O'Reilly logo

No Tech Hacking by Kevin D. Mitnick, Johnny Long

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7 P2P Hacking

As we continue our pause from strict no-tech hacking, we’ll cover another low-tech skill: peer-to-peer (P2P) hacking. In keeping with the spirit of no-tech, let’s assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. In fact, let’s even take away Google. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.

Understanding P2P Hacking

A peer-to peer (P2P) network is composed of a number of clients (called peers) who want to share files or data. Most often, peer-to-peer networks carry audio, video or program files shared by users who join the network. The workings of a P2P network are beyond the scope of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required