Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Paperback
from $0.00

Author: Jayson E Street

ISBN-10: 1597495689

ISBN-13: 9781597495684

Category: Security - Computer Networks

About the Author Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on...

Search in google:

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life.Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story.Revised edition includes a completely NEW STAR Section (Part 2)Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hackCheck out the companion site at www.dissectingthehack.com complete with an interactive forum!Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum

ForewordAcknowledgmentsHow to R34d Dissecting the Hack: The Forb1dd3n NetworkAbout the AuthorsPART 1 FORB1DD3NPrologue 3A New Assignment 3Chapter One 15Problem Solved 15Getting Started 21The Acquisition 22Chapter Two 27Just Another Day 27The Installation 32Chapter Three 35In Country 35Chapter Four 47In Real Life 47Chapter Five 57Status Check 57Log Review 63Chapter Six 69The Meeting 69First Lead 72The Discovery 75Chapter Seven 81Code Review 81Chapter Eight 91Battle Plans 91Data Collection 96Chapter Nine 105Data Analysis 105Shrinking Team 106Tenuous Connections 107Loose Ends 112Expendable Assets 115Chapter Ten 119Choosing Sides 119EPILOGUE 127End Process 127PART 2 SECURITY THREATS ARE REAL (STAR) 2.0Chapter 1 Recon 131Social Networking 132Exploit Techniques 133Best Practices 137Summary of Social Networking 138For More Information 138Google Hacking 138Exploit Techniques 139Best Practices 145Summary of Google Hacking 146For More Information 146Deep Web Searching 146Exploit Techniques 147Best Practices 151Summary of Deep Web Searching 152For More Information 152Physical Surveillance 152Exploit Techniques 153Best Practices 155Summary of Physical Surveillance 156For More Information 157Log Analysis 157Exploit Techniques 158Best Practices 158Summary of Log Analysis 160For More Information 162Do It Yourself: Hacking 3DNF 162Targeting Human Resources 163Google Apps 167Blog Recon 168Domain Information 169Twitter Recon 170Endnotes 172Chapter 2 Scan 175Wardriving 175Exploit Techniques 176Best Practices 181Summary of Wardriving 182For More Information 182Long-Range Wireless Scanning 183Exploit Techniques 183Best Practices 185Summary of Long-Range Wireless Scanning 185For More Information 185Scanning Tools 185Exploit Techniques 186Best Practices 188Summary of Scanning Tools 189For More Information 190Bluetooth Security 190Exploit Techniques 190Best Practices 192Summary of Bluetooth Security 192For More Information 193Endnotes 193Chapter 3 Explore 195Authentication Security 195Exploit Techniques 195Best Practices 197Summary of Authentication Security 199For More Information 199Physical Security 200Exploit Techniques 200Best Practices 203Summary of Physical Security 206For More Information 206Network Traffic Sniffing 207Exploit Techniques 207Best Practices 209Summary of Network Traffic Sniffing 211For More Information 211Dormant Malware 212Exploit Techniques 212Best Practices 213Summary of Dormant Malware 215For More Information 216Web Browser Security 216Exploit Techniques 217Best Practices 218Summary of Web Browser Security 223For More Information 224Out-of-Band Communications 224Exploit Techniques 225Best Practices 225Summary of Out-of-Band Communications 226For More Information 226Endnotes 226Chapter 4 Exploit 229Encrypted Storage 229Exploit Techniques 230Best Practices 232Summary of Encrypted Storage 234For More Information 235Attack Research 235Exploit Techniques 235Best Practices 237Summary of Attack Research 238For More Information 238Password Security 239Exploit Techniques 239Best Practices 242Summary of Password Security 245For More Information 245E-Mail Security 245Exploit Techniques 246Best Practices 247Summary of E-Mail Security 248For More Information 248Windows Null Share Exploit 249Exploit Techniques 249Best Practices 250Summary of Windows Null Share Exploit 250For More Information 251Credit Card Fraud 251Exploit Techniques 251Best Practices 253Summary of Credit Card Fraud 254For More Information 254Traffic Obfuscation 255Exploit Techniques 255Best Practices 259Summary of Traffic Obfuscation 259For More Information 259Metasploit 260Exploit Techniques 261Best Practices 262Summary of Metasploit 263For More Information 264Endnotes 264Chapter 5 Expunge 269Removing Windows Login Traces 269Exploit Techniques 269Best Practices 271Summary of Removing Windows Login Traces 276For More Information 276Browser Cleanup 277Exploit Techniques 277Best Practices 279Summary of Browser Cleanup 279For More Information 280Endnotes 280Chapter 6 Hacker Culture 281Hacking Celebrities 281Dan Kaminsky 282Tony Watson 282GOBBLES Security 282n3td3v 283Stephen Colbert 283Conferences 283The Four Points of the Hacking Compass (From BruCON to DEFCON and Beijing to Brazil) 286Security Meetups 288For More Information 289Podcasts 290Blogs 290Hacker Interviews 292Jeff Moss (Dark Tangent) 292Dan Kaminsky 299Johnny Long 302Marcus Ranum 307Summary 310Endnotes 310Chapter 7 Bit Bucket 313Covert Physical Devices 313Oydsseus 315Volksbank 315Tiger Team 316Online Vigilantism 316Spot the Fed 317Bob Falken 318Honey Pots 3182600 319Capture the Flag 319MD5 Hash 320Sydney Bristow 320CyberBob 321Linksys 323InfraGard 323Echelon 324Perl Scripts 324GhOstRAT 325Lock Picking 325Endnotes 326Index 329