Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses 1st Edition
There is a newer edition of this item:
$46.92
(98)
Only 1 left in stock - order soon.
- ISBN-100130332739
- ISBN-13978-0130332738
- Edition1st
- PublisherPrentice Hall PTR
- Publication dateJanuary 1, 2002
- LanguageEnglish
- Dimensions7 x 1.5 x 9.2 inches
- Print length564 pages
Editorial Reviews
Amazon.com Review
The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall
Topics covered: How black-hat hackers work, what tools and techniques they use, and how to assess and improve your systems' defenses. The author explains how Windows, Unix, and TCP/IP can be exploited for nefarious purposes, and details a modus operandi that's typical of the bad guys.
From the Back Cover
The Next Generation Hacker Book
The step-by-step guide to defending against hacker intrusions!
- Defend against today's most powerful hacker attacks!
- Hands-on, step-by-step techniques for UNIX/Linux and Windows environments
- Intrusion detection: New evasion techniquesand countermeasures
- By the security expert who demonstrated hacking to the U.S. Senate!
This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assetswhether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics-and specific, proven countermeasures for both UNIX and Windows environments. Skoudis covers all this and more:
- Know your adversary: from script kiddies to elite attackers
- A hacker's view of networks, TCP/IP protocols, and their vulnerabilities
- Five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection
- The most dangerous and widespread attack scenariosexplained in depth
- Key hacker tools: port scanners, firewall scanners, sniffers, session hijackers, RootKits, and more
- How hackers build elegant attacks from simple building blocks
- Detecting and preventing IP spoofing, covert channels, denial of service attacks, and other key attacks
- How hackers cover their tracksand how you can uncover their handiwork
- A preview of tomorrow's hacker tools, attacks, and countermeasures
Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right nowand long-term strategies that will improve security for years to come.
About the Author
EDWARD SKOUDIS is Vice President of Security Strategy for Predictive Systems, a leading independent infrastructure network consulting company, helping global enterprises and service providers harness the power of network technology. His specialty is identifying and resolving security vulnerabilities in UNIX, Windows, firewall architectures, and Web servers. Skoudis is a frequent speaker at major security conferences such as SANS and has demonstrated hacker techniques for the United States Senate.
Excerpt. © Reprinted by permission. All rights reserved.
My cell phone rang. I squinted through my sleepy eyelids at the clock. Ugh! 4 a.m., New Year's Day. Needless to say, I hadn't gotten very much sleep that night.
I picked up the phone to hear the frantic voice of my buddy, Fred, on the line. Fred was a security administrator for a medium-sized Internet Service Provider, and he frequently called me with questions about a variety of security issues.
"We've been hacked big time!" Fred shouted, far too loudly for this time of the morning.
I rubbed my eyes to try to gain a little coherence.
"How do you know they got in? What did they do?" I asked.
Fred replied, "They tampered with a bunch of Web pages. This is bad, Ed. My boss is gonna have a fit!"
I asked, "How did they get in? Have you checked out the logs?"
Fred stuttered, "W-Well, we don't do much logging, because it slows down performance. I only snag logs from a couple of machines. Also, on those systems where we do gather logs, the attackers cleared the log files."
"Have you applied the latest security fixes from your operating system vendor to your machines?" I asked, trying to learn a little more about Fred's security posture.
Fred responded with hesitation, "We apply security patches every three months. The last time we deployed fixes was?um?two-and-a-half months ago."
I scratched my aching head and said, "Two major buffer overflow attacks were released last week. You may have been hit. Have they installed any RootKits? Have you checked the consistency of critical files on the system?"
"You know, I was planning to install something like Tripwire, but just never got around to it," Fred admitted.
I quietly sighed and said, "OK. Just remain calm. I'll be right over so we can start to analyze your machines."
You clearly don't want to end up in a situation like Fred, and I want to minimize the number of calls I get at 4 a.m. on New Year's Day. While I've changed Fred's name to protect the innocent, this situation actually occurred. Fred's organization had failed to implement some fundamental security controls, and it had to pay the price when an attacker came knocking. In my experience, many organizations find themselves in the same state of information security unpreparedness.
But the situation goes beyond these security basics. Even if you've implemented all of the controls discussed in my Fred narrative above, there are a variety of other tips and tricks you can use to defend your systems. Sure, you may apply security patches, use a file integrity checking tool, and have adequate logging, but have you recently looked for unsecured modems? Or, how about activating port-level security on the switches in your critical network segments to prevent powerful, new active sniffing attacks? Have you considered implementing non-executable stacks to prevent one of the most common types of attacks today, the stack-based buffer overflow? Are you ready for kernel-level RootKits? If you want to learn more about these topics and more, please read on.
As we will see throughout the book, computer attacks happen each and every day, with increasing virulence. To create a good defense, you must understand the offensive techniques of your adversaries. In my career as a system penetration tester, incident response team member, and information security architect, I've seen numerous types of attacks ranging from simple scanning by clueless kids to elite attacks sponsored by the criminal underground. This book boils down the common and most damaging elements from these real-world attacks, while offering specific advice on how you can proactively avoid such trouble from your adversaries. We'll zoom in on how computer attackers conduct their activities, looking at each step of their process so we can implement in-depth defenses.
The book is designed for system administrators, network administrators, and security professionals, as well as others who want to learn how computer attackers do their magic and how to stop them. The offensive and defensive techniques laid out in the book apply to all types of organizations using computers and networks today, including enterprises and service providers, ranging in size from small to gigantic.
Computer attackers are marvelous at sharing information with each other about how to attack your infrastructure. Their efficiency at information dissemination about victims can be ruthless. It is my hope that this book can help to even the score, by sharing practical advice about how to defend your computing environment from the bad guys. By applying the defenses from this book, you can greatly improve your computer security and, perhaps, we'll both be able to sleep in late next New Year's Day.
Excerpt. © Reprinted by permission. All rights reserved.
Preface
My cell phone rang. I squinted through my sleepy eyelids at the clock. Ugh! 4 a.m., New Year's Day. Needless to say, I hadn't gotten very much sleep that night.
I picked up the phone to hear the frantic voice of my buddy, Fred, on the line. Fred was a security administrator for a medium-sized Internet Service Provider, and he frequently called me with questions about a variety of security issues.
"We've been hacked big time!" Fred shouted, far too loudly for this time of the morning.
I rubbed my eyes to try to gain a little coherence.
"How do you know they got in? What did they do?" I asked.
Fred replied, "They tampered with a bunch of Web pages. This is bad, Ed. My boss is gonna have a fit!"
I asked, "How did they get in? Have you checked out the logs?"
Fred stuttered, "W-Well, we don't do much logging, because it slows down performance. I only snag logs from a couple of machines. Also, on those systems where we do gather logs, the attackers cleared the log files."
"Have you applied the latest security fixes from your operating system vendor to your machines?" I asked, trying to learn a little more about Fred's security posture.
Fred responded with hesitation, "We apply security patches every three months. The last time we deployed fixes was?um?two-and-a-half months ago."
I scratched my aching head and said, "Two major buffer overflow attacks were released last week. You may have been hit. Have they installed any RootKits? Have you checked the consistency of critical files on the system?"
"You know, I was planning to install something like Tripwire, but just never got around to it," Fred admitted.
I quietly sighed and said, "OK. Just remain calm. I'll be right over so we can start to analyze your machines."
You clearly don't want to end up in a situation like Fred, and I want to minimize the number of calls I get at 4 a.m. on New Year's Day. While I've changed Fred's name to protect the innocent, this situation actually occurred. Fred's organization had failed to implement some fundamental security controls, and it had to pay the price when an attacker came knocking. In my experience, many organizations find themselves in the same state of information security unpreparedness.
But the situation goes beyond these security basics. Even if you've implemented all of the controls discussed in my Fred narrative above, there are a variety of other tips and tricks you can use to defend your systems. Sure, you may apply security patches, use a file integrity checking tool, and have adequate logging, but have you recently looked for unsecured modems? Or, how about activating port-level security on the switches in your critical network segments to prevent powerful, new active sniffing attacks? Have you considered implementing non-executable stacks to prevent one of the most common types of attacks today, the stack-based buffer overflow? Are you ready for kernel-level RootKits? If you want to learn more about these topics and more, please read on.
As we will see throughout the book, computer attacks happen each and every day, with increasing virulence. To create a good defense, you must understand the offensive techniques of your adversaries. In my career as a system penetration tester, incident response team member, and information security architect, I've seen numerous types of attacks ranging from simple scanning by clueless kids to elite attacks sponsored by the criminal underground. This book boils down the common and most damaging elements from these real-world attacks, while offering specific advice on how you can proactively avoid such trouble from your adversaries. We'll zoom in on how computer attackers conduct their activities, looking at each step of their process so we can implement in-depth defenses.
The book is designed for system administrators, network administrators, and security professionals, as well as others who want to learn how computer attackers do their magic and how to stop them. The offensive and defensive techniques laid out in the book apply to all types of organizations using computers and networks today, including enterprises and service providers, ranging in size from small to gigantic.
Computer attackers are marvelous at sharing information with each other about how to attack your infrastructure. Their efficiency at information dissemination about victims can be ruthless. It is my hope that this book can help to even the score, by sharing practical advice about how to defend your computing environment from the bad guys. By applying the defenses from this book, you can greatly improve your computer security and, perhaps, we'll both be able to sleep in late next New Year's Day.
Product details
- Publisher : Prentice Hall PTR; 1st edition (January 1, 2002)
- Language : English
- Paperback : 564 pages
- ISBN-10 : 0130332739
- ISBN-13 : 978-0130332738
- Item Weight : 2.5 pounds
- Dimensions : 7 x 1.5 x 9.2 inches
- Best Sellers Rank: #2,956,664 in Books (See Top 100 in Books)
- #338 in CompTIA Certification Guides
- #7,316 in Computer Security & Encryption (Books)
- #187,989 in Textbooks (Special Features Stores)
- Customer Reviews:
About the authors
Discover more of the author’s books, see similar authors, read book recommendations and more.
Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
- 5 star4 star3 star2 star1 star5 star64%22%14%0%0%64%
- 5 star4 star3 star2 star1 star4 star64%22%14%0%0%22%
- 5 star4 star3 star2 star1 star3 star64%22%14%0%0%14%
- 5 star4 star3 star2 star1 star2 star64%22%14%0%0%0%
- 5 star4 star3 star2 star1 star1 star64%22%14%0%0%0%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews right now. Please try again later.
- Reviewed in the United States on May 17, 2002I decided to purchase this book based in large part on the fact that all the reviews at the time I was shopping gave it 5 stars. I was also looking for something that seemed a good introduction without being either totally non-technical or overwhelming technical.
I'm well into the book now and can tell you that it definitely lives up to all those 5 star ratings. As others have said, it is an easy, enjoyable, and very informative read. Depending on your ultimate objectives you may eventually want to get even deeper into the technical aspects of security but for starters and for a good long term reference this book is excellent.
Buy it. You won't be disappointed.
- Reviewed in the United States on March 9, 2013The fundamental ideas of how to stave off hacks likely won't change for years to come (though some individual methods or protocols do), so this book is a decent guide to help start out anyone interested in network security.
- Reviewed in the United States on March 7, 2003Good book dinamic and simple. it does not use complicated words and easy to fallow.
- Reviewed in the United States on December 16, 2002After reading the introduction chapter, you get excited and think that this book might actually be some what different than any other hacking book on the market. It really isn't.
If you have experience, the first 144 pages are a complete waste.
The author provides a review of TCP/IP, Unix and NT in 144 pages.
I have no doubt that the author is a seasoned professional. He even makes mention of the fact that he provides advice to the groups of authors who make the SANS security publications. Maybe he does, but this book is not written very well.
If you actually read this entire book, you'll find yourself
saying "I've read this somewhere else". Don't get me wrong, buy the book only if you have not read other security books. There are others that you should get before you read this one.
- Reviewed in the United States on September 6, 2001For those of you out there who are new to computer security, or who understand theory and concepts and want some practical explanations about what's out there, this is a book you cannot do without. If you are really serious about wanting to know details about what you are up against when protecting your organization, or your PC from attacks you will not just want to glance through the book but read it from cover to cover. The is not a book that will teach you theory about encryption, PKI and all the mathamatical and computer science concepts that Computer Science or Computer Engineering majors usually learn. There are plenty of good books out there for that. This book is more of a practical hands-on approach to how attacks are executed and how to stop and defend against them.
Ed Skoudis has really done a phenomenal job presenting the material in an organized, easy-to-follow format without making it like a 'security for dummies' type of book. He gives you knowledge and techniques you can apply. Ed begins with 3 chapters on the basics of TCP/IP, UNIX and Windows NT/2000. I found these three chapter very helpful in preparing for the rest of the book even though I have read books on and worked with all three before. Ed presents a few ideas about the vulnerabilities of these systems without going into detail. That comes later. Then he serves up the main course. The 5 phases of an attack are outlined and the following is a brief description:
Phase 1: How do attackers do research on their targets ? This includes web sites where they look up their info, social engineering techniques, etc.
Phase 2: How do they find vulnerable systems ? This includes war dialers, port scanners, network mappers etc. He also gives you detailed information about where you can find these tools how to use the most popular ones and how they actually work internally.
Phase 3: What can an attacker actually do once he has found the vulnerabilities in your system and breached security ? This tells you about cracking passwords in UNIX and NT, how to attack web apps by finding bad cgi scripts, stack buffer overflows, packet sniffing, IP spoofing, etc. This once again has detailed explanations on where to get the tools and how they are used.
Phase 4: How does the attacker maintain access to the system ? This tells you about trojan horses, back doors, Rootkits, etc
Phase 5: How does the attacker cover his tracks ?
Ed finally ties it all together by describing attacks using the phases and tools he talks about above with examples along with a discussion of mistakes made by system admins. I should also mention that for all the attacks mentioned in the book, Ed always fills you in on how to defend against them so you don't feel like you are fighting a losing battle as a system admin. The book is written in a way that is very easy to follow. It is almost like someone standing in front of you in a classroom and explaining things to you. Ed uses personal experiences along with light-hearted comments about system administrators and hackers that will make you smile so that the reading doesn't stay too serious.
This book is worth reading and keeping as a reference. I gave it 5 stars because it is the best book I have seen on practical computer security.
Top reviews from other countries
-
tamoReviewed in Japan on October 4, 2004
4.0 out of 5 stars 豊富な図、例、具体的な解説
Windows と Unix の基本構造から始まり、
IDS や sniffer の基本的な仕組みを経て、
バックドアを仕掛けたあとの攻撃者の行動パターンまで考慮する本。
攻撃者の心理、利点、弱点を考えてから対処策を解説する形式。
攻撃者が IDS を避けるためのフラグメンテーションなどの仕組みを、
TCP/IP の細かい規定などには触れずに、
豊富な図とともに簡明に解説していたのが印象に残っている。
全体的に図や例が多くて具体的であるが、将来の脅威にも
対応できるように、一般性を失うことなく書かれている。
私は自分のコンピュータに侵入された経験がないので、
読む前は「どんな攻撃があるのか」「攻略されたあとにどうなるか」
「侵入されたことに気付いたあとはどうすれば良いか」
いずれもわからないで漠然とした不安だけがあったのだが、
著者の見てきた実際の被害やアングラ情報に基づく解説によって、
脅威と対策を実際的に考慮することができるようになった。
私が「暗号の秘密とウソ」のような一般論を読んだあとで
この本を読んだのは、偶然であるが最適な順序だったと考えている。
セキュリティの考え方と、正確かつ最新の知識、いずれも
重要である。ある程度セキュリティの概要をつかんだあとは、
本書でひととおり攻撃と防御の手段を学ぶようお勧めする。
厚い本だが、類書をいくつも読むより時間の節約になると思う。