Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
暫譯: 網路靜默:被動偵查與間接攻擊的實用指南
Michal Zalewski
- 出版商: No Starch Press
- 出版日期: 2005-04-01
- 售價: $1,590
- 貴賓價: 9.5 折 $1,511
- 語言: 英文
- 頁數: 312
- 裝訂: Paperback
- ISBN: 1593270461
- ISBN-13: 9781593270469
已過版
買這商品的人也買了...
-
$640$506 -
$800$632 -
$720$569 -
$550$435 -
$590$466 -
$550$435 -
$560$442 -
$580$458 -
$650$514 -
$540$427 -
$500$450 -
$650$507 -
$520$411 -
$460$363 -
$520$406 -
$490$417 -
$620$490 -
$750$593 -
$560$437 -
$580$493 -
$620$490 -
$820$648 -
$650$514 -
$780$663 -
$280$221
相關主題
商品描述
Description:
Author Michal Zalewski has long been known and respected in the hacking and security communities for his intelligence, curiosity and creativity, and this book is truly unlike anything else out there. In Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, Zalewski shares his expertise and experience to explain how computers and networks work, how information is processed and delivered, and what security threats lurk in the shadows. No humdrum technical white paper or how-to manual for protecting one's network, this book is a fascinating narrative that explores a variety of unique, uncommon and often quite elegant security challenges that defy classification and eschew the traditional attacker-victim model.
Tabel of Contents:
FOREWORD
by Solar Designer
INTRODUCTION
A Few Words about Me
About This Book
PART I: THE SOURCE
On the problems that surface long before one sends any information over the network
CHAPTER 1: I CAN HEAR YOU TYPING
Where we investigate how your keystrokes can be monitored from far, far away
The Need for Randomness
Automated Random Number Generation
The Security of Random Number Generators
I/O Entropy: This Is Your Mouse Speaking
Delivering Interrupts: A Practical Example
One-Way Shortcut Functions
The Importance of Being Pedantic
Entropy Is a Terrible Thing to Waste
Attack: The Implications of a Sudden Paradigm Shift
A Closer Look at Input Timing Patterns
Immediate Defense Tactics
Hardware RNG: A Better Solution?
Food for Thought
Remote Timing Attacks
Exploiting System Diagnostics
Reproducible Unpredictability
CHAPTER 2: EXTRA EFFORTS NEVER GO UNNOTICED
Where we learn how to build a wooden computer and how to obtain information from watching a real computer run
Boole's Heritage
Toward the Universal Operator
DeMorgan at Work
Convenience Is a Necessity
Embracing the Complexity
Toward the Material World
A Nonelectric Computer
A Marginally More Popular Computer Design
Logic Gates
From Logic Operators to Calculations
From Electronic Egg Timer to Computer
Turing and Instruction Set Complexity
Functionality, at Last
Holy Grail: The Programmable Computer
Advancement through Simplicity
Split the Task
Execution Stages
The Lesser Memory
Do More at Once: Pipelining
The Big Problem with Pipelines
Implications: Subtle Differences
Using Timing Patterns to Reconstruct Data
Bit by Bit...
In Practice
Early-Out Optimization
Working Code-Do It Yourself
Prevention
Food for Thought
CHAPTER 3: TEN HEADS OF THE HYDRA
Where we explore several other tempting scenarios that occur very early on in the process of communications
Revealing Emissions: TEMPEST in the TV
Privacy, Limited
Tracking the Source: "He Did It!"
"Oops" Exposure: *_~1q'@@... and the Password Is...
CHAPTER 4: WORKING FOR THE COMMON GOOD
Where a question of how the computer may determine the intent of its user is raised and left unanswered
PART II: SAFE HARBOR
On the threats that lurk in between the computer and the Internet
CHAPTER 5: BLINKENLIGHTS
Where we conclude that pretty can also be deadly, and we learn to read from LEDs
The Art of Transmitting Data
From Your Email to Loud Noises... Back and Forth
The Day Today
Sometimes, a Modem Is Just a Modem
Collisions Under Control
Behind the Scenes: Wiring Soup and How We Dealt with It
Blinkenlights in Communications
The Implications of Aesthetics
Building Your Own Spy Gear...
...And Using It with a Computer
Preventing Blinkenlights Data Disclosure-and Why It Will Fail
Food for Thought
CHAPTER 6: ECHOES OF THE PAST
Where, on the example of a curious Ethernet flaw, we learn that it is good to speak precisely
Building the Tower of Babel
The OSI Model
The Missing Sentence
Food for Thought
CHAPTER 7: SECURE IN SWITCHED NETWORKS
Or, why Ethernet LANs cannot be quite fixed, no matter how hard we try
Some Theory
Address Resolution and Switching
Virtual Networks and Traffic Management
Attacking the Architecture
CAM and Traffic Interception
Other Attack Scenarios: DTP, STP, Trunks
Prevention of Attacks
Food for Thought
CHAPTER 8: US VERSUS THEM
What else can happen in the local perimeter of "our" network? Quite a bit!
