Training

Books

Navigation
Security Power Tools

Authors: Nicolas Beauchesne, Philippe Biondi, Bryan Burns, Chris Iezzoni, Jennifer Statis Grannick, Paul Guersch, Dave Killion, Michael Lynn, Steve Manzuik, Eric Markham, Eric Moret, and Julien Sobrier
Paperback: 900 Pages
Publisher: O’Reilly Media
ISBN: 0-596-00963-1
Price: $59.99 US / £42.50 UK

A Special Offer from O’Reilly: Click here and use the promo code: JUNIPER, to get 35% and Free Shipping within the continental United StatesPurchase the book from Amazon USPurchase the book from Amazon UK

Reviews

“Here in a single volume is a veritable think-tank of state-of-the-art security techniques addressing the needs of the most popular computer platforms: Linux, Mac, Unix, and Windows. It is a real eye-opener to the vulnerabilities of compture networks and is therefore a must-have book for network administrators...Written by members of the Juniper Networks’ Security Engineering team, with some guest authors, the twenty-three chapters cover the use of the both offensive and defensive commercial and freeware tools, along with insider techniques, tips, and methods. The authors reveal the inner workings of a world that is foreign to most computer users, and show the ingenious ways which the “bad guys” have devised to compromise a tragets personal data. (Reprinted with permission from the Kleper Report on Digital Publishing, Copyright 2007, Graphic Dimensions, Lauderdale by the Sea, FL)”

Michael Kleper, The Kleper Report on Digital Publishing

“Security Power Tools is chock–full of relevant content that is also accessible and straightforward...Security Power Tools is almost guaranteed to offer any intermediate– and advanced–level professional information and tools to fill in knowledge and memory gaps.”

Bruce Gain, Processor: Products, News & Information Data Centers Can Trust

“I’d love to use this book in my system administrator training courses – it’s a beautiful example of how to do problem analysis and counter-intelligence. I guess having the book describe these techniques in detail for the hostiles may be the price I have to pay to get the awareness and (hopefully) the motivation for the admin community to close the holes and do responsible system management.”

David Boyes, Computers and Publishing, Inc.

About this Book

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks’ Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.

Twenty-three cross-referenced chapters review the best security tools on the planet for both black hat techniques and white hat defense tactics. You’ll find tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate-level command-line operations to advanced programming of self-hiding exploits.

Security Power Tools details best practices for:

  • Reconnaissance–including tools for network scanning such as nmap; vulnerability scanning; LAN reconnaissance; wireless reconnaissance; and custom packet generation
  • Penetration–such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; and tricks and tools to manipulate shellcodes
  • Control–including tools for use as backdoors; and a review of known rootkits
  • Defense–including host-based firewalls; host hardening; communication security with SSH; email security and anti-malware; and device security testing
  • Monitoring–such as tools to capture and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes
  • Discovery–including The Forensic Toolkit, SysInternals, and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools such as Interactive Disassembler and Ollydbg

About the Author(s)

Nicolas Beauchesne, Bryan Burns, Chris Iezzoni, Paul Guersch, Dave Killion, Michael Lynn, Steve Manzuik, Eric Markham, Eric Moret, and Julien Sobrier are all Juniper Network employees working in Juniper’s Security Engineering Team. The key responsibilities of the team are monitoring vulnerabilities/worms/virus, security research, reverse engineering, and signature/software development for Juniper’s threat prevention products. In addition, Bryan Burns is the Chief Security Architect at Juniper Networks. The group is led by Avishai Avivi, Senior Manager, Security Engineering, who wrote the forward to the book.

Philippe Biondi is a research engineer at EADS Innovation Works and the creator of many security tools and programs, such as Scapy and Shell- Forge. Jennifer Stisa Granick has been the Executive Director of the Center for Internet and Society at Stanford Law School, where she taught Cyberlaw, and recently became the Civil Liberties Director with the Electronic Frontier Foundation.