Zero-Day Exploit
暫譯: 零日漏洞利用
Rob Shein, David Litchfield, Marcus Sachs
- 出版商: Syngress Media
- 出版日期: 2004-07-01
- 售價: $2,220
- 貴賓價: 9.5 折 $2,109
- 語言: 英文
- 頁數: 412
- 裝訂: Paperback
- ISBN: 1931836094
- ISBN-13: 9781931836098
已過版
買這商品的人也買了...
-
$480$379 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$480$408 -
$580$493 -
$600$540 -
$680$537 -
$560$476 -
$650$553 -
$880$695 -
$280$218 -
$480$379 -
$780$616 -
$390$332 -
$780$616 -
$540$427 -
$490$382 -
$650$514 -
$650$553 -
$690$587 -
$620$490 -
$540$427 -
$990$782 -
$450$383 -
$780$616 -
$280$221
商品描述
Description:
So much of our critical national infrastructure hinges on technology, which is so fragile, that a zero-day bug in the wrong hands could lead to any equally bad attack. I'm not, for a moment, going to speculate on what or how that attack may come, but suffice to say that the potential is there; the threat is real. David Litchfield, Managing Director, NGSSoftware
A realistic and downright scary tale of cyber-terrorism
Zero-Day Exploit: Countdown to Darkness is this seasons must read cyber-thriller. From the casinos of Las Vegas to the slums of Manila to FBI Headquarters, the adrenaline never stops pumping as an elite team of security hotshots race to stop Islamic terrorists from crippling the economies of the Western world. Written by some of the worlds leading counter-terrorism experts, the story is all the more chilling for its authenticity.Tagig, The Philippines: Tuesday, October 21st, 5:19 PM, 2003
The challenge for Lualhati was to target only installations in North America. Since the list of IP addresses available for use is broken down by region, Lualhati focused only on ranges allocated to ARIN and other groups known to be associated with the United States, so as to limit impact on any infrastructure in the Islamic world. The pair had developed a relatively clever two-stage attack. Their main target was the petrochemical infrastructure, but they realized that they needed to create a secondary effect that would in some way slow the reaction to the first attack. They settled upon ZFon as the target of choice, given the breadth and criticality of its deployment within the federal law enforcement community. What truly delighted them was the discovery of just how easy it was to break into ZFons software. It took the excited young men only a week to discern how to root the gateways and develop shellcode that would accomplish their aims. What remained was the scanning, which was already in progress.
Table of Contents:
Contents
xiii
Foreword—by David Litchfield . . . . . . . . . . .xix
Chapter 1 . . . . . . . . . . . . . . . . . . . . . . . . . .1
Prologue
“That’s wicked cool.”
Reuben and his friends looked at the design on the screen,
astounded at the result of their hard work. A dragon, complete
with chunkily-animated fire spouting from his mouth, filled the
small video screen of the computer.They sat for a minute in
front of the Apple II+ computer, just watching the fruits of their
labor.
Chapter 2 . . . . . . . . . . . . . . . . . . . . . . . . . . .9
DefCon in Las Vegas, 2000
The brutal desert heat wasn’t too easy to bear in standard
DefCon clothing. Black was the order of the day, and despite
the low humidity, Reuben was looking forward to getting
inside, back into the air conditioning. He looked around the
pool area and wondered if anyone else was feeling the same
way; if they were, it didn’t show. Most perplexing of all were a
couple of the members of Phenoelit, the German hacker thinktank,
who were wearing not just black, but black leather pants.
Reuben could feel the sweat under his backpack, and wondered
xiv Contents
what it must feel like under those pants. Phenoelit was wellknown
for their understanding of (and ability to poke holes in)
various networking protocols, especially those used for communication
between devices like routers. FX, one of their members,
was a talented researcher and speaker with regard to router
vulnerabilities, and had the ear of Cisco when it came to fixing
problems.
Chapter 3 . . . . . . . . . . . . . . . . . . . . . . . . . .55
The DoJ Project,
Washington DC, 2001
“Alright, let me see if I understand you correctly.You’ve been
burned in the past by consultants saying ‘yeah, yeah, we know
how to do that’, and then after a few weeks of work they give
you a deliverable that’s big on words but doesn’t really say much
in terms of analysis; they don’t boil it down and give you anything
useful or coherent, right? And that’s what you’re afraid of
this time?” Reuben talked calmly into the speaker phone in his
boss’ office at the Vigility Corporation.
Chapter 4 . . . . . . . . . . . . . . . . . . . . . . . . . .81
The Arrival of MadFast
Reuben waited patiently at the exit in Baltimore Washington
International airport, watching for MadFast to emerge. Since
September 11th, it was no longer so simple to pick people up.
Everyone from all the different gates seemed to come out
together. It was tough to search through such a crowd for one
person he’d only seen once before in his life. But soon enough,
the face he was looking for emerged, and saw him as well.
Contents xv
Chapter 5 . . . . . . . . . . . . . . . . . . . . . . . . .131
ZFon Vulnerability
“Are you sure you set it up right?” John was one of the ZFon
programmers, and already Reuben didn’t like him. He tried to
remember that this was a guy who was being told that his work
wasn’t good enough, and now his company either had to fix the
mistakes or probably go out of business. But there was something
more than that, some kind of arrogance behind it all that Reuben
perceived. It wasn’t just that he was on the defensive because of
the situation, he actually seemed to think that he was the only
person in the room with half a brain. Boy, is he in for a rough time,
Reuben mused to himself as he smirked internally.“Well, why
don’t you take a look at it and let us know?” he suggested.
Chapter 6 . . . . . . . . . . . . . . . . . . . . . . . . .155
Scanning the System, 2003
Looking at the front page of the Internet Storm Center was a
daily routine, like looking outside to see what the weather was
like before going outside or choosing what to wear. From time to
time there were interesting things, like a sudden spike in scanning
for a service that might indicate that there’s a new vulnerability.
But this time, it was different.“Upward Scanning Trends:TCP
port 1734, unknown.” It was the same port as used by the ZFon
software.
xvi Contents
Chapter 7 . . . . . . . . . . . . . . . . . . . . . . . . .181
Zero Day
“It is time, brother.” Lualhati and Agpalo looked at each other
before they separated and went in different directions down the
street.This morning, they would walk into different Internet
cafés, log in, and start issuing the commands that would trigger
the first attack.
Chapter 8 . . . . . . . . . . . . . . . . . . . . . . . . .207
Exploit Impact
The tanker approached the docking port at the facility. Slowly
and carefully, the tug helped maneuver it into place, and enormous
hoses were winched up to mate with connectors on deck.
It was a lazy morning.The calm voyage had made the workers
on deck somewhat sluggish for lack of any significant challenges
over the previous weeks. Eventually everything was connected
and tightened up, and the Captain informed the control room
that he was ready to start pumping gasoline onshore.
Chapter 9 . . . . . . . . . . . . . . . . . . . . . . . . .239
Damage Control
It had been a long, trying, and unproductive day.There had been
no progress in acquiring a copy of ZFon’s VPN for testing.
Without the software they needed, MadFast and Reuben spent
the day double-checking everything to make sure they were
ready, discussing concepts and definitions of computer security
with Jane, Paul and Mark to pass the time.
Contents xvii
Chapter 10 . . . . . . . . . . . . . . . . . . . . . . . .281
Recovery
The pair stood in the control room, looking around.The various
workers looked at them strangely, wondering why these two
guys in t-shirts rated an FBI escort and a tour of the plant.The
two seemed pretty bright, though, and definitely picked up on
the computer-oriented aspects of the tour faster than everything
else.They mostly seemed interested in the servers of the
SCADA master, and how it was interconnected with the rest of
the plant.They were awfully serious for people their age, and
sure didn’t say much aside from some whispers to each other
from time to time.
Appendix . . . . . . . . . . . . . . . . . . . . . . . . .305
The Laws of Security
This book contains a fictional account of a zero day exploit,
demonstrating criminal hacking techniques that are used every
day to exploit vulnerabilities. While this story is fictional, the dangers
are obviously real. As such, we’ve included this appendix,
which discusses how to mitigate attacks, such as the one described
in this book. While not a complete reference, these security laws
can provide you with a foundation of knowledge to prevent
criminal hackers from hacking your network and exploiting your
vulnerabilities…
商品描述(中文翻譯)
**描述:**
「我們的關鍵國家基礎設施如此依賴技術,而這技術又是如此脆弱,以至於一個錯誤手中的零日漏洞可能導致同樣糟糕的攻擊。我不會片刻地推測那種攻擊會是什麼或如何發生,但可以說潛在的威脅是存在的;威脅是真實的。」——David Litchfield,NGSSoftware 總經理
《零日漏洞:黑暗倒數》是一個現實且令人恐懼的網路恐怖主義故事,是本季必讀的網路驚悚小說。從拉斯維加斯的賭場到馬尼拉的貧民窟,再到FBI總部,隨著一支精英安全專家的團隊急忙阻止伊斯蘭恐怖分子癱瘓西方世界的經濟,腎上腺素不斷飆升。這個故事由一些世界頂尖的反恐專家撰寫,其真實性使得故事更加令人毛骨悚然。
**塔吉格,菲律賓:2003年10月21日,星期二,下午5:19**
Lualhati的挑戰是僅針對北美的設施。由於可用的IP地址列表按地區劃分,Lualhati僅專注於分配給ARIN及其他與美國有關的組織的範圍,以限制對伊斯蘭世界任何基礎設施的影響。這對他們開發了一個相對聰明的兩階段攻擊。他們的主要目標是石化基礎設施,但他們意識到需要創造一個次要效果,以某種方式減緩對第一次攻擊的反應。他們選擇了ZFon作為首選目標,因為它在聯邦執法社區中的部署範圍和重要性。令他們真正高興的是發現入侵ZFon的軟體是多麼容易。這對興奮的年輕人僅花了一周的時間就辨識出如何根植於網關並開發出能達成他們目標的shellcode。剩下的就是掃描,這已經在進行中。
**目錄:**
內容
前言——David Litchfield
第一章
序幕
「這真是太酷了。」
Reuben和他的朋友們看著螢幕上的設計,驚訝於他們辛勤工作的成果。一條龍,嘴裡噴出粗壯的動畫火焰,填滿了電腦的小螢幕。他們在Apple II+電腦前坐了一分鐘,只是看著他們的勞動成果。
第二章
2000年拉斯維加斯的DefCon
在標準的DefCon服裝下,殘酷的沙漠熱浪並不容易忍受。黑色是當天的主題,儘管濕度低,Reuben仍然期待著進入室內,回到空調中。他環顧泳池區,想知道是否還有其他人有同樣的感受;如果有,他們並沒有表現出來。最令人困惑的是幾位Phenoelit的成員,這個德國黑客智庫,他們不僅穿著黑色,還穿著黑色皮褲。Reuben能感覺到背包下的汗水,並想知道穿著那些褲子會是什麼感覺。Phenoelit以其對各種網路協議的理解(以及能夠找出漏洞)而聞名,特別是用於設備之間通信的協議,如路由器。FX是他們的一位成員,對路由器漏洞的研究和演講非常有才華,並在解決問題時得到了Cisco的重視。
第三章
2001年華盛頓特區的DoJ專案
「好吧,讓我看看我是否正確理解了你的意思。你過去曾被顧問燒過,他們說『是的,是的,我們知道怎麼做』,然後幾週後給你一個充滿文字但實際上沒有什麼分析的交付品;他們沒有將其簡化,給你任何有用或連貫的東西,對吧?而這正是你這次所擔心的?」Reuben在Vigility Corporation的老闆辦公室裡,平靜地對著免提電話說。
第四章
MadFast的到來
Reuben在巴爾的摩華盛頓國際機場的出口耐心等待,觀察MadFast的出現。自從911事件以來,接人變得不再那麼簡單。來自不同登機口的每個人似乎都一起走出來。在這樣的人群中尋找一個他一生中只見過一次的人是很困難的。但不久,他所尋找的面孔出現了,並且也看到了他。
第五章
ZFon漏洞
「你確定你設置正確嗎?」John是ZFon的程式設計師,Reuben已經不喜歡他了。他試著記住這是一個被告知他的工作不夠好的人,而現在他的公司要麼必須修正錯誤,要麼可能會倒閉。但他感覺到的不僅僅是這樣,還有某種傲慢。這不僅僅是因為情況而防守,他似乎真的認為自己是房間裡唯一有半根腦子的人。Reuben心裡暗想,這傢伙將會有一段艱難的時光。「那你為什麼不看看它,告訴我們呢?」他建議道。
第六章
掃描系統,2003年
查看Internet Storm Center的首頁是一個日常例行公事,就像在外出前查看天氣或選擇穿什麼一樣。偶爾會有一些有趣的事情,比如某個服務的掃描突然上升,這可能表明有新的漏洞。但這次情況不同。「上升的掃描趨勢:TCP端口1734,未知。」這是ZFon軟體使用的相同端口。
第七章
零日
「是時候了,兄弟。」Lualhati和Agpalo互相看了一眼,然後分開朝街道的不同方向走去。今天早上,他們將走進不同的網路咖啡館,登錄並開始發出觸發第一次攻擊的命令。
第八章
漏洞影響
油輪接近設施的停靠港。慢慢地,小拖船幫助將其引導到位,巨大的管子被吊起以連接甲板上的接頭。這是個懶洋洋的早晨。平靜的航行使得甲板上的工人因為前幾週缺乏任何重大挑戰而有些遲鈍。最終一切都連接並緊固,船長通知控制室他準備開始將汽油泵入岸上。
第九章
損害控制
這是一個漫長、艱難且無所事事的一天。沒有進展獲得ZFon的VPN進行測試。沒有他們需要的軟體,MadFast和Reuben整天檢查一切,以確保他們準備好,與Jane、Paul和Mark討論計算機安全的概念和定義以打發時間。
第十章
恢復
這對站在控制室裡,四處張望。各種工人奇怪地看著他們,想知道為什麼這兩個穿著T恤的傢伙需要FBI的護送和工廠的參觀。不過這兩個人似乎相當聰明,並且明顯比其他方面更快地理解了參觀中與計算機相關的內容。他們對SCADA主控伺服器的伺服器及其如何與工廠的其他部分互連非常感興趣。他們對於他們這個年齡的人來說顯得非常嚴肅,並且除了偶爾低聲交談外幾乎不說話。
附錄
安全法則
本書包含了一個零日漏洞的虛構故事,展示了每天用來利用漏洞的犯罪黑客技術。雖然這個故事是虛構的,但危險顯然是真實的。因此,我們附上了這個附錄,討論如何減輕攻擊,例如本書中描述的攻擊。雖然不是完整的參考資料,但這些安全法則可以為您提供防止犯罪黑客入侵您的網路和利用您的漏洞的知識基礎……