Logical Blinkenlights and Their Unusual Application
Show Me Your Typing, and I Will Tell You Who You Are
The Unexpected Bits: Personal Data All Around
Wi-Fi Vulnerabilities
PART III: OUT IN THE WILD
Once you are on the Internet, it gets dirty
CHAPTER 9: FOREIGN ACCENT
Passive fingerprinting: subtle differences in how we behave can help others tell, who we are
The Language of the Internet
Naive Routing
Routing in the Real World
The Address Space
Fingerprints on the Envelope
Internet Protocol
Protocol Version
The Header Length Field
The Type of Service Field (Eight Bits)
The Total Packet Length (16 Bits)
The Source Address
The Destination Address
The Fourth Layer Protocol Identifier
Time to Live (TTL)
Flags and Offset Parameters
Identification Number
Checksum
Beyond Internet Protocol
User Datagram Protocol
Introduction to Port Addressing
UDP Header Summary
Transmission Control Protocol Packets
Control Flags: The TCP Handshake
Other TCP Header Parameters
TCP Options
Internet Control Message Protocol Packets
Enter Passive Fingerprinting
Examining IP Packets: The Early Days
Initial Time to Live (IP Layer)
The Don't Fragment Flag (IP Layer)
The IP ID Number (IP Layer)
Type of Service (IP Layer)
Nonzero Unused and Must Be Zero Fields (IP and TCP Layers)
Source Port (TCP Layer)
Window Size (TCP Layer)
Urgent Pointer and Acknowledgment Number Values (TCP Layer)
Options Order and Settings (TCP Layer)
Window Scale (TCP Layer, Option)
Maximum Segment Size (TCP Layer, Option)
Time-Stamp Data (TCP Layer, Option)
Other Passive Fingerprinting Venues
Passive Fingerprinting in Practice
Exploring Passive-Fingerprinting Applications
Collecting Statistical Data and Incident Logging
Content Optimization
Policy Enforcement
Poor Man's Security
Security Testing and Preattack Assessment
Customer Profiling and Privacy Invasion
Espionage and Covert Reconnaissance
Prevention of Fingerprinting
Food for Thought: The Fatal Flaw of IP Fragmentation
Breaking TCP into Fragments
CHAPTER 10: ADVANCED SHEEP-COUNTING STRATEGIES
Where we dissect the ancient art of determining network architecture and computer's whereabouts
Benefits and Liabilities of Traditional Passive Fingerprinting
A Brief History of Sequence Numbers
Getting More Out of Sequence Numbers
Delayed Coordinates: Taking Pictures of Time Sequences
Pretty Pictures: TCP/IP Stack Gallery
Attacking with Attractors
Back to System Fingerprinting
ISNProber-Theory in Action
Preventing Passive Analysis
Food for Thought
CHAPTER 11: IN RECOGNITION OF ANOMALIES
Or what can be learned from subtle imperfections of network traffic
Packet Firewall Basics
Stateless Filtering and Fragmentation
Stateless Filtering and Out-of-Sync Traffic
Stateful Packet Filters
Packet Rewriting and NAT
Lost in Translation
The Consequences of Masquerading
Segment Size Roulette
Stateful Tracking and Unexpected Responses
Reliability or Performance: The DF Bit Controversy
Path MTU Discovery Failure Scenarios
The Fight against PMTUD, and Its Fallout
Food for Thought
CHAPTER 12: STACK DATA LEAKS
Where you will find a yet another short story on where to find what we did not intend to send out at all
Kristjan's Server
Surprising Findings
Revelation: Phenomenon Reproduced
Food for Thought
CHAPTER 13: SMOKE AND MIRRORS
Or how to disappear with grace
Abusing IP: Advanced Port Scanning
Tree in the Forest: Hiding Yourself
Idle Scanning
Defense against Idle Scanning
Food for Thought
CHAPTER 14: CLIENT IDENTIFICATION: PAPERS, PLEASE!
Seeing through a thin disguise may come in handy on many occasions
Approaching the Problem
Towards a Solution
A (Very) Brief History of the Web
A HyperText Transfer Protocol Primer
Making HTTP Better
Latency Reduction: A Nasty Kludge
Content Caching
Managing Sessions: Cookies
When Cookies and Caches Mix
Preventing the Cache Cookie Attack
Uncovering Treasons
A Trivial Case of Behavioral Analysis
Giving Pretty Pictures Meaning
Beyond the Engine...
...And Beyond Identification
Prevention
Food for Thought
CHAPTER 15: THE BENEFITS OF BEING A VICTIM
In which we conclude that approaching life with due optimism may help us track down the attacker
Defining Attacker Metrics
Protecting Yourself: Observing Observations
Food for Thought
PART IV: THE BIG PICTURE
Our legal department advised us not to say "the network is the computer" here
CHAPTER 16: PARASITIC COMPUTING, OR HOW PENNIES ADD UP
Where the old truth that having an army of minions is better than doing the job yourself is once again confirmed
Nibbling at the CPU
Practical Considerations
Parasitic Storage: The Early Days
Making Parasitic Storage Feasible
Applications, Social Considerations, and Defense
Food for Thought
CHAPTER 17: TOPOLOGY OF THE NETWORK
On how the knowledge of the world around us may help track down rogue attackers
Capturing the Moment
Using Topology Data for Origin Identification
Network Triangulation with Mesh-Type Topology Data
Network Stress Analysis
Food for Thought
CHAPTER 18: WATCHING THE VOID
When looking down the abyss, what does not kill us makes us stronger
Direct Observation Tactics
Attack Fallout Traffic Analysis
Detecting Malformed or Misdirected Data
Food for Thought
CLOSING WORDS
Where the book is about to conclude
BIBLIOGRAPHIC NOTES
INDEX
商品描述(中文翻譯)
描述:
作者 Michal Zalewski 在駭客和安全社群中因其智慧、好奇心和創造力而廣受尊敬,這本書確實與其他書籍截然不同。在《Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks》中,Zalewski 分享了他的專業知識和經驗,解釋了計算機和網絡的運作方式、信息是如何處理和傳遞的,以及潛伏在陰影中的安全威脅。這本書不是乏味的技術白皮書或保護網絡的操作手冊,而是一個引人入勝的敘述,探索各種獨特、不常見且往往相當優雅的安全挑戰,這些挑戰無法被分類並且避開了傳統的攻擊者-受害者模型。
目錄:
前言 由 Solar Designer
引言
關於我
關於這本書
第一部分:來源
在發送任何信息到網絡之前出現的問題
第一章:我能聽到你在打字
我們調查如何從遙遠的地方監控你的按鍵
隨機性的需求
自動隨機數生成
隨機數生成器的安全性
I/O 熵:這是你的滑鼠在說話
傳遞中斷:一個實際的例子
單向快捷函數
講究的必要性
熵是可怕的浪費
攻擊:突如其來的範式轉變的影響
更仔細地看輸入時序模式
即時防禦策略
硬體 RNG:更好的解決方案?
思考的食糧
遠程時序攻擊
利用系統診斷
可重現的不可預測性
第二章:額外的努力從不會被忽視
我們學習如何建造一台木製計算機,以及如何從觀察一台真正的計算機運行中獲取信息
布爾的遺產
朝向通用運算子
德摩根的工作
便利是必要的
擁抱複雜性
朝向物質世界
一台非電動計算機
一種邊緣更受歡迎的計算機設計
邏輯閘
從邏輯運算符到計算
從電子蛋定時器到計算機
圖靈與指令集複雜性
功能性,終於
聖杯:可編程計算機
通過簡單性進步
分割任務
執行階段
較小的記憶體
同時做更多:流水線
流水線的大問題
含義:微妙的差異
使用時序模式重建數據
逐位...
在實踐中
提前退出優化
可運行的代碼-自己動手
預防
思考的食糧
第三章:九頭蛇的十個頭
我們探索在通信過程中非常早期出現的幾個其他誘人場景
揭露的輻射:電視中的 TEMPEST
隱私,有限
追蹤來源:'他做的!'
'哎呀'曝光:*_~1q'@@... 密碼是...
第四章:為了共同利益而工作
提出一個問題,即計算機如何判斷其用戶的意圖,並留待未回答
第二部分:安全港
在計算機和互聯網之間潛伏的威脅
第五章:閃爍的燈光
我們得出結論,美麗也可能是致命的,我們學會從 LED 中閱讀
傳輸數據的藝術
從你的電子郵件到響亮的噪音... 來回
今天的日子
有時,調製解調器就是調製解調器
碰撞在控制之下
幕後:接線湯以及我們如何處理它
通信中的閃爍燈光
美學的含義
自己製作間諜裝備...
...並與計算機一起使用
防止閃爍燈光數據洩露-以及為什麼它會失敗
思考的食糧
第六章:過去的回聲
在一個好奇的以太網缺陷的例子中,我們學到精確表達是好的
建立巴別塔
OSI 模型
缺失的句子
思考的食糧
第七章:在交換網絡中的安全
或者,為什麼以太網局域網無法完全修復,無論我們多麼努力
一些理論
地址解析和交換
虛擬網絡和流量管理
攻擊架構
CAM 和流量攔截
其他攻擊場景:DTP、STP、幹線
防止攻擊
思考的食糧
第八章:我們對他們
在「我們」的網絡本地邊界中還會發生什麼?相當多!
