Penetration Tester's Open Source Toolkit, Volume 2
暫譯: 滲透測試者的開源工具包,第2卷
Jeremy Faircloth, Chris Hurley, Jesse Varsalone
- 出版商: Syngress Media
- 出版日期: 2007-11-30
- 定價: $1,980
- 售價: 5.0 折 $990
- 語言: 英文
- 頁數: 592
- 裝訂: Paperback
- ISBN: 1597492132
- ISBN-13: 9781597492133
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$2,500$2,375 -
$420$332 -
$1,805UML Distilled: A Brief Guide to the Standard Object Modeling Language, 3/e (Paperback)
-
$760$646 -
$2,240$2,128 -
$650$514 -
$1,080$1,026 -
$850$672 -
$550$435 -
$520$199 -
$1,980$1,881 -
$990$891 -
$550$435 -
$600$510 -
$2,370$2,252 -
$1,180$1,003 -
$1,188Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816), 3/e
-
$680$537 -
$420$357 -
$480$379 -
$780$515 -
$490$382 -
$620$527 -
$850$672 -
$750$495
相關主題
商品描述
Customer Reviews
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the worlds most powerful and popular tool for reverse engineering code.
* Master the most powerful disassembler and debugger for Windows, Linux, or OS X
* Single-step through code to understand the complexities of worms, viruses, and Trojans
* Automate even the most complex tasks using IDA Pros development environment I am not sure why Penetration Tester's Open Source Toolkit (PTOST) was published. If you have no other security assessment books, you may find PTOST helpful. Otherwise, I don't believe this book offers enough value to justify purchasing it. Other books -- some published by Syngress -- cover some of the same ideas, and 5 of PTOST's chapters are published in other books anyway.
I was somewhat confused by PTOST's approach. The book features the logo of the Auditor live CD, along with a foreword by Auditor developer Max Moser. A version of Auditor is included with the book. However, PTOST isn't exactly a guide to Auditor. In fact, only on the back cover do we see a listing of the "CD contents." This list is odd since it does not distinguish between categories of tools (e.g., "Forensics") and the tools themselves (e.g., "Autopsy"). At the very least the book should have included an appendix listing the Auditor tools and a summary of their purpose.
PTOST does not feature enough original content to warrant buying the book. I think Osborne's Hacking Exposed, 5th Ed (HE5E) (or even the 4th Ed) addresses the phases of compromise in a more coherent and valuable manner. This is especially true for Ch 1 (Reconnaissance) and Ch 2 (Enumeration and Scanning); is there really anything original left to say on those subjects? I admit that coverage of certain SensePost tools was helpful, and SpiderFoot was cool.
Those looking to learn about database assessment (Ch 3) or Web hacking (Ch 4) would be better served by Syngress' own Special Ops: Host and Network Security for Microsoft, Unix, and Oracle. HE5E has a good chapter on Web hacking, and there's even a Hacking Exposed: Web Applications (HEWA) book. (A second edition of HEWA arrives this year, as does Syngress' new Web Application Security: A Guide for Developers and Penetration Testers.) However, I did like hearing about OScanner, SQLAT, and OAT in Ch 3.
Ch 5 (Wireless Penetration Testing Using Auditor), was one of my favorite chapters. It covered the material well enough, and it covered tools included with Auditor. The case studies were also helpful. Ch 6 (Network Devices) resembled Chs 1 and 2; it didn't contain anything really new. I could not understand why Ch 7 (Writing Open Source Security Tools) appeared in a book more or less about using a penetration testing live CD. The audiences for those using live CDs and those writing their own tools seem very different.
I also liked Ch 8 (Running Nessus from Auditor). Like Ch 5, it looked at the unique problems one encounters using a live CD for security work. For example, author Johnny Long offers multiple ways to update the Nessus plugins to a USB drive. This is exactly the sort of knowledge not found in other Nessus books. He also takes a look behind the scenes of the Nessus startup script on Auditor. Bravo.
I stopped reading PTOST after Ch 8. Why? Chs 9, 12, and 13 are published in Syngress' Writing Security Tools and Exploits (as Chs 9, 10, and 11). Chs 10 and 11 from PTOST are the same as Chs 3 and 4 from Syngress' Nessus, Snort, and Ethereal Power Tools. This tendency to reprint chapters from other books is worrisome.
I believe a second edition of PTOST would be more helpful if it focused strictly on tools found on a future assessment live CD, namely BackTrack. (BackTrack is a new live CD uniting the Auditor and Whax projects.) In fact, the authors might consider taking a case-based approach for the whole book. I thought the case studies in PTOST were some of the best material. For those looking for a comprehensive guide to security assessment, I recommend waiting for a second edition of Special Ops. Those who want a wide-ranging guide to security tools will like the recently published third edition of Osborne's Anti-Hacker Toolkit.
The Penetration Tester's Open Source Toolkit is a new offering from Syngress that primarily focuses on using the Auditor live CD. The 200605-02-ipw2100 version comes included with the book; if you have an IPW2200 wireless interface in your laptop, though, the 802.11x tools won't work as it doesn't include the proper driver.
The book walks through using a number of Open Source or free tools for overall reconnaissance, enumeration, and scanning (most of which everyone's seen before), but then it delves into database, web application, and wireless testing as well as network devices. There's a chapter on "Writing Open Source Security Tools", but it's a little misleading as it's a quick guide to writing security tools without any real discussion of open source development or what it means other than an appendix that briefly includes and talks about the GPL and why it's good.
There are four chapters on Nessus, most of which focus on using NASL and other ways of extending the venerable vulnerability scanner. The final two chapters discuss the Metasploit Project; the first of these is also misleading as it's not so much about "Extending Metasploit" as it is an (admittedly good) introduction to the Framework. The second does a decent walkthrough of developing an exploit with Metasploit, including other offerings from the project like the Opcode Database and such.
It's a very useful book; much of it you'll already know, but there's a lot of discussion about tools that I hadn't seen before. A few of the tools are mostly out-dated, and not all of them are on the Auditor CD, but this goes beyond simple discussions of nmap and whois; even some Google tools from Sensepost are examined. The database chapter features a lot of great information about Oracle but is cursory in its discussion of SQL Server (though I'll be reviewing another book focusing on database testing in the near future). The other topic areas receive decent coverage, if somewhat fast-paced from time to time.
I'm not an expert in NASL, so all I can say about the Nessus chapters is that they appear fairly in-depth and should be useful to me in the future; if you don't know much about scripting for Nessus, at a minimum they'll be a good introduction. The Metasploit Framework was something I'd never used before, but with the help of this book and a few other resources on the Net, it's immediately become a staple in my toolbox along with venerable testing resources like nmap and Nessus - the software is that good, and the text here is clear enough that you should be able to get started with it right away.
Overall, I'm pretty pleased with this book, but it's not as in-depth as I had expected when it arrived. Even though the book is 678 pages long, not including the GPL or the index, the type face is fairly large and there are a lot of examples and sidebars. I'd like a little wider margins and a little smaller point size so that I could make better notes. There are a number of typos, few of which have any technical signifance (those that do are mostly incorrect acronym explications). The technical level feels just right to me for a mid-level security consultant: this is deeper than Hacking Exposed but it's not quite as technical as Hacking: The Art of Exploitation. It won't hold your hand, but you don't need to understand assembly and the intricacies of buffer overflows for all but a few portions of the book (it would be a good idea for you to learn them, though!) Also note that the book focuses on vulnerability assessment; further exploitation of a compromised system is not really discussed. That is, tools and techniques to demonstrate vulnerabilities are shown, but once you're in, you're on your own.
I'd recommend this to anyone involved in vulnerability assessment or penetration testing, whether as a consultant, system administrator, security engineer, etc., if for no other reason than it may introduce you to some tools you haven't seen before.
