500 Days: Decisions and Deceptions in the Shadow of 9/11


Kurt Eichenwald - 2012
    He reveals previously undisclosed information from the terror wars, including never-before-reported details about warrantless wiretapping, the anthrax attacks, and investigations and conflicts among Washington, D.C., and London.With his signature fast-paced narrative style, Eichenwald--whose book, "The Informant," ""was called "one of the best nonfiction books of the decade" by "The""New York Times Book Review--"exposes a world of secrets and lies that has remained hidden until now.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

The Revenge Of Geography: What the Map Tells Us About Coming Conflicts and the Battle Against Fate


Robert D. Kaplan - 2012
    Kaplan, the bestselling author of Monsoon and Balkan Ghosts, offers a revelatory new prism through which to view global upheavals and to understand what lies ahead for continents and countries around the world.   In The Revenge of Geography, Kaplan builds on the insights, discoveries, and theories of great geographers and geopolitical thinkers of the near and distant past to look back at critical pivots in history and then to look forward at the evolving global scene. Kaplan traces the history of the world’s hot spots by examining their climates, topographies, and proximities to other embattled lands. The Russian steppe’s pitiless climate and limited vegetation bred hard and cruel men bent on destruction, for example, while Nazi geopoliticians distorted geopolitics entirely, calculating that space on the globe used by the British Empire and the Soviet Union could be swallowed by a greater German homeland.   Kaplan then applies the lessons learned to the present crises in Europe, Russia, China, the Indian subcontinent, Turkey, Iran, and the Arab Middle East. The result is a holistic interpretation of the next cycle of conflict throughout Eurasia. Remarkably, the future can be understood in the context of temperature, land allotment, and other physical certainties: China, able to feed only 23 percent of its people from land that is only 7 percent arable, has sought energy, minerals, and metals from such brutal regimes as Burma, Iran, and Zimbabwe, putting it in moral conflict with the United States. Afghanistan’s porous borders will keep it the principal invasion route into India, and a vital rear base for Pakistan, India’s main enemy. Iran will exploit the advantage of being the only country that straddles both energy-producing areas of the Persian Gulf and the Caspian Sea. Finally, Kaplan posits that the United States might rue engaging in far-flung conflicts with Iraq and Afghanistan rather than tending to its direct neighbor Mexico, which is on the verge of becoming a semifailed state due to drug cartel carnage.   A brilliant rebuttal to thinkers who suggest that globalism will trump geography, this indispensable work shows how timeless truths and natural facts can help prevent this century’s looming cataclysms.

Red Team: How to Succeed By Thinking Like the Enemy


Micah Zenko - 2015
    The concept is as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams are used widely in both the public and the private sector by those seeking to better understand the interests, intentions, and capabilities of institutional rivals. In the right circumstances, red teams can yield impressive results, giving businesses an edge over their competition, poking holes in vital intelligence estimates, and troubleshooting dangerous military missions long before boots are on the ground. But not all red teams are created equal; indeed, some cause more damage than they prevent. Drawing on a fascinating range of case studies, Red Team shows not only how to create and empower red teams, but also what to do with the information they produce. In this vivid, deeply-informed account, national security expert Micah Zenko provides the definitive book on this important strategy -- full of vital insights for decision makers of all kinds.

Metasploit: The Penetration Tester's Guide


David Kennedy - 2011
    But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Michael Sikorski - 2011
    When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

Gray Hat Hacking: The Ethical Hacker's Handbook


Shon Harris - 2004
    Section I: Exploits 202; Chapter 1: Survival; Chapter 2: Basic Exploits; Chapter 3: Advance Exploits; Chapter 4: Writing Shell Code; Section II: Vulnerability Analysis; Chapter 5: Passive Analysis; Chapter 6: Active Analysis; Chapter 7: Bug to Exploit; Chapter 8: Mitigation; Section III: Advanced System Hacks; Chapter 9: Advanced.

