Cart
Free Shipping in Australia
Proud to be B-Corp

Know Your Enemy Honeynet Project, The

Know Your Enemy By Honeynet Project, The

Know Your Enemy by Honeynet Project, The


$28.99
Condition - Very Good
Only 2 left

Summary

This title shares the lessons of the two-year Honeynet Project, in which leading security professionals built networks designed to be compromised -- and learned everything possible from the "blackhat" hackers who took the bait: their tools, their tactics, and their motives.

Know Your Enemy Summary

Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community by Honeynet Project, The

This book shares the lessons of the Honeynet Project, in which leading security professionals built networks designed to be compromised. From this they learned everything possible from the "blackhat" hackers who took the bait: their tools, their tactics, and their motives. The insights in this book will go a long way towards helping security professionals protect their networks against real attacks. If that's not enough, the book shows you how to build your own honeynet, learning even more about today's most significant exploits -- and tomorrow's. Lance Spitzer, leader of The Honeynet Project, begins by introducing honeynets and honeypots (the parts that make up the honeynet network), explaining how they work, and showing how to build one. Next, Know Your Enemy focuses on an in-depth analysis of attacks, including detailed analyses of compromised systems, and techniques for containing blackhat hackers while you gather evidence and work to identify them. Part III takes you into the minds of the blackhat hackers, focusing on the evidence left by actual attacks -- not theory or speculation. For all computer security specialists, and network and system administrators concerned with intrusion detection and security.

About Honeynet Project, The

The Honeynet Project is a nonprofit security research organization made up of volunteers. These volunteers are dedicated to learning the tools, tactics, and motives of the blackhat community and sharing lessons learned. The Honeynet Project has 30 members, and works with various other organizations through The Honeynet Research Alliance.



Table of Contents



Preface.


Foreword.


1. The Battleground.

I: THE HONEYNET.

2. What a Honeynet Is.

Honeypots.

Honeynets.

Value of a Honeynet.

The Honeypots in the Honeynet.

Summary.

3. How a Honeynet Works.

Data Control.

Data Capture.

Access Control Layer.

Network Layer.

System Layer.

Off-Line Layer.

Social Engineering.

Risk.

Summary.

4. Building a Honeynet.

Overall Architecture.

Data Control.

Data Capture.

Maintaining a Honeynet and Reacting to Attacks.

Summary.

II: THE ANALYSIS.

5. Data Analysis.

Firewall Logs.

IDS Analysis.

System Logs.

Summary.

6. Analyzing a Compromised System.

The Attack.

The Probe.

The Exploit.

Gaining Access.

The Return.

Analysis Review.

Summary.

7. Advanced Data Analysis.

Passive Fingerprinting.

The Signatures.

The ICMP Example.

Forensics.

Summary.

8. Forensic Challenge.

Images.

The Coroner's Toolkit.

MAC Times.

Deleted Inodes.

Data Recovery.

Summary.

III: THE ENEMY.

9. The Enemy.

The Threat.

The Tactics.

The Tools.

The Motives.

Changing Trends.

Summary.

10. Worms at War.

The Setup.

The First Worm.

The Second Worm.

The Day After.

Summary.

11. In Their Own Words.

The Compromise.

Reading the IRC Chat Sessions.

Day 1, June 4.

Day 2, June 5.

Day 3, June 6.

Day 4, June 7.

Day 5, June 8.

Day 6, June 9.

Day 7, June 10.

Analyzing the IRC Chat Sessions.

Profiling Review.

Psychological Review.

Summary.

12. The Future of the Honeynet.

Future Developments.

Conclusion.

Appendix A. Snort Configuration.

Snort Start-Up Script.

Snort Configuration File, snort.conf..

Appendix B. Swatch Configuration File.
Appendix C. Named NXT HOWTO.
Appendix D. NetBIOS Scans.
Appendix E. Source Code for bj.c.
Appendix F. TCP Passive Fingerprint Database.
Appendix G. ICMP Passive Fingerprint Database.
Appendix H. Honeynet Project Members.
Index. 0201746131T08302001

Additional information

GOR004015552
9780201746136
0201746131
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community by Honeynet Project, The
Used - Very Good
Hardback
Pearson Education (US)
2001-08-31
352
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Know Your Enemy