邏輯閃爍燈光及其不尋常的應用
告訴我你的打字,我將告訴你你是誰
意外的位:個人數據無處不在
Wi-Fi 漏洞
第三部分:在野外
一旦你在互聯網上,它就變得骯髒
第九章:外國口音
被動指紋識別:我們行為中的微妙差異可以幫助他人識別我們是誰
互聯網的語言
天真的路由
現實世界中的路由
地址空間
信封上的指紋
互聯網協議
協議版本
標頭長度字段
服務類型字段(八位元組)
總數據包長度(16 位元組)
源地址
目標地址
第四層協議標識符
生存時間(TTL)
標誌和偏移參數
識別號
檢查和
超越互聯網協議
用戶數據報協議
端口地址引介
UDP 標頭摘要
傳輸控制協議數據包
控制標誌:TCP 握手
其他 TCP 標頭參數
TCP 選項
互聯網控制消息協議數據包
進入被動指紋識別
檢查 IP 數據包:早期的日子
初始生存時間(IP 層)
不分段標誌(IP 層)
IP ID 號(IP 層)
服務類型(IP 層)
非零未使用和必須為零的字段(IP 和 TCP 層)
源端口(TCP 層)
窗口大小(TCP 層)
緊急指針和確認號值(TCP 層)
選項順序和設置(TCP 層)
窗口縮放(TCP 層,選項)
最大段大小(TCP 層,選項)
時間戳數據(TCP 層,選項)
其他被動指紋識別場地
被動指紋識別的實踐
探索被動指紋識別應用
收集統計數據和事件日誌
內容優化
政策執行
窮人的安全
安全測試和預攻評估
客戶輪廓和隱私入侵
間諜活動和秘密偵察
防止指紋識別
思考的食糧:IP 分段的致命缺陷
將 TCP 分割成片段
第十章:高級羊數計數策略
我們剖析確定網絡架構和計算機位置的古老藝術
傳統被動指紋識別的好處和負擔
序列號的簡史
從序列號中獲得更多
延遲坐標:拍攝時間序列的照片
美麗的圖片:TCP/IP 堆疊畫廊
用吸引子進行攻擊
回到系統指紋識別
ISNProber-理論在行動
防止被動分析
思考的食糧
第十一章:識別異常
或者,從網絡流量的微妙缺陷中可以學到什麼
數據包防火牆基礎
無狀態過濾和分段
無狀態過濾和不同步流量
有狀態數據包過濾器
數據包重寫和 NAT
翻譯中的迷失
偽裝的後果
段大小輪盤
有狀態跟蹤和意外響應
可靠性或性能:DF 位的爭議
路徑 MTU 發現失敗場景
對 PMTUD 的鬥爭及其後果
思考的食糧
第十二章:堆疊數據洩漏
在這裡你會找到另一個短篇故事,關於我們未打算發送的內容
Kristjan 的伺服器
驚人的發現
啟示:現象重現
思考的食糧
第十三章:煙霧與鏡子
或者如何優雅地消失
濫用 IP:高級端口掃描
森林中的樹:隱藏自己
閒置掃描
防禦閒置掃描
思考的食糧
第十四章:客戶識別:請出示證件!
透過薄薄的偽裝看透來在許多場合都會派上用場
接近問題
朝向解決方案
網絡的(非常)簡史
超文本傳輸協議入門
改善 HTTP
延遲減少:一個討厭的權宜之計
內容緩存
管理會話:Cookies
當 Cookies 和緩存混合時
防止緩存 Cookie 攻擊
揭露背叛
行為分析的微不足道案例
賦予美麗圖片意義
超越引擎...
...並超越識別
預防
思考的食糧
第十五章:成為受害者的好處
在這裡我們得出結論,懷著適當的樂觀態度面對生活可能有助於我們追蹤攻擊者
定義攻擊者指標
保護自己:觀察觀察
思考的食糧
第四部分:全局觀
我們的法律部門建議我們在這裡不要說「網絡就是計算機」
第十六章:寄生計算,或者如何小錢累積
在這裡再次確認擁有一支小兵隊伍比自己做工作更好的古老真理
啃食 CPU
實際考量
寄生存儲:早期的日子
使寄生存儲可行
應用、社會考量和防禦
思考的食糧
第十七章:網絡拓撲
關於周圍世界的知識如何幫助追蹤流氓攻擊者
捕捉瞬間
使用拓撲數據進行來源識別
使用網絡三角測量與網狀拓撲數據
網絡壓力分析
思考的食糧
第十八章:注視虛無
當向深淵凝視時,讓我們變得更強的不是殺死我們的東西
直接觀察策略
攻擊後果流量分析
檢測畸形或錯誤導向的數據
思考的食糧
結語
在這裡書籍即將結束
書目註釋
索引