This guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these…mehr
This guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage. The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed. Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Robert Jones runs Craic Computing, a small bioinformatics company in Seattle that provides advanced software and data analysis services to the biotechnology industry. He was a bench molecular biologist for many years before programming got the better of him. Dr. Jones has extensive experience in Linux/Apache/MySQL/Perl software development and Linux systems administration.
Inhaltsangabe
Preface Who This Book Is For Contents of This Book Conventions Used in This Book Safari Enabled Using Code Examples How to Contact Us Acknowledgments Chapter 1: Introduction 1.1 What Is Internet Forensics? 1.2 The Seamy Underbelly of the Internet 1.3 Pulling Back the Curtain 1.4 Taking Back Our Internet 1.5 Protecting Your Privacy 1.6 Before You Begin 1.7 A Network Neighborhood Watch Chapter 2: Names and Numbers 2.1 Addresses on the Internet 2.2 Internet Address Tools 2.3 DNS Record Manipulation 2.4 An Example-Dissecting a Spam Network Chapter 3: Email 3.1 Message Headers 3.2 Forged Headers 3.3 Forging Your Own Headers 3.4 Tracking the Spammer 3.5 Viruses, Worms, and Spam 3.6 Message Attachments 3.7 Message Content 3.8 Is It Really Spam? Chapter 4: Obfuscation 4.1 Anatomy of a URL 4.2 IP Addresses in URLs 4.3 Usernames in URLs 4.4 Encoding the Entire Message 4.5 Similar Domain Names 4.6 Making a Form Look Like a URL 4.7 Bait and Switch-URL Redirection 4.8 JavaScript 4.9 Browsers and Obfuscation Chapter 5: Web Sites 5.1 Capturing Web Pages 5.2 Viewing HTML Source 5.3 Comparing Pages 5.4 Non-Interactive Downloads Using wget 5.5 Mapping Out the Entire Web Site 5.6 Hidden Directories 5.7 In-Depth Example-Directory Listings 5.8 Dynamic Web Pages 5.9 Filling Out Forms 5.10 In-Depth Example-Server-Side Database 5.11 Opening the Black Box Chapter 6: Web Servers 6.1 Viewing HTTP Headers 6.2 What Can Headers Tell Us? 6.3 Cookies 6.4 Redirection 6.5 Web Server Statistics 6.6 Controlling HTTP Headers 6.7 A Little Bit of Everything Chapter 7: Web Browsers 7.1 What Your Browser Reveals 7.2 Apache Web Server Logging 7.3 Server Log Analysis 7.4 Protecting Your Privacy Chapter 8: File Contents 8.1 Word Document Metadata 8.2 U.K. Government Dossier on Iraq 8.3 Document Forgery 8.4 Redaction of Sensitive Information Chapter 9: People and Places 9.1 Geographic Location 9.2 Time Zone 9.3 Language 9.4 Expertise 9.5 Criminal or Victim? 9.6 Hardware and Software Chapter 10: Patterns of Activity 10.1 Signatures 10.2 Searching with Signatures 10.3 Problems with Simple Signatures 10.4 Full Text Comparison 10.5 Using Internet Search Engines for Patterns Chapter 11: Case Studies 11.1 Case Study 1: Tidball 11.2 Case Study 2: Spam Networks Chapter 12: Taking Action 12.1 What Is Being Done to Tackle Internet Fraud? 12.2 What You Can Do to Help 12.3 Getting in Over Your Head 12.4 Vision of a Community Response About the Author Colophon
Preface Who This Book Is For Contents of This Book Conventions Used in This Book Safari Enabled Using Code Examples How to Contact Us Acknowledgments Chapter 1: Introduction 1.1 What Is Internet Forensics? 1.2 The Seamy Underbelly of the Internet 1.3 Pulling Back the Curtain 1.4 Taking Back Our Internet 1.5 Protecting Your Privacy 1.6 Before You Begin 1.7 A Network Neighborhood Watch Chapter 2: Names and Numbers 2.1 Addresses on the Internet 2.2 Internet Address Tools 2.3 DNS Record Manipulation 2.4 An Example-Dissecting a Spam Network Chapter 3: Email 3.1 Message Headers 3.2 Forged Headers 3.3 Forging Your Own Headers 3.4 Tracking the Spammer 3.5 Viruses, Worms, and Spam 3.6 Message Attachments 3.7 Message Content 3.8 Is It Really Spam? Chapter 4: Obfuscation 4.1 Anatomy of a URL 4.2 IP Addresses in URLs 4.3 Usernames in URLs 4.4 Encoding the Entire Message 4.5 Similar Domain Names 4.6 Making a Form Look Like a URL 4.7 Bait and Switch-URL Redirection 4.8 JavaScript 4.9 Browsers and Obfuscation Chapter 5: Web Sites 5.1 Capturing Web Pages 5.2 Viewing HTML Source 5.3 Comparing Pages 5.4 Non-Interactive Downloads Using wget 5.5 Mapping Out the Entire Web Site 5.6 Hidden Directories 5.7 In-Depth Example-Directory Listings 5.8 Dynamic Web Pages 5.9 Filling Out Forms 5.10 In-Depth Example-Server-Side Database 5.11 Opening the Black Box Chapter 6: Web Servers 6.1 Viewing HTTP Headers 6.2 What Can Headers Tell Us? 6.3 Cookies 6.4 Redirection 6.5 Web Server Statistics 6.6 Controlling HTTP Headers 6.7 A Little Bit of Everything Chapter 7: Web Browsers 7.1 What Your Browser Reveals 7.2 Apache Web Server Logging 7.3 Server Log Analysis 7.4 Protecting Your Privacy Chapter 8: File Contents 8.1 Word Document Metadata 8.2 U.K. Government Dossier on Iraq 8.3 Document Forgery 8.4 Redaction of Sensitive Information Chapter 9: People and Places 9.1 Geographic Location 9.2 Time Zone 9.3 Language 9.4 Expertise 9.5 Criminal or Victim? 9.6 Hardware and Software Chapter 10: Patterns of Activity 10.1 Signatures 10.2 Searching with Signatures 10.3 Problems with Simple Signatures 10.4 Full Text Comparison 10.5 Using Internet Search Engines for Patterns Chapter 11: Case Studies 11.1 Case Study 1: Tidball 11.2 Case Study 2: Spam Networks Chapter 12: Taking Action 12.1 What Is Being Done to Tackle Internet Fraud? 12.2 What You Can Do to Help 12.3 Getting in Over Your Head 12.4 Vision of a Community Response About the Author Colophon
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826