Ulteriori informazioni
This guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage.
The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed.
Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.
Sommario
Preface;
Who This Book Is For;
Contents of This Book;
Conventions Used in This Book;
Safari Enabled;
Using Code Examples;
How to Contact Us;
Acknowledgments;
Chapter 1: Introduction;
1.1 What Is Internet Forensics?;
1.2 The Seamy Underbelly of the Internet;
1.3 Pulling Back the Curtain;
1.4 Taking Back Our Internet;
1.5 Protecting Your Privacy;
1.6 Before You Begin;
1.7 A Network Neighborhood Watch;
Chapter 2: Names and Numbers;
2.1 Addresses on the Internet;
2.2 Internet Address Tools;
2.3 DNS Record Manipulation;
2.4 An Example-Dissecting a Spam Network;
Chapter 3: Email;
3.1 Message Headers;
3.2 Forged Headers;
3.3 Forging Your Own Headers;
3.4 Tracking the Spammer;
3.5 Viruses, Worms, and Spam;
3.6 Message Attachments;
3.7 Message Content;
3.8 Is It Really Spam?;
Chapter 4: Obfuscation;
4.1 Anatomy of a URL;
4.2 IP Addresses in URLs;
4.3 Usernames in URLs;
4.4 Encoding the Entire Message;
4.5 Similar Domain Names;
4.6 Making a Form Look Like a URL;
4.7 Bait and Switch-URL Redirection;
4.8 JavaScript;
4.9 Browsers and Obfuscation;
Chapter 5: Web Sites;
5.1 Capturing Web Pages;
5.2 Viewing HTML Source;
5.3 Comparing Pages;
5.4 Non-Interactive Downloads Using wget;
5.5 Mapping Out the Entire Web Site;
5.6 Hidden Directories;
5.7 In-Depth Example-Directory Listings;
5.8 Dynamic Web Pages;
5.9 Filling Out Forms;
5.10 In-Depth Example-Server-Side Database;
5.11 Opening the Black Box;
Chapter 6: Web Servers;
6.1 Viewing HTTP Headers;
6.2 What Can Headers Tell Us?;
6.3 Cookies;
6.4 Redirection;
6.5 Web Server Statistics;
6.6 Controlling HTTP Headers;
6.7 A Little Bit of Everything;
Chapter 7: Web Browsers;
7.1 What Your Browser Reveals;
7.2 Apache Web Server Logging;
7.3 Server Log Analysis;
7.4 Protecting Your Privacy;
Chapter 8: File Contents;
8.1 Word Document Metadata;
8.2 U.K. Government Dossier on Iraq;
8.3 Document Forgery;
8.4 Redaction of Sensitive Information;
Chapter 9: People and Places;
9.1 Geographic Location;
9.2 Time Zone;
9.3 Language;
9.4 Expertise;
9.5 Criminal or Victim?;
9.6 Hardware and Software;
Chapter 10: Patterns of Activity;
10.1 Signatures;
10.2 Searching with Signatures;
10.3 Problems with Simple Signatures;
10.4 Full Text Comparison;
10.5 Using Internet Search Engines for Patterns;
Chapter 11: Case Studies;
11.1 Case Study 1: Tidball;
11.2 Case Study 2: Spam Networks;
Chapter 12: Taking Action;
12.1 What Is Being Done to Tackle Internet Fraud?;
12.2 What You Can Do to Help;
12.3 Getting in Over Your Head;
12.4 Vision of a Community Response;
About the Author;
Colophon;
Info autore
Robert Jones runs Craic Computing, a small bioinformatics company in Seattle that provides advanced software and data analysis services to the biotechnology industry. He was a bench molecular biologist for many years before programming got the better of him. Dr. Jones has extensive experience in Linux/Apache/MySQL/Perl software development and Linux systems administration.
Riassunto
Presents the skills needed to fight back against the spammers, con artists, and identity thieves that plague the Internet. This practical guide shows how to extract the information that lies hidden in every email message, web page, and web server on the Internet. The examples illustrate the techniques discussed.