Synopses & Reviews
John Chirillo is back and ready to help you outsmart the next generation of intruders!
Since the publication of the First Edition, new security breaches to networks have inevitably occurred. In order to keep hack-prevention information as current as possible for security engineers and designers, John Chirillo is back with a new edition on how to fortify your networks and home computers. He's updated his bestselling book and is ready to arm you with the necessary security steps from the system to the daemon, concluding with that crucial ingredient-an effective security policy. Packed with nearly 400 pages of fresh material, including new fortification techniques, advisory solutions, and firewall labs, Hack Attacks Denied, Second Edition offers vital insight that will teach you how to be aware of potential security dangers.
This all-in-one reference covers Windows, UNIX, and Linux, and teaches you how to keep the hacks out of your network by using the same Tiger Box tools that hackers use to detect and penetrate network vulnera-bilities. Full of essential examples and illustrations, the Second Edition, contains:
* Over 170 new countermeasures
* Patching the top seventy-five hack attacks for UNIX and Windows
* Cleanup and prevention of malicious code including Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSurf 2.0 Intrusion Defense (full suite single license)
Bonus CD!
To accommodate the new material in the book, Chirillo has moved all lengthy lists and source code from the book to the CD-ROM, and has also added the new version of the security software, TigerSurf 2.0.
Review
"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)
"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)
"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)
"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)
Synopsis
Once youve seen firsthand in
Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, youre ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more.
Synopsis
Learn how to beat hackers at their own game
Hack Attacks Denied
If you?ve read John Chirillo?s provocative work,Hack Attacks Revealed, you?re well on your way to understanding how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks.
Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box? tools that hackers use todetect and penetrate network vulnerabilities. Drawing on his experience as a consultant hired by Fortune 1000 companies to break into their corporate networks, Chirillo covers all the necessary security steps?from system to daemon?and helps you tie the information together to create a highly effective security policy.
Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains:
- Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and discovery countermeasures
- How to detect and protect against intrusion?from backdoor and flooding attacks to mail bombing, viral infections, and Web page hacking
- Essential technical hack countermeasures pertaining to popular gateways and routers, Internet server daemons, operating systems, and proxies and firewalls
Synopsis
Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more.
About the Author
JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.
Table of Contents
Acknowledgments.
A Note to the Reader.
Introduction.
SECURING PORTS AND SERVICES.
Common Ports and Services.
Concealed Ports and Services.
Discovery Countermeasures.
Intuitive Intermission: The Other Side.
INTRUSION DEFENSE MECHANISMS.
Safeguarding Against Penetration Attacks.
TIGER TEAM SECRETS.
Locking Down Perimeter Hardware and Server Daemons.
PUTTING IT ALL TOGETHER.
Intuitive Intermission: Final Act: Rebirth.
Security Policies.
Appendix A: SafetyWare.
Appendix B: Template for Security Plan.
Appendix C: What's on the CD.
Glossary.
References.
Index.