Dissecting the Hack: The F0rb1dd3n Network, Revised Edition book cover

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons. ""The F0rb1dd3n Network"" can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout “The F0rb1dd3n Network” are “Easter eggs”-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on “The F0rb1dd3n Network,” STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.


Beginner to intermediate security professionals, pen testers and hackers

Paperback, 360 Pages

Published: July 2010

Imprint: Syngress

ISBN: 978-1-59749-568-4


  • "Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc.

    "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH

    "A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc.

    "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute


  • Foreword


    H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network

    About the Authors

    Part 1 F0rb1dd3n


    A New Assignment

    Chapter 0n3

    Problem Solved

    Getting Started

    The Acquisition

    Chapter Tw0

    Just Another Day

    The Installation

    Chapter Thr33

    In Country

    Chapter F0ur

    In Real Life

    Chapter F1v3

    Status Check

    Log Review

    Chapter S1x

    The Meeting

    First Lead

    The Discovery

    Chapter S3v3n

    Code Review

    Chapter E1ght

    Battle Plans

    Data Collection

    Chapter N1n3

    Data Analysis

    Shrinking Team

    Tenuous Connections

    Loose Ends

    Expendable Assets

    Chapter T3n

    Choosing Sides


    End Process

    Part 2 Security Threats are real (STAR) 2.0

    Chapter 1 Recon

    Social Networking

    Summary of Social Networking

    For More Information

    Google Hacking

    Summary of Google Hacking

    For More Information

    Deep Web Searching

    Summary of Deep Web Searching

    For More Information

    Physical Surveillance

    Summary of Physical Surveillance

    For More Information

    Log Analysis

    Summary of Log Analysis

    For More Information

    Do It Yourself: Hacking 3DNF


    Chapter 2 Scan


    Summary of Wardriving

    For More Information

    Long-Range Wireless Scanning

    Summary of Long-Range Wireless Scanning

    For More Information

    Scanning Tools

    Summary of Scanning Tools

    For More Information

    Bluetooth Security

    Summary of Bluetooth Security

    For More Information


    Chapter 3 Explore

    Authentication Security

    Summary of Authentication Security

    For More Information

    Physical Security

    Summary of Physical Security

    For More Information

    Network Traffic Sniffing

    Summary of Network Traffic Sniffing

    For More Information

    Dormant Malware

    Summary of Dormant Malware

    For More Information

    Web Browser Security

    Summary of Web Browser Security

    For More Information

    Out-of-Band Communications

    Summary of Out-of-Band Communications

    For More Information


    Chapter 4 Exploit

    Encrypted Storage

    Summary of Encrypted Storage

    For More Information

    Attack Research

    Summary of Attack Research

    For More Information

    Password Security

    Summary of Password Security

    For More Information

    E-Mail Security

    Summary of E-Mail Security

    For More Information

    Windows Null Share Exploit

    Summary of Windows Null Share Exploit

    For More Information

    Credit Card Fraud

    Summary of Credit Card Fraud

    For More Information

    Traffic Obfuscation

    Summary of Traffic Obfuscation

    For More Information


    Summary of Metasploit

    For More Information


    Chapter 5 Expunge

    Removing Windows Login Traces

    Summary of Removing Windows Login Traces

    For More Information

    Browser Cleanup

    Summary of Browser Cleanup

    For More Information


    Chapter 6 Hacker Culture

    Hacking Celebrities


    For More Information



    Hacker Interviews



    Chapter 7 Bit Bucket

    Covert Physical Devices



    Tiger Team

    Online Vigilantism

    Spot the Fed

    Bob Falken

    Honey Pots


    Capture the Flag

    MD5 Hash

    Sydney Bristow





    Perl Scripts


    Lock Picking




advert image