This new edition of Hacking Exposed features completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz explain how hackers exploit network security holes and what IT professionals can do to recognize and block oncoming attacks. Coverage includes: Code hacking methods and countermeasures New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications Latest DDoS techniques -- zombies, Blaster, MyDoom All new class of vulnerabilities -- HTTP Response Splitting Internet client attacks, including phishing
"A must-read for anyone in security.... One of the best security books available." --Tony Bradley, CISSP, About.com "Authoritative....Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee "A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times "The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." —Bill Machrone, PC Magazine "With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." —Mirko Zorz, Net-security.org The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the proven Hacking Exposed methodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world. New and Updated Material: New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners New content on remote connectivity including VoIP hacking New coverage of web and e-mail client hacking, including the latest Internet Explorer exploits, phishing, spyware, rootkits, and bots New hacks and countermeasures using Google as a reconnaissance tool An updated footprinting chapter that deals with changes regarding finding information from Internet databases Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks
"A must-read for anyone in security.... One of the best security books available." --Tony Bradley, CISSP, About.com "Authoritative....Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee "A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times "The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." —Bill Machrone, PC Magazine "With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." —Mirko Zorz, Net-security.org The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the proven Hacking Exposed methodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world. New and Updated Material: New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners New content on remote connectivity including VoIP hacking New coverage of web and e-mail client hacking, including the latest Internet Explorer exploits, phishing, spyware, rootkits, and bots New hacks and countermeasures using Google as a reconnaissance tool An updated footprinting chapter that deals with changes regarding finding information from Internet databases Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks