Hacker's Challenge
Test Your Incident Response Skills Using 20 Scenarios
Résumé
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.
The Challenge:
Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....
The Solution:
After reviewing the log files included in the challenge, propose your assessment--when did the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.
Contributing authors include:
Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.
Contents Part I: Challenges
- 1. The French Connection
- 2. The Insider
- 3. The Parking Lot
- 4. The Hinge Factor
- 5. Maggie's Moment
- 6. Genome Injection
- 7. Up in the Air
- 8. Tip of the Iceberg
- 9. FDIC Insecured
- 10. Jack and Jill
- 11. The Accidental Tourist
- 12. Run for the Border
- 13. Malpractice
- 14. An Apple a Day
- 15. A Thousand Razors
- 16. One Hop Too Many
- 17. Gluttony
- 18. The Sharpest Tool in the Shed
- 19. Omerta
- 20. Nostalgia
- 1. The French Connection
- 2. The Insider
- 3. The Parking Lot
- 4. The Hinge Factor
- 5. Maggie's Moment
- 6. Genome Injection
- 7. Up in the Air
- 8. Tip of the Iceberg
- 9. FDIC Insecured
- 10. Jack and Jill
- 11. The Accidental Tourist
- 12. Run for the Border
- 13. Malpractice
- 14. An Apple a Day
- 15. A Thousand Razors
- 16. One Hop Too Many
- 17. Gluttony
- 18. The Sharpest Tool in the Shed
- 19. Omerta
- 20. Nostalgia
L'auteur - Mike D. Schiffman
MIKE D. SCHIFFMAN is Director of Security Architecture
for @stake, the premier provider of professional security
consulting services. Previously, he was director of
research and development at Guardent, a leading provider of
managed security services. He also held senior positions
with ISS as well as Cambridge Technology Partners.
Schiffman has developed numerous security tools and is the
author of Hacker's Challenge.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | Mike D. Schiffman |
Parution | 07/11/2001 |
Nb. de pages | 354 |
Format | 18,5 x 23,2 |
Couverture | Broché |
Poids | 750g |
Intérieur | Noir et Blanc |
EAN13 | 9780072193848 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet