Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.
"synopsis" may belong to another edition of this title.
The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.
Exerpt from "Big Bait, Big Phish"
The Challenge: "Could you find out what's going on with the gobi web server? Customer order e-mails aren't being sent out, and the thing's chugging under a big load..." Rob e-mailed the development team reminding them not to send marketing e-mails from the gobi web server.... "Customer service is worried about some issue with tons of disputed false orders...." Rob noticed a suspicious pattern with the "false" orders: they were all being delivered to the same P.O. box...He decided to investigate the access logs. An external JavaScript file being referenced seemed especially strange, so he tested to see if he could access it himself.... The attacker was manipulating the link parameter of the login.pl application. Rob needed to see the server side script that generated the login.pl page to determine the purpose....
The Solution: After reviewing the log files included in the challenge, propose your assessment: What is the significance of the attacker's JavaScript file? What was an early clue that Rob missed that might have alerted him to something being amiss? What are some different ways the attacker could have delivered the payload? Who is this attack ultimately targeted against? Then, turn to the experts' answers to find out what really happened.
"About this title" may belong to another edition of this title.
Shipping:
£ 3.24
Within U.S.A.
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0072263040
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard0072263040
Book Description Condition: new. Seller Inventory # FrontCover0072263040
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0072263040
Book Description Condition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!. Seller Inventory # OTF-Y-9780072263046
Book Description Paperback or Softback. Condition: New. Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions 1.47. Book. Seller Inventory # BBS-9780072263046
Book Description Condition: New. Seller Inventory # ABLIING23Feb2215580015294
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 1.54. Seller Inventory # Q-0072263040
Book Description Condition: New. Book is in NEW condition. Seller Inventory # 0072263040-2-1
Book Description Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Seller Inventory # C9780072263046