The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversHacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
|
Contents
WhenTerrorists Come Calling | |
Cops and Robbers | |
Guarding the Barricades | |
The Robin HoodHacker | |
The Wisdom and Folly of Penetration Testing | |
COUNTERMEASURES | |
Other editions - View all
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon No preview available - 2005 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon No preview available - 2005 |
Common terms and phrases
able actually administrator Adrian Alex allowed application asked attack bank Boeing called cards casino challenge command common company’s configured connection corporate Costa countermeasures cracking developer device discovered domain employees Erik executive explained figured firewall gain getting give going guard guys hack hackers identify installed internal Internet inthe IP address it’s kind knew located logs looking Louis machine Matt ne0h never ofthe Once onthe operating organization password person playing port prison protecting remote request Robert running says scanning sensitive server shares social engineering someone started story tell things thought tothe turned vulnerabilities wanted Whurley Windows