Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community

Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community

List Price: $39.99
Your Price: $27.99
Product Info Reviews

<< 1 2 3 >>

Rating: 2 stars
Summary: Not as 31137 as they think they are
Review: This book describes an worthwhile project, and shares some novel insights. However, I can't help thinking that those novel insights could easily have been packaged in a 30-50 page journal article, instead of padding them into a 320 page book.

It's not clear to me what audience this book is targetting. Presumably, one would have to be a fairly sophisticated system administrator to make use of the information obtained by setting up one's own honeynet. For such an audience, however, much of the information presented seems to be at too elementary a level.

The authors don't help their case with their constant boasting of their own sophistication and their gratuitous use of military metaphors. The technical side of internet security is still better served by Cheswick and Bellovin's _Firewalls and Internet Security_ and Garfinkel and Spafford's _Practical Unix Security_, despite the age of those books. If you're interested in the social side, you'll be better entertained by Stoll's _Cuckoo's Egg_ or Shimomura and Markoff's _Takedown_.

I can't recommend this book very highly, but the bundled CD appears to be quite useful, so if you have the money to spare, you might give it a try.

Rating: 4 stars
Summary: The Alarm Clock is Ringing
Review: This book describes the methods and findings of the Honeynet Project in
prose that is clear and easy to follow even for someone without a strong
background in computer technology. It shows that the members of the
blackhat community (more commonly called crackers or hackers) scan the
internet indiscriminatley, probing computers for secruity weaknesses
and exploiting those that they find. The book conveys this message
that needs to reach a wide audience: Blackhats look for any internet

attached computer that they can break into. They do not care if the
computer is powerful, contains valuable data, or has a fast connection.
They only care about its presence and crackability.

If you are under the delusion that blackhats are not interested in your
computer this book is an alarm clock ringing to wake you up. If you
are curious about how computers on the Internet are compromised this
book has the details you need (including a CDROM with useful programs)
to get a base understanding of the issues. If you are a data security
professional this book is a self test about what you should already know.
If you are a business manager responsible for Internet attached computers
this book provides information to help you make better decisions about
resource allocation for security.

The Honeynet Project is fairly young. The book covers what they
have learned to date from putting stock systems out on the Internet.
The final chapter is titled "The Future of the Honeynet". The promise
of that chapter addresses my primary complaint about the book. It just
covers the basics - unpatched default installations getting cracked by
wandering vandals. While the detection and analysis work of the Honeynet
Project is advanced they show in this book the literal and figurative
kiddie brats bullying systems with no security precautions applied.
This left me hungry for information on how more advanced hackers do
their attacks. I hope "Know Your Enemy Volume II" is not too far away.

Having said that I must acknowledge that the Internet has a massive
population of computers that are vulnerable to these basic attacks.
Through ignorance, indifference, or misplaced priorities computers are
attached to the Internet without being properly secured. Blackhats can
compromise these systems and use them to attack targets of choice -
including the infrastructre of the Internet itself.

Hopefully this book will gather an audience that will respond to its
implied call to action...

Rating: 4 stars
Summary: Interesting read..
Review: This book is a very interesting read and would recommend any CSO to read it. I've been to too many seminars where opions and products are the driving force of selling a product. This book gives an objective view and I have found it helpful in my own evaluations and have given me food for thought. The CD with the book gives some useful information and links to some very good articles, and tools.
I am designing one of the largest networks and security infrastructures in the world, and thought generating books even though they may not give you the complete answer wrangle your curiousity and indepth knowledge of others.
This will book can only expand on what you know or you don't know. Recommended

Rating: 2 stars
Summary: Almost no useful information.
Review: This book is mainly about how to setup a honeypot or in other words the theory behind a honeypot. The actual root methods are very primitive and reveal almost no useful tactics to any intelligent computer user. Then the authors combine this with 100 pages of irc chats which are pathetic. I would not recommend buying this book.

Rating: 2 stars
Summary: Almost no useful information.
Review: This book is mainly about how to setup a honeypot or in other words the theory behind a honeypot. The actual root methods are very primitive and reveal almost no useful tactics to any intelligent computer user. Then the authors combine this with 100 pages of irc chats which are pathetic. I would not recommend buying this book.

Rating: 5 stars
Summary: Well written, researched and titled
Review: This is a fascinating read about how understanding hacking, from gathering the data, to the forensic analysis. The second part, on the forensic analysis is very detailed and well written.

The root idea is very simple, put an attractive target on the Internet, wait until it's hacked (and it will be), and then analyze the attack. The first part of the book covers the construction of these attractive 'honeypots'. The second part covers how to analyze the inevitable attack. The third part, which is the most high level, is about the culture of hacking and hackers.

I would recommend this book to anyone involved in securing systems on the open internet who has a good understanding of the technology behind networking and operating systems.

Rating: 5 stars
Summary: Excellent Security Must Read
Review: This is a requirement for anyone studying security or it is also a good read for those who aren't security professionals but want to understand more about the blackhat community. It really should be read by any computer professional to understand the threats and the tactics to deceive those who deceive us.
Overall, a great book and one to add to the collection (but easy to read cover to cover first!)

Rating: 5 stars
Summary: I know my enemy a lot more than before
Review: Very interesting and practical book about security.
CD-ROM contains good sources such as tools,examples and codes.
Every security professional must read this book.

Rating: 4 stars
Summary: The struggle against blackhats continues
Review: [This is a review of the Second Edition, May 2004.]

The Honeynet Project grew out of an informal group of computer experts who decided to take an active role in tracking breakins to computers. Existing countermeasures, like firewalls, and frequent patches of discovered firmware bugs, were fundamentally defensive. And did not actively try to understand the capabilities and intentions of the crackers/intruders/blackhats.

This second edition describes what they term Gen 2 Honeynets. These are more sophisticated than Gen 1 networks of honeypots, where a honeypot is a computer expressly deployed for blackhats to intrude upon. The book delves in some length on how to construct a honeypot and a honeynet. Various configurations are possible. A honeypot could mimic a Microsoft computer or a Solaris or linux machine. There is more emphasis on the actual machine being linux, because of the open source nature, which has led to tools like Snort, Ethereal and Sebeb being available. Indeed, Snort-Inline and Sebek were developed by this project.

Lots of craft keyboard sniffing (Sebek) and network sniffing (Ethereal). Plus, variant arrangements like having one computer pretend to be several honeypots are described. Or another, where a honeynet might be physically distant from the production net, but linked to it via a VPN.

All this is scarcely the last word. The blackhats will certainly devour this book to concoct their next generation techniques. You can safely predict an eventual third edition of this book.


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates