• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Book Review - HackNotes : Network Security

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> News // Columns // Articles

View previous topic :: View next topic  
Author Message
chris
Forum Fanatic
Forum Fanatic


Joined: 18 Apr 2002
Posts: 16777201
Location: ~/security-forums

Offline

PostPosted: Fri Nov 14, 2003 12:55 am    Post subject: Book Review - HackNotes : Network Security Reply with quote

Hack Notes - Network Security - Portable Reference

Authors: Mike Horton // Clinton Mugge
Publisher: Osborne McGraw-Hill
Book Specifications: Soft Cover, 228 pages
Category:
User Level: Assumes basic understanding of Security
Special Discounted Security Forums Price : 14.99 UK GBP - http://www.mcgraw-hill.co.uk/securityforums
ISBN: 0072227834
Amazon.co.uk: HackNotes : Network Security
Amazon.com: HackNotes : Network Security




Description

"Hacknotes network security portable reference gives step-by-step details of intrusion tactics, tools and techniques used to compromise computer networks. Understand how the attacks work, then learn how to assess and strenghten your systems through a series of tested and trusted anti-hacking methods.

Introduction

There are currently four books in the hack notes series, I choose to review network security first due to an interest in this area and it being more generic rather the other more platform specific titles. This book is purposely kept to an acceptable number of pages and is meant to be a portable reference providing condensed security reference information.

The two main authors work with FoundStone and have worked for various employers including army counterintelligence and Ernst & Young. The contributing authors specialise in different areas including web applications, intrusion detection and network assessment.

Contents

The book has 10 chapters, each ending with a small review. In the centre of the book there is a reference centre section. These contain a range of useful information for quick reference such as networking command line syntax, enumeration tools, UNIX system and network commands, Cisco IOS reference, common exploitable services / ports and a decimal,hex,binary,ascii conversion table.

Chapters


Part I: Network Security Principles and Methodologies

1: Security Principles and Components
2: INFOSEC Risk Assessment and Management

Part II: Hacking Techniques and Defenses

3: Hacking Concepts
4: Reconnaissance
5: Attack, Compromise, and Escalate

Part III: Special Topics

6: Wireless Network Security
7: Web Application Security
8: Common Intruder Tactics
9: Incident Response
10: Security Assessment/Hardening Checklists
Appendix: Web Resources


Style And Detail


A link to an example chapter is provided, chapter 13 covers Wireless Network Security : http://www.hacknotes.com/images/0072227834_ch06.pdf

The book gives both the administrators' perspective and that of the attacker, so although it is written from a preventative viewpoint any budding script kiddies would also find interest in this.

Whilst the first two chapters deal with principles and risk management, the next parts deal with concepts and attacks themselves, with the final chapters covering common methods, response and hardening.

An application enumeration section covers a range of methods using popular tools with full syntax examples. This starts with using nmap and scanline, to find services and fingerprint operating systems. The first actual example is exploiting typical netbios issues using null sessions and then prevention covering registry entries to restrict anonymous access.

The 'attack, compromise and escalate' section then starts with UNIX exploits. Bearing in mind the books small size common exploitable services are listed here with general information on potential methods and insecurities. These are by no means comprehensive lists of how to exploit specific services but more a brief reference to point the user in a direction for more research for common vulnerabilities. Where needed there are useful code snippets such as finding SUID/SGID and leftover core files. Next up is the windows section which is split into 9x/ME and NT/2000, which is dealt with in the same way with syntax and URLs.

The reference centre is next which is mentioned in the contents, and contains 'hacking steps' which are logical lists of methods to try against systems. This ends with a good list of must-have free or low cost tools ranging from network probing and enumerating to lockdown and assessment tools.

There is a brief wireless section (sample) and then a dedicated web application security chapter. This contains lots of useful references which aren't platform specific such as session management, code validation and encryption.

The final sections cover common tactics and hardening lists which are more comprehensive than the initial list of services in the earlier attacks section.

The different approach of the smaller books work well, the small size is quick and easy reading and would appeal both to beginners wanting to learn about hacking & prevention quickly and to people with some experience wanting to explore areas in more detail.


Conclusion

There are currently 4 titles in the hack notes series all from the publisher of hacking exposed. The style is the same as the exposed series and is a 'cut-down' book. I would have liked to have seen more firewalling examples of free software for both linux and windows and maybe some basic cisco access control lists to aid beginners and for quick reference. The other titles focus in on linux, windows and web security.

Security Forums Discount

The publishers Mcgraw Hill have kindly setup a discount section for Security Forums' users. Discounts can be up to 30% off the RRP and postage is free on all orders over 20 in the UK & Central Europe.

http://www.mcgraw-hill.co.uk/securityforums


Rating

Great reference book and well priced 8 / 10



This review is copyright 2003 by the author and Security-Forums.com, and may not be reproduced in any form in any media without the express permission of the author, or Security-Forums Dot Com.
Back to top
View user's profile Send private message AIM Address Yahoo Messenger MSN Messenger
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> News // Columns // Articles All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register