Automotive Holiday Deals Books Gift Guide Books Gift Guide Shop Men's Athletic Shoes Learn more nav_sap_SWP_6M_fly_beacon Prime Music Sweepstakes egg_2015 All-New Amazon Fire TV Luxury Beauty Gifts for Her Amazon Gift Card Offer cm15 cm15 cm15 $30 Off Amazon Echo $30 Off Fire HD 6 Kindle Cyber Monday Deals Indie for the Holidays in Prime Music Outdoor Deals on Tikes
Hack the Stack and over one million other books are available for Amazon Kindle. Learn more

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network 1st Edition

9 customer reviews
ISBN-13: 978-1597491099
ISBN-10: 1597491098
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$50.66 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$54.95 On clicking this link, a new layer will be open
More Buying Choices
13 New from $38.31 14 Used from $37.30
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Get Up to 80% Back Rent Textbooks
$54.95 FREE Shipping. Only 1 left in stock (more on the way). Ships from and sold by Gift-wrap available.

Frequently Bought Together

  • Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
  • +
  • CISSP: Certified Information Systems Security Professional Study Guide
Total price: $97.99
Buy the selected items together

Special Offers and Product Promotions

  • Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more | Shop now

Editorial Reviews

About the Author

Michael Gregg is the President of Superior Solutions, Inc. and has more than 20 years' experience in the IT field. He holds two associate’s degrees, a bachelor’s degree, and a master’s degree and is certified as CISSP, MCSE, MCT, CTT+, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and TICSA. Michael's primary duty is to serve as project lead for security assessments, helping businesses and state agencies secure their IT resources and assets. Michael has authored four books, including Inside Network Security Assessment, CISSP Prep Questions, CISSP Exam Cram2, and Certified Ethical Hacker Exam Prep2. He has developed four high-level security classes, including Global Knowledge's Advanced Security Boot Camp, Intense School's Professional Hacking Lab Guide, ASPE's Network Security Essentials, and Assessing Network Vulnerabilities. He has written over 50 articles featured in magazines and Web sites, including Certification Magazine, GoCertify, The El Paso Times, and SearchSecurity. Michael is also a faculty member of Villanova University and creator of Villanova's college-level security classes, including Essentials of IS Security, Mastering IS Security, and Advanced Security Management. He also serves as a site expert for four TechTarget sites, including SearchNetworking, SearchSecurity, SearchMobileNetworking, and SearchSmallBiz. He is a member of the TechTarget Editorial Board.

Stephen Watkins (CISSP) is an Information Security Professional with more than 10 years of relevant technology experience, devoting eight of these years to the security field. He currently serves as Information Assurance Analyst at Regent University in southeastern Virginia. Before coming to Regent, he led a team of security professionals, providing in-depth analysis for a global-scale government network. Over the last eight years, he has cultivated his expertise with regard to perimeter security and multilevel security architecture. His Check Point experience dates back to 1998 with FireWall-1 version 3.0b. He earned his B.S. in Computer Science from Old Dominion University and his M.S. in Computer Science, with Concentration in InfoSec, from James Madison University.

George Mays (CISSP, CCNA, A+, Network+, Security+, INet+) is an independent consultant with 35 years' experience in computing, data communications, and network security. He holds a B.S. in Systems Analysis. He is a member of the IEEE, CompTIA, and Internet Society.

Chris Ries is a Security Research Engineer for VigilantMinds Inc., a managed security services provider and professional consulting organization based in Pittsburgh. His research focuses on the discovery, exploitation, and remediation of software vulnerabilities, analysis of malicious code, and evaluation of security software. Chris has published a number of advisories and technical white papers based on his research and has contributed to several books on information security. Chris holds a bachelor’s degree in Computer Science with a Mathematics Minor from Colby College, where he completed research involving automated malicious code detection. Chris has also worked as an analyst at the National Cyber-Forensics & Training Alliance (NCFTA), where he conducted technical research to support law enforcement.

Ronald M. Bandes (CISSP, CCNA, MCSE, Security+) is an independent security consultant. Before becoming an independent consultant, he performed security duties for Fortune 100 companies such as JP Morgan, Dun and Bradstreet, and EDS. Ron holds a B.A. in Computer Science.

Brandon Franklin (GCIA, MCSA, Security+) is a network administrator with KIT Solutions, Inc. KIT (Knowledge Based Inormation Technology) Solutions, Inc. creates intelligent systems for the health and human services industry that monitor and measure impact and performance outcomes and provide knowledge for improved decision making. A KIT system enables policy makers, government agencies, private foundations, researchers, and field practitioners to implement best practices and science-based programs, demonstrate impacts, and continuously improve outcomes. Brandon formerly served as the Team Lead of Intrusion Analysis at VigilantMinds Inc., a Pittsburgh-based managed security services provider.

Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Product Details

  • Paperback: 481 pages
  • Publisher: Syngress; 1 edition (December 27, 2006)
  • Language: English
  • ISBN-10: 1597491098
  • ISBN-13: 978-1597491099
  • Product Dimensions: 7.1 x 1.4 x 8.9 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 3.7 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #1,952,731 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

31 of 34 people found the following review helpful By Richard Bejtlich on November 5, 2006
Format: Paperback
I teach a course called "TCP/IP Weapons School" that involves walking students up the OSI model. We look at network traces generated by tools and techniques to defeat security measures. When I saw "Hack the Stack" (HTS) I thought it might make a good resource for my class, since HTS seemed to advocate a similar approach. Unfortunately, technical errors, shoddy production, internal repetition and poor organization, and a lack of original material make me question the value of HTS.

A critical aspect of a security book is technical accuracy, but HTS does not deliver. In some cases the book is half-right, or it omits important elements. For example, p 9 implies only port 20 TCP is used for TCP data; that's true for the server in active FTP, but passive FTP uses arbitrary ports. p 15 says SOCKS is "Windows Sockets," when SOCKS is a proxy protocol. p 71 says CSMA/CA (wireless) is similar to CSMA/CD (traditional Ethernet), but the two protocols are very different; CSMA/CA is much more complex. p 115 should say IP proto 41 is "IPv6 in IPv4", and not imply that IP proto 41 is somehow "IPv6". p 118 says "ICMP messages cannot be sent in response to other ICMP messages." That's not true; otherwise, ICMP echo would not be able to elicit an ICMP echo reply. (The authors meant ICMP error messages cannot elicit ICMP errors.)

Several times the book makes odd statements. p 14 says the first virus concept appeared in 1984, but non-PC viruses existed in the 1970s and the first PC virus (Elk Cloner) was in the wild in 1982. p 3 says "IDS has a short history" by citing Dorothy Denning's work in 1983, but ignores James Anderson's 1980 work for the Air Force as the first real IDS pioneer.
Read more ›
2 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 3 people found the following review helpful By Psygnosis1 on February 9, 2007
Format: Paperback
Hack the Stack is a Syngress title that primarily focuses on security topics layer by layer. The book takes a concept most people know, the OSI model, and uses that approach to discuss security exploits, vulnerabilities, and defenses. I liked the concept and the manner in which the material was presented. The books takes the 7 layer model and adds one more for people, this made sense to me.

The book starts out with the physical layer and continues up through each layer. The final chapter is a kind of checklist that reviews the material covered in the other chapters. Each chapter provides a hands-on security project. The ones on Snort and Bluetooth were my favorites. The book uses a number of Open Source or free tools like Snort and Wireshark to explain concepts I often wondered about. The authors seem to know the material but as others have said I wish they would have provided more resources and a glossary. With that in mind I rated this book four stars.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
4 of 5 people found the following review helpful By Chris Miller VINE VOICE on December 12, 2006
Format: Paperback
I anticipated the book going more in depth in certain areas, but the overview it provided for each section was a great starter. I do agree with another reviewer that stated it was missing references to certain website links or direction to where to gather more information. This was a downside, mainly in dealing with large technical references such as this book. An index or glossary, noting the pages used and full definitions would have gone a long way.

I did like some of the directions on testing and building of products, scripts or other methods to verify your own environment however. I do realize you can only fit so much detail, but some definition areas needed more explanation that a simple paragraph. I would have looked to eliminate those and expand on others to give the feeling of deeper information.

Now saying all that, I appreciated the adding of the 8th layer that is not mentioned anywhere else. The reading was fairly straightforward and simple for the intermediate level technical administrator. Some of the references are not for the basic entry level, as it jumps right into topics that assume basic knowledge of networks, protocols and even mail and messaging.

I shared this with some staff in the office for reading of particular areas and will be keeping it on the bookshelf (which means it is a keeper)
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful By JTS on April 6, 2010
Format: Paperback Verified Purchase
I've read other reviews saying the book isn't perfect, however I do like the approach through the OSI Model etc which makes the book worth it and something which has become a permanent part of my skill set/approach. A good value.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
(I received a free copy of the book from the Author in exchange for an honest review)

I'm an audit professional and while networking is not my field of expertise, I needed to study it for a professional examination I was appearing for.

It was then that this book helped me a lot. When you read the book you can actually appreciate what goes behind that laptop you type on and those chats you have across time and space and what happens when you send an email. Which is essential knowledge when you consider how unsecure networks are and the vulnerability to hacking from viral and rogue parties.

Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure. Through this book, though I may not have understood the specifics enough to be an expert, I've become more aware of the attendant risks of being snooped at and having systems hacked. I have recommended this book to others who I am sure will make use of the knowledge to make their Company's network more secure.

The knowledge given here was not too much in detail which was good considering I am not someone from the field. I am planning to start an e-commerce business website soon and this book gave me some tips I will need to consider when I finally get down to that.

This was a helpful book to me.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
This item: Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
Price: $54.95
Ships from and sold by

Want to discover more products? Check out these pages to see more: ebay books, computer security