The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversHacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
|
Other editions - View all
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon No preview available - 2005 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon No preview available - 2005 |
Common terms and phrases
10phtCrack 3COM 3COM device able Adrian Alex application audit authentication backup badge bank Boeing break-in called cards casino command company’s compromised computer systems Comrade configuration connection countermeasures cracker cracking Danny database dial-up domain dumpster diving Dustin employee encrypted Erik Excite@Home exploit firewall gain access gLobaLheLL going guard guys hack hacker identify installed internal network Internet IP address Khalid laptop looking Louis machine mail server Microsoft Mudge neoh operating system password cracking password hashes phone number port scanning prison protecting proxy servers random number reverse DNS lookup Robert router running says script sensitive information SIPRNET social engineering someone source code SQL injection started static passwords story system administrator target terrorist there’s things trying unauthorized upload vulnerabilities wanted Web server Whurley Zyklon