Stuff I've Done:
December, 2003: Winners of Rudolph's XSS Christmas, along with my own answers to the
challenge! We received a great batch of answers this time. Thanks to all who played, and merry Christmas, ya'll.
December, 2003: A Holiday-themed CRACK THE HACKER CHALLENGE, called Rudolph's XSS Christmas. Help Rudolph and Hermey save Christmas and get a chance to win a copy of my new book, Malware
. Special thanks to TechRepublic.com for hosting this challenge!
December, 2003: Winners of the Spinal Hack challenge, along with my answers, are here. Congrats to the brilliant folks who won.
November, 2003: The new book is out! Finally... Malware: Fighting Malicious Code by Ed Skoudis, with Lenny Zeltser.
The book includes a detailed look at all forms of malware including viruses, worms, RootKits, kernel manipulation, BIOS attacks, and the possibility of malware microcode. It
also includes a description of how to build your own malware analysis laboratory, along with three different exciting malware scenarios:
- A Fly in the Ointment
- Invasion of the Kernel Snatchers
- Silence of the Worms
November, 2003: My hiatus is over... the book is done. Here's a NEW Spinal Tap themed CRACK THE HACKER CHALLENGE called Spinal Hack. Answer the questions to win a copy of my new book, Malware!
November, 2003: An article on Combo Malware that I wrote for Information Security Magazine.
November, 2003: A malware analysis template to fill out while performing static and dynamic
analysis of malicious software. This form and the process surrounding its use are described in Chapter 11 of my Malware book.
July, 2003: Ever wonder what's going on deep inside of Windows? No one knows for sure, as depicted in this presentation on the Evolution of a Windows Forensics Guru by Rob Lee and me.
June, 2003: What's this
? A new book on the way? Written by me and Lenny Zeltser. Stay tuned for November, 2003...
May, 2003: I get asked which are my favority computer security books on a weekly basis. Not that I'm special or anything, but here is my list of favorite books (computer security and related). Please ignore the dorky picture!
May, 2003: WINNERS for the "When Trinity Hacked the IRS D-Base..." Challenge.
May, 2003: The
Counter Hack Baby
... Pictures of the cute little guy! And, no, it's not mine.
May, 2003: A Matrix-themed CRACK THE HACKER CHALLENGE, titled "When Trinity Hacked the IRS D-Base." Answer the questions to win a copy of my book!
February, 2003: A "Willie Wonka" themed CRACK THE HACKER CHALLENGE, titled
"Willie Wonka and the Chocolate Hackery." Answer the questions to win a nifty prize!
February, 2003: A presentation on
January, 2003: A "Back to the Future" themed CRACK THE HACKER CHALLENGE, titled
"Hack to the Future". Answer the questions and win a nifty prize!
December, 2002: Ever wonder what other things Snort could run on? Check out Unusual
Devices Running Snort.
December, 2002: A Holiday Grinch-themed CRACK THE HACKER CHALLENGE, "How the Grinch Hacked Christmas!" Answer the questions and win a prize.
December, 2002: A
memo template to use for getting permission for conducting penetration tests.
Some people call this a "Get Out of Jail Free" card. Remember to have your legal team review, tweak, and approve the language before getting it signed!
December, 2002: Need holiday gift ideas? How about Information Security Action Figures
November, 2002: InfoSec's Worst Nightmares, an article on threats in Information Security
Magazine on the biggest attacks of the last 5 years and issues to worry about in the future.
November 2002: A Spider-Man themed CRACK THE HACKER CHALLENGE. Solve the
"Spider-Hack" challenge, and Win a Prize
(Sponsored by SearchSecurity.com)
October 2002: Ever wonder what would happen if Microsoft started writing hacking tools? Check out If Microsoft Had Written Nmap
October 2002: A Robin Hood-based CRACK THE HACKER CHALLENGE. Solve the "Robin Hack" challenge, and Win a Prize (Sponsored by SearchSecurity.com)
September 2002: A Princess-Bride-based CRACK THE HACKER CHALLENGE. Solve the "Princess Hack" challenge, and Win a Prize
(Sponsored by SearchSecurity.com)
August 2002: Music from conferences (including Kraftwerk!)
August 2002: Some slides on Format String Attacks. These slides show a picture of what's
happening on the stack during such an attack.
Article in Information Security Magazine, "Cracker Tools and Techniques... Faster Stealthier... More Dangerous", along with sidebar "The Worm Turns" and "Sneaking Past IDS"
July 2002: A Wizard-of-Oz-based CRACK THE HACKER CHALLENGE. Solve the "Crackers, Admins, and Sploits... Oh My!" challenge, and Win a Prize (Sponsored by
July 2002: How to Tell If You Are a Netcat Geek
June 2002: Silly Quotes from a Conference
June 2002: CRACK THE HACKER CHALLENGE. Solve the
"Star Hacks, Episode IV, A New Hack" challenge, and Win a Prize (Sponsored by SearchWebManagement.com)
June 2002: Some
on Cross-Site Scripting (XSS)
May 2002: CRACK THE HACKER CHALLENGE, Solve the
"Backdoor Shell Game Face Off", and Win a Prize (Sponsored by SearchWebManagement.com)
May 2002: Presentation on Latest Hacking Trends, Delivered to Infraguard Delaware Chapter
Night of the Living Wi-Fi's(A Security Parable for Our Times), a fun wireless scenario
March 2002: Counter Hack Briefing Slides
, Delivered at SoftPro books
Silence of the Worms, a fun worm scenario -- Learn from the mistakes of
On the Cutting Edge - The Year of the Worm, Information Security Magazine
August 2001: An Article on Newer Types of Ethical Hacks, (Web App, Client Side Components, and War Driving), written by Ed Skoudis and Chris O'Ferrell
August 2001: An Article on Security Organization Structures, written by Ed Skoudis and Mike Ressler
July 2001: Wireless LAN Security Policies, written by Ed Skoudis & John Burgess
NEW - Interactive CD-ROM
The Hack-Counter Hack Training Course: A Network Security Seminar
This CD-ROM contains:
- Over 4 hours of video lecture on computer attack tools
- Complete attack tool programs, with step-by-step guide to installation and use
- Directions on building your own hacker tool analysis laboratory
- Ideas for using tools in penetration testing
- Detailed defensive strategies
- Hands-on exercises to verify your understanding!
Buy the CD-ROM Package
Book -- Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses, by
- Description of the most widely used attack tools
- Effective defenses for each type of attack
- Includes three in-depth attack scenarios using a variety of attack tools:
- Dial "M" for Modem
- Death of a Telecommuter
- The Manchurian Contractor
Buy the Book