From the Publisher
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
╖ Analyze the Technical, Legal, and Financial Ramifications of Revolutionary and
Controversial Network Strike-Back and Active Defense Techniques
╖ Follow the Travails of Eight System Administrators Who Take Cyber Law into
Their Own Hands
╖ See Chillingly Realistic Examples of Everything from a PDA to the MD5 Hash
Being Used as Weapons in Cyber Dogfights
There is a certain satisfaction for me in seeing this book published. When I
presented my "strike-back" concept to the security community years ago, I was
surprised by the ensuing criticism from my peers. I thought they would support
our right to defend ourselves, and that the real challenge would be educating
the general public. It was the other way around, however. This is why I?m happy
to see Aggressive Network Self-Defense published. It shows that people are
beginning to consider the reality of today?s Internet. Many issues are not black
and white, right or wrong, legal or illegal. Some of the strike-back approaches
in this book I support. Others, I outright disagree with. But that?s good?it
gives us the chance to truly think about each situation?and thinking is the most
important part of the security business. Now is the time to analyze the
technologies and consider the stories presented in this book before fiction
becomes reality.?Timothy M. Mullen, CIO and Chief Software Architect for
AnchorIS.Com
╖ When the Worm Turns...
Analyze the technical and legal implications of "neutralizing" machines that
propagate malicious worms across the Internet.
╖ Are You the Hunter or the Hunted?
Discover for yourself how easy it is to cross the line from defender to
aggressor, and understand the potential consequences.
╖ Reverse Engineer Working Trojans, Viruses, and Keyloggers
Perform forensic analysis of malicious code attacking a Pocket PC to track down,
identify, and strike back against the attacker.
╖ To Catch a Thief...
Track stolen software as it propagates through peer-to-peer networks and learn
to bypass MD5 checksum verification to allow multiple generations of attackers
to be traced.
╖ Learn the Definition of "Hostile Corporate Takeover" in Cyberspace
Find out who will own the fictional Primulus Corporation as attacker and
defender wage war.
╖ Understand the Active Defense Algorithm Model (ADAM)
Analyze the primary considerations of implementing an active defense strategy in
your organization: ethical, legal, unintended consequences, and risk validation.
╖ See What Can Happen when the Virtual World Meets the Real World
Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover
if your cubicle mate has been stealing more than post-it notes.
╖ Where the Wild Things Are...
Follow along as a real-life "in-the-wild" format string bug is morphed into
strike-back code that launches a listening shell on the attacker's own machine.
╖ Implement Passive Strike-Back Technologies
Learn the strategy and implement the tools for responding to footprinting,
network reconnaissance, vulnerability scanning, and exploit code.
Your Solutions Membership Gives You Access to:
A comprehensive FAQ page that consolidates all of the key points of this book
into an easy-to-search Web page
"From the Author" Forum where the authors post timely updates and links to
related sites
The complete code listings from the book
Downloadable chapters from these best-selling books:
Black Hat Physical Device Security
Google Hacking for Penetration Testers
Buffer Overflow Attacks: Detect, Exploit, Prevent
Hacking a Terror Network: The Silent Threat of Covert Channels
Table of Contents
Part I Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge
Chapter 1 PDA Perils: Revenge from the Palm of Your Hand
Chapter 2 The Case of a WLAN Attacker: In the Booth
Chapter 3 MD5: Exploiting the Generous
Chapter 4 A VPN Victim?s Story: Jack?s Smirking Revenge
Chapter 5 Network Protection: Cyber-Attacks Meet Physical Response
Chapter 6 Network Insecurity: Taking Patch Management to the Masses
Chapter 7 The Fight for the Primulus Network: Yaseen vs Nathan
Chapter 8 Undermining the Network: A Breach of Trust
Part II The Technologies and Concepts Behind Network Strike Back
Chapter 9 ADAM: Active Defense Algorithm and Model
Chapter 10 Defending Your Right to Defend
Chapter 11 MD5 to Be Considered Harmful Someday
Chapter 12 When the Tables Turn: Passive Strike-Back 339
Product Details
* ISBN: 1931836205
* ISBN-13: 9781931836203