商品描述(中文翻譯)
顧客評價
如果您想掌握使用 IDA Pro 進行安全研發或軟體除錯的逆向工程技術與科學,這本書就是為您而寫。高度組織化且複雜的犯罪組織不斷開發更複雜、混淆且加固的病毒、蠕蟲、木馬和僵屍網路。IDA Pro 的互動介面和可編程開發語言讓您對程式碼的反組譯和除錯擁有完全的控制權。這是唯一一本專注於世界上最強大和最受歡迎的逆向工程工具的書籍。
* 精通 Windows、Linux 或 OS X 的最強大反組譯器和除錯器
* 單步執行程式碼以理解蠕蟲、病毒和木馬的複雜性
* 使用 IDA Pro 的開發環境自動化即使是最複雜的任務
我不確定為什麼《滲透測試者的開源工具包》(PTOST)會被出版。如果您沒有其他安全評估書籍,您可能會發現 PTOST 有幫助。否則,我不認為這本書提供的價值足以證明購買的必要性。其他書籍——一些由 Syngress 出版——涵蓋了一些相同的概念,而 PTOST 的五個章節也已在其他書籍中出版。
我對 PTOST 的方法感到有些困惑。這本書的封面上印有 Auditor live CD 的標誌,並附有 Auditor 開發者 Max Moser 的前言。書中包含了一個 Auditor 的版本。然而,PTOST 並不完全是 Auditor 的指南。事實上,只有在封底我們才看到「CD 內容」的列表。這個列表很奇怪,因為它沒有區分工具的類別(例如,「取證」)和工具本身(例如,「Autopsy」)。至少這本書應該包含一個附錄,列出 Auditor 工具及其用途的摘要。
PTOST 的原創內容不足以讓人購買這本書。我認為 Osborne 的《Hacking Exposed》第五版(HE5E)(甚至第四版)以更連貫和有價值的方式處理了妥協的階段。這對於第一章(偵查)和第二章(枚舉和掃描)尤其如此;在這些主題上真的還有什麼原創的內容可以說嗎?我承認對某些 SensePost 工具的介紹是有幫助的,而 SpiderFoot 也很酷。
想要了解資料庫評估(第三章)或網頁駭客(第四章)的人,Syngress 自己的《Special Ops: Host and Network Security for Microsoft, Unix, and Oracle》會更合適。HE5E 有一個關於網頁駭客的好章節,甚至還有一本《Hacking Exposed: Web Applications》(HEWA)書籍。(HEWA 的第二版將於今年出版,Syngress 的新書《Web Application Security: A Guide for Developers and Penetration Testers》也將出版。)不過,我確實喜歡在第三章中聽到 OScanner、SQLAT 和 OAT 的內容。
第五章(使用 Auditor 進行無線滲透測試)是我最喜歡的章節之一。它對材料的覆蓋相當充分,並涵蓋了 Auditor 附帶的工具。案例研究也很有幫助。第六章(網路設備)與第一章和第二章相似;它沒有包含任何真正的新內容。我無法理解為什麼第七章(撰寫開源安全工具)會出現在一本主要關於使用滲透測試 live CD 的書中。使用 live CD 的受眾和撰寫自己工具的受眾似乎非常不同。
我也喜歡第八章(從 Auditor 執行 Nessus)。與第五章類似,它探討了使用 live CD 進行安全工作時遇到的獨特問題。例如,作者 Johnny Long 提供了多種將 Nessus 插件更新到 USB 驅動器的方法。這正是其他 Nessus 書籍中找不到的知識。他還深入探討了 Auditor 上的 Nessus 啟動腳本。太棒了。
我在第八章後停止閱讀 PTOST。為什麼?第九、十二和十三章已在 Syngress 的《Writing Security Tools and Exploits》中出版(作為第九、第十和第十一章)。PTOST 的第十和第十一章與 Syngress 的《Nessus, Snort, and Ethereal Power Tools》的第三和第四章相同。這種從其他書籍重印章節的趨勢令人擔憂。
