Hack Attacks Revealed
by John Chirillo
John Wiley & Sons. 2001. 944 pages. Index, seven appendices including glossary, references, CD-ROM. $59.99 Softcover. ISBN 0-471-41624-X.

and

Hack Attacks Denied
by John Chirillo
John Wiley & Sons. 2001. 491 pages. Index, three appendices, glossary, references, CD-ROM. $54.99. Softcover. ISBN 0-471-41625-8.

 

Reviewed by  Robert Bruen   September 12, 2001

 

When I first read through these two books, I was at a bit of a loss to figure out why hackers were mentioned at all. The information presented here is how networks work, how ports works, how to do systems administration, in short, a pretty complete set of the technical things one need to know to really understand how it all works. Then it dawned on me, that is what hackers need to know and what many systems people do not know. Many of the great secrets are secrets because they are not known, not because they are hidden. What is needed is a terrific, single source, like this Hack Attack set. It is a good as any textbook I have seen when it comes to describing the practical side of networking. The Revealed volume gives one of the best explanation of an IP address at the bit level, which include how masks work. Ethernet is presented in easy to understand charts that cover the older and newer flavors, (read thick wire through 100Mb), along with descriptions of frames for all sorts of useful protocols, without going deeper than necessary. It is a comprehensive quick-start.

The next large section in Revealed is the Hacker Coding Fundamentals, actually a brief introduction to C, which I would not recommend as a method to learn C. Its value is the code that follows it. If you already know another language well and do not know C, it is helpful as you read the hacking code to be able to refer back to introduction to C. The hacking code has examples of flooding using echo and ping, tunneling and keystroke logging (let's hope this does not violate national security).

The Denied volume puts on the white hat to help in the struggle against the Revealed volume. There is some natural overlap, but the tools presented range from intrusion detection, both commercial and homegrown, through policy making to help in protecting your network. The log file examples are little excessive at times, but the code examples are interesting and useful, such as the source code for scanning your own ports.

The CDs included contain lots of code, some of it old, some almost recent, but the age should not matter if you are merely trying to learn about it. Much of the software is not on the CD, but instead there is a large list of links to the places where the code resides.

There are lots of pages in these two books, some of it detailed, but worth the effort to get through it all. I recommend this set because it covers a broad range of technical material which any systems or network administrator ought to know. It also has real code that could be used, for example, to port scan or ping flood, which I believe is necessary for admins to know. Dealing with attacks require an understanding of how they are done, especially since it is an ongoing process. It is not enough to know about a particular attack or vulnerability, because new ones are being created almost daily. What is important is to understand the underlying principles that will be utilized for attack and defense. A grasp of the foundations make it a bit easier to notice and respond to novel attacks.