Skip to content
Paperback Honeypots: Tracking Hackers [With Cdrm] Book

ISBN: 0321108957

ISBN13: 9780321108951

Honeypots: Tracking Hackers [With Cdrm]

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$5.99
Save $39.00!
List Price $44.99
Almost Gone, Only 1 Left!

Book Overview

In this text, the author of Know Your Enemy explores state-of-the-art security technologies called Honeypots. It provides examples of real world deployments and coverage of the legal issues... This description may be from another edition of this product.

Customer Reviews

5 ratings

Think Honeypot!

Lance is the "been there, done that" guy when it comes to honeypots and that really shows this book teaches, but it also entertains. Honeypots: Tracking Hackers grabs your interest from the start with a real life story of an underground hacker with a powerful new hacking tool, attacking hundreds, if not thousands, of systems all over the world.Lance begins with how he got interested in honeypots and goes on to describe the different tools that are available, how they work and how anyone can set up their system to learn how to defend from novel attacks attacks. From the personal home computer to huge networks, Lance and his team have a solution.He puts attackers in two categories: those who want to attack as many systems as possible and those who target a specific system of high value. By defining these attackers the audience has a clear understanding of what they are dealing with.Starting with the history and definition of honeypots and honeynets, he takes us through characteristics and the different levels of interaction, how to configure different levels of honeypots, then on to the need to convince management of the value of honeypots and finally the legal issues (USA law) involved.Honeypots are becoming more acceptable as hackers get into more systems and management is mandated to stop the attacks. They shouldn't be anyone's first line of defense, but for advanced sites, this is an important suite of technologies.Honeypots: Tracking Hackers is a must read for novices and experienced security officers, alike. It will keep your attention and make you want to set up your own honeypot! If the book is not on your bookshelf and if honeypots are not part of your defensive information plans, something is wrong!

An original, motivational computer security book

During the 1990s, publishers printed a handful of computer security books per year. Now dozens appear each month, all competing for our limited time and shelf space. Of these "new" books, hardly any offer original, innovative material. Thankfully, Lance Spitzner's "Honeypots" breaks this trend. His is the only book devoted to honeypot technologies, and it will both motivate and inform any reader. "Honeypots" is one-stop-shopping for the world of blackhat deception and observation. Spitzner gets the reader up to speed on commercial and free honeypot technologies, then effectively argues how these tools fit within the enterprise's security infrastructure. He concludes with explanations of how to configure, deploy, and operate a variety of honeypots. "Honeypots" shines with good material, like the honeypot history in chapter 3, the explanation of GenI and GenII honeynets in chapter 11, and the all-star legal discussion in chapter 15. Spitzner also demonstrates his understanding of subtle but critical security engineering concepts, such as learning by analyzing failure (p. 8) and studying second-order effects when first-order events are tough to detect (chapter 4). I have two minor critiques. First, the text could have been a bit more concise. Second, it's best not to confuse people by calling the "link" layer by the name "layer 1" and the network layer as "layer 2" (p. 149). Stevens and others do show the TCP/IP model as link - network - transport - application. However, network engineers usually think of "layer 2" as the data link layer and "layer 3" as the network layer. I was a big fan of the HoneyNet Project's book, minus the 150 pages of IRC logs. I think all security-minded readers will find the entire "Honeypots" book exciting. I rarely find security books that rally me to join a cause, but Spitzner's is an exception.

Awesome! Better than the first Honeynet book!

If you liked "Know Your Enemy" by the Honeynet Project, you willundoubtedly like Lance Spitzner's (the Honeynet Project founder) newbook "Tracking Hackers" much more. In fact, even if you did not quitelike "Know Your Enemy", you will likely be deeply impressed with thenew book on honeypots and their use for tracking hackers.The structure of the book is different from the "Know Your Enemy":Lance starts from the very beginning - namely, his first honeypotpenetration experience and then goes on to talk about all aspects ofhoneypots. In-depth and structured background on honeypot technologyis provided. Honeypots are sorted by the level of interaction withattacker they are able to provide.In addition, the book covers the business benefits of usinghoneypots. By classifying the value of honeypots into prevention,detection and response (exactly as done in Honeynet Project whitepapers) Lance Spitzner analyzes the honeypot technology contributionsto an overall security posture. Also, the book describes thedifferences between the research and production honeypots anddemonstrates the benefits of both for various deployment scenarios.A good part of the book is devoted to particular honeypot solutions:'honeyd' by Niels Provos and several commercial honeypots withdetailed explanation of how they work. For example, there is a cleardescription of ARP spoofing and how it is used by the 'honeyd'honeypot daemon. An interesting chapter on "homegrown" honeypotsolutions (such as the ones used to capture popular worms of 2001)sheds some light on the simplest honeypots that can be built forspecific purposes, such as to capture a popular attack by means of asimple port listener. Use of UNIX chroot() jail environment forhoneypots is also analyzed.Of course, a special chapter is devoted to honeynets - Project'sprimary weapon in a war against malicious hackers. The Generation II(GenII) honeynet technology is first introduced in a book. The chapternot only lists honeynet deployment and maintenance suggestions, butalso talks about the risks of honeynets.Another great feature of the book is a chapter on honeypotimplementation strategies and methods, such as using NAT to forwardtraffic to a honeypot and DMZ honeypot installation. The informationis then further demonstrated using the two full honeypot case studies,from planning to operation.What is even more important, maintaining the honeypot architecture iscovered in a separate chapter. Honeypots are a challenge to run,mainly since no 'lock it down and maintain state' is possible. One hasto constantly build defenses and hide and dodge attacks that cannot bedefended against."Tracking hackers" also has a "Legal Issues" chapter, written with alot of feedback from the DoJ official. It dispels some of themisconceptions about the honeypots such as the "entrapment" issue,summarizes wiretap laws and related data capture problems.The book describes an almost cutting edge of the honeypot research andtechnology. To truly get the cuttin

A great book!

I've been watching Lance and the honeynet guys' progress since they started and I think they're one of the leading lights in the security field right now. This is a well-written and interesting book with lots of crunchy technical stuff! A+!

The Only One

I just read this book and am really impressed. It is not worse or better than other similar books. It is just the only serious book around.(on these issues). Perhaps you could compare it with 'Know your Enemy' (KyE) but then 'Tracking Hackers' would win hands down. After all, about the same content of KyE can be found in the pages of 'The Honeynet Project'. Of course KyE is more concise and organized (than the site), easier to use for understanding Honeynets, and several original attacks are discussed in the book. A good book indeed. However, HTH is very special, because for the first time there is an extensive discussion about Honeypots, in a unique document (book). And it is very well written. From beginners to experts everybody will enjoy the book. Every single detail is clearly and patiently explained and fitted in the honeypots puzzle. The case studies are clever and representative. The Honeypots are classified according their level of interaction, and treated following the same sequence: BOF, Specter, Honeyd, Man Trap, and 'Home Made' Honeypots (including Jailed Environments) are thoroughly analyzed. Even Honeynets are discussed, and an significative case study is used to 'put all together'.As a bonus the related 'legal issues' are also discussed (new to me).At the bottom line it is an excellent book not only for reading (beginners and intermediates), but also for being used by experts as a reference in Security Courses (just what I am planning to do).
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured