Chapter 5. The Hacking Top 10

Solutions in this chapter:

  • The Hacking Top Ten
  • Reconnaissance Tools
  • Summary

Introduction

In the world of computer crime, Hollywood fills our mind with illusions of grandeur. Films like Hackers, Sneakers, Mission Impossible, and the most recent, Untraceable, depict our primary adversary to possess super human intelligence, never make a mistake, and only get caught by the good guys after a dramatic, heart pounding chase scene. The truth of the matter is, in the overwhelming majority of cases that I have worked, this is simply not the case. While the “Uber-Hacker” does exist, your chances of coming across him or ...

Get UNIX and Linux Forensic Analysis DVD Toolkit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.