Skip to content
Scan a barcode
Scan
Paperback Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community Book

ISBN: 0201746131

ISBN13: 9780201746136

Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$9.79
Save $30.20!
List Price $39.99
Almost Gone, Only 2 Left!

Book Overview

Honeynets (also called honeypots) are a new tool in computer security for luring and containing a hacker. Like a surveillance camera, the honeypot allows you to observe hacker behaviour and captures... This description may be from another edition of this product.

Customer Reviews

5 ratings

Very good book!

One of most exciting areas to emerge in information security has been in the area of honeynets. These are networks designed to be compromised and capture all of the tools and activity of attackersThe Honeynet Project is a volunteer organization dedicated to researching and learning cyber-threats, and sharing our lessons learned. The project is made up of 30 security professionals around the world. They learn about cyber-threats by deploying networks around the world to be compromised. Once compromised, they capture all of the attacker's tools and activity, analyze, and learn from that. The value to this research is there is very little theory involved, they are capturing and seeing what is happening in the Internet today.Very neat!A honeynet is the primary tool used to capture attacker's activity. It is a type of honeypot, specifically a high-interaction honeypot. As a honeypot, honeynets work on the concept that they should not see any activity, no one has authorization to interact with them. As a result, any inbound or outbound connections to the honeynet is most likely unauthorized activity. This simple concept makes it highly effective in detecting and capturing both known and unknown activity. Honeynets work as a highly controlled network made up of real systems and applications for attackers to probe and compromise.The book is about honeynets, how to use them, and what you can learn. The book is broken into three parts. The first part is focused on what honeynets are, how they work, the different types, and technical details on how you can deploy them safely. The second part focuses on how to analyze all the different data a honeynet can collect (network and host based forensics, reverse engineering, centralized data correlation, etc). The third part is specific examples of several honeynets being hacked, including Win2000, Linux, and Solaris. What makes the book so interesting is it ties all these different elements together. You can learn more at http://www.honeynet.org/book/The book was not written by a single individual, but by leading experts in their field. They attempted to combine the best experiences and skills from some of the leading individuals. The book was organized by the Honeynet Project, but the contributing authors include members of the Honeynet Research Alliance, individuals from the Department of Justice, and others who have helped us in the past and wanted to contribute. Some examples of authors include Honeynet Project members Brian Carrier who wrote several chapters and Max Kilger who wrote about profiling. Honeynet Research Alliance members include the work of the Greek Honeynet Project writing about hacked Linux systems, and the Mexican Honeynet Project writing about hacked Solaris systems. They also had outside experts help out, including Richard Salgado of the DoJ author about legal issues, and Dion Mendel from Australia write about Reverse Engineering.-- To defend against your threats, you h

An informative look at how the "bad guys" operate

"Know Your Enemy" begins with this simple yet striking observation: no military would plan to fight a battle without trying to learn as much as possible about the enemy -- their capabilities, their equipment, normal patterns of observation, and so on. But these rudiments of "tactical intelligence" have long been neglected in computer security. This book describes the Honeynet project (www.honeynet.org), a group that sets up so-called "honeypot" systems in order to observe (and learn about) the people who then try to attack them.One fact that is especially striking, and more than a little frightening, is the short amount of time that elapses between new systems being connected to the Internet and the first attempts to break into them. The author tells of one system that got hit within 15 minutes of plugging it in!The book is divided into three parts: how to set up a honeynet, how to analyze the collected data, and what the author has learned about "the enemy" in doing so.The first part will be most interesting to those strange folks like me who, at one point or another, have set up "tripwires" on their systems to see who might be jiggling the doorknobs. The thought process involved in setting up a honeypot system, however, is more generally useful, because it helps to train the mind to think about secure vs. insecure systems and trust in general. Students of system and/or network administration should find this helpful, even if they never set up a honeypot themselves.But it's also more generally useful for forensic analysis after a security incident.Finally, there's part three, the discussion of what has been learned about the "black hat" community. This I found to be both the most interesting and the most frustrating part of the book. In particular, chapter 11 ("In Their Own Words") is at the same time a strong and weak point. This chapter consists mainly of a collection of intercepted chat logs between intruders, with some commentary and analysis interspersed. My concerns with this chapter are, first, it is rather long (over 100 pages); and second, the actual analysis is fairly limited, though having an actual psychologist in on the honeynet team does add an interesting touch. Overall, this is an extremely valuable book for those with responsiblity for (and/or interest in) computer security. Taking into account my complaints about chapter 11, I give the book 4.5 stars, rounded up to 5.

