Book picks similar to
Behold a Pale Farce: Cyberwar, Threat Inflation, the Malware Industrial Complex by Bill Blunden
nonfiction
politics
cyber-security
computers
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
Nick Bilton - 2017
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye. It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists and black hat hackers—could buy and sell contraband detection-free. Spurred by a public outcry, the federal government launched an epic two-year manhunt for the site’s elusive proprietor, with no leads, no witnesses, and no clear jurisdiction. All the investigators knew was that whoever was running the site called himself the Dread Pirate Roberts. The Silk Road quickly ballooned into $1.2 billion enterprise, and Ross embraced his new role as kingpin. He enlisted a loyal crew of allies in high and low places, all as addicted to the danger and thrill of running an illegal marketplace as their customers were to the heroin they sold. Through his network he got wind of the target on his back and took drastic steps to protect himself—including ordering a hit on a former employee. As Ross made plans to disappear forever, the Feds raced against the clock to catch a man they weren’t sure even existed, searching for a needle in the haystack of the global Internet.Drawing on exclusive access to key players and two billion digital words and images Ross left behind, Vanity Fair correspondent and New York Times bestselling author Nick Bilton offers a tale filled with twists and turns, lucky breaks and unbelievable close calls. It’s a story of the boy next door’s ambition gone criminal, spurred on by the clash between the new world of libertarian-leaning, anonymous, decentralized Web advocates and the old world of government control, order, and the rule of law. Filled with unforgettable characters and capped by an astonishing climax, American Kingpin might be dismissed as too outrageous for fiction. But it’s all too real.
Red Team: How to Succeed By Thinking Like the Enemy
Micah Zenko - 2015
The concept is as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams are used widely in both the public and the private sector by those seeking to better understand the interests, intentions, and capabilities of institutional rivals. In the right circumstances, red teams can yield impressive results, giving businesses an edge over their competition, poking holes in vital intelligence estimates, and troubleshooting dangerous military missions long before boots are on the ground. But not all red teams are created equal; indeed, some cause more damage than they prevent. Drawing on a fascinating range of case studies, Red Team shows not only how to create and empower red teams, but also what to do with the information they produce. In this vivid, deeply-informed account, national security expert Micah Zenko provides the definitive book on this important strategy -- full of vital insights for decision makers of all kinds.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Pearl Harbor: Final Judgement: The Shocking True Story of the Military Intelligence Failure at Pearl Harbor and the Fourteen Men Responsible for the Disaster
Henry C. Clausen - 1992
the authoritative appraisal of why American armed forces met the Japanese attack asleep” (The Christian Science Monitor). On December 6, 1941, Admiral Husband E. Kimmel, commander in chief of the United States Pacific Fleet, assured his staff that the Japanese would not attack Pearl Harbor. The next morning, Japanese carriers steamed toward Hawaii to launch one of the most devastating surprise attacks in the history of war, proving the admiral disastrously wrong. Immediately, an investigation began into how the American military could have been caught so unaware. The results of the initial investigation failed to implicate who was responsible for this intelligence debacle. Secretary of War Henry L. Stimson, realizing that high-ranking members of the military had provided false testimony, decided to reopen the investigation by bringing in an unknown major by the name of Henry C. Clausen. Over the course of ten months, from November 1944 to September 1945, Clausen led an exhaustive investigation. He logged more than fifty-five thousand miles and interviewed over one hundred military and civilian personnel, ultimately producing an eight-hundred-page report that brought new evidence to light. Clausen left no stone unturned in his dogged effort to determine who was truly responsible for the disaster at Pearl Harbor. Pearl Harbor: Final Judgement reveals all of the eye-opening details of Clausen’s investigation and is a damning account of massive intelligence failure. To this day, the story surrounding the Japanese attack on Pearl Harbor stokes controversy and conspiracy theories. This book provides conclusive evidence that shows how the US military missed so many signals and how it could have avoided the events of that fateful day.
Double Agent: My Secret Life Undercover in the IRA
Kevin Fulton - 2019
"I am a British soldier and I'm saving lives. I'm saving lives. I'm a British soldier and I'm saving lives..."'Kevin Fulton was one of the British Army's most successful intelligence agents. Having been recruited to infiltrate the Provisional IRA at the height of The Troubles, he rose its ranks to an unprecedented level. Living and working undercover, he had no option other than to take part in heinous criminal activities, including the production of bombs which he knew would later kill. So highly was he valued by IRA leaders that he was promoted to serve in its infamous internal police - ironically, his job was now to root out and kill informers.Until one day in 1994, when it all went wrong. . . Fleeing Northern Ireland, Kevin was abandoned by the security services he had served so courageously and left to live as a fugitive. The life of a double agent requires constant vigilance, for danger is always just a heartbeat away. For a double agent within the highest ranks of the IRA, that danger was doubled. In this remarkable account, Kevin Fulton - former intelligence agent, ex-member of the IRA - tells a truth that is as uncomfortable as it is gripping.
History of the Early Settlement and Indian Wars of West Virginia
Wills De Hass - 1851
This area was dangerous and many who had ventured there alone had never returned.
But slowly over the course of this century settlers continued to push further west until regions such as West Virginia were populated with more and more adventurous young men and women. The settlement of these lands did not occur without difficulties and colonizers frequently came into conflict with the local Native American populations. Wills De Hass’s remarkable book History of the Early Settlement and Indian Wars of West Virginia is a fascinating history of how the lands of the west were first settled by white emigrants in the eighteenth century and how these settlers came into frequent strife with the Native American tribes who had previously lived there. Beginning with Columbus’ discovery of this great continent Wills De Hass charts the colonization of this expansive land. He records with brilliant detail the early encounters that Europeans had with the men and women that they found already living across the region and explains how various nations from across the Atlantic made their first tentative footholds on this newly discovered land. De Hass records how settlers were not only conflict with Native Americans but also with each other as this region descended into war, firstly during the French and Indian War and shortly afterwards during the American War of Independence. Particularly fascinating throughout the book are the biographical sketches of various well-known frontiersmen who were particularly influential in the Ohio Valley and northwestern Virginia. This book is perfect for anyone interested in the early settlement of western regions prior to 1795 and how this area was frequently in conflict as settlers attempted to assert their rights against the wishes of the Native American populations. Wills de Hass was a lecturer and writer on archaeological and historical subjects. His book History of the Early Settlement and Indian Wars of Western Virginia was first published in 1851 and De Hass passed away 1910.
Writer, Sailor, Soldier, Spy: Ernest Hemingway's Secret Adventures, 1935-1961
Nicholas E. Reynolds - 2017
Writer, Sailor, Soldier, Spy brings to light for the first time this riveting secret side of Hemingway’s life—when he worked closely with both the American OSS, a precursor to the CIA, and the Soviet NKVD, the USSR’s forerunner to the KGB to defeat Adolf Hitler and the Nazis.Reynolds dig deep into Hemingway’s involvement in World War II, from his recruitment by both the Americans and the Soviets—who valued Hemingway for his journalistic skills and access to sources—through his key role in gaining tactical intelligence for the Allies during the liberation of Paris, to his later doubts about communist ideology and his undercover work in Cuba. As he examines the links between his work as a spy and as an author, Reynolds reveals how Hemingway’s wartime experiences shook his faith in literature and contributed to the writer’s block that plagued him for much of the final two decades of his life. Reynolds also illuminates how those same experiences also informed one of Hemingway’s greatest works—The Old Man and the Sea—the final novel published during his lifetime.A unique portrait as fast-paced and exciting as the best espionage thrillers, Writer, Sailor, Soldier, Spy illuminates a hidden side of a revered artist and is a thrilling addition to the annals of World War II.
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson - 2010
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Silent Warfare: Understanding the World of Intelligence
Abram N. Shulsky - 1991
Leading intelligence scholars Abram N. Shulsky and Gary J. Schmitt clearly explain such topics as the principles of collection, analysis, counterintelligence, and covert action, and their interrelationship with policymakers and democratic values. This new edition takes account of the expanding literature in the field of intelligence and deals with the consequences for intelligence of vast recent changes in telecommunication and computer technology the new “information age.” It also reflects the world’s strategic changes since the end of the Cold War. This landmark book provides a valuable framework for understanding today’s headlines, as well as the many developments likely to come in the real world of the spy.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Chris Sanders - 2007
But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.
The Disappearing Act
Florence de Changy - 2021
In a world defined by advanced technology and interconnectedness, how could an entire aircraft become untraceable? Had the flight been subject to a perfect hijack? Perhaps the pilots lost control? And if the plane did crash, where was the wreckage?Writing for Le Monde in the days and months after the plane’s disappearance, journalist Florence de Changy closely documented the chaotic international investigation that followed, uncovering more questions than answers. Riddled with inconsistencies, contradictions and a lack of basic communication between authorities, the mystery surrounding flight MH370 only deepened.Now, de Changy offers her own explanation. Drawing together countless eyewitness testimonies, press releases, independent investigative reports and expert opinion, The Disappearing Act offers an eloquent and deeply unnerving narrative of what happened to the missing aircraft.An incredible feat of investigative journalism and a testament to de Changy’s tenacity and resolve, this book is an exhaustive, gripping account into one of the most profound mysteries of the 21st century.