Goodreads helps you keep track of books you want to read.
Start by marking “Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks” as Want to Read:
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Enlarge cover
Rate this book
Clear rating
Open Preview

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

4.22  ·  Rating details ·  411 ratings  ·  29 reviews

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security

...more
Kindle Edition, 312 pages
Published April 15th 2005 by No Starch Press (first published January 1st 2005)
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Silence on the Wire, please sign up.

Be the first to ask a question about Silence on the Wire

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

Showing 1-30
Average rating 4.22  · 
Rating details
 ·  411 ratings  ·  29 reviews


More filters
 | 
Sort order
Start your review of Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Nick Black
Jul 26, 2008 rated it really liked it  ·  review of another edition
Amazon 2008-07-12, recommendation from a friend.

An InfoSec book with truly new perspectives, let alone detailed technique, is one of the world's great rarities -- we Defenders of the True Faith, protecting the Internet and her citizens, normally must scour the academic literature, hunt down the deep Webs running on zombied machines for the lancing, draining, and strip-mining of information on Romanian, Russian, and Chinese efforts, and perform our own small researches and inquisitions under nigh
...more
Nick
Oct 12, 2007 rated it it was amazing  ·  review of another edition
Shelves: security
This is probably the best-written guide to how networks and operating systems themselves work, and how knowledge of how these things do what they do in their own special way reveals much about what specifically is doing the talking. If that makes any sense. I loved it.
Dozo
Dec 18, 2018 rated it it was ok  ·  review of another edition
Silence on the Wire's topic, passive listening to determine the information processed by a system, has never been more topical than now.

I was looking forward to reading a book that illustrates some of these attack vectors and maybe some feasible usage and defence scenarios.

In reality though, this book is about 80% basic computer science and 20% computer security. The strange things is that most of the basic computer science is pretty irrelevant to the actual attacks which are described at a high
...more
Alexei
Silence on the Wire provides fascinating insight into security - rather than discussing the traditional security issues, rooted largely in implementation bugs, it discusses how the design of the fundamental protocols and technologies of the Internet creates room for subtle and sophisticated uses above and beyond what their designers intended.
Simmoril
Jun 06, 2007 rated it it was amazing  ·  review of another edition
Absolutely fantastic book, a great survey of network analysis and passive reconnaissance. Zalewski's insights are ingenious. A definite must read for anyone studying network security. ...more
Jarek
Jul 23, 2017 rated it really liked it  ·  review of another edition
Shelves: nonfiction
I came in a little skeptical: it's a book from 2005, and I already knew how Ethernet works and why you should make sure your encryption runs in constant time. But this was legitimately an interesting read, with many points and takeaways still interesting and applicable in 2017. If the idea of _understanding_ what the computer is doing -- and what implications that has on all kinds of security -- appeals to you, it's a book for you. ...more
Heather Noel
Feb 04, 2021 rated it did not like it  ·  review of another edition
Long-winded for the sake of being long-winded in many places, but this book predominantly gets one star because it breaks the fourth wall early and assumes all its readers are male. I know it's a choice that had to be made, and the majority of the industry is male, but that's why I'll stick out over here with my one lonely star. ...more
Jason Harper
May 21, 2020 rated it really liked it  ·  review of another edition
This was an interesting overview of how infomation is processed from the local system, to the local network, and then the Internet. The author does a good job of explaining how the various protocols were designed and the vulnerabilities built into these implementations, along with some possible threats. I would definitely recommend this book to someone getting started in network security.
Alex  Gyoshev
Apr 26, 2019 rated it it was amazing  ·  review of another edition
An awesome book. I understood quite a bit about TCP/IP, what can be learned from modem lights, and why my dial-up modem made those funny noises, all these years ago. A lot can be learned about a network by only listening, and this book shows how.
Nikolay Ivanov
Feb 11, 2020 rated it it was amazing  ·  review of another edition
I love how this book describes how the internet became what its now. I would suggest it for a getting started for anyone doing anything related to the web and not only.
Box2
Oct 05, 2017 rated it it was amazing  ·  review of another edition
One of the best hacking books I have ever read. Absolutely mandatory for infosec professionals and hackers.
Sara Rocutto
Libro che non ho finito, ma che ho assai apprezzato: è abbastanza tecnico, ma se qualcuno desidera farsi un'idea del mondo della sicurezza informatica... c'è di che stupirsi!! ...more
Hugh Smalley
Sep 14, 2016 rated it really liked it  ·  review of another edition

Author Michal Zalewski is respected in the hacking and security communities for his\n intelligence, curiosity and creativity, and this book is truly unlike anything else.\n Silence on the Wire is no humdrum white paper or how-to manual for protecting\n one's network. Rather, this narrative explores a variety of unique, uncommon and\n often elegant security challenges that defy classification and eschew the traditional\n attacker-victim model.



There are many ways that a potential attacker can inte

...more
André
MUSIC IS THE SILENCE BETWEEN THE NOTES (DEBUSSY)

Dokumentiert das kreative Ausnutzen unbeabsichtigter Nebeneffekte in informationstechnischen Produkten; viele (konkrete) Anwendungsbeispiele waren zuletzt zwischen 1997-2004 relevant, manche sind es noch. Die Ansätze, um von einem Gegner unbeabsichtigte Auskünfte über ein Zielobjekt zu gewinnen, sind zumindest prinzipiell übertragbar: Unaufmerksame Entwickler, unvollständige Spezifikationen, kryptoanalytische Naivität und logische Fortgänge bestimm
...more
Koleś
Feb 25, 2017 rated it really liked it  ·  review of another edition
Despite the fact that this book is a little old as for the IT book about security, it is still an interesting read. Different look at security problems
Russ
Sep 07, 2014 rated it it was amazing  ·  review of another edition
This book is probably one of my favorite books on security. Many security books rehash old topics that have almost been covered time and time again but this one does not. Fortunately, Michal Zalewski takes a very interesting approach to security. It is a very unique book because he takes a look at security vulnerabilities that involve passive reconnaissance. I really enjoyed learning about typing timing patterns, the blinking light vulnerability on modems and parasitic storage (and computing) we ...more
Julio Biason
Jun 10, 2016 rated it it was ok  ·  review of another edition
Shelves: it, kindle
This is a book about passive detection. Or active detection. Or attacks. I really don't know, because the subject keeps jumping around so much you have no idea the point the author wants to make.

