News:

Wieners, Brats, Franks, we've got 'em all.

Main Menu

Book: Silence on the Wire

Started by iago, July 13, 2005, 02:20:08 PM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

iago

I bought "Silence on the Wire: a Field Guide to Passive Reconnaissance and Indirect Attacks" yesterday on impulse, and so far I've read the first two chapters.  I have one thing to say: it's amazing!  I bought it because it was written by the guy who wrote p0f (which I love), and I'm glad I did.

It's a book that takes a different approach to security and attacks.  Rather than the conventional attacks like buffer overflows, he explains more subtle things like timing and random number prediction as threats that aren't commonly seen.

The first chapter explains how you can guess somebody's keystrokes based on the entropy used for /dev/random.

The second chapter explains how you can find somebody's private key by sending them information to decrypt and measuring response time, based on CPU architecture and optimizations.  For example, if part of the algorithm multiplies, and the key involves a "0", it'll run faster.  Lots of little tricks like that.

So far, I'm very impressed.  Highly recommended!!

rabbit


iago

USD$35?

I'm not scanning 250 pages.

rabbit

My history teacher scanned more than that.  Come on iago!

iago

Plus, he's a hard working young guy who's trying to make a few bucks.  Help him out!

rabbit

I don't have that kind of money :\

Tuberload

Quote from: R.a.B.B.i.T on July 14, 2005, 04:06:21 PM
I don't have that kind of money :\

Put in some effort and I am sure you can come up with $35...
I am prepared to be ridiculed for what I believe, are you?

RoMi

Don't you have a job R.a.B.B.i.T?
-RoMi

rabbit


iago

I just finished it today.  It's fantastic, I highly recommend it. 

The whole thing is based on research/security holes that don't come from flaws in programming, but rather from problems in specifications, or ambiguities in specifications. 

Much of it involves how to fingerprint OS's and browsers without being obvious.

There's a chapter on "parasitic computing", which involves using other computers on the Internet for computation without actually exploiting them, but by taking advantage of some sneaky parts of implementations (like using a specially contructed IP checksum to get a server to make computations for you).  That chapter also talks about parasitic storage, how to store data somewhere besides your computer.  There is an estimated (according to numbers from 2003) 2500TB of possible online storage space on SMTP servers alone, if you had the bandwidth to use it.

Anyways, I have to say once again, this is a VERY good read.  Very different from normal security books.