Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Aggressive Network Self-Defense 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently Bought Together
Customers Who Bought This Item Also Bought
Top Customer Reviews
Not being a big fan of most fiction (I tend to prefer history), it's hard to say definitively good or bad things about the quality of the writing. What I can say is that it's infinitely less irritating, and far more realistic, than Neal Stephenson's Cryptonomicon or Gibson's Neuromancer. No over-the-top smearing of adjectives to describe the mundane, and no unrealistic sequences of events. Then again, there's no character development and no real story progression, so it's not great fiction.
As a series of hacker vignettes, the book works just fine, and very well for the purposes at hand. Basically, what the authors want you to get from the book is two-fold: First, they want you to debate the issues around "strike back" attack methodologies. Several of the authors are open advocates of what are legal grey areas and open moral questions in the field of network security. Secondly, they want you to see how it's done, what you do when you actually use a tool to achieve a goal. Most books that do this, like Hacking Exposed, cover far more tools, but they usually do so without showing you each tool's use in a real-world scenario.
I won't bore you with a lengthy, detailed overview of the first part of the book. Like I said, it's a series of part fiction, part tutorial series of short stories.Read more ›
I live in the west. Vigilante's came about because the law enforcement of the time was to weak to handle the problems. I don't know but that this is the situation out on the internet. I understand that CoolWebSearch is written/distributed from Russia. Who is going to go tell them that I don't want their stuff on my machine?
This book presents a series of "fictional" incidents where people being attacked strike back using technological means. Most of the time the police get involved at the end, usually finding the wrong man. None the less, the stories do an excellent job of describing how "aggressive" network defenders might attempt to strike back at attackers. These stories are certainly a more interesting approach than the typical computer manual.
The second part of the manual gets more technical and describes in greater depth the tools and techniques that the defenders in the fictional stories use.
The whole book brings up a series of moral questions. Where do you just build walls and defenses vs. where do you go out and counter-attack the attackers? Where are you counter-attacking illegally, with the potential to get caught yourself? It's quite a book and perhaps a sign of the coming times.
The first eight chapters present creative scenarios where digital strike-back may or may not be justified. Chapter 1 explains how a PDA user retaliates against a miscreant who installs a backdoor on his Pocket PC device. This is a highly technical section where ARM assembly language and virus creation are discussed. In chapter 2 a rogue wireless cafe employee sets up a man-in-the-middle attack to steal customer credit card data. Chapter 3 shows how a game developer retaliates against a software thief. Chapter 4 demonstrates the trouble in which a system administrator can find himself when he installs an unauthorized VPN connection. Chapter 5 -- probably my favorite -- describes hardware and software keyloggers, along with Bluetooth monitoring, to catch a college campus intruder. In chapter 6 two over-zealous administrators decide to patch any machines which attack their honeypots. Chapter 7 is another creative section, where attacker and defender fight for control of a network using unorthodox methods. In chapter 8, a security audit reveals a rogue member who tries to infiltrate a government agency.
I liked all of these chapters. I had a slight problem following the logic in chapter 3, where it was unclear how the intruder compromised sshd to access the victim's system.Read more ›
Most Recent Customer Reviews
I actually read a book titled, "Chained Exploits: Advanced Hacking Attacks From Start to Finish," and could not believe that I've come across such a book. Read morePublished 16 months ago by Aspiring Professional
It is fair to say that most of the current strategies for network defense are passive, in that they involve setting up elaborate security shields to thwart or redirect intruders. Read morePublished on September 17, 2006 by Dr. Lee D. Carlson
The book is riddled with sloppy prose that has not seen the attention of a careful editor. Throughout the book, most figures are annoying. They are screen or window captures. Read morePublished on April 10, 2005 by W Boudville