Profile for Henrik Lund Kramshøj > Reviews

Personal Profile

Content by Henrik Lund Kr...
Top Reviewer Ranking: 415,290
Helpful Votes: 19

Learn more about Your Profile.

Reviews Written by
Henrik Lund Kramshøj (Copenhagen)
(REAL NAME)   

Show:  
Page: 1 | 2
pixel
Rtfm: Red Team Field Manual
Rtfm: Red Team Field Manual
by Ben Clark
Edition: Paperback
Price: £4.94

1 of 1 people found the following review helpful
3.0 out of 5 stars Not great, only okay, 17 Mar. 2015
Verified Purchase(What is this?)
Really just a bunch of commands listed in a small book, if you want that you might have fun trying them ... less than what I expected.


Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
by Branko Spasojevic
Edition: Paperback
Price: £26.14

1 of 1 people found the following review helpful
5.0 out of 5 stars New version is even better than old ones, 17 Mar. 2015
Verified Purchase(What is this?)
This new version of the classic Gray hat hacking contains the essentials if you want to work in infosec. The examples and tools presented will give you a basic understanding and accelerate your learning from other resources. Highly recommended. I have all versions, and they keep on getting better for each new, which is a hard promise to keep.


Troubleshooting with Wireshark: Locate the Source of Performance Problems
Troubleshooting with Wireshark: Locate the Source of Performance Problems
by Gerald Combs
Edition: Paperback

5.0 out of 5 stars Best way to learn Wireshark currently, 17 Mar. 2015
Verified Purchase(What is this?)
These new wireshark books are great. The price is right and the content is perfect. Print quality and layout is worse than other computer science books. I will let that slide, since the content is awesome!


LEVIPOWER (7.4v,11200mah,Li-Polymer) Charger Laptop Replacement Battery For Apple MacBook Pro 17" Series MacBook Pro 17" A1297 (2009 Version), MacBook Pro 17" MC226*/A, MacBook Pro 17" MC226CH/A, MacBook Pro 17" MC226J/A, MacBook Pro 17" MC226LL/A, MacBook Pro 17" MC226TA/A, MacBook Pro 17" Precision Aluminum Unibody (2009 Version), MacBook Pro 17" MC226ZP/A,Compatible Part Numbers: A1309
LEVIPOWER (7.4v,11200mah,Li-Polymer) Charger Laptop Replacement Battery For Apple MacBook Pro 17" Series MacBook Pro 17" A1297 (2009 Version), MacBook Pro 17" MC226*/A, MacBook Pro 17" MC226CH/A, MacBook Pro 17" MC226J/A, MacBook Pro 17" MC226LL/A, MacBook Pro 17" MC226TA/A, MacBook Pro 17" Precision Aluminum Unibody (2009 Version), MacBook Pro 17" MC226ZP/A,Compatible Part Numbers: A1309
Offered by online.store
Price: £38.99

3.0 out of 5 stars Connector was not OK, made it work, 17 Mar. 2015
Verified Purchase(What is this?)
The battery was delivered without problems, but a bit annoyed. The connector did NOT fit into the Macbook 17" - using a dremel I was able to remove a little bit on each side, and mangle it in there. Since then no problems observed, so the battery itself seems to work fine.


Plug-in Laptop. Phone & iPad Charger 70w
Plug-in Laptop. Phone & iPad Charger 70w

1.0 out of 5 stars Bought this after checking compatability on trust.com, 18 Feb. 2014
Forgot my original charger at work, damn. Went to the local electronics store and bought this one, checked using their home page - yes my exact model laptop is compatible.

Unpacked at home, tried all the tips included - none really worked. Checked home page again, oohhhhh for MY laptop I need the AC tip - which is not in the package, really? Trust, you couldn't have told me that up front?

"If this tip is not included in the package, please contact the Support Department to request this tip FREE OF CHARGE." - and their nice ticketing system say they will answer within 48 hours. Guess I will have run out of power before that then, grrrrrrrrrrr MAD


24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by Michael Howard
Edition: Paperback
Price: £23.25

1 of 1 people found the following review helpful
5.0 out of 5 stars Updated and expanded - perfect, 15 Sept. 2011
Verified Purchase(What is this?)
Noticed there were no reviews on this on amazon.co.uk, been some time since I bought it.

Having owned the previous "edition" for years I did NOT think twice before ordering this one when it was published.

The 24 deadly sins cover the things you MUST consider, the ESSENTIAL security stuff you CANNOT miss. Got it? This is probably one of the most important books about security, which you will return to again and again to remind yourself of the importance, and to make sure you can persuade others to the risks associated with these security issues.

