Avatar (Fabio Alessandro Locati|Fale)'s blog

Logging and Log Management by Anton Chuvakin, Kevin Schmidt, Chris Phillips (Elsevier/Syngress)

April 9, 2013

Logs are one of the most powerful tools in the sysadmin hands, and probably of all kind of IT roles.

This book does deep into the logs and their management.

One of the aspects that I really liked about this book is the division of the text in chapters.

The book is “only” 420 pages long, but is well split in 22 chapter, so they are (on average) 21 pages long. This is a huge advantage, since it allows the reader to stop frequently without dividing a concept in two different reading sessions. Also, this policy, allows the reader to quickly find what is more important for her in that specific moment.

Read More

Wireless Reconnaissance in Penetration Testing by Matthew Neely, Alex Hamerstone, Chris Sanyk (Elsevier/Syngress)

March 19, 2013

When someone says the word “wireless”, 99.9% of the audience thinks at the Wireless Networking Technologies (802.11 family). Very few think to the Bluetooth. Even fewer people think to all the other technologies that use wireless technology to work, such as cordless phone, guard radios, headsets, wireless camera etc. This book embrace the last point of view.

The first chapter provides basic information and motivation for Wireless Profiling.

The chapter 2 provides the reader with all the information she needs to be able to understand the wireless technology and it’s usage.

Read More

Metasploit by Mati Aharoni, Devon Kearns, Jim O'Gorman, David Kennedy (No Starch Press)

March 12, 2013

Metasploit is the most common and complete framework for testing security. Metasploit isĀ an entire suite of tools and methodologies designed for testing the security of computers and networks.

The book is written for both experienced penetration tester and people new to the security field. For the first group, one of the most interesting thing is the explanation of the rules and ideas that formed the Penetration Test Execution Standard, while for users new to the field, is really interesting what can be done and how.

Read More

CompTIA Security+ Rapid Review (Exam SY0-301) by Michael Gregg (Microsoft Press)

January 8, 2013

This book is pretty short (258 pages long) but is very dense. It is divided into 6 chapters + one appendix.

For each atomic argument, the author does propose 1 to 3 True-or-False questions, their answer and the explanation. I did like the question-answer approach, since you understand immediately which is your level, therefore you can understand which parts you have to cover more and which less. What I did not liked at all about this structure is the layout. Every question is answered right below the question itself. I think this is a very bad approach, since is really hard to answer to a True-or-False question without looking at the answer that you know is there. I think they should have putted all the chapter questions and after all the chapter answers.

Read More

Download.com bundles malware in downloads

December 6, 2011

Gordon Lyon (also known as Fyodor), the creator of Nmap, sent an email yesterday to the Nmap mailing list pointing out that the C|Net Download.com website is altering Nmap downloadable files injecting malware into them. It’s also possible that other files delivered by C|Net Download.com are also subject to the same problem.

This event is a very problematic one since it will create a complete loss of trust toward Download.com. It also reminds us of a critical aspect of security: all chain steps need to be secure and trusted.

Read More
Newer