Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

by Mike Schiffman

Other, 2001

Status

Available

Call number

005

Publication

McGraw-Hill Osborne (2001), 300 pages

Description

*Hackerâ¬"s Challenge will consist of 20-25 hacking scenarios followed by the solution for each. The challenges/chapters are organized by increasing levels of complexity, and covers many hot topics including Web content, VPNs, Denial of Service, wireless issues, e-commerce, email attacks and more. *Includes input from top names in the industry-- in addition to Mike Schiffman, consultants from the top security firms such as Guardent, Foundstone, @Stake, SecurityFocus.com, In-Q-Tel, Arbor Networks, LoudCloud and more contribute their expertise *Broad audience -- Hackerâ¬"s Challenge is for anyone who wants to solve the latest hacking challenges *Great companion to Hacking Exposed-- an entire book of hands-on scenarios that compliment the Hacking Exposed text… (more)

User reviews

LibraryThing member euang
This book is a real wake-up call: By the time you've finished reading this book you'll be wanting to rush out and lock down all your systems, install intrusion detection and completely review your security and admin procedures.There are 20 scenarios, each of which reads as a story. As the story
Show More
develops it becomes apparent that something bad has happened or is happening. You are shown log files and given other clues. Then you are asked what has happened, how it happened, how it could have been prevented.
In the rear half of the book the solutions are given as a continuation of the story. The exploit is identified, the evidence and logs are preserved, the network is locked down and the procedures reviewed. Each scenario is completed with URLs to real security products you can download, such as SNORT, to use in your own organisation.
Most of the exploits are IIS flaws but the point is that it is the ability to spot that something is wrong - slow systems, lack of bandwidth, strange operations, etc - which this book teaches. There are exploits and intrusions involving UNIX and even Wi-Fi covered in this book, as well as notes on keeping software up to date.
A must read, and indeed an investment, for any network or security administrator.
Show Less

Physical description

300 p.; 11 cm

ISBN

978-0-07-219384-8 / 9780072193848
Page: 0.2492 seconds