Security Warrior
暫譯: 安全戰士
Cyrus Peikari, Anton Chuvakin
- 出版商: O'Reilly
- 出版日期: 2004-02-17
- 售價: $1,730
- 貴賓價: 9.5 折 $1,644
- 語言: 英文
- 頁數: 556
- 裝訂: Paperback
- ISBN: 0596005458
- ISBN-13: 9780596005450
-
相關分類:
資訊安全
-
相關翻譯:
防駭戰士 (Security Warrior) (繁中版)
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$680$537 -
$1,330Beginning Perl for Bioinformatics (Paperback)
-
$920$727 -
$880$695 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$350$298 -
$650$553 -
$590$466 -
$1,730$1,644 -
$690$538 -
$750$638 -
$800$760 -
$560$476 -
$420$328 -
$850$723 -
$280$218 -
$480$379 -
$750$593 -
$720$569 -
$780$616 -
$780$663 -
$590$460 -
$540$427 -
$1,100$1,078 -
$299$254
相關主題
商品描述
When it comes to network security, many users and administrators are running
scared, and justifiably so. The sophistication of attacks against computer
systems increases with each new Internet worm.
What's the worst an
attacker can do to you? You'd better find out, right? That's what Security
Warrior teaches you. Based on the principle that the only way to defend
yourself is to understand your attacker in depth, Security Warrior
reveals how your systems can be attacked. Covering everything from reverse
engineering to SQL attacks, and including topics like social engineering,
antiforensics, and common attacks against UNIX and Windows systems, this book
teaches you to know your enemy and how to be prepared to do battle.
Security Warrior places particular emphasis on reverse
engineering. RE is a fundamental skill for the administrator, who must be aware
of all kinds of malware that can be installed on his machines -- trojaned
binaries, "spyware" that looks innocuous but that sends private data back to its
creator, and more. This is the only book to discuss reverse engineering for
Linux or Windows CE. It's also the only book that shows you how SQL injection
works, enabling you to inspect your database and web applications for
vulnerability.
Security Warrior is the most comprehensive and
up-to-date book covering the art of computer war: attacks against computer
systems and their defenses. It's often scary, and never comforting. If you're on
the front lines, defending your site against attackers, you need this book. On
your shelf--and in your hands.
Table of Contents
Preface
Part I. Software Cracking
1. Assembly Language
Registers
ASM Opcodes
References2. Windows Reverse Engineering
History of RCE
Reversing Tools
Reverse Engineering Examples
References3. Linux Reverse Engineering
Basic Tools and Techniques
A Good Disassembly
Problem Areas
Writing New Tools
References4. Windows CE Reverse Engineering
Windows CE Architecture
CE Reverse Engineering Fundamentals
Practical CE Reverse Engineering
Reverse Engineering serial.exe
References5. Overflow Attacks
Buffer Overflows
Understanding Buffers
Smashing the Stack
Heap Overflows
Preventing Buffer Overflows
A Live Challenge
ReferencesPart II. Network Stalking
6. TCP/IP Analysis
A Brief History of TCP/IP
Encapsulation
TCP
IP
UDP
ICMP
ARP
RARP
BOOTP
DHCP
TCP/IP Handshaking
Covert Channels
IPv6
Ethereal
Packet Analysis
Fragmentation
References7. Social Engineering
Background
Performing the Attacks
Advanced Social Engineering
References8. Reconnaissance
Online Reconnaissance
Conclusion
References9. OS Fingerprinting
Telnet Session Negotiation
TCP Stack Fingerprinting
Special-Purpose Tools
Passive Fingerprinting
Fuzzy Operating System Fingerprinting
TCP/IP Timeout Detection
References10. Hiding the Tracks
From Whom Are You Hiding?
Postattack Cleanup
Forensic Tracks
Maintaining Covert Access
ReferencesPart III. Platform Attacks
11. Unix Defense
Unix Passwords
File Permissions
System Logging
Network Access in Unix
Unix Hardening
Unix Network Defense
References12. Unix Attacks
Local Attacks