This said lets look into some details, the parts included are very vendor neutral (good thing), covers multiple languages (some bias perhaps, but pretty neutral), the book includes lots of code examples to show the problems and lots of references to papers, tools, methods - enough to keep anyone busy doing better at software security.

The product description already list the specific sins, so there you have it - buy the book, hit your developers or yourself repeatedly if you forget some of these when doing development, system work, implementation projects etc.

Highly recommended - and do NOT consider it "old" just because it is published in 2009, the stuff is still too important.


The Mac Hacker's Handbook
The Mac Hacker's Handbook
by Charlie Miller
Edition: Paperback
Price: £27.19

5.0 out of 5 stars Excellent and very detailed, 15 Sept. 2011
Verified Purchase(What is this?)
I read this book some time ago, but noticed there are no reviews.

This book was an excellent read, and I guess a lot is still valid.
If you are interested in Mac OS X security this is a must read.

The specific parts that made it good was the detailed instructions you could follow on your own computer. Really low level nitty gritty details are shown and explained.

The chapters on tracing and findings bug includes Mac specifics, so if you are moving to Mac and want to hunt bugs then this book is for you.
Mac specific information about Mach and root kits on OSX in chapters 11 and 12 is also required reading.


Network Flow Analysis
Network Flow Analysis
by Michael W. Lucas
Edition: Paperback
Price: £25.17

1 of 1 people found the following review helpful
5.0 out of 5 stars Fantastic and very complete information about network flows, 19 Aug. 2010
This review is from: Network Flow Analysis (Paperback)
Content
This book is a easy guide to the world of netflow logging and analysis. The content ranges from basic configuration of flow logging and easy customer friendly graphing methods to detailed custom reporting features in the software presented.

While this book does not cover each and every netflow tool available it has a complete walk through allowing you to get started and immediately produce important information for decision makers and troubleshooting.

This book also cover some details that a lot of beginning network people haven't noticed yet, but which are critical for doing netflow analysis. Things like ICMP types and codes and defining what a flow is. Michael also presents filtering and does so while showing you how to build these from simple primitives into fully working and usable examples that you can reuse in production.

The chapters about reporting both show textual representations, hard numbers, and nice graphing tools - suitable for management and others not needing the same level of detail. While showing reporting he not only show the reference, which options are available, but does interpretation of the sample reports.

The book finishes strong by listing common use cases for netflow analysis and if you reach this level in your own network you will have improved things a lot.

Target audience
Focus in this book is on making use of data available from network devices and thus the network administrator is the one doing the actual work. If you are a decision maker you should buy this book for your network guy and benefit from the awesome output he will generate.

You will need a bit of effort if you are not skilled in running tools from the command line, and setting up the tools can seem hard. Fortunately Michael Lucas has already selected a fine list of tools and how to install those.

The strategy of the book is to get you up and running with netflow easily which really works. Then later when you have seen the benefit from netflow you can dig deeper and deeper into reporting and advanced filtering of the data collected.

To summarize the Good stuff:
Short - this book is easy to read and short
Practical - if you follow the strategy and layout you will get going quickly
Very advanced and complete - given the length of the book it really has a lot of links and references

The Bad stuff about this book
The subject of netflow is hard to ease into and there are some great tools not described. If possible I would enjoy a follow up book that would connect netflow, intrusion detection, syslogging and monitoring with the same detail - using some selected tools.

Conclusion
This book is mandatory reading for network people, even if they already use netflow. There are sure to be tips and hints that you will enjoy. I read this book in a few days, but I will use the knowledge gained for years to come.


Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
by Justin Seitz
Edition: Paperback
Price: £26.50

7 of 7 people found the following review helpful
5.0 out of 5 stars The book for Windows bug hunters, 23 Nov. 2009
This book was a joy to read, but take notice of the reverse engineer part in the title.

Contents
The content of this book is a presentation of tools that use Python as part of their automation. The tools selected range from debuggers, fuzzers and onto emulators which can be driven using python. The book is laid out in 12 chapters which progress from setting up the environment to more advanced exercises.

The selection of tools is very good and the content fits together with lots of cross references.

Target audience
Focus for this book is running debugging tools automatically using python to do work for you. These features will allow you the reader the opportunity to go hunting for bugs more efficiently and with less manual work. With this in mind the target audience is not python beginners, though the programs shown are not very hard to follow. The real target audience are bug hunters and the ones that understand the issues, but are spending to much of their own time doing it.