I Alone Can Fix It: Donald J. Trump's Catastrophic Final Year


Carol Leonnig - 2021
    What was really going on around the president, as the government failed to contain the coronavirus and over half a million Americans perished? Who was influencing Trump after he refused to concede an election he had clearly lost and spread lies about election fraud? To answer these questions, Philip Rucker and Carol Leonnig reveal a dysfunctional and bumbling presidency’s inner workings in unprecedented, stunning detail. Focused on Trump and the key players around him—the doctors, generals, senior advisers, and Trump family members— Rucker and Leonnig provide a forensic account of the most devastating year in a presidency like no other. Their sources were in the room as time and time again Trump put his personal gain ahead of the good of the country. These witnesses to history tell the story of him longing to deploy the military to the streets of American cities to crush the protest movement in the wake of the killing of George Floyd, all to bolster his image of strength ahead of the election. These sources saw firsthand his refusal to take the threat of the coronavirus seriously—even to the point of allowing himself and those around him to be infected. This is a story of a nation sabotaged—economically, medically, and politically—by its own leader, culminating with a groundbreaking, minute-by-minute account of exactly what went on in the Capitol building on January 6, as Trump’s supporters so easily breached the most sacred halls of American democracy, and how the president reacted. With unparalleled access, Rucker and Leonnig explain and expose exactly who enabled—and who foiled—Trump as he sought desperately to cling to power. A classic and heart-racing work of investigative reporting, this book is destined to be read and studied by citizens and historians alike for decades to come.

The Next 100 Years: A Forecast for the 21st Century


George Friedman - 2008
    It imagines passing clouds to be permanent and is blind to powerful, long-term shifts taking place in full view of the world.” —George Friedman In his long-awaited and provocative new book, George Friedman turns his eye on the future—offering a lucid, highly readable forecast of the changes we can expect around the world during the twenty-first century. He explains where and why future wars will erupt (and how they will be fought), which nations will gain and lose economic and political power, and how new technologies and cultural trends will alter the way we live in the new century.The Next 100 Years draws on a fascinating exploration of history and geopolitical patterns dating back hundreds of years. Friedman shows that we are now, for the first time in half a millennium, at the dawn of a new era—with changes in store, including:• The U.S.-Jihadist war will conclude—replaced by a second full-blown cold war with Russia.• China will undergo a major extended internal crisis, and Mexico will emerge as an important world power.• A new global war will unfold toward the middle of the century between the United States and an unexpected coalition from Eastern Europe, Eurasia, and the Far East; but armies will be much smaller and wars will be less deadly.• Technology will focus on space—both for major military uses and for a dramatic new energy resource that will have radical environmental implications.• The United States will experience a Golden Age in the second half of the century.Written with the keen insight and thoughtful analysis that has made George Friedman a renowned expert in geopolitics and forecasting, The Next 100 Years presents a fascinating picture of what lies ahead.For continual, updated analysis and supplemental material, go to www.Stratfor.com

The Sword and the Shield: The Mitrokhin Archive & the Secret History of the KGB


Christopher Andrew - 1985
    Vasili Mitrokhin, a secret dissident who worked in the KGB archive, smuggled out copies of its most highly classified files every day for twelve years. In 1992, a U.S. ally succeeded in exfiltrating the KGB officer and his entire archive out of Moscow. The archive covers the entire period from the Bolshevik Revolution to the 1980s and includes revelations concerning almost every country in the world. But the KGB's main target, of course, was the United States. Though there is top-secret material on almost every country in the world, the United States is at the top of the list. As well as containing many fascinating revelations, this is a major contribution to the secret history of the twentieth century. Among the topics and revelations explored are: The KGB's covert operations in the United States and throughout the West, some of which remain dangerous today. KGB files on Oswald and the JFK assassination that Boris Yeltsin almost certainly has no intention of showing President Clinton. The KGB's attempts to discredit civil rights leader in the 1960s, including its infiltration of the inner circle of a key leader. The KGB's use of radio intercept posts in New York and Washington, D.C., in the 1970s to intercept high-level U.S. government communications. The KGB's attempts to steal technological secrets from major U.S. aerospace and technology corporations. KGB covert operations against former President Ronald Reagan, which began five years before he became president. KGB spies who successfully posed as U.S. citizens under a series of ingenious disguises, including several who attained access to the upper echelons of New York society.

Compromised: Counterintelligence and the Threat of Donald J. Trump


Peter Strzok - 2020
    His career in counterintelligence ended shortly thereafter, when the Trump administration used his private expression of political opinions to force him out of the Bureau in August 2018. But by that time, Strzok had seen more than enough to convince him that the commander in chief had fallen under the sway of America’s adversary in the Kremlin.In Compromised, Strzok draws on lessons from a long career—from his role in the Russian illegals case that inspired The Americans to his service as lead FBI agent on the Mueller investigation—to construct a devastating account of foreign influence at the highest levels of our government. And he grapples with a question that should concern every U.S. citizen: When a president appears to favor personal and Russian interests over those of our nation, has he become a national security threat?

