Internet Forensics
暫譯: 網路取證
Robert Jones
- 出版商: O'Reilly
- 出版日期: 2005-11-15
- 售價: $1,590
- 貴賓價: 9.5 折 $1,511
- 語言: 英文
- 頁數: 242
- 裝訂: Paperback
- ISBN: 059610006X
- ISBN-13: 9780596100063
已過版
買這商品的人也買了...
-
$780$616 -
$660$627 -
$2,550$2,423 -
$650$514 -
$1,952Innovation Happens Elsewhere: Open Source as Business Strategy (Hardcover)
-
$1,120$1,098 -
$880$695 -
$390$308 -
$620$490 -
$650$507 -
$680$537 -
$680$537 -
$880$695 -
$750$593 -
$680$537 -
$550$435 -
$500$450 -
$450$356 -
$620$527 -
$720$569 -
$1,200$948 -
$1,140$1,083 -
$1,200$1,140 -
$450$383 -
$450$383
商品描述
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it.
This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage.
The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed.
Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.
Table of Contents
Preface
1. Introduction
What Is Internet Forensics?
The Seamy Underbelly of the Internet
Pulling Back the Curtain
Taking Back Our Internet
Protecting Your Privacy
Before You Begin
A Network Neighborhood Watch2. Names and Numbers
Addresses on the Internet
Internet Address Tools
DNS Record Manipulation
An Example-Dissecting a Spam Network3. Email
Message Headers
Forged Headers
Forging Your Own Headers
Tracking the Spammer
Viruses, Worms, and Spam
Message Attachments
Message Content
Is It Really Spam?4. Obfuscation
Anatomy of a URL
IP Addresses in URLs
Usernames in URLs
Encoding the Entire Message
Similar Domain Names
Making a Form Look Like a URL
Bait and Switch-URL Redirection
JavaScript
Browsers and Obfuscation5. Web Sites
Capturing Web Pages
Viewing HTML Source
Comparing Pages
Non-Interactive Downloads Using wget
Mapping Out the Entire Web Site
Hidden Directories
In-Depth Example-Directory Listings
Dynamic Web Pages
Filling Out Forms
In-Depth Example-Server-Side Database
Opening the Black Box6. Web Servers
Viewing HTTP Headers
What Can Headers Tell Us?
Cookies
Redirection
Web Server Statistics
Controlling HTTP Headers
A Little Bit of Everything7. Web Browsers
What Your Browser Reveals
Apache Web Server Logging
Server Log Analysis
Protecting Your Privacy8. File Contents
Word Document Metadata
U.K. Government Dossier on Iraq
Document Forgery
Redaction of Sensitive Information9. People and Places
Geographic Location
Time Zone
Language
Expertise
Criminal or Victim?
Hardware and Software10. Patterns of Activity
Signatures
Searching with Signatures
Problems with Simple Signatures
Full Text Comparison
Using Internet Search Engines for Patterns11. Case Studies
Case Study 1: Tidball
Case Study 2: Spam Networks12. Taking Action
What Is Being Done to Tackle Internet Fraud?
What You Can Do to Help
Getting in Over Your Head
Vision of a Community ResponseIndex
商品描述(中文翻譯)
**描述**
因為互聯網如此龐大且缺乏監管,成為各種詐騙和陰謀的滋生地。通常他們所追求的是你的信用卡號碼,而他們不會止步於此。這些詐騙不僅僅是小麻煩,而是真正的犯罪,擁有真實的受害者。現在,感謝 O'Reilly 的《Internet Forensics》,你可以採取行動來應對這些問題。
這本實用指南教你如何防範互聯網詐騙,讓你具備揭露那些困擾互聯網的垃圾郵件發送者、騙子和身份盜竊者的技能。《Internet Forensics》主要針對開發者社群,教你如何提取隱藏在每封電子郵件、網頁和網路伺服器中的資訊。它描述了壞人為了掩蓋痕跡所做的種種努力,並提供了你可以用來看穿他們偽裝的技巧。你還將了解互聯網的運作方式,以及垃圾郵件發送者如何利用這些協議來達成他們的陰險目的。
本書圍繞互聯網的核心技術組織,包括電子郵件、網站、伺服器和瀏覽器。各章節描述這些技術的使用和濫用,並展示如何揭露隱藏在其中的資訊。短小的範例說明了所有主要技術的討論。書中也探討了在揭露互聯網濫用時所產生的倫理和法律問題。
不出所料,《Internet Forensics》的讀者群是無邊無際的。對於開發者來說,這是一次深入互聯網安全世界的嚴肅探索;對於厭倦垃圾郵件的週末網民來說,這是一本有趣且娛樂性的指南,讓他們能在安全的家中或辦公室裡扮演業餘偵探的角色。
**目錄**
**前言**
**1. 介紹**
什麼是互聯網取證?
互聯網的陰暗面
揭開面紗
奪回我們的互聯網
保護你的隱私
開始之前
網路鄰里守望
**2. 名稱和數字**
互聯網上的地址
互聯網地址工具
DNS 記錄操作
範例 - 解剖一個垃圾郵件網路
**3. 電子郵件**
郵件標頭
偽造標頭
偽造自己的標頭
追蹤垃圾郵件發送者
病毒、蠕蟲和垃圾郵件
郵件附件
郵件內容
這真的是垃圾郵件嗎?
**4. 混淆**
URL 的結構
URL 中的 IP 地址
URL 中的用戶名
編碼整個郵件
相似的域名
讓表單看起來像 URL
誘餌與切換 - URL 重定向
JavaScript
瀏覽器與混淆
**5. 網站**
捕獲網頁
查看 HTML 原始碼
比較頁面
使用 wget 進行非互動式下載
繪製整個網站的地圖
隱藏目錄
深入範例 - 目錄列表
動態網頁
填寫表單
深入範例 - 伺服器端數據庫
打開黑箱
**6. 網路伺服器**
查看 HTTP 標頭
標頭能告訴我們什麼?
Cookies
重定向
網路伺服器統計
控制 HTTP 標頭
各種內容
**7. 網頁瀏覽器**
你的瀏覽器揭示了什麼
Apache 網路伺服器日誌
伺服器日誌分析
保護你的隱私
**8. 檔案內容**
Word 文件元數據
英國政府對伊拉克的檔案
文件偽造
敏感信息的刪除
**9. 人物與地點**
地理位置
時區
語言
專業知識
罪犯還是受害者?
硬體和軟體
**10. 活動模式**
簽名
使用簽名進行搜索
簡單簽名的問題
全文比較
使用互聯網搜索引擎尋找模式
**11. 案例研究**
案例研究 1:Tidball
案例研究 2:垃圾郵件網路
**12. 採取行動**
目前正在做什麼來應對互聯網詐騙?
你可以做什麼來幫助
陷入困境
社區反應的願景
**索引**