Dissecting the Hack: The F0rb1dd3n Network, Revised Edition book cover

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life.

Yes, the security threats are real!   In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story.

Audience

Beginner to intermediate security professionals, pen testers and hackers

Paperback, 360 Pages

Published: July 2010

Imprint: Syngress

ISBN: 978-1-59749-568-4

Reviews

  • "Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc.

    "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH

    "A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc.

    "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute


Contents

  • Part 1: FOrb1dd3n

    PrO1Ogu3

    CHAPTER ON3

    CHAPTER TWO

    CHAPTER THR33

    CHAPTER FOUR

    CHAPTER F1V3

    CHAPTER S1X

    CHAPTER S3V3N

    CHAPTER E1GHT

    CHAPTER N1N3

    CHAPTER T3N

    3P1LOGU3

    PART 2: Security Threats Are Real (STAR) 2.0

    Chapter 1: Recon

    Chapter 2: Scan

    Chapter 3: Explore

    Chapter 4: Exploit

    Chapter 5: Expunge

    Chapter 6: Hacker Culture

    Chapter 7: Bit Bucket

Advertisement

advert image