Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community

Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community

List Price: $39.99
Your Price: $27.99
Product Info Reviews

<< 1 2 3 >>

Rating: 5 stars
Summary: An informative look at how the "bad guys" operate
Review: "Know Your Enemy" begins with this simple yet striking observation: no military would plan to fight a battle without trying to learn as much as possible about the enemy -- their capabilities, their equipment, normal patterns of observation, and so on. But these rudiments of "tactical intelligence" have long been neglected in computer security. This book describes the Honeynet project (www.honeynet.org), a group that sets up so-called "honeypot" systems in order to observe (and learn about) the people who then try to attack them.

One fact that is especially striking, and more than a little frightening, is the short amount of time that elapses between new systems being connected to the Internet and the first attempts to break into them. The author tells of one system that got hit within 15 minutes of plugging it in!

The book is divided into three parts: how to set up a honeynet, how to analyze the collected data, and what the author has learned about "the enemy" in doing so.

The first part will be most interesting to those strange folks like me who, at one point or another, have set up "tripwires" on their systems to see who might be jiggling the doorknobs. The thought process involved in setting up a honeypot system, however, is more generally useful, because it helps to train the mind to think about secure vs. insecure systems and trust in general. Students of system and/or network administration should find this helpful, even if they never set up a honeypot themselves.But it's also more generally useful for forensic analysis after a security incident.

Finally, there's part three, the discussion of what has been learned about the "black hat" community. This I found to be both the most interesting and the most frustrating part of the book. In particular, chapter 11 ("In Their Own Words") is at the same time a strong and weak point. This chapter consists mainly of a collection of intercepted chat logs between intruders, with some commentary and analysis interspersed. My concerns with this chapter are, first, it is rather long (over 100 pages); and second, the actual analysis is fairly limited, though having an actual psychologist in on the honeynet team does add an interesting touch.

Overall, this is an extremely valuable book for those with responsiblity for (and/or interest in) computer security. Taking into account my complaints about chapter 11, I give the book 4.5 stars, rounded up to 5.

Rating: 5 stars
Summary: Lance Spitzner "Know Your Enemy"
Review: "Know Your Enemy" from the Honeynet Project...
team (led by Lance Spitzner) is an amazing account on adventures in computer
security. This superb book provides the summary of two years of the project
operation. Aimed to gather and analyze more information about malicious
hackers, the project provided security community with unique insights into
attacks, tricks, and even personalities of hackers. The network (now a
combination of networks in several places worldwide) was deployed for the
single purpose of being penetrated by remote attackers (or blackhats, as
they are called in the book). Their actions were then recorded, studied and
presented in this book and papers on the project web site
.... Real production systems (Linux, UNIX,
Windows) were deployed within the Honeynet.

Leveraging his military background, Lance Spitzner explains why it is
crucial to get first hand information on computer underground operations.
"Information is power" and in computer security there is a serious lack of
information about the adversaries. Most of the available information comes
as 'too little, too late' such as for a company that gets first-hand
knowledge of hackers right after seeing "u r 0wned" on their web site. And
even in this case other companies cannot learn from mistakes, since the
break-in will be kept as secret as possible.

The typical Honeynet break-in produces the following information. What
reconnaissance activity was performed by an attacker before the intrusion?
Which network service was exploited? What exact exploit string or buffer
overflow was used? What attacked did after getting access to the system? How
he or she retained access to the system? How did he or she use the system?
The answers are in the book!

In some of the attacks, the logs of IRC (Internet Relay Chat) conversations
between hackers were recorded. They reveal not only the technology, but also
some of the motivations of intruders. Some stories from the book border on
impossible, such as the case where the streaming video sent by hackers was
captured by the Honeynet team.

The book also provides full details on designing, building and
maintaining the honeynet, including the risks of running a honeynet. To
be more precise, they describe a Generation I honeynet, since now the
project has moved to more sophisticated security technology. The
project uses stringent standards for data control (preventing attacker
from causing trouble to third parties), data collection (recording
everything that happens on the network) and data collection
(aggregating attack data from several honeynets).

Overall, as Bruce Schneier said in the book's foreword: "Great stuff,
and it 's all real"

Anton Chuvakin, Ph.D. is a Senior Security Analyst with a major
information security company.

Rating: 2 stars
Summary: Disappointing. Way too much padding.
Review: Having seen Lance Spitzner's website and read other reviews of this book, I have to say that it failed to live up to my expectations. There is far too much repetition. It felt like Spitzner was still in the army, lecturing a class of new recruits and drumming everything in over and over. Maybe OK in a classroom, but not a book.

