An edition of Hacker's challenge (2001)

Hacker's challenge

test your incident response skills using 20 scenarios

  • 5.00 ·
  • 1 Rating
  • 5 Want to read
  • 1 Currently reading
  • 1 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 5.00 ·
  • 1 Rating
  • 5 Want to read
  • 1 Currently reading
  • 1 Have read

Buy this book

Last edited by MARC Bot
October 8, 2017 | History
An edition of Hacker's challenge (2001)

Hacker's challenge

test your incident response skills using 20 scenarios

  • 5.00 ·
  • 1 Rating
  • 5 Want to read
  • 1 Currently reading
  • 1 Have read

“A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you.” —Tim Newsham, security research scientist, @stake, Inc.Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident—how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.Excerpt from “The Insider”:The Challenge:Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....The Solution:After reviewing the log files included in the challenge, propose your assessment—when did the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.Contributing authors include:Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

Publish Date
Language
English
Pages
355

Buy this book

Previews available in: English

Edition Availability
Cover of: Hacker's Challenge
Hacker's Challenge
2003, McGraw-Hill
E-book in English
Cover of: Hacker's challenge
Hacker's challenge: test your incident response skills using 20 scenarios
2001, Osborne/McGraw-Hill
in English
Cover of: Hacker's challenge
Hacker's challenge: test your incident response skills using 20 scenarios
2001, Osborne/McGraw-Hill
in English

Add another edition?

Book Details


Edition Notes

Includes bibliographical references and index.

Published in
New York

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 S338 2001

The Physical Object

Pagination
xxvi, 355 p. :
Number of pages
355

ID Numbers

Open Library
OL3580929M
Internet Archive
hackerschallenge00schi
ISBN 10
0072193840
LCCN
2002277030
OCLC/WorldCat
48489500
Library Thing
2022
Goodreads
369875

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
October 8, 2017 Edited by MARC Bot merge duplicate works of 'Hacker's challenge'
August 12, 2011 Edited by ImportBot add ia_box_id to scanned books
June 7, 2011 Edited by ImportBot Added new cover
June 7, 2011 Edited by ImportBot Found a matching Internet Archive item record
April 1, 2008 Created by an anonymous user Imported from Scriblio MARC record