Hacker's Challenge 2 95
Hacker's Challenge 2 | |
author | Mike Schiffman, Bill Pennington, Adam J. O'Donnell, David Pollino |
pages | 352 |
publisher | McGraw-Hill Osborne Media |
rating | 9 |
reviewer | Francis (Frank) White |
ISBN | 0072226307 |
summary | A computer security puzzle book with interesting challenges and detailed solutions |
What It Covers
The scenarios in the book cover a wide range of current attacks. There are a few scenarios involving wireless access that each manage to point out a different facet of wireless security. Also, the book includes a few examples of network penetrations, a man in the middle attack, a bit of forensic analysis and the highly popular (in the media at least) "insider attack." One chapter focuses on exploit development using a simple stack overflow, which is a nice diversion.
The book's format is identical to that of the previous volume. Each challenge is rated Low, Medium, or High for Attack Complexity, Prevention and Mitigation. An account of each problem is presented (organized by date and time), often from the point of view of the person charged with figuring out what is happening or has happened. Logs are presented as they are requested by the investigator; the authors do a great job of following the thought processes and actions of the people responding to the incident as they discover each clue and take their steps forward.
At the end of each scenario description, there are a number of questions that generally help focus the reader's attention on the relevant parts of the scenario. After the reader comes up with some likely answers, he can turn to the back of the book where the solutions are found. Each solution is broken down into an explanation of the attack, how the attack could have been prevented, and steps to take to mitigate the effects of the attack after it has occurred.
The explanation highlights the clues that were presented, how they could have been used to solve the challenge, and the right (or wrong) steps the investigator took and why. Links to additional information and references are provided at the end of each solution.
The Authors
Hacker's Challenge 2 is written by Mike Schiffman (@stake), Bill Pennington (WhiteHatSec), Adam J. O'Donnell (working towards PhD at Drexel), and David Pollino (@stake). From the material presented, if not from their reputations and contributions to the computer security field (some of them under other names), the authors are obviously very familiar with analyzing and responding to security incidents. All of them contributed to the previous volume in the series. The book does not identify who wrote each chapter, unlike the first volume.
Why I Gave This Book A 9
I have read the previous volume in the series. I liked this volume a lot more, and while I was reading it, I tried to work out why. One of the possibilities I came up with is that they trimmed the number of authors from somewhere around ten, as they had used for the previous volume. The consistency of the writing and scenarios is greatly improved. The scenarios in this book are also much more interesting to me than in the previous book. It feels much more current than the previous volume. (I still recommend the previous volume, however, if you haven't been following possible attacks and countermeasures for a while. - I'd say I'd give it a 7.)From the first chapter which opens with a still under-publicized layer-2 802.11 attack, it grabbed my attention. This is a great book for seeing not just what attacks are out there, but what attacks people in the security industry think are likely in the real world.
Like the previous volume, there doesn't appear to be much vendor bias in this book, which is always a welcome sight to me. Also, although the authors work in the security industry, they stay away from promoting themselves or their companies. (They do include links to some documents on company web sites, but they are technical documents, not marketing fluff.)
This volume is also packed with humor, although perhaps not everyone will appreciate or catch all of the jokes. My favorite quote in the book is from the chapter where "d4rkl0rd", a young novice hax0r who only speaks in l33t speak, is at the dinner table : "n0 m0m, 3y3 h4t3 gr33n b34ns, dUh!"
Conclusion
I definitely recommend Hacker's Challenge 2 to anyone interested in, or responsible for, computer security. Even if you are very familiar with the subject, it's worthwhile to look over the attacks and solutions presented, and to compare the suggested response with the one you would use if presented with a similar scenario. The book is worth picking up even if you have read the previous volume, as it is of even higher quality, and covers, for the most part, completely different attacks. The format is easy to read and the real-world problem scenarios presented are interesting enough to keep you reading. The solutions are well presented and thorough, covering not just what happened in the attack and how to put the course of events together from the clues, but also ways to prevent and mitigate the attacks. Highly recommended.You can purchase Hacker's Challenge 2 from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Sweet. (Score:1, Funny)
Mad Libs for hackers...
Re:Sweet. (Score:3, Funny)
good, now instead of replacing every adjective with smelly and every noun with ass, we can replace every adjective with 1337 sekret ninja and every noun with, well, ass.
why would people want a challenge... (Score:1, Funny)
=)
That rings a bill ... (Score:5, Informative)
Re:That rings a bill ... (Score:3, Insightful)
and "Hack-Me" challenges that security groups put out when trying to recruit. It's always fun for a challenge if nothing else.
The book sounds like a good read....
Good Challenges/Case Studies (Score:4, Interesting)
I was first intrigued by case studies when I read hacking linux exposde [hackinglinuxexposed.com], which has excellent real-world case studies. Turn them on their heads and they are useful as challenges too. Since HLE was based on Hacking Exposed [hackingexposed.com] I thought I'd get it for those case studies, but they are lame 1-2 page things.
You can get the case studies for HEL online now, which is cool.
Does anyone else have good case studies / challenge pointers that are available online?
Re:That rings a bill ... (Score:1)
Thanks for the link, I think some geek fun is definitely no bad thing from time to time.
Now if only I could get past level 5...
Time to monitor those temp files or find something to decompile visual basic exe's =)
Or peek at memory usage in something like softICE. Tonight could be a long night...
Cheers
And i thought... (Score:1)
Re:And i thought... (Score:2)
Not Javascript, it's Java.
This is fun. Thanks Khalidz0r.
