-
Hackers Challenge 2!
Hi AO!
I picked up a book called Hackers Challenge 2 .
It is the sequel to Hackers Challenge .
I have to say that I absolutely love the first one and I read it in about a week on the beach.
So... I picked up the second one. :)
So far I've only skimmed through it but I've liked what I've seen.
They have all of your classic senarios and more. These challenges seem to be a little more difficult than the last ones. Seeing that I'm still a newbie with computer forensics, thats not a bad thing, cause I get to learn something.
Has anyone else picked up this book, and if so, what do you think of it?
If you have not yet purchased this book or the first one... I would recommend it.
They are a great way to learn about the differend types/scenarios of an attack and how to counter it along with the tell tale signs of attacks and how to protect yourself from these attacks. Great reading!
-
Hrm.... i might take a look into it, thanks for the heads up
-
cool ill take a look aswell looks good thanks
~Neo
-
Well i get confused by these HACKING Books.Some says HACKING EXPOSED
-
exactly what confuses you bat21? if i could make more sense of your post i would try to help you clarify some things ..?.
-
Well i get confused by these HACKING Books.Some says HACKING EXPOSED series is best and now HACKER CHALLENGE. So guys help me to point the best book.
-
well thats the whole idea of the book reviews.. some books are better written than others and some have different content.. go to www.amazon.com and read what they have to say about the books their... read a varied wide range of books for a broader knowledge base..
search this forum for book reviews on some books that you are interested and read reviews on them .... also remember dont just judge a book by its cover. the title doesnt really mean a lot ...
-
An excellant read:
---->Network Intrusion Detection : An analysts handbook
A bit of a tough read in places..but well worth it...
never heard of hackers challenge (sounds interesting tho)..but the hacking exposed series were quite interesting....
Happy Reading!!
-
i'll take a l00k into all of these b00ks....they sound g00d reading....
|kante - check it out....amitabh bachan + bank robberies = good m0vie....
-
I read Hacking Exposed it's a good one and you should check 2600 and Phrack
http://www.2600.com
http://www.phrack.com
-=[Ph3ar]=-
-
just ordered the book, looks pretty interesting
BTW = this was a pointless post for me to make. muhuhahaha!!!
-
Cool! Loved the first one (although the I thought the hacks difficulty levels were a bit overrated), didn't know there was a second one out! Gonna grab it ASAP! Thanks for the heads up!
Ammo
-
UPDATE: I've been reading this and the hacker diaries all weekend.
I must say that i'm very impressed with the Hackers Challenge 2. I love reading stuff like this.
I think its going to take me longer than a week to read this one though... I have too much school work.
But I def. recommend it!
Oh, the Hacker Diaries is good too. The thread on that one went suicidal so I thought I'd post my opinion on that here. The link I included was a review by someone who likes it as much as I do.
Here is where you can buy it if you are interested. I recommend this one too!
-
ive read the hacker diaries and i must say i really enjoyed it .. it has no technical teachings (that i can remember) or anything like that in it but it is a really good read on events leading up to capture of "hackers" and how they got into the game and their backgrounds etc.. it was an enjoyable book! :)
-
My turn to update:
I've just finished reading hacker's challenge 2. It was pretty good, but compared to hacker's challenge 1, I found the challenges to actually be somewhat easier. That, or I'm really getting better ;)
More objectively...
Compared to the first book, the attacks are less specific, and by that I mean that they're addressing more a type of attack than a particular exploit, which is not bad in itself.
The challenge with the buffer overflow explanations was pretty good read: while perhaps not you're typical remote buffer overflow, which would have been harder to explain clearly (without explaining all the surrounding network and server implications), instead they had a very good explaination of a basic buffer-overflow. Once you understand this, the only diffrence is how the egg is delivered.
Oh, on the editorial side, I found some of the authors attempts in dramatical descriptions to be, well, unnecessary...
Asside from this, it's still a greate read.
My personnal take on this series is that they really help you stay sharp. Your network(s) might not get compromised often (hopfully, if you're doing your job right!) but reading such stories really help condition yourself in how to react when such an event occures.
Ammo