Download PDF Honeypots: Tracking Hackers, by Lance Spitzner
Get the advantages of checking out routine for your life style. Reserve Honeypots: Tracking Hackers, By Lance Spitzner message will consistently associate with the life. The reality, understanding, science, health and wellness, religion, home entertainment, and much more can be located in composed publications. Lots of authors supply their encounter, science, study, and also all points to discuss with you. One of them is through this Honeypots: Tracking Hackers, By Lance Spitzner This book Honeypots: Tracking Hackers, By Lance Spitzner will certainly provide the needed of message as well as statement of the life. Life will certainly be finished if you recognize a lot more things with reading e-books.
Honeypots: Tracking Hackers, by Lance Spitzner
Download PDF Honeypots: Tracking Hackers, by Lance Spitzner
Checking out a book Honeypots: Tracking Hackers, By Lance Spitzner is kind of very easy activity to do every time you want. Even checking out each time you really want, this activity will certainly not interrupt your various other tasks; numerous people frequently review guides Honeypots: Tracking Hackers, By Lance Spitzner when they are having the leisure. Exactly what regarding you? What do you do when having the downtime? Do not you invest for worthless things? This is why you should get guide Honeypots: Tracking Hackers, By Lance Spitzner and also aim to have reading practice. Reviewing this publication Honeypots: Tracking Hackers, By Lance Spitzner will not make you worthless. It will certainly provide a lot more benefits.
As one of the home window to open the brand-new world, this Honeypots: Tracking Hackers, By Lance Spitzner provides its fantastic writing from the writer. Published in among the prominent authors, this book Honeypots: Tracking Hackers, By Lance Spitzner turneds into one of the most ideal publications lately. Really, the book will not matter if that Honeypots: Tracking Hackers, By Lance Spitzner is a best seller or not. Every publication will certainly consistently offer finest resources to get the reader all finest.
Nonetheless, some individuals will certainly seek for the best vendor publication to check out as the very first recommendation. This is why; this Honeypots: Tracking Hackers, By Lance Spitzner exists to satisfy your necessity. Some individuals like reading this publication Honeypots: Tracking Hackers, By Lance Spitzner as a result of this preferred publication, however some love this because of preferred writer. Or, several likewise like reading this publication Honeypots: Tracking Hackers, By Lance Spitzner considering that they actually have to read this publication. It can be the one that really love reading.
In getting this Honeypots: Tracking Hackers, By Lance Spitzner, you could not still pass walking or riding your motors to guide establishments. Get the queuing, under the rainfall or warm light, as well as still hunt for the unidentified book to be during that book store. By visiting this web page, you can just hunt for the Honeypots: Tracking Hackers, By Lance Spitzner and also you can discover it. So currently, this time is for you to choose the download link as well as acquisition Honeypots: Tracking Hackers, By Lance Spitzner as your very own soft documents book. You could read this publication Honeypots: Tracking Hackers, By Lance Spitzner in soft data only and save it as your own. So, you don't need to fast put the book Honeypots: Tracking Hackers, By Lance Spitzner into your bag almost everywhere.
In this text, the author of Know Your Enemy explores state-of-the-art security technologies called Honeypots. It provides examples of real world deployments and coverage of the legal issues surrounding the use of honeypots. The CD includes white papers, source code and evaluation software.
- Sales Rank: #230346 in Books
- Published on: 2002-09-20
- Original language: English
- Number of items: 1
- Dimensions: 9.10" h x 1.10" w x 7.30" l, 1.83 pounds
- Binding: Paperback
- 480 pages
From the Back Cover
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute
"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action."
--From the Foreword by Marcus J. Ranum
"From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today."
--Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems
Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.
Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets.
Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots.
With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable.
0321108957B08282002
About the Author
Lance Spitzner is a senior security architect for Sun Microsystems, Inc., and an acknowledged authority in security and honeypot research. He is a developer, the moderator of the honeypots mailing list, and an instructor for the SANS honeypot course. He is also the founder of the Honeynet Project, a nonprofit group of thirty security professionals dedicated to Honeynet research and learning the tools, tactics, and motives of blackhats and sharing their lessons learned. Lance has presented data on honeypot technologies to organizations such as the Pentagon, the FBI Academy, the Naval War College, the National Security Agency, West Point, SANS, CanSecWest, and Black Hat Briefings.
0321108957AB08282002
Excerpt. © Reprinted by permission. All rights reserved.
It began as an innocent probe. A strange IP address was examining an unused service on my system. In this case, a computer based in Korea was attempting to connect to an RPC service on my computer. There is no reason why anyone would want to access this service, especially someone in Korea. Something was definitely up. Immediately following the probe, my Intrusion Detection System screamed an alert, an exploit had just been launched, my system was under assault! Seconds after the attack an intruder broke into my computer, executed several commands, then took total control of the system. My computer had just been hacked! I was elated, I could not have been happier.
Welcome to the exciting world of honeypots where we turn the tables on the badguys. Most of the security books you read today cover a variety of concepts and technologies, almost all are about keeping blackhats out. This book is different. It is about keeping the badguys in. It's about building computers that you want to be hacked. Traditionally, security has been purely defensive. There has been little an organization could do to take the initiative, to take the battle to the bad guys. Honeypots change the rules, they are a technology that allows organizations to take the offensive.
Honeypots come in a variety of shapes and sizes. Everything from a simple Windows system emulating a few services, to an entire network of productions systems waiting to be hacked. Honeypots also have a variety of values. Everything from a burglar alarm that detects an intruder, to a research tool that can be used to study the motives of the blackhat community. Honeypots are unique in that they are not a single tool to solve a specific problem. Instead, they are a highly flexible technology that can fulfill a variety of different roles. It is up to you how you want to use and deploy these technologies.
In this book, we explain what a honeypot is, how they work, and the different values this unique technology can have. We then go into detail on six different honeypot technologies. We take you through step-by-step how these honeypot solutions work, their advantages and disadvantages, and what a real attack looks like to each honeypot. Finally, we cover deployment and maintenance issues of honeypots. The goal of this book is to not just give you an understanding of honeypot concepts and architecture, but to give you the skills and experience to deploy the best honeypot solutions for your environment. Throughout the book are examples based on real world experiences, almost all the attacks discussed are based on real world incidents. You will see the blackhat community at their best, and some at their worst. Best of all, you will arm yourself with the skills and knowledge to track these attackers and learn about them on your own.
I have been actively using honeypots for many years. I find them to be absolutely fascinating. They are an exciting technology that not only teaches you a great deal about blackhats, but also a great deal about yourself and security in general. I hope you enjoy this book as much as I have enjoyed writing and learning about honeypot technologies.Audience
This book is intended for the security professional. Anyone involved in protecting or securing computer resources will find this resource valuable. It is the first publication dedicated to honeypot technologies, a tool that more and more computer security professionals will want to take advantage of once they understand its power and flexibility.
Due to honeypots' unique capabilities, other individuals and organizations will be extremely interested in this book. Military organizations can apply these technologies to Cyberwarfare. Universities and security research organizations will find tremendous value in the material concerning research honeypots. Intelligence organizations can apply this book to intelligence and counter-intelligence activities. Members of law enforcement can use this material for capturing of criminal activities. Legal professionals will find chapter fifteen to be one of the first definitive resources concerning the legal issues of honeypots. CD-ROM
This book has a CD-ROM accompanying it. The purpose of the CD-ROM is to give you additional information discussed in the book. It includes everything from whitepapers and source code to actual evaluation copies of software and data captures of real attacks. This will give you the hands on opportunity to develop your skills with honeypot technologies. Also included with the CD-ROM are all the URLs referenced in the book, so you can learn more about the technologies discussed.Web site
This book will have a Web site dedicated to it. The purpose of the Web site is to keep this material updated. If any discrepancies or mistakes are identified in the book, the Web site will have updates and correction. For example, if any of the URLs mentioned in the book have changed or been removed, the Web site will have the latest links. Also, new technologies are always being developed and deployed. Visit the Web site to stay current with the latest in honeypot technologies.References
Each chapter ends with a references section. The purpose is to provide you with resources to gain additional information about topics discussed in the book. Examples of references include Web sites that focus on securing operating systems and books that specialize in forensic analysis.
