Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Honeypots: Tracking Hackers

Honeypots: Tracking Hackers

List Price: $44.99
Your Price: $31.49
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: Awesome! Better than the first Honeynet book!
Review: If you liked "Know Your Enemy" by the Honeynet Project, you will
undoubtedly like Lance Spitzner's (the Honeynet Project founder) new
book "Tracking Hackers" much more. In fact, even if you did not quite
like "Know Your Enemy", you will likely be deeply impressed with the
new book on honeypots and their use for tracking hackers.

The structure of the book is different from the "Know Your Enemy":
Lance starts from the very beginning - namely, his first honeypot
penetration experience and then goes on to talk about all aspects of
honeypots. In-depth and structured background on honeypot technology
is provided. Honeypots are sorted by the level of interaction with
attacker they are able to provide.

In addition, the book covers the business benefits of using
honeypots. By classifying the value of honeypots into prevention,
detection and response (exactly as done in Honeynet Project white
papers) Lance Spitzner analyzes the honeypot technology contributions
to an overall security posture. Also, the book describes the
differences between the research and production honeypots and
demonstrates the benefits of both for various deployment scenarios.

A good part of the book is devoted to particular honeypot solutions:
'honeyd' by Niels Provos and several commercial honeypots with
detailed explanation of how they work. For example, there is a clear
description of ARP spoofing and how it is used by the 'honeyd'
honeypot daemon. An interesting chapter on "homegrown" honeypot
solutions (such as the ones used to capture popular worms of 2001)
sheds some light on the simplest honeypots that can be built for
specific purposes, such as to capture a popular attack by means of a
simple port listener. Use of UNIX chroot() jail environment for
honeypots is also analyzed.

Of course, a special chapter is devoted to honeynets - Project's
primary weapon in a war against malicious hackers. The Generation II
(GenII) honeynet technology is first introduced in a book. The chapter
not only lists honeynet deployment and maintenance suggestions, but
also talks about the risks of honeynets.

Another great feature of the book is a chapter on honeypot
implementation strategies and methods, such as using NAT to forward
traffic to a honeypot and DMZ honeypot installation. The information
is then further demonstrated using the two full honeypot case studies,
from planning to operation.

What is even more important, maintaining the honeypot architecture is
covered in a separate chapter. Honeypots are a challenge to run,
mainly since no 'lock it down and maintain state' is possible. One has
to constantly build defenses and hide and dodge attacks that cannot be
defended against.

"Tracking hackers" also has a "Legal Issues" chapter, written with a
lot of feedback from the DoJ official. It dispels some of the
misconceptions about the honeypots such as the "entrapment" issue,
summarizes wiretap laws and related data capture problems.

The book describes an almost cutting edge of the honeypot research and
technology. To truly get the cutting edge and to know about the
Honeynet Project latest activities in detail, wait for the second
edition of "Know Your Enemy" (coming out next year). In "Tracking
Hackers" Lance makes some predictions about honeypots in "Future of
Honeypots" chapter. Honeypot-based early warning system and
distributed deployments, analysis of new threats and expanding
research applications, making honeypots easier to deploy and maintain
are all in this chapter.

To conclude, Marcus Ranum's enthusiastic preface is not an
overstatement, it is indeed a great book for both security
professionals and others interested in this exciting technology.
While I was already familiar with most of the information in the book,
it was a fascinating read! This is the kind of book you don't want or
even cannot put down until the last page is turned.

Anton Chuvakin, Ph.D., GCIA is a Senior Security Analyst with a major
information security company. His areas of infosec expertise include
intrusion detection, UNIX security, honeypots, etc. In his spare time
he maintains his security portal info-secure.org

Rating: 5 stars
Summary: Think Honeypot!
Review: Lance is the "been there, done that" guy when it comes to honeypots and that really shows this book teaches, but it also entertains. Honeypots: Tracking Hackers grabs your interest from the start with a real life story of an underground hacker with a powerful new hacking tool, attacking hundreds, if not thousands, of systems all over the world.

Lance begins with how he got interested in honeypots and goes on to describe the different tools that are available, how they work and how anyone can set up their system to learn how to defend from novel attacks attacks. From the personal home computer to huge networks, Lance and his team have a solution.

