Used price: $0.50
Collectible price: $1.90
Buy one from zShops for: $15.75
Used price: $15.99
Buy one from zShops for: $49.20
The only thing against the book is that it is a little dated. The first tipoff should be the picture of Dave on the front cover. He hasn't had that much hair in a while. Secondly, these lists were written in the late 80s so the younger generation may not get all the political and cultural references (such as references to Dan Qualye).
I would still recommend this book for anyone needing or wanting a laugh.
This book is an essential for the Letterman fan, especially new fans who don't know or remember the good ol' days.
Used price: $0.20
Collectible price: $3.00
Buy one from zShops for: $1.88
List price: $18.00 (that's 30% off!)
Used price: $20.95
Buy one from zShops for: $33.17
List price: $39.99 (that's 30% off!)
Used price: $23.10
Buy one from zShops for: $23.10
The majority of HC2 involves three subjects. Challenges 1,3,7, and 16 revolve around wireless insecurities. Challenges 2,5,6,15, and 17 discuss network-based attacks. Solving the mysteries of challenges 4,11,12,14,18, and 19 require log analysis. A few other issues are sprinkled through the text: social engineering (ch. 8), host-based digital forensics (ch. 9), a man-in-the-middle attack against SSH (ch. 13), and a crafty buffer overflow tutorial (ch. 10). None of the material struck me as being exceptionally original, although this accurately reflects the sorts of cases handled by most consultants! I was impressed by the level of explanation offered by challenge 17, where vulnerabilities associated with VLAN 1 were exposed.
HC2 has a few weaknesses. I was sorry to see Peter Lemonjello fired in challenge 5, but he appeared to strike again in challenge 11. Pages 126-8 featured some of the oddest techno-babble in print, offering obscure references to Rabindranath Tagore and condescending dialogue with a tech support staffer. I've given up on seeing Mike Schiffman correctly abbreviate the Air Force Information Warfare Center as "AFIWC" in his biography. His use of "AFWIC" must refer to the UN's AFrican Women In Crisis program and not the talk he gave to the AFIWC in Apr 99!
HC2 is the first must-buy of 2003, but it leaves some room for improvement. Future editions should provide greater details in the solutions, like explanations of the fields in various firewall logs. I'd also like to see the author's names on the challenges, as appeared in the first HC book. The bottom line is that HC2 is a fast read that will entertain, and more importantly, educate.
However, if you need or like this kind of books give first a try to "Stealing the Network: How to Own the Box" by Ryan Russell, the same idea, but a lot more illustrative and easy to read (still with the same level of very up to date information).
Some extra bucks to spend ?. . . OK, then try both, they complement each other very well.
Impressive wireless DoS attack, social engineering penetrations (including one case with no technical penetration whatsoever), mysterious web defacements, SQL injection, DNS tunneling case and router attack inform and educate, just as the first book did. Authors' mildly perverse sense of humor keeps the reader in a good mood. The book begs to be read in one helping (and then reread, as needed)! "The Challenge 2" again covers a wide range of victims and attack methods.
An interesting case asks for writing an exploit and provides a walkthrough for a simple local buffer overflow attack, a novel feature of this edition.
At about scenario 12, things start to heat up and solving the case starts to require some thinking. Harder to crack cases and more sophisticated attackers up the fun level and value of information learned. Just as in the first book, solving the case usually takes some log analysis, some security knowledge and careful reading about character actions and observations.
In addition to technology-astute readers, the book will also satisfy the hard-core security policy fans. Some of the questions asked about the cases involve policy decisions.
As for the book minor blemishes, it suffers a bit from a "sequel syndrome". Namely, since the first book was so amazingly good, it is very hard to beat it and most people will compare it to the first one. Let's say that "The Challenge 2" is almost as good as its predecessor. A couple of scenarios sound somewhat ridiculous (e.g. one on "wireless terrorists"). Another couple is painfully obvious (few people are impressed by a /bin/sh bound to a port in inetd.conf or by a default router password nowadays). In addition, the scenario names often give out a hint that spoils the fun of "cracking" the story ("Freeloader" and some others).
Overall, the book is a must have, both for its educational and entertainment value. The Hacker Challenge books fuse fun storyline, mystery and technical information in one great package, that makes for awesome reading for all technical readers, in security field and beyond. It was clearly a great idea to invent such a "security thriller" book.
Anton Chuvakin, Ph.D., GCIA is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org
List price: $18.95 (that's 30% off!)
Used price: $10.61
Buy one from zShops for: $12.51
List price: $14.95 (that's 30% off!)
Used price: $9.99
Used price: $9.73
Collectible price: $8.47
Used price: $18.00
Buy one from zShops for: $60.00
I am fifteen years old. The reason that I read this book is because I hope one day to be involved in public life. I began this book knowing relatively nothing about Kennedy, except his assination and his line, "Ask not what your country can do for you, ask what you can do for your country." This book gives me information to quench my thirst for knowledge as well as inspire and provide me with information that I will be able to use in the future, which I am only aboe to dream of now.
I love this book and feel that it is a shame that this is out of print. I feel that it is atrocious to think of a person not even attempting to find a copy of this book or not reading it if they have it. To conclude, I feel that this book is well worth the read, and so much more.