
Hacker's Challenge 3
3rd EditionISBN10: 0072263040
ISBN13: 9780072263046
Copyright: 2006
Instructors: choose ebook for fast access or receive a print copy.
Still Have Questions? Contact your Rep s
With the McGraw Hill eBook, students can access their digital textbook on the web or go offline via the ReadAnywhere app for phones or tablets.
McGraw Hill eBook Courses Include:
- Offline reading – study anytime, anywhere
- One interface for all McGraw Hill eBooks
- Highlighting and note-taking
- Syncs across platforms, always up-to-date
- Available for Android and iOS
Rent Monthly
Purchase Options
Students, we’re committed to providing you with high-value course solutions backed by great service and a team that cares about your success. See tabs below to explore options and pricing. Don't forget, we accept financial aid and scholarship funds in the form of credit or debit cards.
The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
Program Details
FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
Part I: Challenges
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
INTRODUCTION
Part I: Challenges
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 20: The Not-So-Usual Suspects
INDEX
About the Author
David Pollino
David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.
Bill Pennington
Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hacker’s Challenge.
Tony Bradley
Himanshu Dwivedi
Himanshu Dwivedi is a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security. At iSEC, Himanshu manages the firm’s product development efforts and co-manages the sales and marketing programs. Himanshu is also a renowned industry author with six security books published, including Mobile Application Security (McGraw Hill/Osborne), Hacking VoIP (No Starch Press), Hacking Exposed: Web 2.0 (McGraw Hill/Osborne), Hacker’s Challenge 3 (McGraw Hill/Osborne), Securing Storage (Addison Wesley), and Implementing SSH (Wiley). In addition to the books, Himanshu also has a patent pending on Fibre Channel security. Before starting iSEC Partners, Himanshu was the Regional Technical Director at @stake, Inc.
FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
Part I: Challenges
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
INTRODUCTION
Part I: Challenges
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Part II: Solutions
Chapter 1: To Catch a Phish
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 2: Owning the Pharm
Chapter 3: Big Bait, Big Phish
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 4: Shooting Phish in a Barrel
Chapter 5: Too Few Secrets
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 6: Upgraded or "Owned?"
Chapter 7: Pale Blue Glow
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 8: Crossing the Line
Chapter 9: The Root of the Problem
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 10: Firewall Insights
Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 12: Share and Share Alike
Chapter 13: The Holy Grail
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 14: Open Source
Chapter 15: Cup of Chai
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 16: Love Plus One
Chapter 17: Bullet in the Blue Sky
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 18: The Insider III
Chapter 19: Jumping Someone Else's Train
Chapter 20: The Not-So-Usual Suspects
INDEX
Chapter 20: The Not-So-Usual Suspects
INDEX
About the Author
David Pollino
David Pollino (Walnut Creek, CA) is a senior security consultant at @stake, Inc. He has extensive networking experience including working for a tier 1 ISP architecting and deploying secure networks for Fortune 500 companies. David leads the @stake Center of Excellence focusing on wireless technologies such as 802.11x, WAP and GPRS. Recent projects include helping design and oversee the security architecture for a large European ASP and assisting with the security architecture for a wireless provider.
Bill Pennington
Bill Pennington, (CISSP), is a Principal Security Consultant with Guardent Inc. Bill has five years of professional experience in information security, ten in information technology. He is familiar with Linux, Solaris, Windows, and OpenBSD, and is a Certified Information Security Systems Practitioner, Certified Cisco Network Administrator (CCNA), Certified Internet Security Specialist (CISS), and a Microsoft Certified Product Specialist, Windows NT 4.0. He has broad experience in computer forensics, installing and maintaining VPNs, Cisco Pix firewalls, IDS, and in monitoring systems. Bill was a contributing author to several chapters of the original Hacker’s Challenge.
Tony Bradley
Himanshu Dwivedi
Himanshu Dwivedi is a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security. At iSEC, Himanshu manages the firm’s product development efforts and co-manages the sales and marketing programs. Himanshu is also a renowned industry author with six security books published, including Mobile Application Security (McGraw Hill/Osborne), Hacking VoIP (No Starch Press), Hacking Exposed: Web 2.0 (McGraw Hill/Osborne), Hacker’s Challenge 3 (McGraw Hill/Osborne), Securing Storage (Addison Wesley), and Implementing SSH (Wiley). In addition to the books, Himanshu also has a patent pending on Fibre Channel security. Before starting iSEC Partners, Himanshu was the Regional Technical Director at @stake, Inc.
Shipping Options
- Standard
- Next day air
- 2nd day air
- 3rd day air
Rent Now
You will be taken to our partner Chegg.com to complete your transaction.
After completing your transaction, you can access your course using the section url supplied by your instructor.