Re:That rings a bill ... (Score:1)
Re:That rings a bell ... (Score:1)
sorry, was a typo.
Here's a scenario (Score:2, Funny)
Answer: Take the week off.
Re:Here's a scenario (Score:5, Funny)
Re:Here's a scenario (Score:2)
Depends entirely on what you need, in terms of *speed* and *terrabyte* capacity, mysql was designed to be replace Oracle which is a helluva lot faster (not to mention more scale-able) than SQL-server. *Access* ??? that's a single-user application which some shops use to deploy multi user applications using SMB file locking -- very ugly, and not comparable.
Let's remember that just 4 years ago MS was pushing hard to get big-iron shops to commit to backending SAP-R3 with <cough> SQL-Server while trying to explain that 'you can work around the lack of row-level locking'.
Now *before* all the 'leet(sic) pgsql fans bounce in to suggest the mysql is inadequate ... Sure if you need TP and *complete* SQL language then mysql isn't the right choice. It remains a great solution for both performance and capacity where those attributes aren't needed.
Re:Here's a scenario (Score:1)
Hey Hotshot! (Score:2, Funny)
Shoot the server. Take it out of the equation.
This "Speed" moment was brought to you by Mentos.
Encyclopedia Brown (Score:5, Funny)
"Gee Willikers, looks like Bugs is up to something again. What? He's hacking the Pentagon? No need to call the authorities - us kid detectives have it under control! What? He just launched nukes at Russia? Maybe i'll leave this one to the cops..."
Also check out Encyclopedia Brown and the case of the Pirated MP3s. [modernhumorist.com]
Re:Encyclopedia Brown (Score:2, Interesting)
Seriously, check out the MH Encyclopedia Brown stories. They're great and presented *perfectly*.
Encyclopedia Brown and the Case of the Missing Olympic Magic [modernhumorist.com] is the best one, IMHO. God, I hate Bob Costas.
Re:Encyclopedia Brown (Score:1)
Ha ha! (Score:1)
It's a martian with a phaser-gun!, shouted Bugs, He's going to turn you into an ice-cream pie!
I can also remember Bugs Meaney's "2) ???" was "Trying to figure out why the stomach doesn't digest itself."
What was the girls name? Sally? She had Spunk.
Why I Gave This Book An 9 (Score:5, Funny)
Why I Gave This Book An 9
Because it would not be a
Re:Why I Gave This Book An 9 (Score:1)
It's "a 9".
Re:Why I Gave This Book An 9 (Score:1)
Misleading title... it's NOT about HACKING (Score:4, Insightful)
I suppose trying to get writers and the general public to distinguish between hacking and cracking is a lost cause, but we need to keep trying.
Re:Misleading title... it's NOT about HACKING (Score:3, Funny)
Sigh... I know how you feel. But I think we should just let them have the term. It's wasted effort to keep trying to correct people.
Let them refer to crackers as "hackers." We'll just switch to referring to hackers as "gods." ;-)
Re:Misleading title... it's NOT about HACKING (Score:1)
Pronunciation: 'bich
Function: noun
Etymology: Middle English bicche, from Old English bicce
Date: before 12th century
1 : the female of the dog or some other carnivorous mammals
2 a : a lewd or immoral woman b : a malicious, spiteful, or domineering woman -- sometimes used as a generalized term of abuse
3 : something that is highly objectionable or unpleasant
4 : COMPLAINT
(source: www.m-w.com)
Rather ironic that you dispute the multiple meanings of the word "hacker" by performing an action that also has multiple meanings. Damn I love words, and bitching. And bitches come to think of it.
I wish I could find a book like that (Score:1)
Please inform Kevin Mitnick (Score:2, Funny)
The term 'cracker' only came into use as a result of political correctness... the good hackers didn't like their name tarnished by the bad hackers, so they assigned the term 'cracker' to these people.
So one who breaks into systems is also known as a hacker. Your sense of political correctness prevents you from using that term. To you, one who breaks into Coke vending machines would be a soda cracker.
Re:Misleading title... it's NOT about HACKING (Score:1)
Recommended (Score:3, Insightful)
Re:Recommended (Score:2)
Re:"Why I Gave This Book An 9" (Score:2)
That's okk.
choose your own adventure (Score:1)
they should make one for adults... they would only have to actually write on half the pages... as they could assume everyone would just pick the selection that looked like it would lead to sex...
memories.. (Score:3, Funny)
I can't believe my mom recorded that conversation!
This is so embarassing...
Re:Wouldn't it be funny ... (Score:2)
damn... (Score:2)
After that, I thought, maybe it's real 'hacks', as in what the Jargon File would define 'hack' as.
Speaking of which...I tried to provide a link to www.tuxedo.org and got redirected to various sites. What's up with ESR's site?
Re:damn... (Score:2)
"Speed" meets "Hackers" (Score:5, Funny)
Keanu Reeves: "Shoot the boxen."
Mad Hacker: "But it's got a bullet-proof cover over it with a keyboard entry system...and YOU DON'T KNOW THE PASSWORD"
Keanu Reeves: "I'm already in!"
Mad Hacker: "But how?!"
Keanu Reeves: "The three most commonly used passwords: love, secret, and sex...not necessarily in that order"
Mad Hacker: "But it's not any of those"
Keanu Reeves: "Don't forget about 'God'. System operators love using 'god'."
Ok...maybe I went a bit overboard with it...
Good book and there's a monthly ongoing contest (Score:1)
Great book. I also found a monthly forensic challenge contest here [tigertools.net].