Book description
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real (STAR), focuses on these real-world lessons.The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are “Easter eggs—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
- Revised edition includes a completely NEW STAR Section (Part 2)
- Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
- Introduces basic hacking techniques in real life context for ease of learning
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Foreword
- Acknowledgments
- H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network
- About the Authors
- Part 1: F0RB1DD3N
-
PART 2: SECURITY THREATS ARE REAL (STAR) 2.0
-
CHAPTER 1. Recon
- Social Networking
- Summary of Social Networking
- For More Information
- Google Hacking
- Summary of Google Hacking
- For More Information
- Deep Web Searching
- Summary of Deep Web Searching
- For More Information
- Physical Surveillance
- Summary of Physical Surveillance
- For More Information
- Log Analysis
- Summary of Log analysis
- For More Information
- Do it Yourself: Hacking 3DNF
- Endnotes
- CHAPTER 2. Scan
-
CHAPTER 3. Explore
- Authentication Security
- Summary of Authentication Security
- For More Information
- Physical Security
- Summary of Physical Security
- For More Information
- Network Traffic Sniffing
- Summary of Network Traffic Sniffing
- For More Information
- Dormant Malware
- Summary of Dormant Malware
- For More Information
- Web Browser Security
- Summary of Web Browser Security
- For More Information
- Out-of-Band Communications
- Summary of Out-of-Band Communications
- For More Information
- Endnotes
-
CHAPTER 4. Exploit
- Encrypted Storage
- Summary of Encrypted Storage
- For More Information
- Attack Research
- Summary of Attack Research
- For More Information
- Password Security
- Summary of Password Security
- For More Information
- E-Mail Security
- Summary of E-Mail Security
- For More Information
- Windows Null Share Exploit
- Summary of Windows Null Share Exploit
- For More Information
- Credit Card Fraud
- Summary of Credit Card Fraud
- For More Information
- Traffic Obfuscation
- Summary of Traffic Obfuscation
- For More Information
- Metasploit
- Summary of Metasploit
- For More Information
- Endnotes
- CHAPTER 5. Expunge
- CHAPTER 6. Hacker Culture
- CHAPTER 7. Bit Bucket
-
CHAPTER 1. Recon
- Index
Product information
- Title: Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
- Author(s):
- Release date: August 2010
- Publisher(s): Syngress
- ISBN: 9781597495691
You might also like
book
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …
book
Windows Security Monitoring
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring …
book
Hands-On Cybersecurity for Finance
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats …
book
Cybersecurity Ops with bash
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of …