Information Security News mailing list archives

book: Hacking Exposed: Network Security Secrets and Solutions


From: mea culpa <jericho () DIMENSIONAL COM>
Date: Sat, 18 Sep 1999 14:15:49 -0600

From: Darek Milewski <Darek_Milewski/ABS/Price_Waterhouse () notes pw com>


Hacking Exposed: Network Security Secrets and Solutions
by George Kurtz , Stuart McClure and Joel Scambray
<Osborne /McGraw-Hill>
Type: book   ISBN: 0072121270   Year: 1999 Buy it!

Defend your network against the sneakiest hacks and latest attacks. In
this must-have handbook, security experts Stuart McClure, Joel Scambray,
and George Kurtz give you the full scoop on some of the most highly
publicized and insidious break-ins and show you how to implement
bulletproof security on your system. All aspects of network security are
included from informational scans and probes to password vulnerabilities,
dialup networking insecurities, buffer overflows, Web and email
insecurities, trojans, and back doors. Hacking Exposed: Network Security
Secrets and Solutions covers all security, auditing, and intrusion
detection procedures for UNIX (including Linux), Windows NT/95/98, and
Novell networks.

The bonus companion web site (www.hackingexposed.com) contains custom
scanning scripts and links to security tools.

Foreword by industry expert Marcus Ranum, CEO of Network Flight Recorder
(NFR).

Here's what security experts are saying about "Hacking Exposed".

"Understanding how to mount and create attacks is the only way you can
protect against existing and, more importantly, future attacks. The
information contained herein arms those on the defensive (security admin,
network architects, software developers, etc) with this knowledge. It is
refreshing to see this sort of material finally being made available to
the general public."  - Dr. Mudge of Lopht security research group,
developers of the Lophtcrack NT password auditing tool

"My experience in securing systems is that most users are shocked when
they find out how vulnerable they really are. Perhaps this book will shock
you. No matter what, it will educate you."  - Marcus Ranum, CEO of Network
Flight Recorder

"The authors have put together an excellent up-to-date resource on modern
security vulnerabilities. Rather than simply documenting a few case
studies and talking about problems on a macro scale, the authors build up
a robust framework and dissect the security issues completely. Each
vulnerability covered has detailed countermeasure information. More than a
how-to manual, it's a how-to-do-it-right manual. A book like this has been
needed for quite some time now."  - Mike D. Schiffman ("Route"), Security
Researcher and Author of the Firewalk tool

"Hacking Exposed is a gut wrenching look at the security techniques used
in computer penetration. The authors provide an up to date and
comprehensive view of the methods that hackers use to compromise your
networks. If this book doesn't scare and motivate you to take security
seriously, nothing will."  - Aleph One, Moderator of the Bugtraq Security
Mailing List

"This book is destined to be a classic. Unlike most other security books,
this explains details on hacker tools - why they are used, how they work,
and how best to protect yourself from them. The underground already knows
this stuff, and this book helps the sys admin see their systems through
the intruder's eyes."  - Simple Nomad, Renowned Security Researcher and
Author of The Hack FAQ

Learn to:

Find, exploit, and apply countermeasures for security holes in Unix,
Linux, Windows NT/95/98, and Novell networks Repair email and Web security
holes (CGI, Perl, ASP, browsers, and hostile mobile code) Understand how
back channels and port redirection are used to circumvent firewalls Locate
and scan for vulnerable systems using Whois, Domain Name System queries,
Ping Sweeps, Port Scans, and OS detection Enumerate users, groups, shares,
file systems, and services with no authentication. Crack accounts and
passwords, escalate privilege, and exploit trusts Find and eliminate back
doors, Trojan horses, viruses, and buffer overflows Implement auditing and
intrusion detection solutions Recognize vulnerabilities from dialup
modems, modem pools, and RAS servers.

ISN is sponsored by Security-Focus.COM


Current thread: