Foreword |
|
xxxi | |
Introduction |
|
xxxiii | |
1 What Type of Hacker Are You? |
|
1 | (8) |
|
Most Hackers Aren't Geniuses |
|
|
2 | (1) |
|
Defenders Are Hackers Plus |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (5) |
2 How Hackers Hack |
|
9 | (14) |
|
|
10 | (11) |
|
|
11 | (9) |
|
Hacking Is Boringly Successful |
|
|
20 | (1) |
|
Automated Malware as a Hacking Tool |
|
|
20 | (1) |
|
|
21 | (2) |
3 Profile: Bruce Schneier |
|
23 | (4) |
|
For More Information on Bruce Schneier |
|
|
26 | (1) |
4 Social Engineering |
|
27 | (6) |
|
Social Engineering Methods |
|
|
27 | (3) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
Social Engineering Defenses |
|
|
30 | (3) |
|
|
30 | (1) |
|
Be Careful of Installing Software from Third-Party Websites |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Anti-Social Engineering Technologies |
|
|
31 | (2) |
5 Profile: Kevin Mitnick |
|
33 | (6) |
|
For More Information on Kevin Mitnick |
|
|
37 | (2) |
6 Software Vulnerabilities |
|
39 | (6) |
|
Number of Software Vulnerabilities |
|
|
39 | (1) |
|
Why Are Software Vulnerabilities Still a Big Problem? |
|
|
40 | (1) |
|
Defenses Against Software Vulnerabilities |
|
|
41 | (2) |
|
Security Development Lifecycle |
|
|
41 | (1) |
|
More Secure Programming Languages |
|
|
42 | (1) |
|
Code and Program Analysis |
|
|
42 | (1) |
|
More Secure Operating Systems |
|
|
42 | (1) |
|
Third-Party Protections and Vendor Add-Ons |
|
|
42 | (1) |
|
Perfect Software Won't Cure All Ills |
|
|
43 | (2) |
7 Profile: Michael Howard |
|
45 | (6) |
|
For More Information on Michael Howard |
|
|
49 | (2) |
8 Profile: Gary McGraw |
|
51 | (4) |
|
For More Information on Gary McGraw |
|
|
54 | (1) |
9 Malware |
|
55 | (6) |
|
|
55 | (1) |
|
Number of Malware Programs |
|
|
56 | (1) |
|
Mostly Criminal in Origin |
|
|
57 | (1) |
|
|
58 | (3) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
Application Control Programs |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (2) |
10 Profile: Susan Bradley |
|
61 | (4) |
|
For More Information on Susan Bradley |
|
|
63 | (2) |
11 Profile: Mark Russinovich |
|
65 | (4) |
|
For More on Mark Russinovich |
|
|
68 | (1) |
12 Cryptography |
|
69 | (6) |
|
|
69 | (1) |
|
Why Can't Attackers Just Guess All the Possible Keys? |
|
|
70 | (1) |
|
Symmetric Versus Asymmetric Keys |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (3) |
|
|
72 | (1) |
|
Known Ciphertext/Plaintext |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (2) |
13 Profile: Martin Hellman |
|
75 | (6) |
|
For More Information on Martin Hellman |
|
|
79 | (2) |
14 Intrusion Detection/APTs |
|
81 | (6) |
|
Traits of a Good Security Event Message |
|
|
82 | (1) |
|
Advanced Persistent Threats (APTs) |
|
|
82 | (1) |
|
Types of Intrusion Detection |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
Intrusion Detection Tools and Services |
|
|
84 | (3) |
|
Intrusion Detection/Prevention Systems |
|
|
84 | (1) |
|
Event Log Management Systems |
|
|
85 | (1) |
|
Detecting Advanced Persistent Threats (APTs) |
|
|
85 | (2) |
15 Profile: Dr. Dorothy E. Denning |
|
87 | (4) |
|
For More Information on Dr. Dorothy E. Denning |
|
|
90 | (1) |
16 Profile: Michael Dubinsky |
|
91 | (4) |
|
For More Information on Michael Dubinsky |
|
|
93 | (2) |
17 Firewalls |
|
95 | (6) |
|
|
95 | (6) |
|
The Early History of Firewalls |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
What Firewalls Protect Against |
|
|
98 | (3) |
18 Profile: William Cheswick |
|
101 | (6) |
|
For More Information on William Cheswick |
|
|
105 | (2) |
19 Honeypots |
|
107 | (4) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Catching My Own Russian Spy |
