Black Hat 135
Black Hat: Misfits, Criminals, and Scammers in the Internet Age | |
author | John Biggs |
pages | 176 |
publisher | APress |
rating | 8 |
reviewer | CWitz |
ISBN | 1590593790 |
summary | An introduction to the morass of malice that threatens any internet-connected personal computer; gives a broad overview of both social engineering and purely mechanical attacks, and advice on avoiding them. |
Biggs is a technical journalist with more than seven years of real-world IT experience (programming and management), and he handles complex topics on the page in a fun, easy to understand manner. The book begins with the tale of a hapless spam victim in Germany, and moves on to introduce us to Alan Ralsky, the "spam king of Detroit."
Ralsky describes himself as an honorable marketing professional, but a Detroit Free Press article in November of 2002 pointed out that his computers vomit out more than 650,000 emails each hour. While his label of spammer or marketer may be debatable, there's no question about his efficiency. From the interview with Ralsky, Biggs moves into telling the story of his own struggle with spam. The discussion then turns to various relevant legal and social issues, and this shift is a hallmark of the book's positive qualities.
Black Hat effortlessly moves from straightforward factual reporting to first-person narratives to social and political commentary. The factual sections are just-the-facts-ma'am-reporting that would seem at home in any newspaper or technical journal. The first-person narrative sections are funny and reassuring. For leery technophobes like me, it's nice to know the experts struggle with many of the same computer bugaboos that plague me. The political and social commentary sections succinctly explain legal and cultural influences that shape the world of the internet today.
A good example of the political commentary is the chapter entitled "Upload or Perish: Pirates." As an aspiring author myself, I've always found myself believing that "sharing" intellectual property was inherently wrong. So I chose not to use Napster or Kazaa or the other options and totally agreed with efforts to prosecute active Napster users. But in this chapter, Biggs points out the misguided attempts of the industry by targeting the wrong people in their fight against sharing and piracy. In Eastern Europe and China, there are CD-pressing factories spewing out thousands of copies, complete with jewel case, printed insert, and full-color printing that are almost impossible to distinguish from the real product.
Biggs writes: "BMG Music representative Rob Anderson told me that many of the pirates have better CD and DVD reproducing equipment than even the large, official distributors." The discussion of industry actions targeting the wrong people continues with "Record companies can sue as many 12-year-olds as they want...but the equation will always be the same: piracy cannot be stopped." Detailed explanations of key landmark piracy lawsuits follow and the chapter ends with Biggs providing some suggestions for how the industry can help themselves in more effective ways, rather than attacking kids with home computers and a Jones for Metallica. Quite simply, he states the industry should use the technology to effectively deliver their product, at a reasonable cost, to the consumer. If listeners are going to share files, then the industry should harness the technology instead of stomping their feet and demanding that teenagers continue to trek down to the local mall and spend twenty dollars on a CD that may only have one or two good songs.
Personally, I'm still not sure that I believe in file sharing. Just because something isn't tangible (it's music or it's words or it's code) doesn't mean someone didn't work hard for it and invest in it. But Biggs' illuminating discussion certainly made me see how the industry has mismanaged their very lifeblood. I may not be file sharing anytime soon, but I won't be part of the angry mob hunting down file sharers any longer.
In Black Hat, Biggs manages to clearly explain certain technical aspects of spam, viruses, and other internet parasites. For instance, we've all seen that pile of gibberish at beginning of spam e-mails and Biggs explicates that mess in a way that anyone can understand. Like those rare moments in high-school English class when the teacher explains a poem that you always thought was unintelligible garbage, and the light goes on, and suddenly that long-haired Brit makes sense -- after reading Black Hat, I now understand much of what was to me only gibberish before.
In the chapter entitled "Shockwave: Worms and Viruses," Biggs dissects a simple, working worm. The worm was written by 16-year-old in Austria named Second Part to Hell with a taste for programming to White Zombie. Biggs interviews the worm writer and delves into the world of programmers he likens to sword makers, steeped in art and tradition. They do not include any dangerous payloads in their worms, but the possibility that someone could use the worm for malevolence isn't their concern, any more than the sword maker worries about how the weapon is being used. The dissection of Second Part to Hell's worm begins by actually showing the PHP web-programming code. Biggs then walks through each section, explaining how the worm selects which files to infect, creates a copy of itself, and processes its code to spread, and finally appends itself to the top of each file so it can seek out new victims.
The book goes on to discuss Nigerian 419 scammers, malicious virus writers, hacking legends like Lord Digital, spyware, and ultimately what a user can do to protect their computer and data. Entertaining and educational, Black Hat was a valuable read to a non-technical person like me. Best of all, John Biggs' suggestions for protecting my computer against the frightening aspects of the internet have made my cyber activities more comfortable and secure.
You can purchase Black Hat: Misfits, Criminals, and Scammers in the Internet Age from bn.com. Slashdot welcomes readers' book reviews. To see your own review here, carefully read the book review guidelines, then visit the submission page.
Does anybody know... (Score:1)
I have to ask, is the treatment of "spyware" and "419 scams" only a mention in the book, or is there some detail given to these important subjects?
Also, I am technical, too, but I readily admit to buying and reading "... for Dummys" series books on many (including technical) subjects. It's nice to see a Slashdot review for this type of book.
Re:Does anybody know... (Score:5, Insightful)
Re:Does anybody know... (Score:2)
I've browsed in a few, and they seem pretty much on the ball usually, no really big stinkers on first look. The "for dummies" title is basically a way of poking fun at themselves, well, and their readership. Anyway, it's meant as a joke.
Other series however, seem to take such titles perhaps a little bit too seriously.
What are we to m
Re:Does anybody know... (Score:2, Informative)
It is what is called "irony." Saying the opposite of what you mean. The joke is that the books are for those intelligent people who feel like dummies because they have been reading people who actually are and thus "don't get" what are actually simple concepts if simply, and intellegently, explained.
Andre LaMothe's Windows Game Programming for Dummies, for instance, gives the most concise and intelligently understandable introduction to the Windows SDK and Direct X I have ever
Re:Does anybody know... (Score:1)
Wow. My experience with the For Dummies books have been the exact opposite. Page after page of nothing but fluff with very little actual meat. I much prefer books that don't talk down to you but instead just give you all the facts. The O'reilly Nutshell series of books are what I think of when I think of being useful when you dont need to sift through tons of BS to get to what you want.
Re:Does anybody know... (Score:1)
Re:Does anybody know... (Score:2)
LK
Re:Does anybody know... (Score:1)
Chapter 1: (Score:5, Funny)
This is a person who knows how to have a good time (Score:4, Insightful)
Because going through life in perpetual fear is always the best way to deal with it.
If you are afraid of something, learn about it. If it doesn't make the fear go away, at least you can learn how to minimize the threat.
Re:This is a person who knows how to have a good t (Score:1, Insightful)
Er? (Score:5, Insightful)
Um, that's probably the reason the reviewer bought the book.
Re:Er? (Score:1, Interesting)
>Um, that's probably the reason the reviewer bought the book.
If you are already fearful of the Internet, purchasing a book titled Black Hat: Misfits, Criminals, and Scammers in the Internet Age is probably more to validate your fears rather than calm them.
Re:Er? (Score:2)
Re:Er? (Score:1)
Re:Er? (Score:1)
Better to die on your feet... (Score:3, Insightful)
I life my life for myself. Many will think that a selfish attitude, and they are right. But it is no more selfish than those who would tell me how to live my life, for example by telling me to not climb mountains, get shot at, or sleep alone and unprotected in Grizzly country. It is my life, and my choices. I believe that life is about choosing either to live, or merely exist. For me, living is seeking
OT: "Better to die on your feet... (Score:2)
The same person who said just about everything else of importance: James Brown [funky-stuff.com].
And of course, I should know.
Re:Better to die on your feet... (Score:3, Funny)
"Better to die on your feet than to live on your knees"
- Benito Mussolini.
Now, I'm not saying that there's not some truth in the sentiment, but it's worth knowing when you're quoting fascist dictators.
Re:Better to die on your feet... (Score:3, Funny)
This sounds fine, until my tax dollars go to cover the unimaginable medical costs required for your care and rehabilitation from a gruesome and totally unnecessary "accident" that is really the result o
Re:This is a person who knows how to have a good t (Score:2)
Because going through life in perpetual fear is always the best way to deal with it.
Perpetual vigilance, on the other hand...
Wouldn't say that I'm paranoid - but back in my windows days - and to some extent even now running Linux - I treat(ed) every email attachment as a potential virus. Probably why I never got infected via email (infected just once, thru other computers at a LAN game.)
I do know some windows users who *are* afraid of viruses - and I'm not sure they are all that wrong to be, eith
Re:This is a person who knows how to have a good t (Score:2)
I'd love to, but I'm too busy cleaning the sand out of my nostrils.
Re:This is a person who knows how to have a good t (Score:2, Funny)
I wouldn't worry your pretty little head about it.
As a self-appointed representative of ... (Score:3, Funny)
Those sending $49.95 will receive a full, detailed rebuttal to these scurrilous attacks against my clients. Or better yet, send your credit card number and we'll just bill you.
Re:As a self-appointed representative of ... (Score:2)
What level of experience is this book? (Score:5, Interesting)
Re:What level of experience is this book? (Score:1, Informative)
Re:What level of experience is this book? (Score:2)
Re:What level of experience is this book? (Score:2)
hard to argue with that.
Interesting. Media for message. (Score:4, Insightful)
Personally, I'm still not sure that I believe in file sharing. Just because something isn't tangible (it's music or it's words or it's code) doesn't mean someone didn't work hard for it and invest in it. But Biggs' illuminating discussion certainly made me see how the industry has mismanaged their very lifeblood. I may not be file sharing anytime soon, but I won't be part of the angry mob hunting down file sharers any longer.
This suggests that the way to get this message out to people is more through media (books, maybe films?) than just whining about it amongst ourselves or trying to argue with people.
On the other hand, the reviewer is specifically reading the book, looking for this information, rather than having it forced on him, so would seem to be more receptive.
It's just too bad that the media is owned by so few people, all of whom have a vested interest in keeping things the way they are.
Re:Interesting. Media for message. (Score:1)
It hasn't happened yet, and I doubt that it ever will.
Re:Interesting. Media for message. (Score:2)
Re:Interesting. Media for message. (Score:1)
Re:Interesting. Media for message. (Score:2)
At least... (Score:3, Interesting)
His website was made with DW (Score:1, Offtopic)
Im pissed! (Score:2)
Which Page... (Score:1, Funny)
How can you claim... (Score:5, Insightful)
Re:How can you claim... (Score:2)
A little education will go a long way toward nullifying those common types of attacks. Not having read the book, I assume it also tells people that there are technical measures that must also be employed (i.e. AV, firewall, etc.)
Re:How can you claim... (Score:2)
Re:How can you claim... (Score:2)
A false sense of security is no substitute for real security and real security is something you need to continually rethink...at least that's MHO.
uhhh (Score:2, Insightful)
Re:uhhh (Score:5, Funny)
What I lack in fighting skills, I more than make up for in fear of walking down the street.
What I lack in investment banking skills, I more than make up for in fear of opening a savings account.
What I lack in driving skills, I more than make up for in apprehension about driving on the road.
This has got to be an all time low for Slashdot.... this guy basically started out by stating that he wasn't qualified to write the following review, but he did it anyway.... lovely. Does this mean if I review the next release of an Apple OS I can qualify it by saying I know almost nothing about Apple systems and Slashdot's editors will post it?
RE: This has got to be an all time low... (Score:2)
What?
But most of all I just don't care. (Score:3, Interesting)
Re:uhhh (Score:2)
The word "apprehension" means both "fear" and "understanding". I think he used the latter meaning.
Re:uhhh (Score:3, Interesting)
Case in point: I knew an administrative assistant once who kept a towel draped over the front of her monitor when she wasn't using the computer so people connected elsewhere on the LAN couldn't watch her paint her nails on the job. This was around 1990 at a university, and they were just then pushing out the administrative network to departments. She didn't want LAN access when it first arrived. Kept pulling th
Re:uhhh (Score:2)
Mom (Score:3, Funny)
My mom didn't find it that funny..
Cliff's Notes on (Score:3, Funny)
To summarize:
Theres no place like 127.0.0.1
Theres no place like 127.0.0.1
I was taught to share in preschool (Score:1)
I've always found myself believing that "sharing" intellectual property was inherently wrong.
Even if it is PART of their business model?
as in shareware, radio, publicly displayed art, etc...
Do you feel you owe an artist or his family a few dollars if you enjoy a statue or a painting?
What about the architect when you enjoy a building or a park?
Re:I was taught to share in preschool (Score:1)
were you taught to cheat as well?
Re:I was taught to share in preschool (Score:1)
That's also where I learned about singleton bullies and those that are able to bully through group negotiation (like RIAA).
Only Gene Roddenberry could believe our future includes a public of such moral standing that they would refuse to pick money up off of the ground, or if they saw that the previous tenent left the cable line hot they'd refuse to watch it and the'd report it immediately so the cable company could start bill
Re:I was taught to share in preschool (Score:1, Insightful)
Part of what determines REAL market value is whether or not people would simply steal it rather than pay the price you've placed on it. For example, if you refuse to lower rent rates from some stupid number you made up to get yourself rich, you increase the likelyhood of being infested with squaters.
I've never seen $5 DVDs distributed illegaly, just the more expensive kind.
I won't ask to get
Re:I was taught to share in preschool (Score:2)
Sure, that sounds WAY different from purchasing a CD and sharing it for public download
It is, because usually when you buy a painting you usually also buy the reproduction rights too, unless the artists chooses to retain the copyright. When you buy the postcard of the image, you do not buy the reproduction rights.
Re:I was taught to share in preschool (Score:2)
If you post it on a website and encourage people to retain local copies, print on diapers etc. you are depriving the artist of potential income. This is where the CD analogy came in.
By the way, you are free to retain local copies of the artwork on my homepage. Although I never made much money out of them, I will be irritated if you
Great, that argument again. (Score:2)
<P>Ah, good, this old chestnut. Guess what? Risk is part of life. The meal you buy may not be up to snuff, the album you buy may not be 100% excellent all the way through. Whoop-de-doo.
<P>Also, that $20 is getting you 60+ minutes of music whereas 25 years ago more money (inflation, remember?) would get you a 35 minute LP.
Re:Great, that argument again. (Score:2)
Re:Great, that argument again. (Score:2)
I have to agree. There are some exceptions, but if you like the 1 or 2 songs they play on the radio every half-hour, you'll usually like the rest. You just need to let it "grow on you" a bit. You must expose yourself to the rest of the album as of
Re:Great, that argument again. (Score:2)
Damn, I thought for a moment you meant the Dandy Warhols' "Crack Cocaine Ranger", which may or may not refer to Credence...
Hard work doesn't necessitate a return on investme (Score:5, Interesting)
I believe the growth of intangibles in our society will require a cultural/corporate paradigm shift. As much as we'd like to believe otherwise, the amount of effort we exert is not the only factor which determines our effort's worth. Supply and Demand.
The proliferation of books and music has traditionally be limited by access and the physical space they take up amongst your personal belongings (unless you go to your Library - Does anyone know if there have been similar historical issues with brick and mortar libraries?). The internet has become a digital library with no return date but, current laws make this illegal.
Here's an idea... How about instead of creating wrapper technologies which block sharing songs, books, and code, all are freely available but wraped in technologies which allow for easy donation to the effort's creator? An encoder which integrates certificates and paypal. I got nothing against middle (wo)men... they can maintain the servers. I can't imagine that this doesn't exist somewhere already...
Re:Hard work doesn't necessitate a return on inves (Score:2)
Re:Hard work doesn't necessitate a return on inves (Score:2)
Hard work doesn't necessitate a return on investment
This just won't work. Maybe you should try out this system with your boss: give them your work for free, and make it easy for them to make donations to you. It is very reasonable to try and charge people for your work, even if it is intangible.
There is a precedent with literature and art (in the past), one that much of science currently uses: grants. If these intangible works are in the public good, then the public should sponsor them. In Mexico, artis
But what I lack in technical skills... (Score:1)
Oh, well... in that case you're hired. Who needs technical skills if you're a certified fraidy cat?
The Point of Attacking "Uploaders" (Score:5, Insightful)
The point of "attacking uploaders" is that people in a P2P network are essentially selfish. So long as they can get their own content, most parties in the network derive no benefit from uploading to others. People are much more likely to "stop uploading" than they are to "stop downloading" because of this. Instead of attacking people where it matters (Stop getting things for free!), the RIAA strategy works by cutting off the supply (Stop this annoying service that eats up your bandwith and doesn't provide you any benefit).
The problem, of course, is that if *everyone* stops sharing, the P2P network ceases to exist, and if a large enough majority stops sharing, the network becomes bogged down by bandwith issues (because the only way to operate a truly efficient network is to have truly distributed bandwith).
Essentially, the "Stop Uploading" attack has little to do with the fact that the RIAA places some sort of greater moral or legal weight on actually copying a file for someone else. Instead, it's a clever, underhanded way of attacking a P2P network designed to fly under the radar of most pseudo-techies operating nodes.
I believe that's wrong (Score:2)
So the guy downloading a file isn't breaking the law - the guy uploading it is. Or at least they can make a much more clear-cut case in court that the uploader has broken the law.
Re:I believe that's wrong (Score:2)
Actually, it's illegal to knowingly recieve and use stolen goods or those taken by copyright infringement.
In a server-client*n model, it's much more efficient just to ask the server to stop distributing content. In the (client/server)*n paradigm (like P2P), it's much more efficient to go after the downloader, since it's very difficult to get all those people to stop distributing, but it's very easy to prove that each downloader has been downloading illegal con
Re:I believe that's wrong (Score:1, Insightful)
If this is true, why should downloading be different? I am interested in both legal and philosophical info
PHP viruses (Score:4, Informative)
If you're interested in that stuff, I guess it might be worth checking out.
Old sayings (Score:4, Insightful)
Which is yet another way of saying people fear what they do not understand.
I'm sorry. That was mean.
I'd be happy to help! (Score:3, Funny)
If you post your
Is Fyodor in it? (Score:2)
Swordmaking?! (Score:2, Insightful)
Except that swordmaking takes skill and years of experience, as opposed to running a one-line script.
And you know you're now secure how..? (Score:1)
Considering that you already said that you're not very technical, I fail to see how you are qualified to make this judgement.
Hopefully the book makes the point that the only truly secure computer is one that is locked in a shielded vault without any internet connection (and some would sa
Some black hats (Score:2)
Red Hat Fork? (Score:2)
When I read the title of this article, was anybody else thinking it was some sort of (evil) Red Hat fork?
Re:Red Hat Fork? (Score:2, Funny)
When I read the title of this article, was anybody else thinking it was some sort of (evil) Red Hat fork?
Maybe, what time did you read the title of the article?
Hooray (Score:2, Funny)
"When I get an unexpected e-mail, I'm sure it's from some identity theft villain full of virtual lock picks just dying to snatch all my private information."
Nonsense. Just decent, hard-working Nigerians who believe in the virtues of charity. Silly paranoids.
The SCO Chapter (Score:2)
There better be a whole chapter dedicated to SCO.
CV of reviewer? (Score:1, Interesting)
So at least we know some of the potential conflicts of interest or biases that the reviewer may have.
Re:Not for experts? (Score:2)
I think it's a suggestion for our Xmas shopping lists, in order to keep Uncle Louie from calling all the time asking if such-and-such email is fake or not...
Re:Not for experts? (Score:5, Insightful)
My mother-in-law, brother-in-law and wife who like to download libraries of "little smilies" from banner ads, chocked full of spyware, who don't understand attachments and their danger are prime examples.
I can explain it till I'm blue in the face, but all I get is a blank stare. A professional writer, with a sense of humour, might be able to get through to them.
Re:Not for experts? (Score:1)
I disagree. There are various levels of expertise. I could be an expert in computational theory, but have only a passing familiarity with network intrusion. I think this type of book is great for filling knowledge gaps that each one of us have. And a review of such book is indeed appropriate for /.
Besides, it's important for us technologists to understand the human side of technology. All of these cybercrimes is a result of the innovation that we made and it's imperative that we look towards the socia
/. Not only for experts (Score:2, Insightful)
Re:I'm gonna get slammed for this... (Score:2, Insightful)
Re:I'm gonna get slammed for this... (Score:1)
Re:I'm gonna get slammed for this... (Score:2)
Re:I'm gonna get slammed for this... (Score:2)
Re:I'm gonna get slammed for this... (Score:2)
Re:Not for experts? (Score:4, Insightful)
Second, nobody said this was a site for experts. It's just news for nerds. No claim as to whether those are *expert* nerds or not.
Re:Is this a good idea? (Score:5, Insightful)
Uh... so?
Should we just sugarcoat everything?
"Oh no, sir, if you choose our information superhighway services you don't run into red, gaping, dilated anuses or any other similar pictures that would scar and twist your and your childrens' fragile little minds forever. No, we don't have identity theft even if you splash you credit card number around the net. We promise you won't receive 200 penis enlargement spams per day, numerous 419 scams on a daily basis or viruses and porn dialers to spice up your internet experience. Bestiality, child porn, liberal ideas, fisting, chix-with-dix? What are you talking about, sir? Oh no, sir. We are here to simply provide you and your family with good, clean, christian family entertainment on the information superhighway".
Re:Is this a good idea? (Score:3, Insightful)
If it bleeds, it leads.
Think about it: even the Bible ends with fire, brimstone, and the Pocyclypse. Humans need conflict and challenge, and have the need to rubberneck at auto crashes, or gossip about the misfortunes of another. This goes back to our earliest days. Why? I don't have an answer to that, probably because my science is rocks, not biology or sociology. But I know that it is so, just as people stare at the fire (or the modern equivalent for most people-the TV).
Re:Journalistic credentials (Score:1)
That's not a bad reflection on the Journalist, only on me for feeding a Troll.
Re:Journalistic credentials (Score:1)
It's not lazy journalism if he talked to BMG Music representative Rob Anderson and that's what the guy said. I agree with the original response, journalists talk to PR people to get more information. They can read press releases on their own, they don't need them regurgitated.
Sloppy journalism cannot be excused, even if it makes an argument you agree with
I totally agree with you here, but you shouldn't assume that things are assumtions, as you seem
Re:Journalistic credentials (Score:2, Insightful)
Because they are in free market competition with the legitimate product.
For the protected product you make maximum profit by producing inferior quality items that degrade and must be repurchased periodically.
For the illegitimate product you make maximum profit by producing a superior item, but selling it at a vastly lower price.
It's a market thing.
Nor is the practice restricted to places like Chi
Re:My take (Score:2, Interesting)
Use the simple aprach of 3 email address types:
Work / Personal only HUMANS get this.
Websites that you trust. This is where you send mail that you get from ebay ect. Also used for stites that you might forget your passward ect. Tends to get a fair amount of psudo spam from things like dell saying "10% off laptops" ect but you may want to look into these things so there not realy spam.
And finaly A new hotmail address every month or so for sites t
Re:My take (Score:3, Informative)
This works quite well, right up until one of these humans who doesn't know what they're doing gets infected with one of those viruses and starts spamming everyone with your address in the from field.
Re:My take (Score:2)
Re:Obligatory link... (Score:2)