Awesome....Incredibly informative, insightful, as well as a lot of fun to read. Recommended for anyone who values the integrity and security of their network. --Shawn Bracken, Principal Research Engineer, Cenzic, Inc.
Do you have what it takes to keep hackers out of your network? This unique volume tests your computer forensics and response skills with 20 brand-new, real-life security incidents as told by top-tier security experts. In an entertaining and informative style, this book addresses key security topics, including Denial of Service, malicious code, Web application attacks, wireless technologies, insider and outsider attacks, and more. Each challenge unfolds like a chapter from a novel and includes details of the incident--how the break-in was detected, evidence, and background such as log files and network diagrams--and is followed by a series of questions for you to solve. In Part II, youll find a detailed explanation of exactly what was happening in each incident and the answers to the questioned posed in Part I, along with prevention and mitigation techniques.
Excerpt from One Thing Leads to Another:
The Challenge: John is the I.T. Manager for a movie company working on the special effects for a hit film.... But the fan site has just posted an unauthorized clip of one of the most anticipated scenes in the movie.... A postproduction team member put the clip on the server but no one accessed it after that, at least not via FTP.... Then it happened again: more footage was released.... The Web master of the fan site supplied the e-mail address from which he received the files. John checked the ssh logs and the Web server logs.... He found an IP address he had not seen before.... He pinged the IP address then checked his arp table to get the machines MAC address.... He began tracing the cable back to its source: the proxy server, which had not been used in 8 months....
The Solution: After reviewing the log files included in the challenge, propose your assessment: How could the employees have approached the initial investigation differently that may have helped them get to the culprit sooner? What does the lack of evidence in the ftp and ssh logs reveal? Was Johns method of tracking down the proxy server the best method? What is the best solution to solve the vulnerability? Then, turn to the experts answers to find out what really happened.
Contents
Ch. 1: Dont Tell Mom my Software is
Insecure
Ch. 2: The Man with One Red
Antenna
Ch. 3: The Postman Always Sends Extra Long
Filenames
Ch. 4: Clicks
Ch. 5:
Kids
Ch. 6: One Thing Leads to
Another
Ch. 7: When a Stranger
Calls
Ch. 8: The Insider, Part
Deux
Ch. 9: A Long Hard Road out of
Shell
Ch. 10: All you Zombies
Ch.
11: Forced Byzantine Failure
Ch. 12: Off the Beaten
Path
Ch. 13: My Cup Runneth Over
Ch.
14: Freeloader
Ch. 15: Do I know you?
Ch. 16: Tunnel of Love