I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
Analyze the Technical, Legal, and Financial Ramifications of Revolutionary and Controversial Network Strike-Back and Active Defense Techniques Follow the Travails of Eight System Administrators Who Take Cyber Law into Their Own Hands See Chillingly Realistic Examples of Everything from a PDA to the MD5 Hash Being Used as Weapons in Cyber Dogfights
There is a certain satisfaction for me in seeing this book published. When I presented my "strike-back" concept to the security community years ago, I was surprised by the ensuing criticism from my peers. I thought they would support our right to defend ourselves, and that the real challenge would be educating the general public. It was the other way around, however. This is why I m happy to see Aggressive Network Self-Defense published. It shows that people are beginning to consider the reality of today s Internet. Many issues are not black and white, right or wrong, legal or illegal. Some of the strike-back approaches in this book I support. Others, I outright disagree with. But that s good it gives us the chance to truly think about each situation and thinking is the most important part of the security business. Now is the time to analyze the technologies and consider the stories presented in this book before fiction becomes reality. Timothy M. Mullen, CIO and Chief Software Architect for AnchorIS.Com
When the Worm Turns...Analyze the technical and legal implications of "neutralizing" machines that propagate malicious worms across the Internet.
Are You the Hunter or the Hunted?Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences.
Reverse Engineer Working Trojans, Viruses, and KeyloggersPerform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker.
To Catch a Thief...Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced.
Learn the Definition of "Hostile Corporate Takeover" in CyberspaceFind out who will own the fictional Primulus Corporation as attacker and defender wage war.
Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your ethical, legal, unintended consequences, and risk validation.
See What Can Happen when the Virtual World Meets the Real WorldUse keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes.
Where the Wild Things Are...Follow along as a real-life "in-the-wild" format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine.
Implement Passive Strike-Back TechnologiesLearn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
Your Solutions Membership Gives You Access
A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page"From the Author" Forum where the authors post timely updates and links to related sitesThe complete code listings from the bookDownloadable chapters from these best-selling Hat Physical Device SecurityGoogle Hacking for Penetration TestersBuffer Overflow Detect, Exploit, PreventHacking a Terror The Silent Threat of Covert Channels
Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the company’s Security Products Group. Neil is a staff member of the Black Hat Security Briefings and Def Con hacker conference. He has spoken at numerous security conferences and been the subject of various online, print, film, and television interviews regarding different areas of information security. He was the Lead Author and Technical Editor of Aggressive Network Self-Defense (Syngress, 1-931836-20-5) and serves on the advisory board for a local technical college.