You are previewing The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers.
O'Reilly logo
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Book Description

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestsellingThe Art of Deception

Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:

  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines

  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems

  • Two convicts who joined forces to become hackers inside a Texas prison

  • A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access

With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Table of Contents

  1. Title Page
  2. Copyright Page
  3. Dedication
  4. Preface
  5. Acknowledgements
  6. Chapter 1 - Hacking the Casinos for a Million Bucks
    1. Research
    2. Developing the Hack
    3. Rewriting the Code
    4. Back to the Casinos — This Time to Play
    5. New Approach
    6. The New Attack
    7. Caught!
    8. Aftermath
  7. Chapter 2 - When Terrorists Come Calling
    1. Khalid the Terrorist Dangles Some Bait
    2. Target for Tonight: SIPRNET
    3. A Time for Worrying
    4. Comrade Gets Busted
    5. Investigating Khalid
    6. The Harkat ul-Mujahideen
    7. In the Aftermath of 9/11
    8. The White House Break-in
    9. Aftermath
    10. Five Years Later
    11. How Great Is the Threat?
  8. Chapter 3 - The Texas Prison Hack
    1. Inside: Discovering Computers
    2. Federal Prisons Are Different
    3. William Gets the Keys to the Castle
    4. Online in Safety
    5. Solution
    6. Nearly Caught
    7. Close Call
    8. Growing Up
    9. Back in the Free World
  9. Chapter 4 - Cops and Robbers
    1. Phreaking
    2. Getting into Court
    3. Guests of the Hotel
    4. Opening a Door
    5. Guarding the Barricades
    6. Under Surveillance
    7. Closing In
    8. The Past Catches Up
    9. On the News
    10. Arrested
    11. An End to Good Luck
    12. Jail Phreaking
    13. Doing Time
    14. What They’re Doing Today
  10. Chapter 5 - The Robin Hood Hacker
    1. Rescue
    2. Roots
    3. Midnight Meetings
    4. MCI WorldCom
    5. Inside Microsoft
    6. A Hero but Not a Saint: The New York Times Hack
    7. The Unique Nature of Adrian’s Skills
    8. Easy Information
    9. These Days
  11. Chapter 6 - The Wisdom and Folly of Penetration Testing
    1. ONE COLD WINTER
    2. ONE ALARMING GAME
    3. INSIGHT
    4. COUNTERMEASURES
    5. THE BOTTOM LINE
  12. Chapter 7 - Of Course Your Bank Is Secure–Right?
    1. IN FARAWAY ESTONIA
    2. THE LONG-DISTANCE BANK HACK
    3. INSIGHT
    4. COUNTERMEASURES
    5. THE BOTTOM LINE
    6. NOTES
  13. Chapter 8 - Your Intellectual Property Isn’t Safe
    1. THE TWO-YEAR HACK
    2. ROBERT, THE SPAMMER’S FRIEND
    3. ROBERT THE MAN
    4. SHARING: A CRACKER’S WORLD
    5. INSIGHT
    6. COUNTERMEASURES
    7. THE BOTTOM LINE
    8. NOTES
  14. Chapter 9 - On the Continent
    1. Somewhere in London
    2. Diving In
    3. Mapping the Network
    4. Identifying a Router
    5. The Second Day
    6. Looking at the Configuration of the 3COM Device
    7. The Third Day
    8. Some Thoughts about “Hackers’ Intuition”
    9. The Fourth Day
    10. Accessing the Company’s System
    11. Goal Achieved
    12. INSIGHT
    13. COUNTERMEASURES
    14. THE BOTTOM LINE
  15. Chapter 10 - Social Engineers — How They Work and How to Stop Them
    1. A SOCIAL ENGINEER AT WORK
    2. INSIGHT
    3. COUNTERMEASURES
    4. THE BOTTOM LINE
    5. NOTES
  16. Chapter 11 - Short Takes
    1. THE MISSING PAYCHECK
    2. COME TO HOLLYWOOD, YOU TEEN WIZARD
    3. HACKING A SOFT DRINK MACHINE
    4. CRIPPLING THE IRAQI ARMY IN DESERT STORM
    5. THE BILLION-DOLLAR GIFT CERTIFICATE
    6. THE TEXAS HOLD ’EM HACK
    7. THE TEENAGE PEDOPHILE CHASER
    8. . . . AND YOU DON’T EVEN HAVE TO BE A HACKER
    9. NOTES
  17. INDEX