• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Book Review - Hacking Exposed 4th Edition

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Goto page 1, 2  Next
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> News // Columns // Articles

View previous topic :: View next topic  
Author Message
ShaolinTiger
Forum Fanatic
Forum Fanatic


Joined: 18 Apr 2002
Posts: 16777215
Location: Kuala Lumpur, Malaysia

Offline

PostPosted: Tue Jun 24, 2003 11:13 pm    Post subject: Book Review - Hacking Exposed 4th Edition Reply with quote

Hacking Exposed: Network Security Secrets and Solutions, 4th edition

Author(s): Stuart McClure, Joel Scambray and George Kurtz
Website: http://www.hackingexposed.com/
Publisher: Osborne McGraw-Hill
Book Specifications:Soft-Cover, 737 Pages with DVD
Category: Real Life Hacking
User Level: Familiarity with basic networking, TCP/IP, ports and services.
Suggested Publisher Price: $49.99 USA/ $74.95 CAN/ £36.99 Net UK (inc of VAT)
ISBN: 0-07-222742-7
Amazon.co.uk: Hacking Exposed 4th Edition
Amazon.com: Hacking Exposed 4th Edition
Special Discounted Security Forums Price : £27.74 UK GBP - http://www.mcgraw-hill.co.uk/securityforums



Info from Back: "The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or network to secure - Bill Machrone"

Introduction

For those not familiar with the Hacking Exposed series of books, they are not for the networking/security newcomer and delve into the depths of reality hacking, tools and techniques that are actually used in the field.

They show what is used, how to use it and how to effectively protect against it.

These books are a must for any penetration tester, security admin or general network/system admin that has to deal with security.

Until you really know what is out there and understand it, you can't hope to defend against it.

The guts of the books stay the same, operating systems, networking, switches/routers etc with the addition of a Wireless section and and expansion of other sections that have become more relevant.

Details of updated material
  • The latest 802.11 Wireless networking security attacks and countermeasures
  • Fully up-to-date information on the latest Windows, UNIX, Linux, and NetWare hacks and countermeasures in the tried-and-true Hacking Exposed format
  • New techniques used by today's hacker to pinpoint potential targets ping sweep tools, TCP/UDP scans, traceroutes, whois queries, and zone transfer downloads
  • Significantly revised chapters on analog dial-up and Web attacks
  • Brand-new coverage of Windows XP, Windows.NET Sever (code named Whistler), and IIS 5 vulnerabilities like Code Red
  • New UNIX material including the latest Format String vulnerabilities
  • The latest remote control vulnerabilities in VNC and Terminal Server
  • New strategies for preventing untrusted access to SNMP, Active Directory, and NetBIOS/SMB services using IPSec filters, firewalls, and TCP/IP Security
  • The most recent techniques for securing and managing Microsoft SQL Server and Internet Clients in networked environments

Contents

The main sections in this book are as follows:

Casing the Establishment
  • Footprinting
  • Scanning
  • Enumeration

System Hacking
  • Hacking Windows 95/98 and ME
  • Hacking the Windows NT Family
  • Novell NetWare Hacking
  • Hacking UNIX

Network Hacking
  • Dial-up, PBX, Voicemail and VPN Hacking
  • Network Devices
  • Wireless Hacking
  • Firewalls
  • Denial of Services (DoS) Attacks

Software Hacking
  • Remote Control Insecurities
  • Advanced Techniques
  • Web Hacking
  • Hacking the Internet User
Each section is very detailed, including details of tools and how to use them, situations in which they would be used, for what purpose they were created and how to protect against them.

The books runs in a logical order, showing the first steps taken by a possible intruder, information gathering, network enumeration, DNS interrogation etc.

Then scanning for for open ports, active and passive stack scanning for OS identification and finally enumeration, banner grabbing, service identification etc.

After this is a break down of each OS and it's commonly exploited weaknesses, included in each section are the tools used to accomplish these exploits.

Such things as NetBIOS, SMB, IIS, Privelege Escalation, IPSec, .NET, EFS, Rootkits and more are covered in quite a bit of detail.

After this it moves onto Networking covering War-Dialing, OSI hacking, Wireless Hacking (sniffing, MAC spoofing etc.) then firewalls (ID, packet filtering, proxies and wingate) and finally DoS attacks (bandwidth consumption, resource starvation, routing and DNS etc.)

All in all it covers pretty much everything that goes in some part.

Style and Detail

The book is written in a fairly casual style which suites the subject matter. It is detailed and dives right into it, I would recommend at least a passing knowledge of TCP/IP, networking and general security before attempting to read this as it is fairly in depth. Even though things are explained well and in simple terms, if it's a totally new area to you, you will get lost.

If you are acquainted with the above things then this is a must have book, it will open your eyes to many things that you probably didn't even know went on or were possible.

This books covers the reality of security on the Internet, the tools and techniques that are really used in the intrusions that happen every day.

There are a variety of real life case studies through out the book outlining real situations and applications.

Every exploit or vulnerability has a small box which shows:
  • Popularity
  • Simplicity
  • Impact
  • Risk Rating

This would be very useful for people unfamiliar with what goes on in the wild outback of the Internet.

Countermeasures are explained well with enough detail to practically apply them.

The book comes with a DVD-ROM containing key security tools ready to install on your computer, links to the security tools covered in the book, a password database and security presentation video.

Conclusion

Overall an excellent book, well written, easy to understand (if you have a technical background) and packed full of information.

It's not hugely different from the 3rd edition, but I'd say if you have the 1st edition and possibly the 2nd it's worth a look as a lot of things have changed.

It's gets an SFDC 8/10 from me, recommended.



Security Forums Discount

The publishers Mcgraw Hill have kindly setup a discount section for Security Forums' users. Discounts can be up to 30% off the RRP and postage is free on all orders over £20 in the UK & Central Europe.

http://www.mcgraw-hill.co.uk/securityforums

Keywords for this post: Hacking Exposed Linux Windows Networking Wireless Foundstone Book Review 4th Edition Fourth Ed 4E HE


Last edited by ShaolinTiger on Thu Apr 08, 2004 10:54 am; edited 9 times in total
Back to top
View user's profile Send private message Visit poster's website
flw
Forum Fanatic
Forum Fanatic


Joined: 27 May 2002
Posts: 16777215
Location: U.S.A.

Offline

PostPosted: Wed Jun 25, 2003 12:21 am    Post subject: Reply with quote

I've read the second edtion some time ago and finished the fourth about a month ago. I would agree with ST on all his points. If you have the third edition you can hold off. If you have the first or second take a look at your local book store for yourself.

This is a learning and a reference book in one. As mentioned you'll need a working knowledge of tcp/ip and networking in general to get the wealth of knowledge that is provided.

The only down side that I saw is that the wireless standard 801.11g draft was out prior to printing. So I felt they could have at least commented on the draft version. The same for 802.11i draft standard. I felt this was important because wireless will only grow and so will the crowd to hack it.
Back to top
View user's profile Send private message Visit poster's website
alt.don
SF Boss
SF Boss


Joined: 04 Mar 2003
Posts: 16777079


Offline

PostPosted: Wed Jun 25, 2003 12:49 am    Post subject: Reply with quote

On the strength of your review alone I will purchase a copy. I have been meaning to just have not had the time to read some reviews of it. Sides my copy of the original is woefully out of date.
Back to top
View user's profile Send private message Visit poster's website
Sgt_B
Trusted SF Member
Trusted SF Member


Joined: 28 Oct 2002
Posts: 16777215
Location: Chicago, IL US

Offline

PostPosted: Wed Jun 25, 2003 3:40 am    Post subject: Reply with quote

Well, just checked my wallet, and it looks like I have $50+ dollars to spend. I'll be buying this book. Thanks for the great review, and hopefully this will give me a better understanding on network security (and a better chance to land a security job!)
Thanks ST!
Back to top
View user's profile Send private message Visit poster's website
TaloneR
Just Arrived
Just Arrived


Joined: 16 Apr 2003
Posts: 2


Offline

PostPosted: Wed Jun 25, 2003 10:14 am    Post subject: Reply with quote

i have the third edition and i love it. I guess the way ST have outlined it, it's the same style as 3rd one. I hope they have included some detailed exploit code and emphesized on VPN hacking. I was disappointed in VPN section and 802.11b section. otehr than that the book is a treasure of information and a must have. As for cd material.. i guess they have a list published somewhere with all tools and code included in the dvd as well as link to all the code and tools used in the books as well as addtional reference material.
Back to top
View user's profile Send private message AIM Address MSN Messenger
Bart Decker
Just Arrived
Just Arrived


Joined: 21 Apr 2003
Posts: 7


Offline

PostPosted: Wed Jun 25, 2003 10:56 am    Post subject: Reply with quote

Would be bad for me to buy at the moment . Had a account block at my internet provider . Don't know if they got a mail from a certain company or that they are logging suspicious activity at their servers .

So probably i have to look out for a new isp ...Sad
Back to top
View user's profile Send private message Send e-mail Visit poster's website
tutaepaki
Trusted SF Member
Trusted SF Member


Joined: 02 May 2002
Posts: 3
Location: New Zealand

Offline

PostPosted: Thu Jun 26, 2003 12:37 am    Post subject: Reply with quote

This review inspired to to go out and buy HE 4 yesterday. I've had HE 2, (or maybe even 1) but lent it to some-one, and never saw it again Sad

Have to say, so far I'm impressed, I enjoyed the one I had, and 4 is just as good. Seems to be one of the few security books which is easy to read, cover to cover.