Remote Attacks
Unix Denial-of-Service Attacks
References13. Windows Client Attacks
Denial-of-Service Attacks
Remote Attacks
Remote Desktop/Remote Assistance
References14. Windows Server Attacks
Release History
Kerberos Authentication Attacks
Kerberos Authentication Review
Defeating Buffer Overflow Prevention
Active Directory Weaknesses
Hacking PKI
Smart Card Hacking
Encrypting File System Changes
Third-Party Encryption
References15. SOAP XML Web Services Security
XML Encryption
XML Signatures
ReferencePart IV. Advanced Defense
16. SQL Injection
Introduction to SQL
SQL Injection Attacks
SQL Injection Defenses
PHP-Nuke Examples
References17. Wireless Security
Reducing Signal Drift
Problems with WEP
Cracking WEP
Practical WEP Cracking
VPNs
TKIP
SSL
Airborne Viruses
References18. Audit Trail Analysis
Log Analysis Basics
Log Examples
Logging States
When to Look at the Logs
Log Overflow and Aggregation
Challenge of Log Analysis
Security Information Management
Global Log Aggregation
References19. Intrusion Detection Systems
IDS Examples
Bayesian Analysis
Hacking Through IDSs
The Future of IDSs
Snort IDS Case Study
IDS Deployment Issues
References20. Honeypots
Motivation
Building the Infrastructure
Capturing Attacks
References21. Incident Response
Case Study: Worm Mayhem
Definitions
Incident Response Framework
Small Networks
Medium-Sized Networks
Large Networks
References22. Forensics and Antiforensics
Hardware Review
Information Detritus
Forensics Tools
Bootable Forensics CD-ROMs
Evidence Eliminator
Forensics Case Study: FTP Attack
ReferencesPart V. Appendix
Appendix: Useful SoftICE Commands and Breakpoints
Index
商品描述(中文翻譯)
當談到網路安全時,許多使用者和管理員都感到恐懼,這是有其理由的。針對電腦系統的攻擊隨著每一個新的網路蠕蟲而變得更加複雜。攻擊者能對你做什麼最糟糕的事情?你最好找出來,對吧?這就是《Security Warrior》所教你的。基於這樣的原則:防衛自己的唯一方法是深入了解你的攻擊者,《Security Warrior》揭示了你的系統可能如何受到攻擊。這本書涵蓋了從逆向工程到 SQL 攻擊的所有內容,並包括社交工程、反取證以及針對 UNIX 和 Windows 系統的常見攻擊等主題,教你如何了解敵人並準備好迎戰。
《Security Warrior》特別強調逆向工程。逆向工程(RE)是管理員的一項基本技能,管理員必須了解各種可能安裝在其機器上的惡意軟體——木馬二進位檔、看似無害但會將私人數據發送回其創建者的「間諜軟體」等等。這是唯一一本討論 Linux 或 Windows CE 的逆向工程書籍。它也是唯一一本展示 SQL 注入如何運作的書籍,使你能檢查你的資料庫和網頁應用程式的漏洞。
《Security Warrior》是涵蓋電腦戰爭藝術的最全面和最新的書籍:針對電腦系統的攻擊及其防禦。這本書常常令人感到恐懼,卻從不讓人感到安慰。如果你在前線,保護你的網站免受攻擊者的侵害,你需要這本書。放在你的書架上——並在你的手中。
目錄
前言
第一部分:軟體破解
1. 組合語言
- 寄存器
- ASM 操作碼
- 參考資料
2. Windows 逆向工程
- RCE 的歷史
- 逆向工具
- 逆向工程範例
- 參考資料
3. Linux 逆向工程
- 基本工具和技術
- 良好的反組譯
- 問題區域
- 編寫新工具
- 參考資料
4. Windows CE 逆向工程
- Windows CE 架構
- CE 逆向工程基礎
- 實用的 CE 逆向工程
- 逆向工程 serial.exe
- 參考資料
5. 溢位攻擊
- 緩衝區溢位
- 理解緩衝區
- 擠壓堆疊
- 堆溢位
- 防止緩衝區溢位
- 實時挑戰
- 參考資料
第二部分:網路跟蹤
6. TCP/IP 分析
- TCP/IP 的簡史
- 封裝
- TCP
- IP
- UDP
- ICMP
- ARP
- RARP
- BOOTP
- DHCP
- TCP/IP 握手
- 隱蔽通道
- IPv6
- Ethereal
- 封包分析
- 分片
- 參考資料
7. 社交工程
- 背景
- 執行攻擊
- 進階社交工程
- 參考資料
8. 偵查
- 在線偵查
- 結論
- 參考資料
9. 作業系統指紋識別
- Telnet 會話協商
- TCP 堆疊指紋識別
- 特殊用途工具
- 被動指紋識別
- 模糊作業系統指紋識別
- TCP/IP 超時檢測
- 參考資料
10. 隱藏痕跡
- 你在隱藏誰?
- 攻擊後清理
- 法醫痕跡
- 維持隱蔽訪問
- 參考資料
第三部分:平台攻擊
11. Unix 防禦
- Unix 密碼
- 檔案權限
- 系統日誌
- Unix 的網路訪問
- Unix 強化
- Unix 網路防禦
- 參考資料
12. Unix 攻擊
- 本地攻擊
- 遠端攻擊
- Unix 拒絕服務攻擊
- 參考資料
13. Windows 客戶端攻擊
- 拒絕服務攻擊
- 遠端攻擊
- 遠端桌面/遠端協助
- 參考資料
14. Windows 伺服器攻擊
- 發行歷史
- Kerberos 認證攻擊
- Kerberos 認證回顧
- 打破緩衝區溢位防護
- Active Directory 弱點
- 破解 PKI
- 智能卡破解
- 加密檔案系統變更
- 第三方加密
- 參考資料
15. SOAP XML 網路服務安全
- XML 加密
- XML 簽名
- 參考資料
第四部分:進階防禦
16. SQL 注入
- SQL 簡介
- SQL 注入攻擊
- SQL 注入防護
- PHP-Nuke 範例
- 參考資料
17. 無線安全
- 減少信號漂移
- WEP 的問題
- 破解 WEP
- 實用的 WEP 破解
- VPN
- TKIP
- SSL
- 空中病毒
- 參考資料
18. 審計追蹤分析
- 日誌分析基礎
- 日誌範例
- 日誌狀態
- 何時查看日誌
- 日誌溢位和聚合
- 日誌分析的挑戰
- 安全資訊管理
- 全球日誌聚合
- 參考資料
19. 入侵檢測系統
- IDS 範例
- 貝葉斯分析
- 透過 IDS 破解
- IDS 的未來
- Snort IDS 案例研究
- IDS 部署問題
- 參考資料
20. 蜜罐
- 動機
- 建立基礎設施
- 捕捉攻擊
- 參考資料
21. 事件響應
- 案例研究:蠕蟲混亂
- 定義
- 事件響應框架
- 小型網路
- 中型網路
- 大型網路
- 參考資料
22. 法醫學與反取證
- 硬體回顧
- 資訊殘餘
- 法醫工具
- 可啟動的法醫 CD-ROM
- 證據消除器
- 法醫案例研究:FTP 攻擊
- 參考資料
附錄:有用的 SoftICE 命令和斷點
索引