Security Power Tools

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.

Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits.

Security Power Tools details best practices for:

  • Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation
  • Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes
  • Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux
  • Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing
  • Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes
  • Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg
A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.
Table of Contents
Product Details
About the Author
Colophon
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillySecurity Power Tools
 
4.5

(based on 4 reviews)

Ratings Distribution

  • 5 Stars

     

    (2)

  • 4 Stars

     

    (2)

  • 3 Stars

     

    (0)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 4 customers

Sort by

Displaying reviews 1-4

Back to top

 
5.0

Very good book for people interested in security

By Kumar Sharshembiev

from Undisclosed

Comments about oreilly Security Power Tools:

This book covers most of the stuff you will need to have a good idea about server,PC and network security.Especially good topics related to network scanning with nmap ,metasploit and wireless security.

I think it would great if they added more topics on how to set up a firewall.But overall I used it for systems work that I do and also for some of my security classes.It will have everything from beginning from basic security to network monitoring and other complex issues.

In terms of readability it was good because I am new to security and I didn't have any problems reading and understanding it.I definitely recommend for any CS majors or sys admins.

(1 of 1 customers found this review helpful)

 
5.0

Excellent: Practical Advice

By jdruin

from Undisclosed

Comments about oreilly Security Power Tools:

Security Power Tools

Bryan Burns, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi

O'Reilly _ 1st Edition

http://oreilly.com/catalog/9780596009632/index.html

This is a detailed overview of tools that can be used to detect and defend against various security threats. The book generally groups software by category, with a section/chapter devoted to each tool. The software tool is thoroughly covered from download to installation to configuration. A fair amount of theory is covered for the various attack vectors discuss but the book focuses on practical, real-world examples.

The topics covered vary across a wide range but each is still covered with a good amount of depth which accounts for the books large size (856 pages). For each threat model covered, various tools that can be used for detection, avoidance, and protection are discussed along with user guides on how to acquire and set up the tools. The software discussed is generally open source and free of charge. Packages for all major PC operating systems are covered. Linux and Windows get the lion's share of attention but Mac and Unix are covered as well. Of course most of the Linux tools are Unix tools as well. Many of the Windows tools talked about are Linux ports.

I enjoyed the book overall and in particular I enjoyed the ability to "follow along" by downloading and working with the software packages covered in each section. Security professionals and hobbyist will certainly recognize many of the tools but a few might be new to many and even on the popular tools, some interesting features might not be know to all.

Summary:

- Practical explanations of each security topic are given for real world use.

- Focus is on example and practice

- A great book for security professionals and security hobbyist.

(2 of 2 customers found this review helpful)

 
4.0

SPT - - A Security Tool Primer Worth Reading

By Ben Nell

from Undisclosed

Comments about oreilly Security Power Tools:

Security Power Tools (SPT) is O'Reilly Publishing's sister manual to their popular Unix Power Tools. It is written as a primer to various security tools, organized within seven sections, covering Legal and Ethics, Reconnaissance, Penetration, Control, Defense, Monitoring, and Discovery. While the target audience of SPT is security professionals, the book weighs in at just over 800 pages and probably has something for everyone working in a technical facet of IT.

Having said that, I really enjoyed reading this book. I read it nearly cover-to-cover, and while I was at least familiar with most of the material in the book, I was still able to find gems of knowledge, even in tools that I work with on a daily basis. Expect to read about some tools that you may already know about, like Nmap, Nessus, and The Metasploit Framework, but keep reading for a heap of other useful applications that you may not be familiar with.

One of the strengths of the book is the varying backgrounds of its contributing authors; just as the book covers a diverse tool set, the expertise of the authors is also diverse. The book was written collaboratively by twelve individuals, made up primarily of Juniper Networks' J-Security team. Despite an opportunity for vendor-bias towards Juniper products, the book remained vendor-neutral. The majority of the book focuses on open-source and free-ware applications, although there is commercial software covered as well. In fact, Chapter 9 - Exploitation Framework Applications covers Canvas and Core Impact exclusively; both commercial applications.

One of the chapters that makes this book unique is the chapter on Law and Ethics, written by Jennifer Stisa Granick. You may recognize Ms Granick from her representation of Michael Lynn in during the Cisco Gate ordeal at Black Hat 2005 (coincidentally, Michael Lynn is also one of the contributing authors of this book). She provides an insightful discussion on not only the legal implications of security work, but also the role that ethics plays in some of those "gray" areas that security professionals may find themselves in.

Another chapter that sets this book apart is Chapter 6 - Custom Packet Generation, which primarily focuses on the use of Scapy. The chapter is written by Phillipe Biondi, the author of Scapy, and he provides an excellent argument to "Decode, Do Not Interpret". He discusses the advantages of writing tools that will provide you with raw decoded information, without an interpretation of that information. For instance, if you scanned a port on a remote host, Biondi would argue that it would be better for your tool to tell you that the remote host returned a RST packet rather than telling you that the port is closed. Beyond this valuable discussion, Biondi provides a very thorough discussion of the uses of Scapy, along with several good examples. This chapter alone makes this book worth buying.

While I liked this book, there were also some problems that prevented me from giving it a 5-star rating. For starters, the preface describes the overwhelming amount of content that was edited out of this book to keep it within size constraints, yet there was quite a bit of content that detracted from the value-density of the book. As I mentioned previously, the majority of SPT is a security primer and should not be considered a reference. Given this position, I believe that there was too much step-by-step installation and setup content. As an example, Chapter 16 - E-Mail Security and Anti-Spam covered the installation and management of the Norton Anti-Virus client. I can appreciate the security-related value of anti-virus software, but I felt that a step-by-step walk through of a Norton product was irrelevant.

Additionally, while I previously stated that the diverse expertise of the authors was a benefit, the varied writing style detracted from the readability of the book. Content aside, I found some chapters to be fun to read while others were boring, due to a particular author's writing style.

In summary, I would recommend this book to anyone interested in an overview of where to get started in researching security tools for a particular purpose. While none of the discussions in the book are exhaustive, they will definitely get you started and arm you with enough information to know what you want and where to get it.

 
4.0

Very good book. I recommend.

By RAMRAMI

from Undisclosed

Comments about oreilly Security Power Tools:

This a good book. I recommend.

Each chapter is written as tutorial and not as man or help. It represent a good security toolbox.

The chapter on scapy is very good and well described.

I prefer the chapter on social engineering.

Azzeddine

Displaying reviews 1-4

Back to top

 
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook: $47.99
Formats:  APK, DAISY, ePub, Mobi, PDF
Print & Ebook: $65.99
Print: $59.99