Lance Spitzner "Know Your Enemy"

"Know Your Enemy" from the Honeynet Project... team (led by Lance Spitzner) is an amazing account on adventures in computersecurity. This superb book provides the summary of two years of the projectoperation. Aimed to gather and analyze more information about malicioushackers, the project provided security community with unique insights intoattacks, tricks, and even personalities of hackers. The network (now acombination of networks in several places worldwide) was deployed for thesingle purpose of being penetrated by remote attackers (or blackhats, asthey are called in the book). Their actions were then recorded, studied andpresented in this book and papers on the project web site.... Real production systems (Linux, UNIX,Windows) were deployed within the Honeynet.Leveraging his military background, Lance Spitzner explains why it iscrucial to get first hand information on computer underground operations."Information is power" and in computer security there is a serious lack ofinformation about the adversaries. Most of the available information comesas 'too little, too late' such as for a company that gets first-handknowledge of hackers right after seeing "u r 0wned" on their web site. Andeven in this case other companies cannot learn from mistakes, since thebreak-in will be kept as secret as possible.The typical Honeynet break-in produces the following information. Whatreconnaissance activity was performed by an attacker before the intrusion?Which network service was exploited? What exact exploit string or bufferoverflow was used? What attacked did after getting access to the system? Howhe or she retained access to the system? How did he or she use the system?The answers are in the book!In some of the attacks, the logs of IRC (Internet Relay Chat) conversationsbetween hackers were recorded. They reveal not only the technology, but alsosome of the motivations of intruders. Some stories from the book border onimpossible, such as the case where the streaming video sent by hackers wascaptured by the Honeynet team.The book also provides full details on designing, building andmaintaining the honeynet, including the risks of running a honeynet. Tobe more precise, they describe a Generation I honeynet, since now theproject has moved to more sophisticated security technology. Theproject uses stringent standards for data control (preventing attackerfrom causing trouble to third parties), data collection (recordingeverything that happens on the network) and data collection(aggregating attack data from several honeynets).Overall, as Bruce Schneier said in the book's foreword: "Great stuff,and it 's all real"Anton Chuvakin, Ph.D. is a Senior Security Analyst with a majorinformation security company.

An extremely important security book & a fascinating read

Many an author has written about hackers and computer criminals, but more often it's not from first-hand knowledge. Know Your Enemy is unique is that it is written in the first person. The book is a chronicle of The Honeynet Project; which is a group of security professionals dedicated to learning the tools, tactics and motives of hackers in order to share what they have learned from those encounters. The group was formed due to the every growing complexity of today's networks, and that no single individual has the complete set of skills necessary to understand the forensics behind computer attacks.The book centers around honey pots and honey network that the Honeynet Project designed. A honey pot is a computer designed to look like something that an intruder can hack into. One example of a honey pot is to install a machine on a network with no particular purpose other than to log all attempted accesses to it. Similarly, a honeynet is a network designed to be compromised. The function of the honeynet is that when attackers probe, attack and attempt to hack a system, the administrators of the honeynet are able to observe all of their activities, and use that knowledge to design stronger systems. By building such a network and understanding the scope attacks against it, one can understand their adversary, and can better protect their corporate information systems assets.The book is divided into three parts. The first part shows how the group planned and built the Honeynet. The second part goes into an in-depth analysis of the logs gathered during attacks. While part 3 looks at the threats, motives and tools that the enemy employs in their attacks.The book is written by technical experts, but in a language that doesn't require a strong technical background. The book effectively shows how a hacker thinks and operates. Most often than not, the hacker simply bypasses the normal security mechanism in place. Know Your Enemy takes all of the lessons learned from hundreds of attacks against the honeynet and shows how to better design systems that is resilient against attack. Know Your Enemy is not only an extremely important security book, it is a fascinating read. For any security practitioner wants to truly understand the risks their networks face on a daily basis, Know Your Enemy is a must read.

Fascinating and intelligent. Everyone should read this book.

Nothing could stop me from writing a review about "Know Your Enemy" and I'll tell you why: It's no secret, most of us can't turn on a television or a radio these days without hearing the United States needs better intelligence, better tools and methods for spying on enemies so America can prepare for attacks before they strike. Well, the same holds true in the information age. More intelligence must be built around network security and computer systems. Lance Spitzner's new book, "Know Your Enemy" shows us how. When I started reading this book, I couldn't believe what I was hearing. A network of computers called a honeynet, designed as an everyday corporate network used to capture, analyze and control the flow of data in and out of the network for studying the motives, tactics, and tools of the blackhat community? Wow!! "Know Your Enemy" walks us through building and managing our own honeynet's. A CD-ROM comes with the book with tools to get us started. I speak from experience when I tell you this book helped me during my honeynet build. It showed me ways to capture critical information, log that information, and alert me via pager and e-mail in real time. The book talks about methods used for capturing keystrokes, advanced data analysis, and ways by which to capture and control the data. There are chock full of real world scenario's directed at dealing with worms. As we read through the book we get the chance to view how systems are exploited and what made them vulnerable. Lance Spitzner takes us step-by-step through real world attacks initiated by real blackhats and crackers. Reading this book is like reading someone's diary from the beginning only the information is freely shared and extremely valuable. "Know Your Enemy" took me down the path I needed to go. It will take you to the next level of security everyone might want to strongly consider. One, that's more analytical and intelligent, one that teaches us to be more proactive. My favorite chapter in this book was "In Their Own Words". That chapter was over 100 pages of captured keystrokes between the blackhats that took over the honeynet and...well...you should get the book and read it for yourself. It's a trip.Richard La Bella, MCSE, CCSE, CCNA
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured