The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversHacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
|
From inside the book
Results 1-5 of 24
Page
... installing a “sniffer,” hewasable toeavesdrop on allthe packets of data going to and from a computer — a kind of computer wiretap. From thishe was able to capture passwords and unencrypted email. Information he gleaned from the emails ...
... installing a “sniffer,” hewasable toeavesdrop on allthe packets of data going to and from a computer — a kind of computer wiretap. From thishe was able to capture passwords and unencrypted email. Information he gleaned from the emails ...
Page
... installed a “back door” allowing him access at any time.) The government obviously considered the case important asa warningto other teenage hackers, and made much ofhis conviction in the press, proclaiminghim theyoungest person ever ...
... installed a “back door” allowing him access at any time.) The government obviously considered the case important asa warningto other teenage hackers, and made much ofhis conviction in the press, proclaiminghim theyoungest person ever ...
Page
You have reached your viewing limit for this book.
You have reached your viewing limit for this book.
Page
You have reached your viewing limit for this book.
You have reached your viewing limit for this book.
Page
You have reached your viewing limit for this book.
You have reached your viewing limit for this book.
Contents
Cops and Robbers | |
Guarding the Barricades | |
The Robin HoodHacker | |
The Wisdom and Folly of Penetration Testing | |
COUNTERMEASURES | |
THE LONGDISTANCE BANK HACK | |
INSIGHT | |
Chapter | |
TheFourth | |
Social Engineers How They Work and How to Stop Them | |
ShortTakes | |
INDEX | |
Other editions - View all
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon No preview available - 2005 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon No preview available - 2005 |
Common terms and phrases
able actually administrator Adrian Alex allowed application asked attack bank Boeing called cards casino challenge command common company’s configured connection corporate Costa countermeasures cracking developer device discovered domain employees Erik executive explained figured firewall gain getting give going guard guys hack hackers identify installed internal Internet inthe IP address it’s kind knew located logs looking Louis machine Matt ne0h never ofthe Once onthe operating organization password person playing port prison protecting remote request Robert running says scanning sensitive server shares social engineering someone started story tell things thought tothe turned vulnerabilities wanted Whurley Windows