Hacking - The Art of Exploitation, 2nd Edition

(Romina) #1

More No-Nonsense Books from


SILENCE ON THE WIRE


A Field Guide to Passive Reconnaissance and Indirect Attacks


by MICHAL ZALEWSKI


Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
explains how computers and networks work, how information is processed


and delivered, and what security threats lurk in the shadows. No humdrum
technical white paper or how-to manual for protecting one’s network, this


book is a fascinating narrative that explores a variety of unique, uncommon,
and often quite elegant security challenges that defy classification and


eschew the traditional attacker-victim model.


APRIL 2005, 312 PP., $39.95


ISBN 978-1-59327-046-9


SECURITY DATA VISUALIZATION


Graphical Techniques for Network Analysis


by GREG CONTI


Security Data Visualization is a well-researched and richly illustrated introduc-
tion to the field of information visualization, a branch of computer science


concerned with modeling complex data using interactive images. Greg Conti,
creator of the network and security visualization tool RUMINT, shows you


how to graph and display network data using a variety of tools so that you can


understand complex datasets at a glance. And once you’ve seen what a network
attack looks like, you’ll have a better understanding of its low-level behavior—
like how vulnerabilities are exploited and how worms and viruses propagate.


SEPTEMBER 2007, 272 PP., 4-COLOR, $49.95
ISBN 978-1-59327-143-5


LINUX FIREWALLS


Attack Detection and Response with iptables, psad, and fwsnort


by MICHAEL RASH


Linux Firewalls discusses the technical details of the iptables firewall and the


Netfilter framework that are built into the Linux kernel, and it explains how
they provide strong filtering, Network Address Translation (NAT), state track-


ing, and application layer inspection capabilities that rival many commercial
tools. You’ll learn how to deploy iptables as an IDS with psad and fwsnort


and how to build a strong, passive authentication layer around iptables with
fwknop. Concrete examples illustrate concepts such as firewall log analysis


and policies, passive network authentication and authorization, exploit
packet traces, Snort ruleset emulation, and more.


OCTOBER 2007, 336 PP., $49.95
ISBN 978-1-59327-141-1


NO STARCH PRESS

Free download pdf