Dissecting the Hack: The F0rb1dd3n Network, Revised Edition


  • Jayson Street, Principle Partner, Stratagem One Solutions, Oklahoma City, OK, USA
  • Kent Nabors, Vice President of Information Security for a multi-billion dollar financial institution
  • Brian Baskin, Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA)
  • Marcus Carey

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons. ""The F0rb1dd3n Network"" can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout “The F0rb1dd3n Network” are “Easter eggs”-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on “The F0rb1dd3n Network,” STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
View full description


Beginner to intermediate security professionals, pen testers and hackers


Book information

  • Published: July 2010
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-568-4


"Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc.

"There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH

"A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc.

"Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute

Table of Contents



H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network

About the Authors

Part 1 F0rb1dd3n


A New Assignment

Chapter 0n3

Problem Solved

Getting Started

The Acquisition

Chapter Tw0

Just Another Day

The Installation

Chapter Thr33

In Country

Chapter F0ur

In Real Life

Chapter F1v3

Status Check

Log Review

Chapter S1x

The Meeting

First Lead

The Discovery

Chapter S3v3n

Code Review

Chapter E1ght

Battle Plans

Data Collection

Chapter N1n3

Data Analysis

Shrinking Team

Tenuous Connections

Loose Ends

Expendable Assets

Chapter T3n

Choosing Sides


End Process

Part 2 Security Threats are real (STAR) 2.0

Chapter 1 Recon

Social Networking

Summary of Social Networking

For More Information

Google Hacking

Summary of Google Hacking

For More Information

Deep Web Searching

Summary of Deep Web Searching

For More Information

Physical Surveillance

Summary of Physical Surveillance

For More Information

Log Analysis

Summary of Log Analysis

For More Information

Do It Yourself: Hacking 3DNF


Chapter 2 Scan


Summary of Wardriving

For More Information

Long-Range Wireless Scanning

Summary of Long-Range Wireless Scanning

For More Information

Scanning Tools

Summary of Scanning Tools

For More Information

Bluetooth Security

Summary of Bluetooth Security

For More Information


Chapter 3 Explore

Authentication Security

Summary of Authentication Security

For More Information

Physical Security

Summary of Physical Security

For More Information

Network Traffic Sniffing

Summary of Network Traffic Sniffing

For More Information

Dormant Malware

Summary of Dormant Malware

For More Information

Web Browser Security

Summary of Web Browser Security

For More Information

Out-of-Band Communications

Summary of Out-of-Band Communications

For More Information


Chapter 4 Exploit

Encrypted Storage

Summary of Encrypted Storage

For More Information

Attack Research

Summary of Attack Research

For More Information

Password Security

Summary of Password Security

For More Information

E-Mail Security

Summary of E-Mail Security

For More Information

Windows Null Share Exploit

Summary of Windows Null Share Exploit

For More Information

Credit Card Fraud

Summary of Credit Card Fraud

For More Information

Traffic Obfuscation

Summary of Traffic Obfuscation

For More Information


Summary of Metasploit

For More Information


Chapter 5 Expunge

Removing Windows Login Traces

Summary of Removing Windows Login Traces

For More Information

Browser Cleanup

Summary of Browser Cleanup

For More Information


Chapter 6 Hacker Culture

Hacking Celebrities


For More Information



Hacker Interviews



Chapter 7 Bit Bucket

Covert Physical Devices



Tiger Team

Online Vigilantism

Spot the Fed

Bob Falken

Honey Pots


Capture the Flag

MD5 Hash

Sydney Bristow





Perl Scripts


Lock Picking