我相信 PTOST 的第二版如果專注於未來評估 live CD 上的工具,特別是 BackTrack,會更有幫助。(BackTrack 是一個新的 live CD,結合了 Auditor 和 Whax 專案。)事實上,作者們可以考慮對整本書採取案例導向的方法。我認為 PTOST 中的案例研究是最好的材料之一。對於那些尋找全面安全評估指南的人,我建議等待《Special Ops》的第二版。想要獲得廣泛安全工具指南的人會喜歡最近出版的 Osborne 的《Anti-Hacker Toolkit》第三版。
《滲透測試者的開源工具包》是 Syngress 的新書,主要專注於使用 Auditor live CD。200605-02-ipw2100 版本隨書附贈;不過,如果您的筆記型電腦中有 IPW2200 無線介面,802.11x 工具將無法使用,因為它不包含正確的驅動程式。
這本書介紹了使用多種開源或免費工具進行整體偵查、枚舉和掃描(大多數人都見過),然後深入探討資料庫、網頁應用程式和無線測試以及網路設備。有一章關於「撰寫開源安全工具」,但這有點誤導,因為它只是快速指南,沒有真正討論開源開發或其意義,除了附錄中簡要提到 GPL 及其優點。
有四章關於 Nessus,大部分集中於使用 NASL 和其他擴展這個久負盛名的漏洞掃描器的方法。最後兩章討論 Metasploit 專案;其中第一章也有些誤導,因為它不僅僅是關於「擴展 Metasploit」,而是對框架的(無可否認的好)介紹。第二章則對使用 Metasploit 開發漏洞進行了不錯的步驟說明,包括該專案的其他產品,如操作碼數據庫等。
這是一本非常有用的書;雖然您可能已經知道其中的大部分內容,但有很多我之前未見過的工具的討論。其中一些工具大多過時,並非所有工具都在 Auditor CD 上,但這超越了對 nmap 和 whois 的簡單討論;甚至還檢視了一些來自 Sensepost 的 Google 工具。資料庫章節提供了大量有關 Oracle 的優秀資訊,但對 SQL Server 的討論則較為簡略(不過我將在不久的將來評審另一本專注於資料庫測試的書籍)。其他主題區域的覆蓋也相當不錯,儘管有時節奏較快。
我不是 NASL 的專家,所以對於 Nessus 章節我只能說它們看起來相當深入,未來應該對我有幫助;如果您對 Nessus 的腳本不太了解,至少這些章節會是個不錯的入門。Metasploit 框架是我之前從未使用過的,但在這本書和網上的其他資源的幫助下,它立即成為我工具箱中的一個主力,與 nmap 和 Nessus 等久負盛名的測試資源並駕齊驅——這個軟體實在太好了,這裡的文字也足夠清晰,讓您能夠立即開始使用。
總的來說,我對這本書相當滿意,但它的深度不如我預期的那樣。儘管這本書有 678 頁,未包括 GPL 或索引,但字體相當大,且有很多範例和側邊註解。我希望邊距能再寬一些,字體大小能再小一些,這樣我可以做更好的筆記。有一些錯字,其中少數有技術意義(那些有意義的主要是錯誤的縮寫解釋)。對於中級安全顧問來說,技術水平對我來說正合適:這比《Hacking Exposed》更深入,但又不如《Hacking: The Art of Exploitation》那麼技術性。這本書不會手把手教您,但您不需要理解組合語言和緩衝區溢出的細節,除了書中的少數幾個部分(不過學習這些會是個好主意!)另外請注意,這本書專注於漏洞評估;對於已被妥協系統的進一步利用並沒有真正的討論。也就是說,展示漏洞的工具和技術有介紹,但一旦您進入,您就得自己應對。
我會推薦這本書給任何參與漏洞評估或滲透測試的人,無論是顧問、系統管理員、安全工程師等,至少因為它可能會讓您接觸到一些您未曾見過的工具。