Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Book description

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.

The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are “Easter eggs”—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
  • Revised edition includes a completely NEW STAR Section (Part 2)
  • Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
  • Introduces basic hacking techniques in real life context for ease of learning

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Foreword
  7. Acknowledgments
  8. H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network
  9. About the Authors
    1. Technical Editor
  10. Part 1: F0RB1DD3N
    1. Pr010gu3
      1. A New Assignment
    2. CHAPTER. 0N3
      1. Problem Solved
      2. Getting Started
      3. The Acquisition
    3. CHAPTER. TW0
      1. Just Another Day
      2. The Installation
    4. CHAPTER. THR33
      1. In Country
    5. CHAPTER. F0UR
      1. In Real Life
    6. CHAPTER. F1V3
      1. Status Check
      2. Log Review
    7. CHAPTER. S1X
      1. The Meeting
      2. First Lead
      3. The Discovery
    8. CHAPTER. S3V3N
      1. Code Review
    9. CHAPTER. E1GHT
      1. Battle Plans
      2. Data Collection
    10. CHAPTER. N1N3
      1. Data Analysis
      2. Shrinking Team
      3. Tenuous Connections
      4. Loose Ends
      5. Expendable Assets
    11. CHAPTER. T3N
      1. Choosing Sides
    12. 3P1L0GU3
      1. End Process
  11. PART 2: SECURITY THREATS ARE REAL (STAR) 2.0
    1. CHAPTER 1. Recon
      1. Social Networking
      2. Summary of Social Networking
      3. For More Information
      4. Google Hacking
      5. Summary of Google Hacking
      6. For More Information
      7. Deep Web Searching
      8. Summary of Deep Web Searching
      9. For More Information
      10. Physical Surveillance
      11. Summary of Physical Surveillance
      12. For More Information
      13. Log Analysis
      14. Summary of Log analysis
      15. For More Information
      16. Do it Yourself: Hacking 3DNF
      17. Endnotes
    2. CHAPTER 2. Scan
      1. Wardriving
      2. Summary of Wardriving
      3. For More Information
      4. Long-Range Wireless Scanning
      5. Summary of Long-Range Wireless Scanning
      6. For More Information
      7. Scanning Tools
      8. Summary of Scanning Tools
      9. For More Information
      10. Bluetooth Security
      11. Summary of Bluetooth Security
      12. For More Information
      13. Endnotes
    3. CHAPTER 3. Explore
      1. Authentication Security
      2. Summary of Authentication Security
      3. For More Information
      4. Physical Security
      5. Summary of Physical Security
      6. For More Information
      7. Network Traffic Sniffing
      8. Summary of Network Traffic Sniffing
      9. For More Information
      10. Dormant Malware
      11. Summary of Dormant Malware
      12. For More Information
      13. Web Browser Security
      14. Summary of Web Browser Security
      15. For More Information
      16. Out-of-Band Communications
      17. Summary of Out-of-Band Communications
      18. For More Information
      19. Endnotes
    4. CHAPTER 4. Exploit
      1. Encrypted Storage
      2. Summary of Encrypted Storage
      3. For More Information
      4. Attack Research
      5. Summary of Attack Research
      6. For More Information
      7. Password Security
      8. Summary of Password Security
      9. For More Information
      10. E-Mail Security
      11. Summary of E-Mail Security
      12. For More Information
      13. Windows Null Share Exploit
      14. Summary of Windows Null Share Exploit
      15. For More Information
      16. Credit Card Fraud
      17. Summary of Credit Card Fraud
      18. For More Information
      19. Traffic Obfuscation
      20. Summary of Traffic Obfuscation
      21. For More Information
      22. Metasploit
      23. Summary of Metasploit
      24. For More Information
      25. Endnotes
    5. CHAPTER 5. Expunge
      1. Removing Windows Login Traces
      2. Summary of Removing Windows Login Traces
      3. For More Information
      4. Browser Cleanup
      5. Summary of Browser Cleanup
      6. For More Information
      7. Endnotes
    6. CHAPTER 6. Hacker Culture
      1. Hacking Celebrities
      2. Conferences
      3. For More Information
      4. Podcasts
      5. Blogs
      6. Hacker Interviews
      7. Summary
      8. Endnotes
    7. CHAPTER 7. Bit Bucket
      1. Covert Physical Devices
      2. Oydsseus
      3. Volksbank
      4. Tiger Team
      5. Online Vigilantism
      6. Spot the Fed
      7. Bob Falken
      8. Honey Pots
      9. 2600 Clubs
      10. Capture the Flag
      11. MD5 Hash
      12. Sydney Bristow
      13. Cyberbob
      14. Linksys
      15. Infragard
      16. Echelon
      17. Perl Scripts
      18. Gh0Strat
      19. Lock Picking
      20. Endnotes
  12. Index

Product information

  • Title: Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
  • Author(s): Brian Baskin, Marcus J. Carey, Jayson E Street, Kent Nabors
  • Release date: August 2010
  • Publisher(s): Syngress
  • ISBN: 9781597495691