본문 바로가기

카테고리 없음

Michal Zalewski Silence On The Wire



For Christmas, Valorie got me a copy of Michal Zalewski's 'Silence on the Wire'. I have a fair amount of respect for Michal as a security researcher, he's done some realy interesting stuff, so I was looking forward to reading it (I have no idea where Valorie found it, I didn't even realize the book existed).

Some details about Silence on the Wire Michal Zalewski Pdf. Short Description of Book – There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

'Silence on the Wire' describes itself as 'a Field Guide to Passive Reconnaissance and Indirect Attacks' (I know that because it's on the front cover of the book). In it, Michal discusses Information Disclosure vulnerabilities and the various ways that information can leak out from a system, even when that system is protected by a firewall. He also discusses (although not in as much detail) ways that you can mount indirect attacks against a host.

I finished it a while ago, and found it 'interesting'. Overall, it was a reasonably enjoyable read, but I have to be honest and say that I'm not really sure that the book actually met the discription on the cover. There were also several mysterious (to me) diversions during the course of the book.

For instance, Chapter 2 starts with a huge discussion about how von Neumann computers work, including how memory gates are assembled, etc. While The end of the chapter discusses a way of of using detailed timing analysis to as a covert channel to detect information leaking from sensitive calculation. The hardware discussion was interesting stuff, I'm not sure why it needed to be in a book on passive analysis (and realistically, Charles Petzold did a better job of it in his book 'Code').

There are similar digressions throughout the book (although none as notable as this one).

One of my favorite portions of the book was the one with the pretty pictures ;). In it he discusses a fascinating analysis of the pseudo random number generator that's used to generate TCP/IP sequence numbers. He showed a series of pictures and some analysis for a series of operating systems, ranging from good to not so good. I do wish he had used more up-to-date operating systems in his analysis, the book was printed in 2005, but he uses examples from Mac OS 9, and Win98 and NT4, and none from Win2K3, or OS X.

Some of my problems with the book are:

John mayer pdf file. May 05, 2017  The musician John Mayer assisted with its. Instruction DVDs, Solos, Transcriptions, Arrangements, Video. A detailed tab/music instructional booklet is included as a PDF file. John Mayer - Continuum. The News Archive DVDs. Space-Time Continuum. John Mayer Guitar PDF. Guitar With Tablature) By John Mayer If you are searched for a book by John. John Mayer Sheet Music. Don't wait to play the renowned piece by John Mayer for piano solo. It includes PDF sheet music files. It also includes interactive sheet music for realtime transposition. Have a blasting peformance with the wonderful composition by John Mayer for voice, piano or guitar. It comprises PDF sheet music files. NEON - John Mayer Page 2 of 7 Generated using the Power Tab Editor by Brad Larsen. D P r e-V s 1 11 T A B Csus4 0 (x). Slow Dancing In A Burning Room is a song by John Mayer. Words and music by John Mayer. As heard on John Mayer's recording Continuum. Guitar and bass tablature PDF transcribed by Jeff Perrin. JOHN MAYER LIVE SONGBOOK Download John Mayer Live Songbook ebook PDF or Read Online books in PDF, EPUB, and Mobi Format. Click Download or Read Online button to JOHN MAYER LIVE SONGBOOK book pdf for free now.

While he does a good job pointing out ways information can leak out, he doesn't really provide ways of mitigating the flaws. That's a shame, because it limits the usefulness of the book IMHO.

In addition, he doesn't go back and discuss how vendors have responded to vulnerabilities. A good example of this is his discussion of the GUID. As originally designed, GUIDs were tied to a particular network adapter, and Michal discusses some of the issues associated with this. However, starting in Windows 2000, all UUIDs created no longer have this association with the hardware, he never mentions that fact.

You can use drag and drop feature to edit your files and save into your required format. Vector Magic Desktop Edition 1.15 Product Key helps you to change desktop application images with copy and paste feature. Serial magic software.

This latter issue means that even if a vendor responded and removed a potential vulnerability, a reader won't know about it, which is a shame, because it leads the user to believe that there are unaddressed security issues in the vendors product.

Overall, I enjoyed reading the book, I found much of the information presented to be fascinating (and a bit scary).

Goodreads helps you keep track of books you want to read.
Start by marking “Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks” as Want to Read:
Rate this book

See a Problem?

We’d love your help. Let us know what’s wrong with this preview of Silence on the Wire by Michal Zalewski.
Not the book you’re looking for?

Preview — Silence on the Wire by Michal Zalewski

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.
Silence on the Wire dissects several unique and fascinating securit
..more
Published April 22nd 2005 by No Starch Press (first published January 1st 2005)
To see what your friends thought of this book,please sign up.
To ask other readers questions aboutSilence on the Wire,please sign up.

Be the first to ask a question about Silence on the Wire

Samurai deeper kyo manga. (Jun 22, 2003) You can contribute information to this page, but first you must or Graphic novel 2008----------08-12 (from $4.99) 2003---------02-08 (from $4.99) 2005-04-12 (from $4.99) 2005-06-07 (from $4.99) 2005--08-09 (from $4.99) 2005-09-13 (from $4.99) 2005-10-11 (from $4.99) 2006-05-09 (from $4.99) 2006----------06-22.

Hacker nonfiction
58 books — 77 voters
Books For the Aspiring Hacker
14 books — 9 voters

More lists with this book..

Michal Zalewski Silence On The Wire Lyrics

Rating details

|
Amazon 2008-07-12, recommendation from a friend.
An InfoSec book with truly new perspectives, let alone detailed technique, is one of the world's great rarities -- we Defenders of the True Faith, protecting the Internet and her citizens, normally must scour the academic literature, hunt down the deep Webs running on zombied machines for the lancing, draining, and strip-mining of information on Romanian, Russian, and Chinese efforts, and perform our own small researches and inquisitions under nigh
..more
Apr 01, 2009Alexei rated it it was amazing
Shelves: made-of-awesome, programming, technology-internet
Wire
Silence on the Wire provides fascinating insight into security - rather than discussing the traditional security issues, rooted largely in implementation bugs, it discusses how the design of the fundamental protocols and technologies of the Internet creates room for subtle and sophisticated uses above and beyond what their designers intended.
Oct 12, 2007Nick rated it it was amazing
This is probably the best-written guide to how networks and operating systems themselves work, and how knowledge of how these things do what they do in their own special way reveals much about what specifically is doing the talking. If that makes any sense. I loved it.
Absolutely fantastic book, a great survey of network analysis and passive reconnaissance. Zalewski's insights are ingenious. A definite must read for anyone studying network security.
Silence on the Wire's topic, passive listening to determine the information processed by a system, has never been more topical than now.
I was looking forward to reading a book that illustrates some of these attack vectors and maybe some feasible usage and defence scenarios.
In reality though, this book is about 80% basic computer science and 20% computer security. The strange things is that most of the basic computer science is pretty irrelevant to the actual attacks which are described at a high
..more
Jul 23, 2017Jarek rated it really liked it
I came in a little skeptical: it's a book from 2005, and I already knew how Ethernet works and why you should make sure your encryption runs in constant time. But this was legitimately an interesting read, with many points and takeaways still interesting and applicable in 2017. If the idea of _understanding_ what the computer is doing -- and what implications that has on all kinds of security -- appeals to you, it's a book for you.
An awesome book. I understood quite a bit about TCP/IP, what can be learned from modem lights, and why my dial-up modem made those funny noises, all these years ago. A lot can be learned about a network by only listening, and this book shows how.
One of the best hacking books I have ever read. Absolutely mandatory for infosec professionals and hackers.

Author Michal Zalewski is respected in the hacking and security communities for hisn intelligence, curiosity and creativity, and this book is truly unlike anything else.n Silence on the Wire is no humdrum white paper or how-to manual for protectingn one's network. Rather, this narrative explores a variety of unique, uncommon andn often elegant security challenges that defy classification and eschew the traditionaln attacker-victim model.

Deewar film mp3 songs download. Recent Tags: Deewar (2004) songs download, Deewar (2004) mp3 song| Deewar (2004) download song| Deewar (2004) free play mp3 song| Deewar (2004) free download mp3 song| Deewar (2004) download mp3 song| Deewar (2004) movie songs| Deewar (2004) free song| Deewar (2004) play online| Deewar (2004) Lyrics| Deewar (2004) online play| Deewar (2004) free mp3 songs| Deewar (2004) play mp3 song| Deewar (2004) online mp3 songs| Deewar (2004) full songs| Deewar (2004) online music| Deewar (2004) Video song download| Deewar (2004) online mp3| Deewar (2004) Movie song download| Deewar (2004) mp3 Download.


There are many ways that a potential attacker can inte

..more
Despite the fact that this book is a little old as for the IT book about security, it is still an interesting read. Different look at security problems
Oct 20, 2017

Silence On The Wire Michal Zalewski Pdf

André rated it it was amazing
Shelves: aged-outdated, comp-swtest-infosec, computing, comp-networks, comp-hardware-lowlev, comp-unconventional, lang-en, non-fiction, classics, comp-data-anlys-optm
MUSIC IS THE SILENCE BETWEEN THE NOTES (DEBUSSY)
Kurzweilige Darstellung unkonventionellen Denkens und des kreativen Umgangs mit Informationstechnik, auch unabhängig davon, ob die konkreten Anwendungsbeispiele noch relevant sind (manche sind es, viele waren es zwischen 1997-2004). Die Ansätze, um von einem Gegner unbeabsichtigte Auskünfte über ein Zielobjekt zu gewinnen, sind übertragbar: Unaufmerksame Entwickler, unvollständige Spezifikationen, kryptoanalytische Naivität und logische Fortgänge b
..more
This book is probably one of my favorite books on security. Many security books rehash old topics that have almost been covered time and time again but this one does not. Fortunately, Michal Zalewski takes a very interesting approach to security. It is a very unique book because he takes a look at security vulnerabilities that involve passive reconnaissance. I really enjoyed learning about typing timing patterns, the blinking light vulnerability on modems and parasitic storage (and computing) we..more
Jun 10, 2016Julio Biason rated it it was ok
This is a book about passive detection. Or active detection. Or attacks. I really don't know, because the subject keeps jumping around so much you have no idea the point the author wants to make.
There are plenty explanations for stuff, but mostly is dumbed down to the point it doesn't even make sense. Besides that, you have explanations for attacks that sounds really scary/cool (depending on your point of view) but after you think a bit about it, it is really hard to execute and, with the necess
..more
Zalewski is renowned throughout the InfoSec industry for simply being incredible and bringing many new ways of thinking to the industry through his research.
In 'Silence on the Wire', Zalewksi discusses security vulnerabilities and methods of attack that are simply mind-boggling. Although I've been in InfoSec for quite some time and there are areas of repetition for me, much of the book was fascinating and thought-provoking, from both a defender and attacker mindset.
The one downside is that the b
..more
Aug 22, 2007Ivan rated it Silence on the wire michal zalewski pdfit was amazing
Recommends it for: hackers, network security folks, people interested in online privacy
Genius work focusing on passive recon, and not a very hard read either. The explanation of the thoughts and discoveries behind his ideas is easily as interesting as the real-life examples of how they can be used. If you're trying to protect someone's data, you really NEED to understand what Zalewski has to say. And if you think your data can truly be secure, just try to understand, that is not the world we live in today..
I bought this book for myself at HOPE 2006, but it was so good I gave it t
..more
May 04, 2016Nina rated it it was amazing
This book focusses on security flaws that exist because of the way something was designed. They may not all be the most commonly exploited flaws, since some aren't so practical to take advantage of, but they sure are interesting to learn about. The book starts right within the heart of the computer and expands all the way out to the internet as a whole. It is less of a practical guide in that it neither really tells you how to exploit something, or how to protect you against said exploit, it mer..more
I read this right after Zalewski got hired by Google as their web security guru. He has good perspective on security engineering and it is reflected in the pages of this book. As we obsess over the things we can see and secure, this book takes the approach of understanding the people, not very unlike Art of Deception in ages past. Not all the vectors are going to be obvious but you need to anticipate them.
It is a bit dated, and it will only get more so, but it only means you need to read it as soon as possible. For me it's a good example that an author can get in-depth about a technical subject and keep it interesting at all times. It really gave me some new insights about networking and it-sec. Solid recommendation!
Well another book finished that I have on my 'to-read-urgently' shelf since, well, I don't remember.
The only problem is that in the while most of the stuff is REALLY outdated, but still a pleasant read.
Oct 02, 2012Takedown rated it really liked it
A bit dated but still interesting book about cool low level tricks. I was especially fascinated about first part of the book and those hardware hacks.
I love the way the author describes the ways in which information that is sent through networks becomes vulnerable to attacks or surveillance.
Poor structure and poorly written as well as a lot of content which was last relevant in 1997.
A great generalist's introduction to the ways information can leak from a system, especially as that system's design becomes more complex.
Apr 29, 2009Andy Magnusson rated it it was amazing
A fantastic and readable overview of a wide range of passive reconnaissance techniques, mixed with a good dose of computing history.
Kamil Grabowski rated it it was amazing
Nov 15, 2016
There are no discussion topics on this book yet.Be the first to start one »
Recommend It | Stats | Recent Status Updates
See similar books…
If you like books and love to build cool products, we may be looking for you.
Learn more »
See top shelves…

Michal Zalewski Silence On The Wire Tv

19followers