Showing posts with label internet security. Show all posts
Showing posts with label internet security. Show all posts

Unauthorised Access: Physical Penetration Testing For IT Security Teams Review

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Average Reviews:

(More customer reviews)
Unauthorised Access is nothing short of a manual for corporate espionage. Author Wil Allsopp, is a "penetration tester", a hired gun brought in by companies to find out how effective the security defences protecting their premises are.
While conventional penetration testing ("pentesting") involves remote hacking, typically through software vulnerabilities, physical pen-testers gain access to a company's offices or data centre with the goal of connecting to a restricted network, planting a bug or even an imitation explosive device
With ten years experience as a pen-tester, Allsopp offers superb insight into common methods used by criminals to manipulate employees, from phone calls to outright espionage. The chapter on social engineering, in particular, is guaranteed to spark paranoia and sleepless nights among even the most grizzled chief security officers.
Specific tactics he reveals include employing politeness, inducing fear, faking supplication, invoking authority, ingratiation and deference, and even sexual manipulation.
Another chapter details several successful pen-tests conducted by Allsopp and his team, including attacks on a UK power plant and a supercomputing facility conducting spatial modelling of nuclear explosions for the military. He also describes the antics of a pentester who bypassed the security of a large corporate by observing the uniform of the firm's security guard, then showing up the next day in identical costume, pulling rank and relieving the man of duty
The enjoyment Allsopp clearly derives from his work is reflected in his book; he writes with that particular tone of repressed glee common among white hat hackers. This, together with his tendency to adopt a Boy's Own adventure narrative style, makes the book very readable but occasionally somewhat glib. And at times it is hard to tell whether Allsopp is offering advice to the CSO, helping the reader start their own pen-testing company or trying to prove to a less salubrious readership how clever he is.
Indeed, many of the techniques described in Unauthorised Access are open to abuse. Allsopp gives the excuse that "the bad guys already know", before urging the reader to consider taking up lock picking as a rewarding hobby.

Click Here to see more reviews about: Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.
Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.
Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance
Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels
Includes safeguards for consultants paid to probe facilities unbeknown to staff
Covers preparing the report and presenting it to management

In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.

Buy NowGet 43% OFF

Click here for more information about Unauthorised Access: Physical Penetration Testing For IT Security Teams

Read More...

802.11 Security Review

802.11 Security
Average Reviews:

(More customer reviews)
GEEK ALERT!
Warning Will Robinson! This small book on 802.11b wireless security (167 pages not including the comprehensive index) is not for the faint of heart. To take full advantage of the copious amount of detail that Potter and Fleck provide, you need a good working knowledge of networking, and familiarity with either the Linux, FreeBSD, or OpenBSD operating systems.
802.11 Security is aimed at people who need to configure and administer secure 802.11b wireless (popularly named Airport or WiFi) networks. 802.11 Security is NOT targeted at the casual home computer user who merely wants to keep others from poaching their wireless connection. Those users are best served by Adam Engst's and Glenn Fleishman's Wireless Internet Starter Kit.
However, if you have any interest in comprehensive and detailed knowledge of how 802.11b security works from the network administrator's viewpoint, 802.11 Security is the book for you. Potter and Fleck have years of experience with Unix security issues, and have several papers on the subject to their credit.
After setting the stage with a good discussion of the many problems with wireless security, the authors outline some of the more common types of attacks on wireless networks. Why? Their point is that understanding the nature of the "Man-in-the-middle" attack (for example) is important for knowing how to prevent it. This point shows that 802.11 Security is more than just a "cookbook" manual. It provides the "why" as well as the "how."
The bulk of the book covers how to configure FreeBSD, Linux, and OpenBSD clients, gateways, and access points (base stations for us Apple types). Plenty of examples are provided. However, with no CD included to allow copy-and-paste, you'll need to enter everything manually if you want to follow the examples verbatim. In reality, the lack of a CD is not an issue, as the typical sysadmin is going to be working on their customized installation, and will need to tweak the code examples.
802.11 Security does have ten pages on Mac OSX station configuration, as well as a smaller section on Windows setup. For those adventurous readers, the Mac setup section has plenty of examples on how to configure OSX's built-in firewall for best wireless security. The relative paucity on client computer setup is one of the few drawbacks for an end-user reader, as the book focuses on administrator issues.
802.11 Security is a good read for the Unix sysadmin who is new to wireless networks, or for the aficionados who want to roll their own home wireless network security. Again, this is not a mass-market book. But if you're not the average home user, 802.11 Security is a worthwhile book.
MacMice Rating: 4 out of 5
David Weeks
[website]

Click Here to see more reviews about: 802.11 Security


Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns.But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment.This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network.

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification.The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11.You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD.You'll also find thorough information on controlling network access and encrypting client traffic.

Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way.In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include:

Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows
Setting Up Access Point Security
Gateway Security, including building Gateways, firewall Rules, Auditing, etc.
Authentication and Encryption
FreeBSD IPsec client and gateway configuration
Linux IPsec client and gateway configuration
802.1x authentication
802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.

Buy NowGet 33% OFF

Click here for more information about 802.11 Security

Read More...

Maximum Wireless Security Review

Maximum Wireless Security
Average Reviews:

(More customer reviews)
The authors have done an admirable job in making this complex topic approachable by readers with a basic understanding of networks. The coverage of cryptography was just enough to support the discussions on WEP cracking. I particularly enjoyed the step-by-step description of actual attacks. The overview of existing tools was also very good, though I detected a certain bias towards Microsoft solutions. Overall, this great book has earned an important place on my bookshelf. Kudos.

Click Here to see more reviews about: Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.

Buy Now

Click here for more information about Maximum Wireless Security

Read More...