Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons. ""The F0rb1dd3n Network"" can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout “The F0rb1dd3n Network” are “Easter eggs”—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on “The F0rb1dd3n Network,” STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
Beginner to intermediate security professionals, pen testers and hackers
Foreword Acknowledgments H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network About the Authors Part 1 F0rb1dd3n Pr010gu3 A New Assignment Chapter 0n3 Problem Solved Getting Started The Acquisition Chapter Tw0 Just Another Day The Installation Chapter Thr33 In Country Chapter F0ur In Real Life Chapter F1v3 Status Check Log Review Chapter S1x The Meeting First Lead The Discovery Chapter S3v3n Code Review Chapter E1ght Battle Plans Data Collection Chapter N1n3 Data Analysis Shrinking Team Tenuous Connections Loose Ends Expendable Assets Chapter T3n Choosing Sides 3p1l0gu3 End Process Part 2 Security Threats are real (STAR) 2.0 Chapter 1 Recon Social Networking Summary of Social Networking For More Information Google Hacking Summary of Google Hacking For More Information Deep Web Searching Summary of Deep Web Searching For More Information Physical Surveillance Summary of Physical Surveillance For More Information Log Analysis Summary of Log Analysis For More Information Do It Yourself: Hacking 3DNF Endnotes Chapter 2 Scan Wardriving Summary of Wardriving For More Information Long-Range Wireless Scanning Summary of Long-Range Wireless Scanning For More Information Scanning Tools Summary of Scanning Tools For More Information Bluetooth Security Summary of Bluetooth Security For More Information Endnotes
- No. of pages:
- © Syngress 2010
- 1st July 2010
- eBook ISBN:
- eBook ISBN:
- Paperback ISBN:
"The descriptions will be useful for nonsecurity professionals to understand the security jargon in the story and in real life."--Computing Reviews, Dissecting the Hack
"Welcome to hacker fiction—like sci fi, but you don't get to make the good stuff up."—Dan Kaminsky, Director of Penetration Testing, IOActive, Inc.
"There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."—FX of Phenoelit Recurity Labs GmbH
"A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."—Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc.
"Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."—Stephen Northcutt, President, The SANS Technology Institute