Deliver to Japan
IFor best experience Get the App
Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
A**A
Great for any level of expertise
Easy to read/follow regardless of your level of expertise... Beginners will understand the content and professionals/executives will not feel bored. This is a must in our library and anyone concerned about security should add it as well.Great read!
S**N
Hackers
Hackers Challenge 3 is a good book, will buy again, very interesting, helps with hacking and catching hackers used it for class
B**R
Great
great book series, was sent what was ordered in a reasonable time period with minimal ware on the used book.
A**E
Five Stars
I love this book, it really helped my troubleshooting skills.
W**N
Very Helpful In Incident Response Excercise
I bought the entire series of these books to help my organization during Incident Response exercises. As part of our yearly audits we are required to test our procedures and tighten up any loose ends. I felt a great way to test them was with predefined scenarios such as the ones in this book. We had to modify them a little to meet our infrastructure and business model, but that was not too difficult. It was amazing to work through these scenarios as a group and see how each of us would handle the situations differently. Overall it was a very effective way to share ideas and thoughts on how we would handle these situations in the future.Overall I think the book was an enjoyable and thought provoking read, and can be used for real world situations. Perfect for getting your security team thinking about what might hit them next and how they will handle situations when they arise.
C**T
OK, but not what I expected from the HC series
The stories were entertaining but they lacked the detail I had been looking for. It would be a great book for non-technical managers to read so they know their techs are not just over-bearing security freaks.I also feel that several of the investigations were flawed in how they were conducted. It is possible that the book is just being faithful to the 'real' story, but it would have been good to see comments on what could have been done better at the end of each one.If you are looking for a broad picture of the types of attacks you might face and some procedures for what to do during or after an attack the book can be a helpful starting point (wake up call for some).
A**R
A Digest of the New World of Hack Attacks
What struck me about this book is that the attacks are all brand new. This isn't just a rehash of the same old attacks we read about over and over again, nor is it a rehash of the attacks - but on steroids - from the previous Hacker's Challenge books. The day of the simple port scan and null session enumeration are long gone. Today's world is much more complicated and scarier. Hacker's Challenge 3 proves it.And these aren't off-the-wall attacks cooked up in hidden computer labs by researchers. They're the type of threats now, unfortunately, becoming more commonplace to any one in information security.The chapters on phishing are real-life and could've been taken right out of the playbook of an actual attack perpetrated against a real bank. The steps for investigating, tracking down and bringing down malicious phishing sites closely follow those actually taken by information security professionals on the job.Another attack presented is pharming, a new and frightening type of DNS poisoning that threatens financial and e-commerce web sites. The description of the attacks is very accurate. It's almost as if you were working with the team trying to block the attack.Hacker's Challenge 3 is written by a star-studded cast of well-known industry players, each a top notch expert in their specialty in the field.For each attack, this book provides a complete set of steps for detection, resolution, prevention and evasion of future attacks. There are detailed examples of the forensics examination used to track down both the attack and its offending attackers, including samples of analyzed logs and data that would be used by an actual threat and incident management team in action on a case.Each chapter has a series of questions that add to the material and provide thought-provoking points for further discussion.This is a digest of the new world of Twenty-First Century attacks that should be read by every information security professional.
S**N
Hacker's Challenge 3
This is a book that can serve two different purposes. For the security expert the book provides 20 real world security issues along with the appropriate logs and challenges them to work out what type of attack is being performed, how it is being performed, and what needs to be done to fix it and prevent it happening again. For those with an interest in security but who are not experts the book provides an entertaining series of tutorials that introduce several types of security breach, what they are, how to detect them, and what to do to stop them or at leasdt mitigate the effects.The 'challenges' that are described in the book cover a range of different methods that have been used to breach the security of various computer networks. Each challenge provides a all of the essential pieces of information that would be available to be examined by security experts dealing with the problem (trimmed of much of the irrelevant logs). Sufficient information is actually provided to enable someone with a sufficient knowledge of security to work out both what type of attack has taken place and how the attack was done. They should then have no trouble in answering the series of questions about the particular attack that appear at the end of each challenge before turning to the solutions section to check their answers.The challenges also provide excellent tutorials for novice security staff to find out how to extract and interpret information in order to determine what has happened.I always thought of computer security as a necessary but boring subject but the authors of this book have managed to make it both informative and entertaining. If you are a security specialist looking to take the "hacker's Challenge" and test how much you know or if you are just someone wanting to learn more about some of the latest security threats then this book will provide you with many hours of interesting reading and investigating.
A**V
Four Stars
As expected.
Trustpilot
3 weeks ago
2 months ago