|
|
109 | (1) |
|
Honeypot Resources to Explore |
|
|
110 | (1) |
20 Profile: Lance Spitzner |
|
111 | (4) |
|
For More Information on Lance Spitzner |
|
|
114 | (1) |
21 Password Hacking |
|
115 | (8) |
|
Authentication Components |
|
|
115 | (2) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Authentication Challenges |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (2) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
Hacking Password Reset Portals |
|
|
119 | (1) |
|
|
119 | (4) |
|
|
120 | (1) |
|
Frequent Changes with No Repeating |
|
|
120 | (1) |
|
Not Sharing Passwords Between Systems |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
Credential Theft Defenses |
|
|
121 | (1) |
|
|
122 | (1) |
22 Profile: Dr. Cormac Herley |
|
123 | (4) |
|
For More Information on Dr. Cormac Herley |
|
|
126 | (1) |
23 Wireless Hacking |
|
127 | (6) |
|
|
127 | (1) |
|
Types of Wireless Hacking |
|
|
127 | (2) |
|
Attacking the Access Point |
|
|
128 | (1) |
|
|
128 | (1) |
|
Guessing a Wireless Channel Password |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Physically Locating a User |
|
|
129 | (1) |
|
Some Wireless Hacking Tools |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
Wireless Hacking Defenses |
|
|
130 | (3) |
|
|
130 | (1) |
|
Predefined Client Identification |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
Electromagnetic Shielding |
|
|
131 | (2) |
24 Profile: Thomas d'Otreppe de Bouvette |
|
133 | (4) |
|
For More Information on Thomas d'Otreppe de Bouvette |
|
|
135 | (2) |
25 Penetration Testing |
|
137 | (10) |
|
My Penetration Testing Highlights |
|
|
137 | (2) |
|
Hacked Every Cable Box in the Country |
|
|
137 | (1) |
|
Simultaneously Hacked a Major Television Network and Pornography |
|
|
138 | (1) |
|
Hacked a Major Credit Card Company |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (8) |
|
|
139 | (1) |
|
Get Documented Permission First |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (4) |
|
|
145 | (1) |
|
Minimize Potential Operational Interruption |
|
|
145 | (2) |
26 Profile: Aaron Higbee |
|
147 | (4) |
|
For More Information on Aaron Higbee |
|
|
149 | (2) |
27 Profile: Benild Joseph |
|
151 | (4) |
|
For More Information on Benild Joseph |
|
|
153 | (2) |
28 DDoS Attacks |
|
155 | (6) |
|
|
155 | (3) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
Every Layer in the OSI Model |
|
|
157 | (1) |
|
|
157 | (1) |
|
Upstream and Downsteam Attacks |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Appropriate Network Configuration |
|
|
159 | (1) |
|
Engineer Out Potential Weak Points |
|
|
159 | (1) |
|
|
160 | (1) |
29 Profile: Brian Krebs |
|
161 | (4) |
|
For More Information on Brian Krebs |
|
|
164 | (1) |
30 Secure OS |
|
165 | (6) |
|
How to Secure an Operating System |
|
|
166 | (3) |
|
|
166 | (2) |
|
|
168 | (1) |
|
Secure Configuration Tools |
|
|
169 | (1) |
|
|
169 | (2) |
|
|
169 | (1) |
|
|
169 | (2) |
31 Profile: Joanna Rutkowska |
|
171 | (4) |
|
For More Information on Joanna Rutkowska |
|
|
173 | (2) |
32 Profile: Aaron Margosis |
|
175 | (6) |
|
For More Information on Aaron Margosis |
|
|
179 | (2) |
33 Network Attacks |
|
181 | (4) |
|
|
181 | (2) |
|
|
182 | (1) |
|
Man-in-the-Middle Attacks |
|
|
182 | (1) |
|
Distributed Denial-of-Service Attacks |
|
|
183 | (1) |
|
|
183 | (2) |
|
|
183 | (1) |
|
|
183 | (1) |
|
Use Secure Protocols and Applications |
|
|
183 | (1) |
|
Network Intrusion Detection |
|
|
184 | (1) |
|
|
184 | (1) |
|
Visit Secure Web Sites and Use Secure Services |
|
|
184 | (1) |
34 Profile: Laura Chappell |
|
185 | (4) |
|
For More Information on Laura Chappell |
|
|
188 | (1) |
35 loT Hacking |
|
189 | (4) |
|
|
189 | (1) |
|
|
190 | (3) |
36 Profile: Dr. Charlie Miller |
|
193 | (8) |
|
For More Information on Dr. Charlie Miller |
|
|
198 | (3) |
37 Policy and Strategy |
|
201 | (4) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
38 Profile: Jing de Jong-Chen |
|
205 | (6) |
|
For More Information on Jing de Jong-Chen |
|
|
209 | (2) |
39 Threat Modeling |
|
211 | (6) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (4) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
Ordinary, Solitary Hackers or Hacker Groups |
|
|
214 | (3) |
40 Profile: Adam Shostack |
|
217 | (4) |
|
For More Information on Adam Shostack |
|
|
220 | (1) |
41 Computer Security Education |
|
221 | (6) |
|
Computer Security Training Topics |
|
|
222 | (2) |
|
End-User/Security Awareness Training |
|
|
222 | (1) |
|
General IT Security Training |
|
|
222 | (1) |
|
|
222 | (1) |
|
OS and Application-Specific Training |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (3) |
|
|
224 | (1) |
|
|
224 | (1) |
|
Schools and Training Centers |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (2) |
42 Profile: Stephen Northcutt |
|
227 | (4) |
|
For More Information on Stephen Northcutt |
|
|
230 | (1) |
43 Privacy |
|
231 | (4) |
|
|
232 | (1) |
|
Privacy-Protecting Applications |
|
|
233 | (2) |
44 Profile: Eva Galperin |
|
235 | (4) |
|
For More Information on Eva Galperin |
|
|
237 | (2) |
45 Patching |
|
239 | (6) |
|
|
240 | (1) |
|
Most Exploits Are Caused by Old Vulnerabilities That Patches Exist For |
|
|
240 | (1) |
|
Most Exploits Are Caused by a Few Unpatched Programs |
|
|
240 | (1) |
|
The Most Unpatched Program Isn't Always the Most Exploited Program |
|
|
241 | (1) |
|
You Need to Patch Hardware Too |
|
|
241 | (1) |
|
|
241 | (4) |
|
Detecting Missing Patching Isn't Accurate |
|
|
241 | (1) |
|
|
242 | (1) |
|
Some Percentage of Patching Always Fails |
|
|
242 | (1) |
|
Patching Will Cause Operational Issues |
|
|
242 | (1) |
|
A Patch Is a Globally Broadcasted Exploit Announcement |
|
|
243 | (2) |
46 Profile: Window Snyder |
|
245 | (4) |
|
For More Information on Window Snyder |
|
|
248 | (1) |
47 Writing as a Career |
|
249 | (10) |
|
Computer Security Writing Outlets |
|
|
250 | (5) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Professional Writing Tips |
|
|
255 | (4) |
|
The Hardest Part Is Starting |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
A Picture Is Worth a Thousand Words |
|
|
256 | (3) |
48 Profile: Fahmida Y. Rashid |
|
259 | (4) |
|
For More Information on Fahmida Y. Rashid |
|
|
262 | (1) |
49 Guide for Parents with Young Hackers |
|
263 | (8) |
|
Signs Your Kid Is Hacking |
|
|
264 | (2) |
|
|
264 | (1) |
|
Overly Secretive About Their Online Activities |
|
|
264 | (1) |
|
They Have Multiple Email/Social Media Accounts You Can't Access |
|
|
265 | (1) |
|
You Find Hacking Tools on the System |
|
|
265 | (1) |
|
People Complain You Are Hacking |
|
|
265 | (1) |
|
You Catch Them Switching Screens Every Time You Walk into the Room |
|
|
265 | (1) |
|
These Signs Could Be Normal |
|
|
265 | (1) |
|
|
266 | (1) |
|
How to Turn Around Your Malicious Hacker |
|
|
266 | (5) |
|
Move Their Computers into the Main Living Area and Monitor |
|
|
267 | (1) |
|
|
267 | (1) |
|
Give Legal Places to Hack |
|
|
267 | (2) |
|
Connect Them with a Good Mentor |
|
|
269 | (2) |
50 Hacker Code of Ethics |
|
271 | (4) |
|
|
272 | (3) |
|
Be Ethical, Transparent, and Honest |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
Be Confidential with Sensitive Information |
|
|
273 | (1) |
|
|
273 | (1) |
|
Conduct Yourself Professionally |
|
|
274 | (1) |
|
|
274 | (1) |
Index |
|
275 | |