The transcripts of script-kiddy IRC sessions constitute the biggest single section of the book, but have little real value, and very few words per page. The whole things has the feel of something that seemed like a good idea for a book, but when they got down to it they found there wasn't enough to put in, so they just bulked it out.

There are useful and interesting things in there, which is why I gave it two stars instead of one.

Rating: 2 stars
Summary: Disappointing. Way too much padding.
Review: Having seen Lance Spitzner's website and read other reviews of this book, I have to say that it failed to live up to my expectations. There is far too much repetition. It felt like Spitzner was still in the army, lecturing a class of new recruits and drumming everything in over and over. Maybe OK in a classroom, but not a book.

The transcripts of script-kiddy IRC sessions constitute the biggest single section of the book, but have little real value, and very few words per page. The whole things has the feel of something that seemed like a good idea for a book, but when they got down to it they found there wasn't enough to put in, so they just bulked it out.

There are useful and interesting things in there, which is why I gave it two stars instead of one.

Rating: 4 stars
Summary: One-of-a-kind; a must read for security professionals
Review: I am a senior engineer for network security operations. I reviewed and provided feedback on a draft of "Know Your Enemy" (KYE) and I am credited on page xiii. This book by the Honeynet Project breaks new ground in the security and publishing communities. It is the first substantial "intelligence report" on those who use the Internet for destructive means, and will enlighten readers of all skill and experience levels.

As a former Air Force intelligence officer, I share the Honeynet Project's desire to gain insight into the tools, tactics, and intentions of the enemy. After explaining the technical details of configuring the honeynet, the authors discuss the attacks launched against their monitored network. The book's level of detail is excellent, as it includes network traces, log entries, and even keystroke captures. This multi-dimensional analysis is exactly the sort of information needed by intrusion detectors and other security personnel.

Beyond the descriptions of various incidents, the authors reveal several key insights. First, the security community must look beyond the tools used by the adversary, and understand tactics and intentions. Second, data collection is critical; alerts mean little without supporting evidence. Third, defense in depth applies to intrusion detection, as it is best to use logs from routers, firewalls, IDS, and hosts together when analyzing events.

The main reason I gave the book four stars was the inclusion of 100 pages of IRC logs in chapter 11. This did not add much to the 328 page book. The analysis of the chat sessions near the end of the chapter was more helpful. That section could have paraphrased the chatting or made reference to transcripts on a CD-ROM. I also hope future Honeynet Project books address Windows NT/2000 compromises, and ways to perform digital forensics on those systems.

Overall, I found "Know Your Enemy" to be highly motivational. I was glad to finally see proof that the "good guys" share information! (I think we give the "bad guys" a little too much credit in that respect.) I plan to include this book in my recommended reading list for network security and intrusion detection professionals. It is simple and well-written, and contains the right sort of information for someone trying to understand common security incidents.

Cliff Stoll's book was the last to detail a truly high-end compromise, perpetrated by individuals employed by a foreign intelligence service. When will the Honeynet Project bag "the big one?"

(Disclaimer: The publisher sent me a free review copy.)

Rating: 2 stars
Summary: I like the Honeynet Project idea, not so much the book
Review: I bought this book based on the recommendations of other readers. The first 3 chapters which describe the Honeynet configuration are of some value. The book however turns into an extremely repetitive exercise, and there are at least one hundred pages dedicated to a news dialog between teenager hackers.

Rating: 5 stars
Summary: Great book
Review: I fell in love with honeypots because of this book. They cover everything from beginner to expert. They tell you all you need to know to start your own honeynet. Well done.

Rating: 4 stars
Summary: Good book but missing some info.
Review: I found this book to be very informative but felt the authors were holding back. I know The Honeynet Project has much more up their sleeves. Tool coverage is great, motives too, but missing "meat" of tactics. Still a very good read and recommended to learn more about BHats.

Rating: 4 stars
Summary: Good book but missing some info.
Review: I found this book to be very informative but felt the authors were holding back. I know The Honeynet Project has much more up their sleeves. Tool coverage is great, motives too, but missing "meat" of tactics. Still a very good read and recommended to learn more about BHats.

Rating: 4 stars
Summary: Gripping read
Review: I picked this book up and couldn't put down. Well written and gripping. Very informative about how easily systems are "owned" as well how difficult it can be to set up Intrusion Detection Systems to see all attacks. If you weren't paranoid about your system being rooted, you will be after reading this book. I haven't tried the CD yet. The analysis of the conversations of the cracker group were interesting - gave some insight of how some crackers think they are motivated to do their malicious acts.

One nice thing about this book is you don't have to be a security expert or even security acquainted to see how the crackers work. I think my mother (who is a knitting granny type) could read this book without getting overwhelmed by techno-geek details.


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates