Exploiting Software: How to Break Code

 
9780201786958: Exploiting Software: How to Break Code

Praise for Exploiting Software

Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design—a key change from where we are today!”

         —Tony Scott
             Chief Technology Officer, IS&S
             General Motors Corporation

“It’s about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play.”

         —Bruce Schneier
             Chief Technology Officer
             Counterpane
             Author of Beyond Fear and Secrets and Lies

Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the ‘worm of the day’ phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security.”

         —Elinor Mills Abreu
             Reuters’ correspondent

“Police investigators study how criminals think and act. Military strategists learn about the enemy’s tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the ‘white hats’ understand how the ‘black hats’ operate. Through extensive examples and ‘attack patterns,’ this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems. Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security.”

         —Jeremy Epstein
             Director, Product Security & Performance
             webMethods, Inc.

“A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and exploiting software vulnerabilities, along with detailed examples from real software exploits. Exploiting Software is essential reading for anyone responsible for placing software in a hostile environment—that is, everyone who writes or installs programs that run on the Internet.”

         —Dave Evans, Ph.D.
             Associate Professor of Computer Science
             University of Virginia

“The root cause for most of today’s Internet hacker exploits and malicious software outbreaks are buggy software and faulty security software deployment. In Exploiting Software, Greg Hoglund and Gary McGraw help us in an interesting and provocative way to better defend ourselves against malicious hacker attacks on those software loopholes. The information in this book is an essential reference that needs to be understood, digested, and aggressively addressed by IT and information security professionals everywhere.”

         —Ken Cutler, CISSP, CISA
             Vice President, Curriculum Development & Professional Services,
             MIS Training Institute

“This book describes the threats to software in concrete, understandable, and frightening detail. It also discusses how to find these problems before the bad folks do. A valuable addition to every programmer’s and security person’s library!”

         —Matt Bishop, Ph.D.
             Professor of Computer Science
             University of California at Davis
             Author of Computer Security: Art and Science

“Whether we slept through software engineering classes or paid attention, those of us who build things remain responsible for achieving meaningful and measurable vulnerability reductions. If you can’t afford to stop all software manufacturing to teach your engineers how to build secure software from the ground up, you should at least increase awareness in your organization by demanding that they read Exploiting Software. This book clearly demonstrates what happens to broken software in the wild.”

         —Ron Moritz, CISSP
             Senior Vice President, Chief Security Strategist
             Computer Associates

Exploiting Software is the most up-to-date technical treatment of software security I have seen. If you worry about software and application vulnerability, Exploiting Software is a must-read. This book gets at all the timely and important issues surrounding software security in a technical, but still highly readable and engaging, way. Hoglund and McGraw have done an excellent job of picking out the major ideas in software exploit and nicely organizing them to make sense of the software security jungle.”

         —George Cybenko, Ph.D.
             Dorothy and Walter Gramm Professor of Engineering, Dartmouth
             Founding Editor-in-Chief, IEEE Security and Privacy

“This is a seductive book. It starts with a simple story, telling about hacks and cracks. It draws you in with anecdotes, but builds from there. In a few chapters you find yourself deep in the intimate details of software security. It is the rare technical book that is a readable and enjoyable primer but has the substance to remain on your shelf as a reference. Wonderful stuff.”

         —Craig Miller, Ph.D.
             Chief Technology Officer for North America
             Dimension Data

“It’s hard to protect yourself if you don’t know what you’re up against. This book has the details you need to know about how attackers find software holes and exploit them—details that will help you secure your own systems.”

         —Ed Felten, Ph.D.
             Professor of Computer Science
             Princeton University

“If you worry about software and application vulnerability, Exploiting Software is a must-read. This book gets at all the timely and important issues surrounding software security in a technical, but still highly readable and engaging way.”
         —George Cybenko, Ph.D.
             Dorothy and Walter Gramm Professor of Engineering, Dartmouth
             Founding Editor-in-Chief, IEEE Security and Privacy Magazine

Exploiting Software is the best treatment of any kind that I have seen on the topic of software vulnerabilities.”
         —From the Foreword by Aviel D. Rubin
             Associate Professor, Computer Science
             Technical Director, Information Security Institute, Johns Hopkins University

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.

Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out.

This must-have book may shock you--and it will certainly educate you.Getting beyond the script kiddie treatment found in many hacking books, you will learn about

  • Why software exploit will continue to be a serious problem
  • When network security mechanisms do not work
  • Attack patterns
  • Reverse engineering
  • Classic attacks against server software
  • Surprising attacks against client software
  • Techniques for crafting malicious input
  • The technical details of buffer overflows
  • Rootkits

Exploiting Software is filled with the tools, concepts, and knowledge necessary to break software.



Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Review:

Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it's as resistant as possible to attack. Sure, everything's phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen). Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons learned by others. It depends on your situation.

PHP programmers will take issue with the authors' blanket assessment of their language ("PHP is a study in bad security"), much of which seems based on older versions of the language that had some risky default behaviors--but those programmers will also double-check their servers' register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers' rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. --David Wall

Topics covered: How to make software fail, either by doing something it wasn't designed to do, or by denying its use to its rightful users. Techniques--including reverse engineering, buffer overflow, and particularly provision of unexpected input--are covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.

About the Author:

Greg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences.

Gary McGraw, Cigital's CTO, is a leading authority on software security. Dr. McGraw is coauthor of the groundbreaking books Building Secure Software and Exploiting Software (both from Addison-Wesley). While consulting for major software producers and consumers, he has published over ninety peer-reviewed technical publications, and functions as principal investigator on grants from DARPA, the National Science Foundation, and NIST's Advanced Technology Program. He serves on the advisory boards of Authentica, Counterpane, and Fortify Software. He is also an advisor to the computer science departments at University of California, Davis, and the University of Virginia, as well as the School of Informatics at Indiana University.



Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

I migliori risultati di ricerca su AbeBooks

1.

Hoglund, GregMcGraw, Gary
Editore: Prentice Hall
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Quantità: > 20
Da
INDOO
(Avenel, NJ, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Prentice Hall. Condizione libro: New. Brand New. Codice libro della libreria 0201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 35,69
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,00
In U.S.A.
Destinazione, tempi e costi

2.

Greg Hoglund, Gary McGraw
Editore: Addison-Wesley Professional (2004)
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Paperback Quantità: 1
Da
Ergodebooks
(RICHMOND, TX, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional, 2004. Paperback. Condizione libro: New. 1. Codice libro della libreria DADAX0201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 36,84
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,42
In U.S.A.
Destinazione, tempi e costi

3.

Greg Hoglund, Gary R. McGraw
Editore: Pearson Education (US), United States (2004)
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Paperback Quantità: 1
Da
The Book Depository US
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro Pearson Education (US), United States, 2004. Paperback. Condizione libro: New. Language: English . Brand New Book. Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design-a key change from where we are today! -Tony Scott Chief Technology Officer, ISS General Motors Corporation It s about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play. -Bruce Schneier Chief Technology Officer Counterpane Author of Beyond Fear and Secrets and Lies Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the worm of the day phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security. -Elinor Mills Abreu Reuters correspondent Police investigators study how criminals think and act. Military strategists learn about the enemy s tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the white hats understand how the black hats operate. Through extensive examples and attack patterns, this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems.Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security. -Jeremy Epstein Director, Product Security Performance webMethods, Inc. A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and exploiting software vulnerabilities, along with detailed examples from real software exploits. Exploiting Software is essential reading for anyone responsible for placing software in a hostile environment-that is, everyone who writes or installs programs that run on the Internet. -Dave Evans, Ph.D.Associate Professor of Computer Science University of Virginia The root cause for most of today s Internet hacker exploits and malicious software outbreaks are buggy software and faulty security software deployment. In Exploiting Software, Greg Hoglund and Gary McGraw help us in an interesting and provocative way to better defend ourselves against malicious hacker attacks on those software loopholes. The information in this book is an essential reference that needs to be understood, digested, and aggressively addressed by IT and information security professionals everywhere. -Ken Cutler, CISSP, CISA Vice President, Curriculum Development Professional Services, MIS Training Institute This book describes the threats to software in concrete, understandable, and frightening detail. It also discusses how to find these problems before the bad folks do. A val. Codice libro della libreria AAC9780201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 45,98
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

4.

Greg Hoglund, Gary R. McGraw
Editore: Pearson Education (US), United States (2004)
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Paperback Quantità: 1
Da
The Book Depository
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro Pearson Education (US), United States, 2004. Paperback. Condizione libro: New. Language: English . Brand New Book. Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design-a key change from where we are today! -Tony Scott Chief Technology Officer, ISS General Motors Corporation It s about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play. -Bruce Schneier Chief Technology Officer Counterpane Author of Beyond Fear and Secrets and Lies Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the worm of the day phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security. -Elinor Mills Abreu Reuters correspondent Police investigators study how criminals think and act. Military strategists learn about the enemy s tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the white hats understand how the black hats operate. Through extensive examples and attack patterns, this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems.Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security. -Jeremy Epstein Director, Product Security Performance webMethods, Inc. A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and exploiting software vulnerabilities, along with detailed examples from real software exploits. Exploiting Software is essential reading for anyone responsible for placing software in a hostile environment-that is, everyone who writes or installs programs that run on the Internet. -Dave Evans, Ph.D.Associate Professor of Computer Science University of Virginia The root cause for most of today s Internet hacker exploits and malicious software outbreaks are buggy software and faulty security software deployment. In Exploiting Software, Greg Hoglund and Gary McGraw help us in an interesting and provocative way to better defend ourselves against malicious hacker attacks on those software loopholes. The information in this book is an essential reference that needs to be understood, digested, and aggressively addressed by IT and information security professionals everywhere. -Ken Cutler, CISSP, CISA Vice President, Curriculum Development Professional Services, MIS Training Institute This book describes the threats to software in concrete, understandable, and frightening detail. It also discusses how to find these problems before the bad folks do. A val. Codice libro della libreria AAC9780201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 47,09
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

5.

Hoglund, Greg, McGraw, Gary
Editore: Addison-Wesley Professional (2004)
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Paperback Quantità: 2
Da
Murray Media
(North Miami Beach, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional, 2004. Paperback. Condizione libro: New. Codice libro della libreria P110201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 51,63
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 2,56
In U.S.A.
Destinazione, tempi e costi

6.

Hoglund, Greg
Editore: Addison-Wesley Professional (2004)
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Paperback Quantità: 1
Da
Murray Media
(North Miami Beach, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional, 2004. Paperback. Condizione libro: New. Codice libro della libreria 0201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 51,90
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 2,56
In U.S.A.
Destinazione, tempi e costi

7.

Greg Hoglund, Gary R. McGraw
Editore: Pearson Education 2004-02-17, Boston, Mass. |London (2004)
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi paperback Quantità: 1
Da
Blackwell's
(Oxford, OX, Regno Unito)
Valutazione libreria
[?]

Descrizione libro Pearson Education 2004-02-17, Boston, Mass. |London, 2004. paperback. Condizione libro: New. Codice libro della libreria 9780201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 53,39
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,34
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

8.

Hoglund, Greg; McGraw, Gary
Editore: Addison-Wesley Professional
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi PAPERBACK Quantità: 1
Da
Cloud 9 Books
(Wellington, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional. PAPERBACK. Condizione libro: New. 0201786958 New Condition. Codice libro della libreria NEW6.0089658

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 52,90
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 4,27
In U.S.A.
Destinazione, tempi e costi

9.

Greg Hoglund
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Paperback Quantità: 1
Da
Grand Eagle Retail
(Wilmington, DE, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Paperback. Condizione libro: New. 1. Paperback. Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing f.Shipping may be from multiple locations in the US or from the UK, depending on stock availability. 512 pages. 0.966. Codice libro della libreria 9780201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 57,54
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

10.

Greg Hoglund; Gary McGraw
Editore: Addison-Wesley Professional (2004)
ISBN 10: 0201786958 ISBN 13: 9780201786958
Nuovi Brossura Quantità: > 20
Da
Palexbooks
(Sanford, NC, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Addison-Wesley Professional, 2004. Condizione libro: New. Brand new! Please provide a physical shipping address. Codice libro della libreria 9780201786958

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 61,45
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 2,57
In U.S.A.
Destinazione, tempi e costi

Vedi altre copie di questo libro

Vedi tutti i risultati per questo libro