There are plenty explanations for stuff, but mostly is dumbed down to the point it doesn't even make sense. Besides that, you have explanations for attacks that sounds really scary/cool (depending on your point of view) but after you think a bit about it, it is really hard to execute and, with the necess
...more
Mark Hillick
Oct 23, 2016 rated it really liked it  ·  review of another edition
Zalewski is renowned throughout the InfoSec industry for simply being incredible and bringing many new ways of thinking to the industry through his research.

In "Silence on the Wire", Zalewksi discusses security vulnerabilities and methods of attack that are simply mind-boggling. Although I've been in InfoSec for quite some time and there are areas of repetition for me, much of the book was fascinating and thought-provoking, from both a defender and attacker mindset.

The one downside is that the b
...more
Ivan
Aug 22, 2007 rated it it was amazing  ·  review of another edition
Recommends it for: hackers, network security folks, people interested in online privacy
Genius work focusing on passive recon, and not a very hard read either. The explanation of the thoughts and discoveries behind his ideas is easily as interesting as the real-life examples of how they can be used. If you're trying to protect someone's data, you really NEED to understand what Zalewski has to say. And if you think your data can truly be secure, just try to understand, that is not the world we live in today...

I bought this book for myself at HOPE 2006, but it was so good I gave it t
...more
Nina
May 04, 2016 rated it it was amazing  ·  review of another edition
Shelves: non-fiction
This book focusses on security flaws that exist because of the way something was designed. They may not all be the most commonly exploited flaws, since some aren't so practical to take advantage of, but they sure are interesting to learn about. The book starts right within the heart of the computer and expands all the way out to the internet as a whole. It is less of a practical guide in that it neither really tells you how to exploit something, or how to protect you against said exploit, it mer ...more
Prasanna
May 23, 2013 rated it really liked it  ·  review of another edition
I read this right after Zalewski got hired by Google as their web security guru. He has good perspective on security engineering and it is reflected in the pages of this book. As we obsess over the things we can see and secure, this book takes the approach of understanding the people, not very unlike Art of Deception in ages past. Not all the vectors are going to be obvious but you need to anticipate them.
Adi
Jun 18, 2015 rated it it was amazing  ·  review of another edition
It is a bit dated, and it will only get more so, but it only means you need to read it as soon as possible. For me it's a good example that an author can get in-depth about a technical subject and keep it interesting at all times. It really gave me some new insights about networking and it-sec. Solid recommendation! ...more
Nemo
Feb 25, 2016 rated it liked it  ·  review of another edition
Well another book finished that I have on my 'to-read-urgently' shelf since, well, I don't remember.
The only problem is that in the while most of the stuff is REALLY outdated, but still a pleasant read.
...more
Takedown
Oct 02, 2012 rated it really liked it  ·  review of another edition
A bit dated but still interesting book about cool low level tricks. I was especially fascinated about first part of the book and those hardware hacks.
Xiaolu
Oct 05, 2008 rated it it was amazing  ·  review of another edition
I love the way the author describes the ways in which information that is sent through networks becomes vulnerable to attacks or surveillance.
Ryan Williams
Poor structure and poorly written as well as a lot of content which was last relevant in 1997.
J.R.
Nov 03, 2014 rated it it was amazing  ·  review of another edition
A great generalist's introduction to the ways information can leak from a system, especially as that system's design becomes more complex. ...more
Andrew
Apr 29, 2009 rated it it was amazing  ·  review of another edition
A fantastic and readable overview of a wide range of passive reconnaissance techniques, mixed with a good dose of computing history.
Kamil
rated it it was amazing
Nov 15, 2016
Ray
rated it it was amazing
Nov 06, 2011
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Hacking: The Art of Exploitation
  • Inherent Vice
  • Best Served Cold
  • The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
  • The Art of Deception: Controlling the Human Element of Security
  • The Electric Kool-Aid Acid Test
  • Dog Sense: How the New Science of Dog Behavior Can Make You a Better Friend to Your Pet
  • How to Brew: Everything You Need to Know to Brew Beer Right the First Time
  • Brewing Better Beer: Master Lesson for Advanced Homeowners
  • Inward Revolution: Bringing About Radical Change in the World
  • The Book of Life: Daily Meditations with Krishnamurti
  • German Wheat Beer
  • Brew Like a Monk: Trappist, Abbey, and Strong Belgian Ales and How to Brew Them
  • Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
  • Peak: Secrets from the New Science of Expertise
  • Doctor Ecco's Cyberpuzzles: 36 Puzzles for Hackers and Other Mathematical Detectives
  • Rogue World (Undying Mercenaries, #7)
  • Iron Prince (Warformed: Stormweaver, #1)
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Related Articles

San Francisco is a gold rush town. There aren’t many books about people in their 20s who move to Silicon Valley with dreams of earning a living...
34 likes · 1 comments