Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
By- Jayson Street, Principle Partner, Stratagem One Solutions, Oklahoma City, OK, USA
- Kent Nabors, Vice President of Information Security for a multi-billion dollar financial institution
- Brian Baskin, Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA)
- Marcus Carey
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life.
Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story.
Paperback, 360 Pages
Published: July 2010
Imprint: Syngress
ISBN: 978-1-59749-568-4
Reviews
-
"Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."- Dan Kaminsky, Director of Penetration Testing, IOActive, Inc."There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."- FX of Phenoelit Recurity Labs GmbH"A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."- Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc." Dissecting the Hack: the F0rb1dd3n Networkis an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."- Stephen Northcutt, President, The SANS Technology Institute
Contents
Part 1: FOrb1dd3n
PrO1Ogu3
CHAPTER ON3
CHAPTER TWOCHAPTER THR33
CHAPTER FOURCHAPTER F1V3
CHAPTER S1XCHAPTER S3V3N
CHAPTER E1GHTCHAPTER N1N3
CHAPTER T3N3P1LOGU3
PART 2: Security Threats Are Real (STAR) 2.0Chapter 1: Recon
Chapter 2: ScanChapter 3: Explore
Chapter 4: ExploitChapter 5: Expunge
Chapter 6: Hacker CultureChapter 7: Bit Bucket