0321108957P05172002
Most helpful customer reviews
19 of 19 people found the following review helpful.
Awesome! Better than the first Honeynet book!
By Dr Anton Chuvakin
If you liked "Know Your Enemy" by the Honeynet Project, you will
undoubtedly like Lance Spitzner's (the Honeynet Project founder) new
book "Tracking Hackers" much more. In fact, even if you did not quite
like "Know Your Enemy", you will likely be deeply impressed with the
new book on honeypots and their use for tracking hackers.
The structure of the book is different from the "Know Your Enemy":
Lance starts from the very beginning - namely, his first honeypot
penetration experience and then goes on to talk about all aspects of
honeypots. In-depth and structured background on honeypot technology
is provided. Honeypots are sorted by the level of interaction with
attacker they are able to provide.
In addition, the book covers the business benefits of using
honeypots. By classifying the value of honeypots into prevention,
detection and response (exactly as done in Honeynet Project white
papers) Lance Spitzner analyzes the honeypot technology contributions
to an overall security posture. Also, the book describes the
differences between the research and production honeypots and
demonstrates the benefits of both for various deployment scenarios.
A good part of the book is devoted to particular honeypot solutions:
'honeyd' by Niels Provos and several commercial honeypots with
detailed explanation of how they work. For example, there is a clear
description of ARP spoofing and how it is used by the 'honeyd'
honeypot daemon. An interesting chapter on "homegrown" honeypot
solutions (such as the ones used to capture popular worms of 2001)
sheds some light on the simplest honeypots that can be built for
specific purposes, such as to capture a popular attack by means of a
simple port listener. Use of UNIX chroot() jail environment for
honeypots is also analyzed.
Of course, a special chapter is devoted to honeynets - Project's
primary weapon in a war against malicious hackers. The Generation II
(GenII) honeynet technology is first introduced in a book. The chapter
not only lists honeynet deployment and maintenance suggestions, but
also talks about the risks of honeynets.
Another great feature of the book is a chapter on honeypot
implementation strategies and methods, such as using NAT to forward
traffic to a honeypot and DMZ honeypot installation. The information
is then further demonstrated using the two full honeypot case studies,
from planning to operation.
What is even more important, maintaining the honeypot architecture is
covered in a separate chapter. Honeypots are a challenge to run,
mainly since no 'lock it down and maintain state' is possible. One has
to constantly build defenses and hide and dodge attacks that cannot be
defended against.
"Tracking hackers" also has a "Legal Issues" chapter, written with a
lot of feedback from the DoJ official. It dispels some of the
misconceptions about the honeypots such as the "entrapment" issue,
summarizes wiretap laws and related data capture problems.
The book describes an almost cutting edge of the honeypot research and
technology. To truly get the cutting edge and to know about the
Honeynet Project latest activities in detail, wait for the second
edition of "Know Your Enemy" (coming out next year). In "Tracking
Hackers" Lance makes some predictions about honeypots in "Future of
Honeypots" chapter. Honeypot-based early warning system and
distributed deployments, analysis of new threats and expanding
research applications, making honeypots easier to deploy and maintain
are all in this chapter.
To conclude, Marcus Ranum's enthusiastic preface is not an
overstatement, it is indeed a great book for both security
professionals and others interested in this exciting technology.
While I was already familiar with most of the information in the book,
it was a fascinating read! This is the kind of book you don't want or
even cannot put down until the last page is turned.
Anton Chuvakin, Ph.D., GCIA is a Senior Security Analyst with a major
information security company. His areas of infosec expertise include
intrusion detection, UNIX security, honeypots, etc. In his spare time
he maintains his security portal info-secure.org
14 of 14 people found the following review helpful.
Think Honeypot!
By Stephen Northcutt
Lance is the "been there, done that" guy when it comes to honeypots and that really shows this book teaches, but it also entertains. Honeypots: Tracking Hackers grabs your interest from the start with a real life story of an underground hacker with a powerful new hacking tool, attacking hundreds, if not thousands, of systems all over the world.
Lance begins with how he got interested in honeypots and goes on to describe the different tools that are available, how they work and how anyone can set up their system to learn how to defend from novel attacks attacks. From the personal home computer to huge networks, Lance and his team have a solution.
He puts attackers in two categories: those who want to attack as many systems as possible and those who target a specific system of high value. By defining these attackers the audience has a clear understanding of what they are dealing with.
Starting with the history and definition of honeypots and honeynets, he takes us through characteristics and the different levels of interaction, how to configure different levels of honeypots, then on to the need to convince management of the value of honeypots and finally the legal issues (USA law) involved.
Honeypots are becoming more acceptable as hackers get into more systems and management is mandated to stop the attacks. They shouldn't be anyone's first line of defense, but for advanced sites, this is an important suite of technologies.
Honeypots: Tracking Hackers is a must read for novices and experienced security officers, alike. It will keep your attention and make you want to set up your own honeypot! If the book is not on your bookshelf and if honeypots are not part of your defensive information plans, something is wrong!
10 of 12 people found the following review helpful.
An original, motivational computer security book
By Richard Bejtlich
During the 1990s, publishers printed a handful of computer security books per year. Now dozens appear each month, all competing for our limited time and shelf space. Of these "new" books, hardly any offer original, innovative material. Thankfully, Lance Spitzner's "Honeypots" breaks this trend. His is the only book devoted to honeypot technologies, and it will both motivate and inform any reader.
"Honeypots" is one-stop-shopping for the world of blackhat deception and observation. Spitzner gets the reader up to speed on commercial and free honeypot technologies, then effectively argues how these tools fit within the enterprise's security infrastructure. He concludes with explanations of how to configure, deploy, and operate a variety of honeypots.
"Honeypots" shines with good material, like the honeypot history in chapter 3, the explanation of GenI and GenII honeynets in chapter 11, and the all-star legal discussion in chapter 15. Spitzner also demonstrates his understanding of subtle but critical security engineering concepts, such as learning by analyzing failure (p. 8) and studying second-order effects when first-order events are tough to detect (chapter 4).
I have two minor critiques. First, the text could have been a bit more concise. Second, it's best not to confuse people by calling the "link" layer by the name "layer 1" and the network layer as "layer 2" (p. 149). Stevens and others do show the TCP/IP model as link - network - transport - application. However, network engineers usually think of "layer 2" as the data link layer and "layer 3" as the network layer.
I was a big fan of the HoneyNet Project's book, minus the 150 pages of IRC logs. I think all security-minded readers will find the entire "Honeypots" book exciting. I rarely find security books that rally me to join a cause, but Spitzner's is an exception.
Honeypots: Tracking Hackers, by Lance Spitzner PDF
Honeypots: Tracking Hackers, by Lance Spitzner EPub
Honeypots: Tracking Hackers, by Lance Spitzner Doc
Honeypots: Tracking Hackers, by Lance Spitzner iBooks
Honeypots: Tracking Hackers, by Lance Spitzner rtf
Honeypots: Tracking Hackers, by Lance Spitzner Mobipocket
Honeypots: Tracking Hackers, by Lance Spitzner Kindle
Tidak ada komentar:
Posting Komentar