Building Open Source Network Security Tools 33
Building Open Source Network Security Tools | |
author | Mike D. Schiffman |
pages | 424 |
publisher | John Wiley & Sons |
rating | 9 |
reviewer | Mike Clark |
ISBN | 0471205443 |
summary | How to use open source libraries, such as libpcap and libdnet, to build network security tools. |
Building Open Source Network Security Tools , just as the name suggests, is about how to build network security tools. This is a technical book, so you are going to have a little knowledge of C and your networking principles. This is definitely not a manager's book.
First the book describes some basic principles in developing security software. This is a quick primer in case you have never been involved in software development. Next the book goes on to describe several commonly used libraries like libnet and libpcap. For each library, the structures and functions are explained, then there is sample code. I have written programs using libpcap and libnet before, and I still learned something. There is even a section on OpenSSL programming. OpenSSL is a rather large and cryptic, no pun intended, library (in my experience anyways). This book sheds some light on it! These chapters are a great reference to have when making a new security tool.
The author then goes on to explain the several techniques like attack and penetration and active reconnaissance. Not only does the author tell you how they would in a technical sense, he provides code that does it, and explains each piece. This is very useful since most tools in the wild aren't very well commented ;) There is also a chapter on buffer overflows and format string vulnerabilities. These chapters are very well done and do a good job in explaining how they work and how to write code to use them. It may sound like this is an offensive hacker book, but it also gives examples on how to write defensive programs, like a port scan detection tool. At the end of the book the author ties it all together with a large program that utilizes many of the techniques mentioned in the book.
I found this book to be very refreshing. I had been waiting for a good security programming reference, and this is it. As a part of the Honeynet Project, I have seen a large number of compromises and tools, and one thing I've found is that in order to truly know who your enemy is, and how they operate, you need to know how their tools work. I wish this book had been released years ago when I first became interested in network security. It would have saved me from stumbling around old web pages and dead links. If you're an information security professional, this book is a must have for your library.
You can purchase Building Open Source Network Security Tools from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
About time, too (Score:1)
Nessus (Score:4, Informative)
oh goody (Score:1, Funny)
Re:Store Links (RW2 rules ...) (Score:2)
Other books? (Score:3, Interesting)
Thanks.
Re:Other books? (Score:5, Informative)
get a free account to the SANS Reading Room [sans.org]; they have whitepapers galore and a few more applied guides, including some on nessus and snort, iirc. with a good theoretical background, you should be able to proceed to use documentation for each product you choose in a mostly referential manner.
Re:Other books? (Score:3, Informative)
>interested in network security
Definitely start out with TCP/IP Illustrated, Volume 1, W. Richard Stevens, ISBN 0-201-63346-9 [kohala.com]. I can't say enough good things about this book.
Internetworking With TCP/IP Volume 1, Douglas Comer, ISBN 0-13-01830-6 [purdue.edu] is another very good book, but Stevens' book is better.
Re:Other books? (Score:2)
Re:Other books? (Score:1)
Re:Other books? (Score:2)
Sounds like an info-mercial. Oh well.
Re:Other books? (Score:1)
Re:Other books? (Score:1)
Sorry could not help
Re:Other books? (Score:1)
Yes! I highly recommend Network Intrusion Detection: An Analyst's Handbook (2nd Edition)" [amazon.com]. This is one of the best books I've ever read.
From glancing at the title, you'd think it is only about Network Intrusion Detection - but the information on tcpdump alone is priceless! This book reads like a novel, I tell you! The author is from SANS / Windows MCSE fame, and he writes the book as if he's speaking to you.
I cannot say enough about this book!
Review damns with faint praise (Score:1)
The reviewer claims: "They (other books) don't get very technical and once you've read one, you've read them all".
It is not clear to me what level of technical detail the book includes, nor how the book really differs from other books.
It is also not clear if there is any focus on creating defensive security tools (monitoring tools, etc), or offensive tools (vulnerability scanners).
I also agree with another poster: nessus is a great tool; a section in the book detailing NASL would have been nice, considering the lack of good (IMO) documentation available.
Re:Review damns with faint praise (Score:1)
Written by the author of Libnet. (Score:2)
This is his baby -- lets just say I don't have any doubts.
--Dan
How about ... (Score:3, Informative)
Picky, I know. But when the
Open source is not secure! (Score:2, Insightful)
I've thought a lot about the idea of securing systems with open source products, and it makes sense to me. The old argument was that a potential hacker could look at the source code to invade a system, and find the weaknesses therein. But there lies the biggest strength of open souce--the fact that, indeed, everyone can see the problems with the code and contribute towards the betterment of the product.
Let me use a rough example. If I purchase a set of blueprints from a home plan book, make no adjustments to the plan before I build it, how does this information grant a burglar any more information than simply casing the house and looking for weaknesses? That's not the best example in the world, but it'll do for now.
True, closed-source (e.g., commercial) software doesn't have the source in full view to scrutinize, and so is ever so slightly more "secure" (at least in the minds of those purchasing the product), but reverse-engineering is still possible, and brute-force, psychological, and other hack tactics can and do work.
Simply put, and to summarize, the idea that open-source software is insecure is simply false. In fact, it's the opposite of the truth--open-source projects benefit from a large community ensuring that all the bugs are squashed, all the holes are sealed, all the back doors are locked, and the software is more secure than anything a commercial entity could produce.
Re:Open source is not secure! (Score:2, Insightful)
Re:Open source is not secure! (Score:2, Insightful)
If anything, Open Source authors should be more alert to exploits, as I can only do this in open source software, though I'll bet a smart person could figure out how to analyze the executable to see if it uses an insecure library function, or something.
Re:Open source is not secure! (Score:2)
Why? Because the costs of a building not built to spec greatly exceed the benefit of security through obscurity. By forcing building specifications to remain open to some degree, it becomes difficult to hide egregious faults in building design -- and thus, lives are spared.
As I've been pointing out for some time -- every single non-military technology that mankind has considered important has tended towards greater and greater openness -- from legal systems to building codes to the contents of our food. Software is a rare exception.
Yours Truly,
Dan Kaminsky
DoxPara Research
http://www.doxpara.com
Complementary books (Score:4, Informative)
Nonetheless, firewalls and VPN's are still important tools in creating a secure network. My old 1995 edition of Chapman & Zwicky's "Building Internet Firewalls" has been useful to me; I've no reason to think newer versions would be any less so. If you want to build a stateful firewall, Ron Ziegler's "Linux Firewalls" does a good job with the concepts and details of iptables. Another highly recommended book is Kolesnikov & Hatch's "Building Linux Virtual Private Networks". Whenever you do security, you *must* understand what you're doing, and these authors help you do that; that understanding is portable to any OS.
Secure Programming for Linux and Unix HOWTO (Score:5, Informative)