information on exploits, scanners, and various other attacker tools. But these play only a small part in the overall picture. I wanted to know more. What are the attackers' goals? What are attackers trying to achieve? Why? How do they identify vulnerable systems and then compromise them? What happens once attackers control a system? How do they communicate among themselves? Are we dealing with a single threat or a variety of threats?

Many of these questions were ones we asked in the military; in the military, however, we had answers. Specific organizations, commonly called military intelligence, or S2, were dedicated to obtaining and disseminating information on the enemy. The more we knew about the enemy, the better we could defend ourselves. As a tank officer, for example, I was expected to have an intimate knowledge of Soviet armored tactics and capabilities. I was expected to know the technical makeup of a single Soviet tank company. We were trained on the tank's range, speed, and performance capabilities. We read books on the history and political structure of our threat. We conducted hands-on training of captured equipment. This information is critical for defending against this threat. By knowing the tank's range, I can estimate when the enemy will begin opening fire on me and thus when I should begin firing back. By knowing the speed of the enemy's tanks, I will know how much lead time I should have when I call in for artillery fire. By knowing the performance of the enemy's tanks—its rate of fire- I can estimate how many rounds the enemy can fire at me in a minute and the probability of hits. By crawling around inside a captured T-72, I had a better understanding of the visual capabilities of the crew inside. All this information is critical in defending against my opponent. The more information I have, the better I can stop and defeat that enemy.

What amazed me in the field of network security was the lack of this type of intelligence. I found little information on who the enemy was, how it attacked, what the motivations or the tactics involved were. The security community was focused on the specific technical tools used by the blackhat community and the tools used in defense but not in the tactics or motives involved. What I wanted to learn was how the blackhat community was identifying and probing for vulnerable systems. What happened once a system was compromised? What activity was going on that I did not know about? I had a lot of questions but very few answers, and this scared me. It was my job to protect against a threat, an enemy. But I did not even know who my enemy was, let alone its tools and techniques. I wanted to learn more, but how could I do so?

It took several years to develop a solution. The plan is simple: Have the enemy teach us its own tools, tactics, and motivations. Why attempt to develop theory when you can have the blackhats show you step-by-step how they operate? No other source is more reliable or more complete. In the military, some consider this battlefield intelligence, whereby you gather information from the enemy. In network security, we can attempt to do the same. We will let the blackhats teach us how they operate. Now the question is, How do you gather battlefield intelligence when you don't even know where the battlefield is?

For me, the battlefield landed in my wife's dining room in 1998. In the beginning of that year, I received my first dedicated connection to the Internet. Anyone in the world had access to my network at home, at any time. At first, I had no idea what security implications this meant; I did not realize just how aggressive a war is going on in cyberspace. Fortunately, I was researching firewall logs at the time and detected a great deal of suspicious traffic probing my network. I decided to learn more about this traffic, so I researched a variety of papers on the Internet. Although I found a wealth of technical information, most of it focused on specific exploits or the tools used in the exploits. I found little in the way of intelligence on the bad guys. I wanted to learn more but was not sure how. I decided to place a production system on my network, closely monitor this system, and then wait and see what happened. My intent was to have the blackhat community show me how it operates by probing, attacking, and exploiting the system. I used a default installation of Linux Red Hat 5.0, a version of the UNIX operating system, and connected it to the exposed network. I had no idea what to expect. Would anyone even find the system? If so, how long would it take? Would the system be attacked, and what would happen once the system was compromised? All these were questions I was hoping to answer, but would the solution work? On February 25, 1999, I connected the system to my network. Within 15 minutes, my system had been identified, probed, and exploited. Little did I know at the time, but an idea was born.

I learned a lot from that experience, mainly how not to set up such an environment. After compromising the system, the blackhat quickly figured that some-thing was not right, erased the hard drive, and never returned. I lost most of the valuable data that could have been gained, such as the blackhat's keystrokes, toolkits, and system activities. Little was learned, but I had proof that this could be done. By placing production systems on a network and then monitoring all the activity to and from that system, it is possible to learn more about the enemy.