If you are an absolute beginner in debugging I would recommend that you buy this book as a bundle with The Art of Hacking by Jon Erickson or perhaps The Shellcoders Handbook. If you have not experienced assembler ever you would probably also need an introduction to assembly programming.

Practical book
The structure of this book is very workbook-like and encourages you to run the many examples and experiment while doing them. Each one of the labs can also be performed in a short while allowing you to make use of short breaks from other stuff and do these.

The books does not have a lot of pages, but a lot of insight and the author clearly has great knowledge and experience in the reverse engineering arena. He also brings you up to speed by allowing you to start running the programs immediately, and while they run you can read the manuals how to do more advanced stuff by yourself later :-)

The techniques and methods described will also allow you to dive into programs that are not meant for debugging, because the author describes how to attack programs - while manuals typically tell you what options you have, but not the situations you should use those options.

To summarize the Good stuff:
Short - this book is short, so you can actually finish it
Practical - using the tools described you will be able to get started quickly, even if you really haven't learned about debuggers before
Very workbook like - making sure that you are always interested in trying out the examples
Cross references and references to material found on the internet makes this book indispensable

The Bad stuff about this book
I use mostly Unix and this book is mostly about hacking Windows, from applications down to Windows drivers. While I might not be the target audience, this focus has allowed the book to stay on track. I would have liked more about Unix systems, since Python is of course also used a lot in Unix.

Conclusion
This book has brought me through a lot of exercises, even if I didn't finish each and every one of them the first time. I will keep returning to this book to do more of the exercises and experiment more with Sulley and the other programs presented.

The book has persuaded me that I need to use more python and especially it has allowed be to go further with the debuggers I already know of. The level might not be suitable for the most advanced reverse engineers but for the rest of us it is a treasure of good information!

The matter is presented clearly and can be understood by almost anyone, even if they haven't really looked into debuggers before. The reason this book is so successful is partly because it does not repeat material from manuals for the tools, but require you to use existing tools with manuals and show you how to run them.

This book should be bundled with the Art of Hacking, showing you what hacking software is about and
this book show how to automate the hacking with python. I can highly recommend it for people that need to do reverse engineering and running of code through debuggers and emulators.


Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures
by Himanshu Dwivedi
Edition: Paperback
Price: £28.49

0 of 1 people found the following review helpful
4.0 out of 5 stars Practical and useful book that will get you started Hacking VoIP, 3 Nov. 2009
This is a very short book, so I will try to keep the review short too.

I have tried to stay clear of VoIP networks, phones, software, hacking - while keeping an eye out for major problems. The monster called VoIP includes just to many protocols and I have a lot of work doing internet security as it is.

During the last few years though, people are moving even more into VoIP phones and thus I have read a few resources about VoIP, attended a few conference presentations about VoIP security - but not really gotten dirty with hacker tools for VoIP. I asked for a review copy of this book and one was provided by the nice people of No Starch.

This has changed and this book is the reason, because Hacking VoIP is a very practical book that will get you started hacking VoIP networks.

The book is very short, which is great, I like books that you can actually read from cover to cover. The content is also presented clearly with excellent wording and just enough detail to get me started. The book also list precise tools, programs and even allows you to download configurations and special tools.

The problems described are very real and the scenarios are precisely what is found in real life. The target audience for this book is specified as VoIP administrators, but being a security consultant myself I think the actual target audience is a bit wider. The level needed to do the lab exercises is consistent with a VoIP administrator, which have had some experience using Asterisk/BackTrack.

This book also present a VoIP Security Audit Program (VSAP) which I think is a great idea and resource for people to audit their own systems.

To summarize the Good stuff:
Short - this book is short, so you can actually finish it
Practical - using the tools described you will be able to get a VoIP network running quickly
Contents - Specific VoIP stuff, not generic hacker stuff
Writing style - excellent

The Bad stuff about this book:
Repeated content - chapter 8 contains some sniffing and injection which is repeated from chapter 4, including half page screen shoots :-( This might be more of an editorial problem, but having a 200 page book which repeats itself?!

More content would be interesting, for example fuzzing is introduced but more could have been described. Clearly the author has a lot of knowledge about hacking VoIP, so I think he could have easily added another 50-100 pages more.

Conclusion
The book does whet my appetite and lets me get started Hacking VoIP immediately which is the goal. Having obtained that goal I will be able to continue working with VoIP security and understand the new attacks being published. I recommend it for people getting into this area.


Page: 1 | 2