He puts attackers in two categories: those who want to attack as many systems as possible and those who target a specific system of high value. By defining these attackers the audience has a clear understanding of what they are dealing with.

Starting with the history and definition of honeypots and honeynets, he takes us through characteristics and the different levels of interaction, how to configure different levels of honeypots, then on to the need to convince management of the value of honeypots and finally the legal issues (USA law) involved.

Honeypots are becoming more acceptable as hackers get into more systems and management is mandated to stop the attacks. They shouldn't be anyone's first line of defense, but for advanced sites, this is an important suite of technologies.

Honeypots: Tracking Hackers is a must read for novices and experienced security officers, alike. It will keep your attention and make you want to set up your own honeypot! If the book is not on your bookshelf and if honeypots are not part of your defensive information plans, something is wrong!

Rating: 5 stars
Summary: An important book for any information security professional
Review: Sting operations have been around for a long time. But in the age of the Internet how does one perform a sting operation in a digital manner? The answer is via a honeypot. A honeypot is a security resource (generally a file server, router or web server) whose value lies in being probed, attacked or compromised. By having a honeypot, organizations can see who their adversaries are, and in what manner their corporate digital assets are being attacked.

One of the many advantages that honeypots offer are that they enable organizations to take the offensive, as traditionally, the attackers have always has had the initiative. By taking an offensive security stance, companies are much better able and prepared to defend themselves.

Honeypots: Tracking Hackers is written by Lance Spitzner, one of the veterans in the field. The book complements his previous work Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community (reviewed June 2002). The book is an excellent resource for those that want to build their own honeypot.

The book open with an introduction into honeypots and the different roles they can play. It then details in depth various commercial and open source honeypots. The book details the pros and cons of honeypots. It makes it clear that honeypots are not for every organization; as the maintenance of honeypots can be time consuming and must be done by a person who knows exactly what they are doing and looking at.

Even for those that have no intention of implementing a honeypot, the book has a wealth of information about attackers and their methods. While not every organization may want to implement a honeypot, every organization is a target. By understanding who desires to attacks your corporate digital assets, you can be better prepared to defend them.

Not overly technical, Honeypots: Tracking Hackers is a fascinating read, and an important book for any information security professional.

Rating: 5 stars
Summary: An important book for any information security professional
Review: Sting operations have been around for a long time. But in the age of the Internet how does one perform a sting operation in a digital manner? The answer is via a honeypot. A honeypot is a security resource (generally a file server, router or web server) whose value lies in being probed, attacked or compromised. By having a honeypot, organizations can see who their adversaries are, and in what manner their corporate digital assets are being attacked.

One of the many advantages that honeypots offer are that they enable organizations to take the offensive, as traditionally, the attackers have always has had the initiative. By taking an offensive security stance, companies are much better able and prepared to defend themselves.

Honeypots: Tracking Hackers is written by Lance Spitzner, one of the veterans in the field. The book complements his previous work Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community (reviewed June 2002). The book is an excellent resource for those that want to build their own honeypot.

The book open with an introduction into honeypots and the different roles they can play. It then details in depth various commercial and open source honeypots. The book details the pros and cons of honeypots. It makes it clear that honeypots are not for every organization; as the maintenance of honeypots can be time consuming and must be done by a person who knows exactly what they are doing and looking at.

Even for those that have no intention of implementing a honeypot, the book has a wealth of information about attackers and their methods. While not every organization may want to implement a honeypot, every organization is a target. By understanding who desires to attacks your corporate digital assets, you can be better prepared to defend them.

Not overly technical, Honeypots: Tracking Hackers is a fascinating read, and an important book for any information security professional.

Rating: 4 stars
Summary: Great Overview of Honeypots for the Beginner
Review: This book did a great job of presenting the concepts of modern honeypot technology. It begins by covering the basic concepts of what the different types of honeypots can do, the different design concepts of production honeypots vs. research honeypots and how honeypots can be an aid to network security in any organization. The one thing I did'nt like was the "flow" of the book and the way some chapters were written. There was an exessive amount of fluff, some topics were beat like a dead horse. The book could easily have shaved off 50 pages making it a better read. Overall, it was a great book, I learned a lot, and would recomend it to anyone looking for an intro to honeypots. The included CD was a plus as well.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates