Book description
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation.
The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest.
"The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
- All new volume of Dissecting the Hack by Jayson Street, with technical edit by Brian Martin
- Uses actual hacking and security tools in its story – helps to familiarize readers with the many devices and their code
- Features cool new hacks and social engineering techniques, in real life context for ease of learning
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- List of Contributors
- About the Authors
- Foreword
- Acknowledgments
- About the Book
- 1. The V3rb0t3n Network
- 2. Interview Interlude
-
3. Security Threats Are Real (STAR)
- Abstract
- Radio Frequency Identification (RFID)
- BitCoin and Digital Currency
- Steganography
- SSL Encryption
- Advanced Persistent Threat (APT)
- Cyber Espionage
- Malware and Trojans
- Malware Communications
- Adware, Crimeware, and Ransomware
- Reverse Engineering
- Malware Analysis
- Memory Attacks and Analysis
- Digital Forensics and Incident Response
- Penetration Testing Tools
- SCADA
- Mobile Phone Attacks
- Government Surveillance
- 3D Printers
- Maltego
- ROT13
- Wickr
- Pastebin
- Women in Technology
- Pirate Party
- magicJack
- Firewalls
- Avatar
- Chaos Communication Congress/Chaos Computer Camp
- Hacker Spaces
- Hacker Hostel
- German International ID
- Snopes
- Wikileaks
- DEFCON
- BruCON
- 44Con
- OPSEC
- Pentesting Hardware
- Anonymous Emailers
- Terminal Cornucopia
- Hacking in Popular Culture
- System Auditing Tools
- Uber
- Online Identity Hiding
- 2600 Meetings
- Hackers for Charity
- Endnotes
Product information
- Title: Dissecting the Hack
- Author(s):
- Release date: July 2015
- Publisher(s): Syngress
- ISBN: 9780128042823
You might also like
book
Google Hacks, 3rd Edition
Everyone knows that Google lets you search billions of web pages. But few people realize that …
book
WarDriving and Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first …
book
No Tech Hacking
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in …
book
Kismet Hacking
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 …