Status
Call number
Series
Collections
Publication
Description
*Hackerâ¬"s Challenge will consist of 20-25 hacking scenarios followed by the solution for each. The challenges/chapters are organized by increasing levels of complexity, and covers many hot topics including Web content, VPNs, Denial of Service, wireless issues, e-commerce, email attacks and more. *Includes input from top names in the industry-- in addition to Mike Schiffman, consultants from the top security firms such as Guardent, Foundstone, @Stake, SecurityFocus.com, In-Q-Tel, Arbor Networks, LoudCloud and more contribute their expertise *Broad audience -- Hackerâ¬"s Challenge is for anyone who wants to solve the latest hacking challenges *Great companion to Hacking Exposed-- an entire book of hands-on scenarios that compliment the Hacking Exposed text… (more)
User reviews
In the rear half of the book the solutions are given as a continuation of the story. The exploit is identified, the evidence and logs are preserved, the network is locked down and the procedures reviewed. Each scenario is completed with URLs to real security products you can download, such as SNORT, to use in your own organisation.
Most of the exploits are IIS flaws but the point is that it is the ability to spot that something is wrong - slow systems, lack of bandwidth, strange operations, etc - which this book teaches. There are exploits and intrusions involving UNIX and even Wi-Fi covered in this book, as well as notes on keeping software up to date.
A must read, and indeed an investment, for any network or security administrator.