Over time, this concept grew into the Honeynet Project, 30 security professionals dedicated to learning the tools, tactics, and motives of blackhats and sharing those lessons learned. The group learns by building production systems and then monitoring all activity to and from the systems. We capture and analyze data as these systems are probed, attacked, and exploited. Everyone volunteers time and unique skills in the research and development of the project. By combining our skills and knowledge, we can exponentially increase our learning about the blackhat community. We then share this information with the security community. The end goal is to improve our understanding of the enemy. Armed with this knowledge, we and the security community can better defend against the blackhat community. What makes us unique is that we share as much as possible with the security community; we want everyone to benefit from our research. The more people who understand how the enemy works, the more secure systems will be, which indirectly benefits everyone.

The project began informally in April 1999. I needed help in developing methods to capture blackhat activity. The system compromised in February demonstrated the need to develop more comprehensive and sophisticated methods for data capture. Once the data was captured, I also needed help in analyzing it. I just did not understand a great deal of network and system activity, such as decoding a specific exploit captured from the network. I asked certain members of the community to assist me. Fortunately, the security community is made up of many dedicated and helpful individuals. For example, Marty Roesch, developer of Snort, coded new functionality into the IDS (intrusion detection system) just to help our research—in this case, keystroke logging, called session breakout. Max Vision stepped up to help with sophisticated exploit attacks, decoding exploits based on their network signature. Without the help of these and other members, the project would not have been possible.

Honeynets capture all sorts of unusual network and blackhat activity. No single person can understand all the issues involved. Our small group continued to grow as we realized that we needed the expertise of a larger group of people. Over the next year, the project informally grew as more people were willing to help. Each individual had unique skills, experiences, and backgrounds that contributed to the project. However, we all shared a common motivation: to learn about the blackhat community and to share those lessons learned. We were not a highly organized group; many of us had never met in person. We infrequently shared information via e-mail in attempting to improve the Honeynet concept or to decode a specific signature or attack.

This all dramatically changed in June 2000, when a Solaris 2.6 honeypot was compromised by an organized blackhat group that used our honeypot to communicate among themselves. For a three-week period, we captured all their conversations. Tracking all this activity required the skills of the entire group, from decoding specific IRC (Internet relay chat) configurations to translating Urdu into English. This event helped galvanize our informal group into an organized project.

We had never even considered ourselves an organized group until then. In fact, the name Honeynet Project was created at the last minute, as we had to call ourselves and our research something when our findings were released. Since then, the group has attracted additional members, such as psychologist Max Kilger, Ph.D., who focuses on blackhat behavior. We have also established relationships with various national and international organizations. We continue to develop our techniques and research, always sharing with the security community our lessons learned. This book represents another step in sharing that information.

The key tool that the team uses is called a Honeynet, a network designed to be compromised. We can then learn who our adversary is and how it operates. Every packet that enters and leaves the Honeynet is captured and analyzed. Every action on the systems is logged and secured. The beauty of the project is that there is no theory. The blackhats show us step-by-step how they operate in the real world. Once we have gathered this information, we can then review the data and better establish who the enemy is and understand its goals, motives, and methods of operation.

Throughout this book, we use the term blackhat to represent the enemy, the attacker. Many people have used the term hacker, cracker, or a variety of other labels. We prefer not to get involved in the political debate of what words define which users. We standardize on using the term blackhat to mean the bad guys, the enemy. The enemy can be male or female, a disgruntled company employee, a teenager in South East Asia, or a highly trained former KGB agent. In many cases, you will not know the identity of the enemy. In some cases, we have been able to identify the individual(s) and have noted that here whenever possible. Often, however, the only identity you can assign is the term blackhat. Regardless, this is the individual or entity attempting unauthorized activity with one of your resources.

The common theme throughout this book is learning about our adversary, the blackhat community. In Chapters 2, 3, and 4, we introduce you to the Honeynet, the primary learning tool of the Honeynet Project. We discuss what these production systems are; their value; how we build, use, and maintain them; and the risks/issues involved. In Chapters 5–8, we cover how we use Honeynets to capture the blackhat activity and then analyze the captured data. Based on this analysis, we are able to learn the tools, tactics, and motives of the blackhat community. Our analysis includes system forensics, packet analysis, and log review. In Chapters 9–12, we review what we have learned about the blackhat community from some well-documented compromises. This will show you step-by-step how the enemy thinks and acts. We attempt to discuss as little theory as possible and focus instead on what we have learned. The end goal of the book is to teach you

  • The Honeynet: What a Honeynet is, its value to the security community, how a Honeynet works, and the risks and issues involved
  • The Analysis: How to analyze captured data and from that learn the tools, tactics, and motives of the blackhat community
  • The Enemy: What we have learned about the blackhat community
We hope that you learn and have as much fun with this book as we have had in the past several years....
Read More Show Less

Table of Contents

Ch. 1 The Battleground 1
Pt. I The Honeynet 7
Ch. 2 What a Honeynet Is 9
Ch. 3 How a Honeynet Works 19
Ch. 4 Building a Honeynet 45
Pt. II The Analysis 55
Ch. 5 Data Analysis 57
Ch. 6 Analyzing a Compromised System 75
Ch. 7 Advanced Data Analysis 95
Ch. 8 Forensic Challenge 111
Pt. III The Enemy 123
Ch. 9 The Enemy 125
Ch. 10 Worms at War 139
Ch. 11 In Their Own Words 151
Ch. 12 The Future of the Honeynet 267
App. A: Snort Configuration 271
App. B Swatch Configuration File 275
App. C Named NXT HOWTO 277
App. D NetBIOS Scans 285
App. E Source Code for bj.c 297
App. F TCP Passive Fingerprint Database 299
App. G ICMP Passive Fingerprint Database 301
App. H Honeynet Project Members 303
Index 315
Read More Show Less


Have you ever wondered what motivates blackhats, often called hackers, to attack, compromise, and exploit systems or what hackers do once they own them? Well, the purpose of this book is to teach you about this enemy, aka the blackhat. These individuals are attempting to use Internet technology to carry out illegal, destructive, or unauthorized activities. This activity could be something as simple as a teenager attempting to vandalize Web sites, a sophisticated attempt at compromising credit card companies, or terrorist attacks against a country's infrastructure. Regardless of who you are--a homeowner with a cable modem connection, security administrator for a large organization, or information warfare officer for the military--these threats are for real. This book will teach you the tools, tactics, and motives of these threats: to know your enemy.

This book is the result of a 2-year project known as the Honeynet Project. What makes our research unique is that we let the blackhat community teach us how they operate. Instead of trying to guess who the enemy is and to develop theories on how blackhats think and operate, we have them teach us their tools, tactics, and motives. Our primary method for learning is the Honeynet, a collection of production systems designed to be compromised. When the bad guys probe, attack, and compromise our systems, we watch and learn from their every step. In the past two years, we have learned a great deal from having had numerous systems probed, attacked, and compromised. This book is an attempt to share those lessons. In addition, the Honeynet Project's website, the basis of the book, can be found at In the future, this site will contain any additional information relative to this book, such as corrections or updates.

For those of you without a technical background, this book will show you in simple terms how the bad guys accomplish what they do. You do not have to understand all the technical details to learn how the enemy operates and thinks. We will also teach you some of the technical skills necessary to study an attack and to learn from it. For those of you with technical backgrounds, we will develop your skill sets in capturing and analyzing data, such as forensic analysis. However, the end goal is the same regardless of your skill set: to teach you what we have learned about the blackhat community and how we learned it. We hope that by better understanding the enemy, you can better defend against attack.

This book has three parts. In Part I, we cover step-by-step how we plan, build, and maintain a Honeynet and the risk/issues involved. In Part II, we show you step-by-step how we use a Honeynet and how we learn from it, specifically, data analysis. In Part III, we cover what we have learned about the blackhat community, including several specific examples of compromised honeypots. We discuss as little theory as possible, instead focusing on the actions of the blackhats we have witnessed and the lessons we have learned. We hope that you learn as much from this book as we have learned from the blackhat community.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)