Dec 01, 2019 18:30
- Aggressive Network Self-Defense
Edited by: Neil Archibald, dedhed, Seth Fogie, Chris Hurley, Dan Kaminsky, Johnny Long, Luke McOmie (aka Pyr0), Haroon Meer, Bruce Potter, Roelof Temmingh, Neil R. Wyler (aka Grifter) and Timothy M. Mullen (THOR). ISBN: 978-1-931836-20-3.
Copyright © 2005 Elsevier Inc. All rights reserved
Content:
Part I: Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge
Chapter 1 - PDA Perils: Revenge from the Palm of Your Hand, Pages 1-55, Seth Fogie
Chapter 2 - The Case of a WLAN Attacker: In the Booth, Pages 57-84, Chris Hurley
Chapter 3 - MD5: Exploiting the Generous, Pages 85-101, Dan Kaminsky
Chapter 4 - A VPN Victim's Story: Jack's Smirking Revenge, Pages 103-145, Johnny Long and Neil Archibald.
Chapter 5 - Network Protection: Cyber-Attacks Meet Physical Response, Pages 147-177, Bruce Potter
Chapter 6 - Network Insecurity: Taking Patch Management to the Masses, Pages 179-212, Neil R. Wyler (aka Grifter)
Chapter 7 - The Fight for the Primulus Network: Yaseen vs Nathan, Pages 213-252, Harron Meer and Roelof Temmingh
Chapter 8 - Undermining the Network: A Breach of Trust, Pages 253-283, Luke McOmie (aka Pyr0) and dedhed (Nathan) (Marigoni)
Part II: The Technologies and Concepts Behind Network Strike Back
Chapter 9 - ADAM: Active Defense Algorithm and Model, Pages 287-311
Chapter 10 - Defending Your Right to Defend, Pages 313-321, Timothy M. Mullen
Chapter 11 - MD5 to Be Considered Harmful Someday, Pages 323-337, Dan Kaminsky
Chapter 12 - When the Tables Turn: Passive Strike-Back, Pages 339-371, Haroon Meer, Roelof Temmingh and Charl van der Walt - Asterisk Hacking. Toolkit and Live Cd.
Copyright © 2007 Elsevier Inc. All rights reserved
Authors: Benjamin Jackson, Champ Clark III, Larry Chaffin and Johnny Long
ISBN: 978-1-59749-151-8
Content:
Co-Authors, Page v
Technical Editors, Page vi
Chapter 1 - What Is Asterisk and Why Do You Need It?, Pages 1-20
Chapter 2 - Setting Up Asterisk, Pages 21-64
Chapter 3 - Configuring Asterisk, Pages 65-114
Chapter 4 - Writing Applications with Asterisk, Pages 115-145
Chapter 5 - Understanding and Taking Advantage of VoIP Protocols, Pages 147-181
Chapter 6 - Asterisk Hardware Ninjutsu, Pages 183-224
Chapter 7 - Threats to VoIP Communications Systems, Pages 225-244
Index, Pages 245-253 - Black Hat Physical Device Security
Exploiting Hardware and Software
Copyright © 2004 Elsevier Inc. All rights reserved
Author: Drew Miller. ISBN: 978-1-932266-81-8
Content:
Acknowledgments, Page v
Author, Page vii
Technical Editor, Page viii
Foreword, Pages xvii-xix
Introduction, Pages xxi-lii
Chapter 1 - The Enveloping Paradigm, Pages 1-27
Chapter 2 - Inheriting security problems, Pages 29-56
Chapter 3 - Information security, Pages 57-125
Chapter 4 - Mitigating Exposures, Pages 127-169
Chapter 5 - Monitoring Software Exposures, Pages 171-209
Chapter 6 - Taking a Hard Look at Hardware, Pages 211-236
Chapter 7 - Authenticating People, Pages 237-273
Chapter 8 - Monitoring and Detecting Deviations, Pages 275-295
Chapter 9 - Notifying Systems, Pages 297-304
Appendix A - Terms in Context, Pages 305-309
Appendix B - Factoring by Quadratic Relationships, Pages 311-324
Appendix C - Factoring Source Code for Fun, Pages 325-351
Index, Pages 353-363 - Botnets
The Killer Web App
Copyright © 2007 Elsevier Inc. All rights reserved
Authors: Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems and Michael Cross. ISBN: 978-1-59749-135-8
Content:
Acknowledgments, Page v
Lead Authors and Technical Editors, Page vi
Contributors, Pages vi-viii
Chapter 1 - Botnets: A Call to Action, Pages 1-27
Chapter 2 - Botnets Overview, Pages 29-75
Chapter 3 - Alternative Botnet C&Cs, Pages 77-95
Chapter 4 - Common Botnets, Pages 97-132
Chapter 5 - Botnet Detection: Tools and Techniques, Pages 133-215
Chapter 6 - Ourmon: Overview and Installation, Pages 217-243
Chapter 7 - Ourmon: Anomaly Detection Tools, Pages 245-283
Chapter 8 - IRC and Botnets, Pages 285-312
Chapter 9 - Advanced Ourmon Techniques, Pages 313-343
Chapter 10 - Using Sandbox Tools for Botnets, Pages 345-390
Chapter 11 - Intelligence Resources, Pages 391-415
Chapter 12 - Responding to Botnets, Pages 417-452
Appendix A - FSTC Phishing Solutions Categories, Pages 453-458
Index, Pages 459-464 - Buffer Overflow Attacks. Detect, Exploit, Prevent
Copyright © 2005 Elsevier Inc. All rights reserved
Authors: James C. Foster, Vitaly Osipov, Nish Bhalla, Niels Heinen and Dave Aitel. ISBN: 978-1-932266-67-2
Acknowledgments, Page v
Lead Author, Page vii
Contributing Authors, Page viii
Additional Area Experts, Page ix
Author's Acknowledgements, Page x
Foreword, Pages xxi-xxii
Part 1: Expanding on Buffer Overflows
Part II: Exploiting Buffer Overflows
Part III: Finding Buffer Overflows
Appendix A - The Complete Data Conversion Table, Pages 477-484
Appendix B - Useful Syscalls, Pages 485-487
Index, Pages 489-497 - Вы, конечно, шутите, мистер Фейнман! (Surely You're Joking, Mr. Feynman!)
Ричард Ф.Фейнман. Перевод с английского Н. А. Зубченко, О. Л. Тиходеевой, М. Шифмана
ISBN 5-93972-087-0
Список интересной литературы