Showing posts with label infosec. Show all posts
Showing posts with label infosec. Show all posts

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems Review

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Average Reviews:

(More customer reviews)
To use "American Idol" lingo, you've already read reviews by Randy Jackson and Paula Abdul. It's time for the truth from Simon Cowell -- Practical Packet Analysis (PPA) is a disaster. I am not biased against books for beginners; see my five star review of Computer Networking by Jeanna Matthews. I am not biased against author Chris Sanders; he seems like a nice guy who is trying to write a helpful book. I am not a misguided newbie; I've written three books involving traffic analysis. I did not skim the book; I read all of it on a flight from San Jose to Washington Dulles. I do not dislike publisher No Starch; I just wrote a five star review for Designing BSD Rootkits by Joseph Kong.
PPA is written for beginners, or at least it should be intended for beginners givens its subject matter. It appears the author is also a beginner, or worse, someone who has not learned fundamental networking concepts. This situation results in a book that will mislead readers who are not equipped to recognize the numerous technical and conceptual problems in the text. This review will highlight several to make my point. These are not all of the problems in the book.
p 21: This is painfully wrong on multiple levels: "When one computer needs to send data to another, it sends an ARP request to the switch it is connected to. The switch then sends an ARP broadcast packet to all of the computers connected to it... The switch now has a route established to that destination computer... This newly obtained information is stored in the switch's ARP cache so that the switch does not have to send a new ARP broadcast every time it needs to send data to a computer." This misconception is aggravated on p 62 in the discussion of ARP.
p 65, Figure 6-5: The TCP three way handshake is not SYN - ACK - SYN.
p 78, Figure 7-3: The TCP three way handshake is not SYN - ACK - ACK.
p 79: Packet 5 is not "the packet that was lost and is now being retransmitted." Packet 2 is.
p 80: There is no "ICMP type 0, code 1 packet."
p 85: This boggles the mind: "Immediately after that ARP packet, we see a bunch of NetBIOS traffic... If that other IP address wasn't a sign that something is wrong, then all of this NetBIOS traffic definitely is. NetBIOS is an older protocol that is typically only used as a backup when TCP/IP isn't working. The appearance of NetBIOS traffic here means that since Beth's computer was unable to successfully connect to the Internet with TCP/IP, it reverted back to NetBIOS as an alternate means of communication -- but that also failed. (Anytime you see NetBIOS on your network, it is often a good sign that something is not quite right.)"
p 85: This "troubleshooting" example highlights the different default gateways for Barry and Beth as being the "biggest anomaly" causing Beth's computer to not work. The author ignores the fact that Barry and Beth have computers with the same MAC addresses.
p 89: Traces recorded at a client and server are compared. The author says "The two capture files look amazingly similar; in fact, the only difference between the two files is that the source and destination addresses on the SYN packets have been switched around." Good grief.
p 106: Another "troubleshooting" scenario wonders if a "slow network" problem is related to the fact that tracerouting out from a host fails to produce a response from the router. However, the traceroute continues past the router, so connectivity exists (missed by the author). He says "we know our problem lies with our network's internal router because we were never able to receive an ICMP response from it. Routers are very complicated devices, so we aren't going to delve into the semantics of exactly what is wrong with the router."
pp 107-8: Yet another "troubleshooting" issue wonders why seemingly "double packets" are seen while sniffing on a host. The author wonders if "misconfigured port mirroring" could be the problem, ignoring his statement that the trace was collected on the host in question. He doesn't notice that each "double packet" has a unique MAC address pairing, i.e., packet 1 involves 00:d0:59:aa:af:80 > 00:01:96:3c:3f:54 and packet 2 involves 00:01:96:3c:3f:a8 > 00:20:78:e1:5a:80. Assuming 00:d0:59:aa:af:80 is the only MAC address for the troubled host, there is no way this machine could see traffic "bouncing back" -- the destination MAC address for the dupe packet is 00:20:78:e1:5a:80.
p 110: Another "troubleshooting" example fails to recognize that packets 1-18 and 29 are part of one unique TCP session, and 19-28 are an entirely different session. Packet 29's RST ACK is not an "acknowledgement" of the RST in packet 28; besides not being an actual protocol mechanism, those packets are from different sessions anyway!
p 112: "More ominously, most of the traffic is being sent with the TCP PSH flag on, which forces a receiving computer to skip its buffer and push that traffic straight through, ahead of any other traffic. That is almost always a bad sign." It's a bad sign when you don't know what you're talking about, apparently.
p 129: "Display filters make it easy to search for traffic such as DCEPRC (sic), NetBIOS, or ICMP, which should not be seen under normal circumstances." I guess Windows networks never use at least DCERPC regularly?
This book should not have been published. The author should sit down with Interconnections, 2nd Ed by Radia Perlman, Troubleshooting Campus Networks by Priscilla Oppenheimer/Joseph Bardwell, and The Internet and its Protocols by Adrian Farrel, and learn how networks operate. Then he should have Gerald Combs REALLY provide a technical edit of PPA, since it's clear Mr Combs probably skimmed this book without catching the issues noted above.
The only positives I can say for PPA is that, like other No Starch books, it's form factor and readability is excellent. The diagrams are clear (albeit often misunderstood) and the obvious typos are few. As far as learning anything, the mention of "Expert Infos" on p 100 was nice.

