Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Wyler N.R., Potter B., Hurley C. — Aggressive Network Self-Defense
Wyler N.R., Potter B., Hurley C. — Aggressive Network Self-Defense



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Aggressive Network Self-Defense

Авторы: Wyler N.R., Potter B., Hurley C.

Аннотация:

I'm Mad As Hell, and I'm Not Gonna Take it Anymore!

* Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
* Follow the travails of eight system administrators who take cyber law into their own hands.
* See chillingly realistic examples of everything from a PDA to the MD5 hash being used as weapons in cyber dog fights.

There is a certain satisfaction for me in seeing this book published. When I presented my "strike-back" concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I'm happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today's internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that's good — it gives us the chance to truly think about each situation — and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality. — Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com

* When the Worm Turns... Analyze the technical and legal implications of "neutralizing" machines that propagate malicious worms across the Internet.
* Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
* Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
* To Catch a Thief... Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
* Learn the Definition of "Hostile Corporate Takeover" in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war.
* Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation.
* See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
* Where the Wild Things Are... Follow along as a real-life "in-the-wild" format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
* Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.

Your Solutions Membership Gives You Access to: A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page "From the Author" forum where the authors post timely updates and links to related sites The complete code listings from the book Downloadable chapters from these best-selling books: Black Hat Physical Device Security Google Hacking for Penetration Testers Buffer Overflow Attacks: Detect, Exploit, Prevent Hacking a Terror Network: The Silent Threat of Covert Channels TABLE OF CONTENTS Part I Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge Chapter 1 PDA Perils: Revenge from the Palm of Your Hand Chapter 2 The Case of a WLAN Attacker: In the Booth Chapter 3 MD5: Exploiting the Generous Chapter 4 A VPN Victim's Story: Jack's Smirking Revenge Chapter 5 Network Protection: Cyber-Attacks Meet Physical Response Chapter 6 Network Insecurity: Taking Patch Management to the Masses Chapter 7 The Fight for the Primulus Network: Yaseen vs Nathan Chapter 8 Undermining the Network: A Breach of Trust Part II The Technologies and Concepts Behind Network Strike Back Chapter 9 ADAM: Active Defense Algorithm and Model Chapter 10 Defending Your Right to Defend Chapter 11 MD5 to Be Considered Harmful Someday Chapter 12 When the Tables Turn: Passive Strike-Back 339


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 448

Добавлена в каталог: 15.10.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Virus component, adding      43—44
virusbob.exe      25
Viruses, Brador trojan      44—45
Viruses, description      155
Viruses, WINCE4.Dust      43—44
Visual C++      see “eMbedded Visual C++ 4.0 package (MVC)”
VMWare      248 252
VPN (virtual private network)      114
vulnerability exploitation      344
vulnerability scanners      see also “Nessus vulnerability scanner”
Vulnerability scanners, description      344
Vulnerability scanners, NeWT      200—201
Vulnerability scanners, strike-back action      359
Vulnerability scanners, strike-back on, attack tools      357
Vulnerability scanners, strike-back strategy      357—358
Vulnerability scanners, strike-back took      358
Vulnerability scans, mass      259
Vulnerability, null session      261
Wang, Xiaoyun      99 324—325 328 332 334 337
War, justification of      341
wardriving      181
Web application scanners, strike-back action      365—370
Web application scanners, strike-back on attack tools      365
Web application scanners, strike-back strategy      365
Web application scanners, strike-back tools      365
Web logs, avoiding      90
Web-based applications      344 349—350
Web-site hijackers and monitors      155
Web-site URLs, Ad-Aware SE spyware scanner      154 156
Web-site URLs, Agere drivers for Orinoco cards      68
Web-site URLs, black code haunt      107
Web-site URLs, Bluetooth drivers      168
Web-site URLs, Ethereal sniffer      61 82 109
Web-site URLs, geth SMB share scanner      186
Web-site URLs, hardware keyboard logger      165
Web-site URLs, IDA Pro disassembler      9
Web-site URLs, Kismet      61
Web-site URLs, Knoppix STD platform      108
Web-site URLs, Metasploit Framework      201
Web-site URLs, Nessus vulnerability scanner      252
Web-site URLs, netcat utility      183
Web-site URLs, NeWT vulnerability scanner      200
Web-site URLs, nmap port scanner      184
Web-site URLs, PatriotBox honey pot      195
Web-site URLs, PCMCIA-CS Orinoco patch      61
Web-site URLs, Phrack      127
Web-site URLs, SensePost      352
Web-site URLs, SpyBot Search and Destroy (SBSD)      156—157
Web-site URLs, tcpdump network sniffer      107—108
Web-site URLs, tools      252
Web-site URLs, traceroute      229
Webmail      91
whitenoise.pl PERL script      356 370
whois database      92
whois output      275
Wikto tool      248—249 252
WINCE4.Dust virus      43—44
Windows 2000      67
Windows mobile devices      see also “Personal digital assistants (PDAs)”
Windows Mobile devices, allocation slide bar      5
Windows Mobile devices, baseline process listing      7
Windows Mobile devices, battery life      4
Windows Mobile devices, forensics      6
Windows Mobile devices, memory storage      4—5
Windows Mobile devices, permissions      48
Windows Mobile devices, Running Programs List      6
Windows Mobile devices, shell process      7
Windows XP, embedded null session vulnerability      261
Windows XP, ISS (Security Scanner)      263
Windows XP, SP2 firewall      97
Windows XP, wireless networking      67
Winkler, Ira      260
Wireless card configuraton      60
Wireless connections, accepting      67
Wireless Internet Service Providers (WISPs)      57 75
Worms, Nimda and CR      314—319
Xiaoyun Wang      99
Yagi antenna      236
Zone transfer      219 224
_vti_pvt access      258—259
“Armpit” Human Detector daemon      365—366
“Trust but Verify” maxim      253
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте