Saturday, January 10, 2009

Counter Hack Reloaded or Adobe Illustrator for Fashion Design

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2nd Edition

Author: Edward Skoudis

The Next Generation Hacker Book

The step-by-step guide to defending against hacker intrusions!

  • Defend against today's most powerful hacker attacks!
  • Hands-on, step-by-step techniques for UNIX/Linux and Windows environments
  • Intrusion detection: New evasion techniques—and countermeasures
  • By the security expert who demonstrated hacking to the U.S. Senate!

This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assets—whether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics-and specific, proven countermeasures for both UNIX and Windows environments. Skoudis covers all this and more:

  • Know your adversary: from script kiddies to elite attackers
  • A hacker's view of networks, TCP/IP protocols, and their vulnerabilities
  • Five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection
  • The most dangerous and widespread attack scenarios—explained in depth
  • Key hacker tools: port scanners, firewall scanners, sniffers, session hijackers, RootKits, and more
  • How hackers build elegant attacks from simple building blocks
  • Detecting and preventing IP spoofing, covert channels, denial of service attacks, and other key attacks
  • How hackers cover their tracks—and how you can uncover their handiwork
  • A preview ocountermeasures

Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right now—and long-term strategies that will improve security for years to come.

Booknews

Infrastructure network consultant Skoudis provides a step-by-step guide that will help network and system administrators defend their information and computing assets, whether or not they have had security experience. The 13 chapters discuss a hacker's view of networks, TCP/IP protocols, and their vulnerabilities; five phases of hacking (reconnaissance, scanning, gaining and maintaining access, and preventing detection); the most dangerous and widespread attack scenarios; key hacker tools and how they work to build elegant attacks from simple building blocks; detecting and preventing IP spoofing, covert channels, denial of service, and other key attacks; how to uncover the handiwork of hackers; and a preview of tomorrow's hacker tools, attacks, and countermeasures. Annotation c. Book News, Inc., Portland, OR (booknews.com)

Soundview Executive Book Summaries

Skoudis, a leading network security expert, has compiled his wealth of knowledge on protecting information and computing assets into a 564-page masterwork. Sharing his insider's view on the destructive tools and tactics used by hackers, Skoudis offers an encyclopedia of hacker tools, attack detecting techniques and preventive measures to protect the vulnerabilities of today and tomorrow. Copyright (c) 2002 Soundview Executive Book Summaries



Table of Contents:

Foreword xxi

Preface Reloaded xxiii

About the Authors xxxi

Chapter 1: Introduction 1

The Computer World and the Golden Age of Hacking 2

Why This Book? 4

The Threat: Never Underestimate Your Adversary 7

A Note on Terminology and Iconography 12

Caveat: These Tools Could Hurt You 15

Organization of Rest of the Book 19

Summary 23

Chapter 2: Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book 25

The OSI Reference Model and Protocol Layering 26

How Does TCP/IP Fit In? 28

Understanding TCP/IP 32

Transmission Control Protocol (TCP) 33

User Datagram Protocol (UDP) 41

Internet Protocol (IP) and Internet Control Message Protocol (ICMP) 44

ICMP 51

Other Network-Level Issues 53

Don’t Forget About the Data Link and Physical Layers! 66

Security Solutions for the Internet 75

Conclusion 86

Summary 87

Chapter 3: Linux and UNIX Overview: Pretty Much Everything You Need to Know About Linux and UNIX to Follow the Rest of This Book 91

Introduction 91

Architecture 95

Accounts and Groups 107

Linux and UNIX Permissions 110

Linux and UNIX Trust Relationships 115

Common Linux and UNIX Network Services 119

Conclusion 124

Summary 124

Chapter 4: Windows NT/2000/XP/2003 Overview: Pretty Much Everything You Need to Know About Windows to Follow the Rest of This Book 127

Introduction 127

A Brief History of Time 128

The Underlying Windows Operating System Architecture 133

How Windows Password Representations Are Derived 137

Kernel Mode 139

From Service Packs and Hotfixes to Windows Update and Beyond 141

Accounts and Groups 142

Privilege Control 147

Policies 149

Trust 152

Auditing 154

Object Access Control and Permissions 156

Network Security 160

Windows 2000 and Beyond: Welcome to the New Millennium 162

Conclusion 177

Summary 177

Chapter 5: Phase 1: Reconnaissance 183

Low-Technology Reconnaissance: Social Engineering, Caller ID Spoofing, Physical Break-In, and Dumpster Diving 184

Search the Fine Web (STFW) 195

Whois Databases: Treasure Chests of Information 212

The Domain Name System 220

General-Purpose Reconnaissance Tools 230

Conclusion 235

Summary 235

Chapter 6: Phase 2: Scanning 239

War Driving: Finding Wireless Access Points 240

War Dialing: Looking for Modems in All the Right Places 252

Network Mapping 261

Determining Open Ports Using Port Scanners 268

Vulnerability-Scanning Tools 307

Intrusion Detection System and Intrusion Prevention System Evasion 319

Conclusion 335

Summary 335

Chapter 7: Phase 3: Gaining Access Using Application and Operating System Attacks 339

Script Kiddie Exploit Trolling 339

Pragmatism for More Sophisticated Attackers 340

Buffer Overflow Exploits 342

Password Attacks 377

Web Application Attacks 406

Exploiting Browser Flaws 431

Conclusion 435

Summary 435

Chapter 8: Phase 3: Gaining Access Using Network Attacks 439

Sniffing 439

IP Address Spoofing 470

Session Hijacking 482

Netcat: A General-Purpose Network Tool 491

Conclusion 510

Summary 510

Chapter 9: Phase 3: Denial-of-Service Attacks 513

Locally Stopping Services 515

Locally Exhausting Resources 517

Remotely Stopping Services 518

Remotely Exhausting Resources 523

Conclusion 543

Summary 544

Chapter 10: Phase 4: Maintaining Access: Trojans, Backdoors, and Rootkits ... Oh My! 547

Trojan Horses 547

Backdoors 548

The Devious Duo: Backdoors Melded into Trojan Horses 553

Nasty: Application-Level Trojan Horse Backdoor Tools 555

Also Nasty: The Rise of the Bots 568

Additional Nastiness: Spyware Everywhere! 578

Defenses Against Application-Level Trojan Horse Backdoors, Bots, and Spyware 581

Even Nastier: User-Mode Rootkits 587

Defending Against User-Mode Rootkits 604

Nastiest: Kernel-Mode Rootkits 608

Defending Against Kernel-Mode Rootkits 616

Conclusion 623

Summary 623

Chapter 11: Phase 5: Covering Tracks and Hiding 627

Hiding Evidence by Altering Event Logs 628

Defenses Against Log and Accounting File Attacks 637

Creating Difficult-to-Find Files and Directories 641

Hiding Evidence on the Network: Covert Channels 647

Defenses Against Covert Channels 665

Conclusion 668

Summary 668

Chapter 12: Putting It All Together: Anatomy of an Attack 671

Scenario 1: Crouching Wi-Fi, Hidden Dragon 673

Scenario 2: Death of a Telecommuter 685

Scenario 3: The Manchurian Contractor 696

Conclusion 708

Summary 709

Chapter 13: The Future, References, and Conclusions 711

Where Are We Heading? 711

Keeping Up to Speed 715

Final Thoughts ... Live Long and Prosper 721

Summary 722

Index 723

Forewords & Introductions

Preface

My cell phone rang. I squinted through my sleepy eyelids at the clock. Ugh! 4 a.m., New Year's Day. Needless to say, I hadn't gotten very much sleep that night.

I picked up the phone to hear the frantic voice of my buddy, Fred, on the line. Fred was a security administrator for a medium-sized Internet Service Provider, and he frequently called me with questions about a variety of security issues.

"We've been hacked big time!" Fred shouted, far too loudly for this time of the morning.

I rubbed my eyes to try to gain a little coherence.

"How do you know they got in? What did they do?" I asked.

Fred replied, "They tampered with a bunch of Web pages. This is bad, Ed. My boss is gonna have a fit!"

I asked, "How did they get in? Have you checked out the logs?"

Fred stuttered, "W-Well, we don't do much logging, because it slows down performance. I only snag logs from a couple of machines. Also, on those systems where we do gather logs, the attackers cleared the log files."

"Have you applied the latest security fixes from your operating system vendor to your machines?" I asked, trying to learn a little more about Fred's security posture.

Fred responded with hesitation, "We apply security patches every three months. The last time we deployed fixes was?um?two-and-a-half months ago."

I scratched my aching head and said, "Two major buffer overflow attacks were released last week. You may have been hit. Have they installed any RootKits? Have you checked the consistency of critical files on the system?"

"You know, I was planning to install something like Tripwire, but just never got around to it," Fredadmitted.

I quietly sighed and said, "OK. Just remain calm. I'll be right over so we can start to analyze your machines."

You clearly don't want to end up in a situation like Fred, and I want to minimize the number of calls I get at 4 a.m. on New Year's Day. While I've changed Fred's name to protect the innocent, this situation actually occurred. Fred's organization had failed to implement some fundamental security controls, and it had to pay the price when an attacker came knocking. In my experience, many organizations find themselves in the same state of information security unpreparedness.

But the situation goes beyond these security basics. Even if you've implemented all of the controls discussed in my Fred narrative above, there are a variety of other tips and tricks you can use to defend your systems. Sure, you may apply security patches, use a file integrity checking tool, and have adequate logging, but have you recently looked for unsecured modems? Or, how about activating port-level security on the switches in your critical network segments to prevent powerful, new active sniffing attacks? Have you considered implementing non-executable stacks to prevent one of the most common types of attacks today, the stack-based buffer overflow? Are you ready for kernel-level RootKits? If you want to learn more about these topics and more, please read on.

As we will see throughout the book, computer attacks happen each and every day, with increasing virulence. To create a good defense, you must understand the offensive techniques of your adversaries. In my career as a system penetration tester, incident response team member, and information security architect, I've seen numerous types of attacks ranging from simple scanning by clueless kids to elite attacks sponsored by the criminal underground. This book boils down the common and most damaging elements from these real-world attacks, while offering specific advice on how you can proactively avoid such trouble from your adversaries. We'll zoom in on how computer attackers conduct their activities, looking at each step of their process so we can implement in-depth defenses.

The book is designed for system administrators, network administrators, and security professionals, as well as others who want to learn how computer attackers do their magic and how to stop them. The offensive and defensive techniques laid out in the book apply to all types of organizations using computers and networks today, including enterprises and service providers, ranging in size from small to gigantic.

Computer attackers are marvelous at sharing information with each other about how to attack your infrastructure. Their efficiency at information dissemination about victims can be ruthless. It is my hope that this book can help to even the score, by sharing practical advice about how to defend your computing environment from the bad guys. By applying the defenses from this book, you can greatly improve your computer security and, perhaps, we'll both be able to sleep in late next New Year's Day.

Interesting textbook: Dr Atkins 4 Book Package or Malt Whisky

Adobe Illustrator for Fashion Design

Author: Susan Lazear

More than just a how to manual, Adobe Illustrator for Fashion Design introduces readers to the Illustrator approach to design and ways to think about designing fashion apparel and textiles using the program.

Early chapters provide a strong foundation in the commands and capabilities of the program while later sections offer application exercises that develop skills in fashion drawing, textile design and presentation techniques. Available with an accompanying DVD, this book emphasizes the creative process and explores the capabilities of this powerful program as related to drawings of clothing, fashion poses, and textile prints.

Anyone looking to get into the fashion industry.  Prepares readers for the competitive job market by teaching them sought after technical skills.



No comments:

Post a Comment