Book description
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.
Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
Publisher resources
Table of contents
- Silence on the Wire
- Foreword
- Introduction
-
I. The Source
- 1. I Can Hear You Typing
-
2. Extra Efforts Never Go Unnoticed
- Boole’s Heritage
- Toward the Universal Operator
- Toward the Material World
- A Nonelectric Computer
- A Marginally More Popular Computer Design
- From Logic Operators to Calculations
- From Electronic Egg Timer to Computer
- Turing and Instruction Set Complexity
- Implications: Subtle Differences
- In Practice
- Prevention
- Food for Thought
- 3. Ten Heads of the Hydra
- 4. Working for the Common Good
- II. Safe Harbor
-
III. Out in the Wild
-
9. Foreign Accent
- The Language of the Internet
- Internet Protocol
- Beyond Internet Protocol
- User Datagram Protocol
- Transmission Control Protocol Packets
- Internet Control Message Protocol Packets
-
Enter Passive Fingerprinting
- Examining IP Packets: The Early Days
- Initial Time to Live (IP Layer)
- The Don’t Fragment Flag (IP Layer)
- The IP ID Number (IP Layer)
- Type of Service (IP Layer)
- Nonzero Unused and Must Be Zero Fields (IP and TCP Layers)
- Source Port (TCP Layer)
- Window Size (TCP Layer)
- Urgent Pointer and Acknowledgment Number Values (TCP Layer)
- Options Order and Settings (TCP Layer)
- Window Scale (TCP Layer, Option)
- Maximum Segment Size (TCP Layer, Option)
- Time-Stamp Data (TCP Layer, Option)
- Other Passive Fingerprinting Venues
- Passive Fingerprinting in Practice
- Exploring Passive-Fingerprinting Applications
- Prevention of Fingerprinting
- Food for Thought: The Fatal Flaw of IP Fragmentation
-
10. Advanced Sheep-Counting Strategies
- Benefits and Liabilities of Traditional Passive Fingerprinting
- A Brief History of Sequence Numbers
- Getting More Out of Sequence Numbers
- Delayed Coordinates: Taking Pictures of Time Sequences
- Pretty Pictures: TCP/IP Stack Gallery
- Attacking with Attractors
- Back to System Fingerprinting
- Preventing Passive Analysis
- Food for Thought
- 11. In Recognition of Anomalies
- 12. Stack Data Leaks
- 13. Smoke and Mirrors
- 14. Client Identification: Papers, Please!
- 15. The Benefits of Being a Victim
-
9. Foreign Accent
- IV. The Big Picture
- A. Closing Words
- B. Bibliographic Notes
- Index
- Updates
Product information
- Title: Silence on the Wire
- Author(s):
- Release date: April 2005
- Publisher(s): No Starch Press
- ISBN: 9781593270469
You might also like
book
Black Hat Go
Black Hat Go explores the darker side of Go, the popular programming language revered by hackers …
book
How the Internet Really Works
The internet has profoundly changed interpersonal communication, but most of us don’t really understand how it …
audiobook
Crucial Conversations
The book that revolutionized business communications has been updated for today's workplace. Crucial Conversations provides powerful …
book
WTF?: What's the Future and Why It's Up to Us
Silicon Valley's leading intellectual and the founder of O'Reilly Media explores the upside and the potential …