Click Here to see more reviews about: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems



Buy Now

Click here for more information about Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Read More...

CISSP Guide to Security Essentials Review

CISSP Guide to Security Essentials
Average Reviews:

(More customer reviews)
Peter Gregory is a prolific author and well-known computer security professional who is also very active in the information security community. Peter wrote this book to address the current situation in information security, which is stated in the Introduction, as "There aren't enough good security professionals to go around". Information security is a broad field with many sub disciplines. Many professionals feel they should know more about security, but don't know where to start. Peter's book is an attempt to change that situation by providing the foundational materials that every security professional needs to know before undertaking advanced or specialized study. The book is suitable for self-study or as a classroom text. Each chapter has a summary, a glossary of key terms, review questions, hands-on projects, and ideas for case projects. For those interested in obtaining the CISSP, they will find this book a good place to start. The strength of this book lies in its organization and clarity. The book's ten chapters map to the ten CISSP Common Body of Knowledge Domains. Each chapter is broken into many subheadings, with an outline-style organization that clarifies each distinct topic. Acronyms are defined in the text and in the glossaries, which are presented in each chapter and at the end of the book. There are two appendices. One appendix provides summary outlines of the ten domains of CISSP security; the other reproduces the code of ethics of CISSP professionals. The Introduction reviews the steps needed to obtain CISSP certification and, together with the code of ethics, gives a good sense of the knowledge, behavior, and attitude necessary to succeed as a security professional. A CD-ROM containing practice questions for the CISSP exam is included. No single book can provide all you need to know to be a CISSP, but this is a good place to start.

Click Here to see more reviews about: CISSP Guide to Security Essentials

CISSP GUIDE TO SECURITY ESSENTIALS CISSP Guide to Security Essentials provides readers with the tools and resources they need to develop a thorough understanding of the entire CISSP Certification Body of Knowledge. Using a variety of pedagogical features including study questions, case projects, and exercises, this book clearly and pointedly explains security basics. Coverage begins with an overview of information and business security today, security laws, and then progresses through the ten CISSP domains, including topics such as access control, cryptography and security architecture and design. With the demand for security professionals at an all-time high, whether you are a security professional in need of a reference, an IT professional with your sights on the CISSP certification, on a course instructor, CISSP GUIDE TO SECURITY ESSENTIALS CISSP Guide to Security Essentials has arrived just in time.

Buy NowGet 47% OFF

Click here for more information about CISSP Guide to Security Essentials

Read More...