Security Warrior: Know Your Enemy

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

1140203455
Security Warrior: Know Your Enemy

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

35.99 In Stock
Security Warrior: Know Your Enemy

Security Warrior: Know Your Enemy

Security Warrior: Know Your Enemy

Security Warrior: Know Your Enemy

eBook

$35.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.


Product Details

ISBN-13: 9780596552398
Publisher: O'Reilly Media, Incorporated
Publication date: 01/12/2004
Sold by: Barnes & Noble
Format: eBook
Pages: 556
File size: 6 MB

About the Author

Dr. Cyrus Peikari is currently the Chief Technical Officer of Airscanner Corporation, a leading mobile security software company. He personally holds several patents in the anti-virus and infosec fields. In addition to numerous radio and television appearances, he is a popular speaker at technology and network security conferences. He has co-authored four bestselling security books, two of them as lead author, including Maximum Wireless Security, Windows .Net Server Security Handbook, and Windows Internet Security.

Dr. Cyrus Peikari is currently the Chief Technical Officer of Airscanner Corporation, a leading mobile security software company. He personally holds several patents in the anti-virus and infosec fields. In addition to numerous radio and television appearances, he is a popular speaker at technology and network security conferences. He has co-authored four bestselling security books, two of them as lead author, including Maximum Wireless Security, Windows .Net Server Security Handbook, and Windows Internet Security.

Table of Contents

Prefacexiii
Part I.Software Cracking
1.Assembly Language3
Registers4
ASM Opcodes7
References8
2.Windows Reverse Engineering9
History of RCE10
Reversing Tools11
Reverse Engineering Examples23
References32
3.Linux Reverse Engineering33
Basic Tools and Techniques34
A Good Disassembly54
Problem Areas69
Writing New Tools74
References116
4.Windows CE Reverse Engineering118
Windows CE Architecture119
CE Reverse Engineering Fundamentals123
Practical CE Reverse Engineering131
Reverse Engineering serial.exe147
References160
5.Overflow Attacks161
Buffer Overflows161
Understanding Buffers162
Smashing the Stack165
Heap Overflows166
Preventing Buffer Overflows167
A Live Challenge168
References175
Part II.Network Stalking
6.TCP/IP Analysis179
A Brief History of TCP/IP179
Encapsulation179
TCP180
IP182
UDP184
ICMP185
ARP185
RARP186
BOOTP186
DHCP186
TCP/IP Handshaking186
Covert Channels188
IPv6188
Ethereal190
Packet Analysis191
Fragmentation192
References198
7.Social Engineering199
Background200
Performing the Attacks202
Advanced Social Engineering209
References211
8.Reconnaissance212
Online Reconnaissance212
Conclusion224
References224
9.OS Fingerprinting225
Telnet Session Negotiation225
TCP Stack Fingerprinting226
Special-Purpose Tools229
Passive Fingerprinting229
Fuzzy Operating System Fingerprinting232
TCP/IP Timeout Detection234
References235
10.Hiding the Tracks236
From Whom Are You Hiding?236
Postattack Cleanup237
Forensic Tracks243
Maintaining Covert Access248
References254
Part III.Platform Attacks
11.Unix Defense257
Unix Passwords257
File Permissions261
System Logging264
Network Access in Unix267
Unix Hardening270
Unix Network Defense285
References298
12.Unix Attacks299
Local Attacks299
Remote Attacks307
Unix Denial-of-Service Attacks321
References328
13.Windows Client Attacks329
Denial-of-Service Attacks329
Remote Attacks339
Remote Desktop/Remote Assistance343
References349
14.Windows Server Attacks350
Release History350
Kerberos Authentication Attacks351
Kerberos Authentication Review351
Defeating Buffer Overflow Prevention356
Active Directory Weaknesses357
Hacking PKI359
Smart Card Hacking360
Encrypting File System Changes363
Third-Party Encryption365
References367
15.SOAP XML Web Services Security369
XML Encryption369
XML Signatures372
Reference373
16.SQL Injection374
Introduction to SQL374
SQL Injection Attacks377
SQL Injection Defenses383
PHP-Nuke Examples387
References390
17.Wireless Security391
Reducing Signal Drift391
Problems with WEP393
Cracking WEP393
Practical WEP Cracking399
VPNs399
TKIP400
SSL401
Airborne Viruses401
References406
Part IV.Advanced Defense
18.Audit Trail Analysis409
Log Analysis Basics409
Log Examples410
Logging States418
When to Look at the Logs419
Log Overflow and Aggregation420
Challenge of Log Analysis421
Security Information Management421
Global Log Aggregation422
References423
19.Intrusion Detection Systems424
IDS Examples425
Bayesian Analysis430
Hacking Through IDSs435
The Future of IDSs437
Snort IDS Case Study439
IDS Deployment Issues443
References445
20.Honeypots446
Motivation447
Building the Infrastructure448
Capturing Attacks457
References458
21.Incident Response459
Case Study: Worm Mayhem459
Definitions460
Incident Response Framework462
Small Networks466
Medium-Sized Networks471
Large Networks473
References477
22.Forensics and Antiforensics478
Hardware Review478
Information Detritus480
Forensics Tools481
Bootable Forensics CD-ROMs486
Evidence Eliminator490
Forensics Case Study: FTP Attack497
References506
Part V.Appendix
AppendixUseful SoftICE Commands and Breakpoints509
Index517
From the B&N Reads Blog

Customer Reviews