There seems to be quite a bit of new and updated stuff from the one I had.
Back to top
View user's profile Send private message
Sgt_B
Trusted SF Member
Trusted SF Member


Joined: 28 Oct 2002
Posts: 16777215
Location: Chicago, IL US

Offline

PostPosted: Fri Jun 27, 2003 3:40 am    Post subject: Reply with quote

Any comments on the other books that HE4 mentions? Such as 'Hacking Windows 2000' or 'Hacking Web Applications'?
I'm looking at this from the standpoint of building my skills as a penetration tester.
Are those worth the effort?
Back to top
View user's profile Send private message Visit poster's website
PhiBer
SF Mod
SF Mod


Joined: 11 Mar 2003
Posts: 20
Location: Your MBR

Offline

PostPosted: Fri Jun 27, 2003 4:55 am    Post subject: Reply with quote

I have the 3rd edition, havent finished reading it, but i like what i've read so far!!! Definantley recommend!!!
Back to top
View user's profile Send private message
Eddy
Just Arrived
Just Arrived


Joined: 30 Jun 2003
Posts: 1
Location: Edinburgh, UK

Offline

PostPosted: Mon Jun 30, 2003 8:58 pm    Post subject: Reply with quote

I have both the 2nd edition of the master book (Hacking Exposed) and the second edition of the Linux book (Hacking Linux Exposed) and would highly recommend them to anyone who even thinks about setting up a network environment.
They contain much of the high level information that you need in order to properly secure a network, and have enough of a blackhat hint to them to keep them as an interesting read. Definitely a good overview of a lot of topics, but nobody should fall into the trap of thinking that this book is the beginning and end of computer infosec.

There is no substitute for a low level knowledge of the platforms you work with.
Back to top
View user's profile Send private message Visit poster's website AIM Address MSN Messenger
bluwulf
Just Arrived
Just Arrived


Joined: 24 Jun 2003
Posts: 3


Offline

PostPosted: Fri Sep 05, 2003 10:09 pm    Post subject: Reply with quote

By any chance is there a free version of this book or any like it ?
Back to top
View user's profile Send private message
liquidism
Just Arrived
Just Arrived


Joined: 18 Mar 2003
Posts: 2


Offline

PostPosted: Fri Sep 05, 2003 11:10 pm    Post subject: Reply with quote

bluwulf wrote:
By any chance is there a free version of this book or any like it ?

Nope ull have to buy it...but its worth all of your money.
Back to top
View user's profile Send private message Send e-mail AIM Address
bluwulf
Just Arrived
Just Arrived


Joined: 24 Jun 2003
Posts: 3


Offline

PostPosted: Fri Sep 05, 2003 11:56 pm    Post subject: Reply with quote

Well judging from the reviews I'm sure it's well worth it ! Thanx anyway.

Last edited by bluwulf on Sat Sep 06, 2003 12:33 am; edited 2 times in total
Back to top
View user's profile Send private message
squidly
Trusted SF Member
Trusted SF Member


Joined: 07 Oct 2002
Posts: 16777215
Location: Umm.. I dont know.. somewhere

Offline

PostPosted: Sat Sep 06, 2003 12:02 am    Post subject: Reply with quote

bluwulf wrote:
Well judging from the reviews I'm sure worth all my your money ! Thanx anyway.


Actually I think it is worth you money. If you dont want to buy the book then I recomend you look at your local public Library. They usualy will loan out books for 2-3 weeks. That is what I do when I dont have the money for the book but I still want to read it.

There are many perfectly legal ways to get a free copy of the book, even if its just for a short amount of time. The writers spend a LOT of time writing, proof reading, verifying and getting the book printed. I really think that you need (read must) support the hard work and effort the author puts in.
Back to top
View user's profile Send private message Visit poster's website AIM Address Yahoo Messenger
chris
Forum Fanatic
Forum Fanatic


Joined: 18 Apr 2002
Posts: 16777201
Location: ~/security-forums

Offline

PostPosted: Sat Sep 06, 2003 12:21 am    Post subject: Reply with quote

We will shortly be offering this book at discounted rates as the publisher has kindly setup a special section dedicated to us

It will be cheaper than amazon and free p&p to most of europe

If you are considering buying this book or any of the 'hack notes' series please hold up as the discounts will be upto 25%
Back to top
View user's profile Send private message AIM Address Yahoo Messenger MSN Messenger
squidly
Trusted SF Member
Trusted SF Member


Joined: 07 Oct 2002
Posts: 16777215
Location: Umm.. I dont know.. somewhere

Offline

PostPosted: Sat Sep 06, 2003 12:39 am    Post subject: Reply with quote

That sounds very very cool.. I would love to be able to have a nice discount for good books!
Back to top
View user's profile Send private message Visit poster's website AIM Address Yahoo Messenger
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> News // Columns // Articles All times are GMT + 2 Hours
Goto page 1, 2  Next
Page 1 of 2


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register