Skip to content
Scan a barcode
Scan
Paperback Hacker's Challenge 2: Test Your Network Security and Forensic Skills Book

ISBN: 0072226307

ISBN13: 9780072226300

Hacker's Challenge 2: Test Your Network Security and Forensic Skills

Find out if you have what it takes to keep the bad guys out of your network with the latest edition of this best-selling book featuring 20+ all new hacking challenges. This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Good

$6.69
Save $33.30!
List Price $39.99
Almost Gone, Only 1 Left!

Customer Reviews

4 ratings

Test Your Skills With These Hacker Puzzles

Hacker's Challenge 2 is a sort of practical exam for the Hacking Exposed series. Hacker's Challenge was a terrific book for putting some incident response and forensic skills to use and practicing for the real thing. Hacker's Challenge 2 continues the tradition and should be a must read for anyone who works with network security and incident response. The style of the challenges is fairly entertaining and the plots are so engaging you may not want to put the book down. Its like a best-selling mystery novel for network security techies. It may not affect the quality of the book overall, but I preferred having the authors of the individual challenges identified as they were in Hacker's Challenge. However, you should definitely buy this book! (...)

Excellent Book!

Besides being very entertaining this book offers a great deal of knowledge. If you are able to recognize all the concepts inside, it will serve as a perfect reference and starting point book. Very, very nice book.

Awesome book, great reading

The second "The Hacker's Challenge" brought with it another sleepless night of fun security reading. 19 attack cases with solutions and mitigation and prevention strategies are described by a team of known expert authors led by Mike Schiffman.Impressive wireless DoS attack, social engineering penetrations (including one case with no technical penetration whatsoever), mysterious web defacements, SQL injection, DNS tunneling case and router attack inform and educate, just as the first book did. Authors' mildly perverse sense of humor keeps the reader in a good mood. The book begs to be read in one helping (and then reread, as needed)! "The Challenge 2" again covers a wide range of victims and attack methods.An interesting case asks for writing an exploit and provides a walkthrough for a simple local buffer overflow attack, a novel feature of this edition.At about scenario 12, things start to heat up and solving the case starts to require some thinking. Harder to crack cases and more sophisticated attackers up the fun level and value of information learned. Just as in the first book, solving the case usually takes some log analysis, some security knowledge and careful reading about character actions and observations. In addition to technology-astute readers, the book will also satisfy the hard-core security policy fans. Some of the questions asked about the cases involve policy decisions.As for the book minor blemishes, it suffers a bit from a "sequel syndrome". Namely, since the first book was so amazingly good, it is very hard to beat it and most people will compare it to the first one. Let's say that "The Challenge 2" is almost as good as its predecessor. A couple of scenarios sound somewhat ridiculous (e.g. one on "wireless terrorists"). Another couple is painfully obvious (few people are impressed by a /bin/sh bound to a port in inetd.conf or by a default router password nowadays). In addition, the scenario names often give out a hint that spoils the fun of "cracking" the story ("Freeloader" and some others).Overall, the book is a must have, both for its educational and entertainment value. The Hacker Challenge books fuse fun storyline, mystery and technical information in one great package, that makes for awesome reading for all technical readers, in security field and beyond. It was clearly a great idea to invent such a "security thriller" book.Anton Chuvakin, Ph.D., GCIA is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org

Always entertaining, always educational

I read and reviewed the original "Hacker's Challenge" in Nov 01, and gave that book four stars. Mike Schiffman and crew have recaptured the magic and published another winner: "Hacker's Challenge 2" (HC2). This is the sort of book that needs to be used when interviewing new hires or promoting technical staff. If the candidate has read the book and knows the answers to the challenges, she at least demonstrates her commitment to learning, as well as an ability to remember what she reads. If she can solve the challenges without having read the book, she shows a higher level of skill. If she has no clue how to respond to the challenges, you can move on to the next candidate. The majority of HC2 involves three subjects. Challenges 1,3,7, and 16 revolve around wireless insecurities. Challenges 2,5,6,15, and 17 discuss network-based attacks. Solving the mysteries of challenges 4,11,12,14,18, and 19 require log analysis. A few other issues are sprinkled through the text: social engineering (ch. 8), host-based digital forensics (ch. 9), a man-in-the-middle attack against SSH (ch. 13), and a crafty buffer overflow tutorial (ch. 10). None of the material struck me as being exceptionally original, although this accurately reflects the sorts of cases handled by most consultants! I was impressed by the level of explanation offered by challenge 17, where vulnerabilities associated with VLAN 1 were exposed. HC2 has a few weaknesses. I was sorry to see Peter Lemonjello fired in challenge 5, but he appeared to strike again in challenge 11. Pages 126-8 featured some of the oddest techno-babble in print, offering obscure references to Rabindranath Tagore and condescending dialogue with a tech support staffer. I've given up on seeing Mike Schiffman correctly abbreviate the Air Force Information Warfare Center as "AFIWC" in his biography. His use of "AFWIC" must refer to the UN's AFrican Women In Crisis program and not the talk he gave to the AFIWC in Apr 99! HC2 is the first must-buy of 2003, but it leaves some room for improvement. Future editions should provide greater details in the solutions, like explanations of the fields in various firewall logs. I'd also like to see the author's names on the challenges, as appeared in the first HC book. The bottom line is that HC2 is a fast read that will entertain, and more importantly, educate.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured