Practically Networked Home Earthweb HardwareCentral earthwebdeveloper CrossNodes Datamation
Welcome to PractiallyNetworked
Product Reviews

 • Routers
 • Hubs/Switches
 • Wireless Gateway
 • Wireless AP
 • Wireless NIC
 • Network Storage
 • Print Servers
 • Bluetooth Adapters
& Tutorials

 • Networking
 • Internet Sharing
 • Security
 • Backgrounders
 • Troubleshooting

 • PracNet How To's
User Opinions
Practicallynetworked Glossary

 Find a Network Term  

Book review by Joe Moran
September 24, 2002

Author: Various
Publisher: Syngress
Price: $49.95
Pages: 789
ISBN: 1-928994-70-9

The tag line of Hack Proofing Your Network, Second Edition, is "The Only Way to Stop a Hacker is to Think Like One." Truer words were never spoken. Indeed, the only real distinction between hacking and hack-proofing may ultimately be intent.

This hefty tome is penned (alright, typed) by a baker's dozen of authors, not including several more who originally worked on the book's first edition. Two of the authors are known only by their "hacker handles" (K2 and Rain Forest Puppy) which sound more the names of rock groups than people. This abundance of contributors underscores (perhaps unintentionally) what a broad discipline network security is, and how unlikely it is for any one person to be an expert on all of the various areas that comprise it.

As I mentioned in a previous review of another book in this series, I like these Syngress books because of the way the information is summed up succinctly at the end of each chapter. In addition, each chapter includes a Solutions Fast Track: a bulleted review list of key concepts that reinforce the material. They are great for getting the essence of the chapter without having to plod through all the detail which may not be relevant to your situation.

Hack Proofing Your Network is 17 chapters long, and is a very thorough discussion of network security theory, concepts, and practices. The book approaches the topic from a couple of different perspectives.

The first is from the perspective of programmers. The book explores different classes of vulnerabilities lying in various types of application code (Web servers, databases, and so forth). This includes things like buffer overflows, which are the basis of many of the highest profile and most recent attacks, like Code Red. The book outlines techniques for exposing and exploiting these weaknesses, ostensibly for the purpose of eliminating them in your code. If you've never written code, you'll likely find the examples and some of the terminology difficult to follow, but the information still has value, explaining the rudiments of how these weaknesses are caused.

The other angle of approach is from that of a network engineer. Topics such as encryption and tunneling are explained as means to provide secure communications, and the book goes into detail on things like sniffing (reading frames off a wire in order to glean information), and spoofing (providing false information to another host), telling the reader what they are and how to do it.

Coming from a networking rather than a programming background, my favorite chapters were on sniffing and outlining the differences between viruses, worms, and Trojan horses (three terms too often used interchangeably).

Even if, like me, you have a solid understanding of TCP/IP (but no particular expertise in security), this book can be somewhat disturbing to read, since it outlines the myriad ways that computers on your network can be attacked, infiltrated, and compromised. It confirmed what I knew to be possible but tried not to think about. This book forces you to think like a hacker, and realize that what is possible may also be probable and in fact going on right under your nose.

Unfortunately, the book is that it doesn't include a CD. The book is strewn with references to various relevant utilities, including protocol analyzers, tools for session hijacking and other attacks, and programs to audit your environment and check for vulnerabilities. Most of these are open source and freely distributable, so it would be nice if they were collected and included with the book.

That is ultimately a minor complaint. If you're a programmer, network administrator, or simply an interested observer, you'll learn a great deal by reading this book. Just make sure you put your newfound knowledge to good use. Earthweb HardwareCentral earthwebdeveloper CrossNodes Datamation

Home | Networking | Backgrounders | Internet Sharing | Security | HowTo | Troubleshooting | Reviews | News | About | Jobs | Tools | Forums