Prisoners of Geography: Ten Maps That Tell You Everything You Need to Know About Global Politics


Tim Marshall - 2015
    Their choices are limited by mountains, rivers, seas, and concrete. To understand world events, news organizations and other authorities often focus on people, ideas, and political movements, but without geography, we never have the full picture. Now, in the relevant and timely Prisoners of Geography, seasoned journalist Tim Marshall examines Russia, China, the USA, Latin America, the Middle East, Africa, Europe, Japan and Korea, and Greenland and the Arctic—their weather, seas, mountains, rivers, deserts, and borders—to provide a context often missing from our political reportage: how the physical characteristics of these countries affect their strengths and vulnerabilities and the decisions made by their leaders.In ten, up-to-date maps of each region, Marshall explains in clear and engaging prose the complex geo-political strategies of these key parts of the globe. What does it mean that Russia must have a navy, but also has frozen ports six months a year? How does this affect Putin’s treatment of Ukraine? How is China’s future constrained by its geography? Why will Europe never be united? Why will America never be invaded? Shining a light on the unavoidable physical realities that shape all of our aspirations and endeavors, Prisoners of Geography is the critical guide to one of the major (and most often overlooked) determining factors in world history.

Thicker Than Water


Tyler Shultz - 2020
    The COO fired back with a dismissive and insulting email, to which Tyler replied: "Consider this my two weeks’ notice."From there, his life spun out of control at the hand of Elizabeth, her team of high-powered lawyers, and the patriarch of Tyler’s own family, George Shultz—one of America’s most prominent statesmen, who sat among the top of the Theranos Board of Directors. And yet, Tyler forged on. To protect his own conscience, the honor and reputation of his grandfather, and the health of patients worldwide.Thicker than Water is Tyler’s as-told-to story—a harrowing and heartbreaking roller coaster of biomedical drama, family intrigue, and redemption—that will ultimately make you feel as though you are at a dinner party, seated next to a brilliant friend with one hell of a story.

The Burglary: The Discovery of J. Edgar Hoover's Secret FBI


Betty Medsger - 2014
    Edgar Hoover had created and was operating, in violation of the U.S. Constitution, his own shadow Bureau of Investigation. It begins in 1971 in an America being split apart by the Vietnam War . . . A small group of activists—eight men and women—the Citizens Commission to Investigate the FBI, inspired by Daniel Berrigan’s rebellious Catholic peace movement, set out to use a more active, but nonviolent, method of civil disobedience to provide hard evidence once and for all that the government was operating outside the laws of the land.             The would-be burglars—nonpro’s—were ordinary people leading lives of purpose: a professor of religion and former freedom rider; a day-care director; a physicist; a cab driver; an antiwar activist, a lock picker; a graduate student haunted by members of her family lost to the Holocaust and the passivity of German civilians under Nazi rule.Betty Medsger's extraordinary book re-creates in resonant detail how this group of unknowing thieves, in their meticulous planning of the burglary, scouted out the low-security FBI building in a small town just west of Philadelphia, taking into consideration every possible factor, and how they planned the break-in for the night of the long-anticipated boxing match between Joe Frazier (war supporter and friend to President Nixon) and Muhammad Ali (convicted for refusing to serve in the military), knowing that all would be fixated on their televisions and radios.Medsger writes that the burglars removed all of the FBI files and, with the utmost deliberation, released them to various journalists and members of Congress, soon upending the public’s perception of the inviolate head of the Bureau and paving the way for the first overhaul of the FBI since Hoover became its director in 1924.  And we see how the release of the FBI files to the press set the stage for the sensational release three months later, by Daniel Ellsberg, of the top-secret, seven-thousand-page Pentagon study on U.S. decision-making regarding the Vietnam War, which became known as the Pentagon Papers.             At the heart of the heist—and the book—the contents of the FBI files revealing J. Edgar Hoover’s “secret counterintelligence program” COINTELPRO, set up in 1956 to investigate and disrupt dissident political groups in the United States in order “to enhance the paranoia endemic in these circles,” to make clear to all Americans that an FBI agent was “behind every mailbox,” a plan that would discredit, destabilize, and demoralize groups, many of them legal civil rights organizations and antiwar groups that Hoover found offensive—as well as black power groups, student activists, antidraft protestors, conscientious objectors. The author, the first reporter to receive the FBI files, began to cover this story during the three years she worked for The Washington Post and continued her investigation long after she'd left the paper, figuring out who the burglars were, and convincing them, after decades of silence, to come forward and tell their extraordinary story.  The Burglary is an important and riveting book, a portrait of the potential power of non­violent resistance and the destructive power of excessive government secrecy and spying.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code