Detecting Malice eBook - Fraud Loss Prevention
Fraud Loss Prevention eBook
Every day hackers are stealing millions from websites and this is the book that will help you detect it happening on yours. Detecting Malice was written to help website administrators, developers, operations personelle and security product managers in building and maintaining a higher security posture. Understanding user intent is the cornerstone for reducing fraud ratios in modern web applications. From retail to government, this book covers many different realms of fraud and how to detect it at many different technical layers. From DNS and TCP to embedded content and browser fingerprinting techniques it is possible to identify users who are most likely to become dangerous often before it actually happens. A plethora of tools and techniques are all available to you within the 300+ pages of this book. | ![]() |
Table of Contents:
Detecting Malice: Preface User Disposition Deducing Without Knowing Book Overview Who Should Read This Book? Why Now? A Note on Style Working Without a Silver Bullet Special Thanks Chapter 1 - DNS and TCP: The Foundations of Application Security In the Beginning Was DNS Same-Origin Policy and DNS Rebinding DNS Zone Transfers and Updates DNS Enumeration TCP/IP Spoofing and the Three-Way Handshake Passive OS Fingerprinting with pOf TCP Timing Analysis Network DoS and DDoS Attacks Attacks Against DNS TCP DoS Low Bandwidth DoS Using DoS As Self-Defense Motives for DoS Attacks DoS Conspiracies Port Scanning With That Out of the Way... Chapter 2 - IP Address Forensics What Can an IP Address Tell You? Reverse DNS Resolution WHOIS Database Geolocation Real-Time Block Lists and IP Address Reputation Related IP Addresses When IP Address Is A Server Web Servers as Clients Dealing with Virtual Hosts Proxies and Their Impact on IP Address Forensics Network-Level Proxies HTTP Proxies AOL Proxies Anonymization Services Tor Onion Routing Obscure Ways to Hide IP Address IP Address Forensics To Block or Not? Chapter 3 - Time Traffic Patterns Event Correlation Daylight Savings Forensics and Time Synchronization Humans and Physical Limitations Gold Farming CAPTCHA Breaking Holidays and Prime Time Risk Mitigation Using Time Locks The Future is a Fog Chapter 4 - Request Methods and HTTP Protocols Request Methods GET POST PUT and DELETE OPTIONS CONNECT HEAD TRACE Invalid Request Methods Random Binary Request Methods Lowercase Method Names Extraneous White Space on the Request Line HTTP Protocols Missing Protocol Information HTTP 1.0 vs. HTTP 1.1 Invalid Protocols and Version Numbers Newlines and Carriage Returns Summary Chapter 5 - Referring URL Referer Header Information Leakage through Referer Disclosing Too Much Spot the Phony Referring URL Third-Party Content Referring URL Disclosure What Lurks in Your Logs Referer and Search Engines Language, Location, and the Politics That Comes With It Google Dorks Natural Search Strings Vanity Search Black Hat Search Engine Marketing and Optimization Referring URL Availability Direct Page Access Meta Refresh Links from SSL/TLS Sites Links from Local Pages Users' Privacy Concerns Determining Why Referer Isn't There Referer Reliability Redirection Impact of Cross-Site Request Forgery Is the Referring URL a Fake? Referral Spam Last thoughts Chapter 6 - Request URL What Does A Typical HTTP Request Look Like? Watching For Things That Don’t Belong Domain Name in the Request Field Proxy Access Attempts Anchor Identifiers Common Request URL Attacks Remote File Inclusion SQL Injection HTTP Response Splitting NUL Byte Injection Pipes and System Command Execution Cross-Site Scripting Web Server Fingerprinting Invalid URL Encoding Well-Known Server Files Easter Eggs Admin Directories Automated Application Discovery Well-Known Files Crossdomain.xml Robots.txt Google Sitemaps Summary Chapter 7 - User-Agent Identification What is in a User-Agent Header? Malware and Plugin Indicators Software Versions and Patch Levels User-Agent Spoofing Cross Checking User-Agent against Other Headers User-Agent Spam Indirect Access Services Google Translate Traces of Application Security Tools Common User-Agent Attacks Search Engine Impersonation Summary Chapter 8 - Request Header Anomalies Hostname Requests Missing Host Header Mixed-Case Hostnames in Host and Referring URL Headers Cookies Cookie Abuse Cookie Fingerprinting Cross Site Cooking Assorted Request Header Anomalies Expect Header XSS Headers Sent by Application Vulnerability Scanners Cache Control Headers Accept CSRF Deterrent Language and Character Set Headers Dash Dash Dash From Robot Identification Content-Type Mistakes Common Mobile Phone Request Headers X-Moz Prefetching Summary Chapter 9 - Embedded Content Embedded Styles Detecting Robots Detecting CSRF Attacks Embedded JavaScript Embedded Objects Request Order Cookie Stuffing Impact of Content Delivery Networks on Security Asset File Name Versioning Summary Chapter 10 - Attacks Against Site Functionality Attacks Against Sign-In Brute-Force Attacks Against Sign-In Phishing Attacks Registration Username Choice Brute Force Attacks Against Registration Account Pharming What to Learn from the Registration Data Fun With Passwords Forgot Password Password DoS Attacks Don’t Show Anyone Their Passwords User to User Communication Summary Chapter 11 - History Our Past History Repeats Itself Cookies JavaScript Database Internet Explorer Persistence Flash Cookies CSS History Refresh Same Page, Same IP, Different Headers Cache and Translation Services Uniqueness DNS Pinning Part Two Biometrics Breakout Fraud Summary Chapter 12 - Denial of Service What Are Denial Of Service Attacks? Distributed DoS Attacks My First Denial of Service Lesson Request Flooding Identifying Reaction Strategies Database DoS Targeting Search Facilities Unusual DoS Vectors Banner Advertising DoS Chargeback DoS The Great Firewall of China Email Blacklisting Dealing With Denial Of Service Attacks Detection Mitigation Summary Chapter 13 - Rate of Movement Rates Timing Differences CAPTCHAs Click Fraud Warhol or Flash Worm Samy Worm Inverse Waterfall Pornography Duration Repetition Scrapers Spiderweb Summary Chapter 14 - Ports, Services, APIs, Protocols and 3rd Parties Ports, Services, APIs, Protocols, 3rd Parties, oh my… SSL and Man in the middle Attacks Performance SSL/TLS Abuse FTP Webmail Compromise Third Party APIs and Web Services 2nd Factor Authentication and Federation Other Ports and Services Summary Chapter 15 - Browser Sniffing Browser Detection Black Dragon, Master Reconnaissance Tool and BeEF Java Internal IP Address MIME Encoding and MIME Sniffing Windows Media Player “Super Cookie” Virtual Machines, Machine Fingerprinting and Applications Monkey See Browser Fingerprinting Software – Monkey Do Malware Malware and Machine Fingerprinting Value Unmasking Anonymous Users Java Sockets De-cloaking Techniques Persistence, Cookies and Flash Cookies Redux Additional Browser Fingerprinting Techniques Summary Chapter 16 - Uploaded Content Content Images Hashing Image Watermarking Image Steganography EXIF Data In Images GDI+ Exploit Warez Child Pornography Copyrights and Nefarious Imagery Sharm el Sheikh Case Study Imagecrash Text Text Stenography Blog and Comment Spam Power of the Herd Profane Language Localization and Internationalization HTML Summary Chapter 17 - Loss Prevention Lessons From The Offline World Subliminal Imagery Security Badges Prevention Through Fuzzy Matching Manual Fraud Analysis Honeytokens Summary Chapter 18 - Wrapup Mood Ring Insanity Blocking and the 4th Wall Problem Booby Trapping Your Application Heuristics Age Know Thy Enemy Race, Sex, Religion Profiling Ethnographic Landscape Calculated Risks Correlation and Causality Conclusion About Robert Hansen |
![]() |
Detecting Malice is written by Robert "RSnake" Hansen, the author of the noted ha.ckers.org web application security lab. Mr. Hansen has spoken at industry conferences around the world and is widely considered to be a foremost expert in web application security and online fraud. Drawing on well over a decade of web application security experience, the book was written to be a relevant look into the deep technical nuances of user interaction. By being extremely observant and having the correct logging in place it is possible to dramatically reduce online fraud. Whether you are simply an enthusiast or are in charge of a Fortune 500, you will gain deep insights into the tools and techniques available to improve fraud loss prevention. Using practical and real-world examples, the book walks through the different layers in a highly digestable way, that is valuable to practitioners at almost every level of technical abilities. |
- "I can tell you that it is, without a doubt, the best web security book I have ever had the pleasure to read." - David Mortman, CSO - Echelon One
|
By purchasing the Detecting Malice anti-fraud eBook you'll get immediate access to:
* 300+ pages of highly technical detail and insights * Deep de-composition of threats at multiple OSI layers * Useful examples and real-world vignettes * Industry insights on detection of malicious activity * Useful analysis on isolating hack attempts * Written for businesses and websites of all sizes * Security content found nowhere else * Hundreds of examples and pictures * Written in small bite-sized anecdotes * Adobe PDF format for easy portability and readability * Extremely detailed real life deconstructed hack attempts * Free updates when new versions become available |
![]() |
ClickBank sells Detecting Malice. They are a trusted online retailer specializing in digitally delivered products. When you purchase the book, you will be taken to your download immediately. As this is an electronic book, no physical product will be delivered.
share:
![]() |
Share on Facebook |
没有评论:
发表评论