Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
- 1st Edition - July 1, 2010
- Authors: Brian Baskin, Marcus J. Carey, Jayson E Street, Kent Nabors
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 5 6 8 - 4
- eBook ISBN:9 7 8 - 1 - 5 9 7 4 9 - 5 6 9 - 1
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Networ… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteThe F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are “Easter eggs”—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
- Revised edition includes a completely NEW STAR Section (Part 2)
- Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
- Introduces basic hacking techniques in real life context for ease of learning
Acknowledgments
H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network
About the Authors
Part 1 F0rb1dd3n
Pr010gu3
A New Assignment
0n3
Problem Solved
Getting Started
The Acquisition
Tw0
Just Another Day
The Installation
Thr33
In Country
F0ur
In Real Life
F1v3
Status Check
Log Review
S1x
The Meeting
First Lead
The Discovery
S3v3n
Code Review
E1ght
Battle Plans
Data Collection
N1n3
Data Analysis
Shrinking Team
Tenuous Connections
Loose Ends
Expendable Assets
T3n
Choosing Sides
3p1l0gu3
End Process
Part 2 Security Threats are real (STAR) 2.0
1 Recon
Social Networking
Summary of Social Networking
For More Information
Google Hacking
Summary of Google Hacking
For More Information
Deep Web Searching
Summary of Deep Web Searching
For More Information
Physical Surveillance
Summary of Physical Surveillance
For More Information
Log Analysis
Summary of Log Analysis
For More Information
Do It Yourself: Hacking 3DNF
Endnotes
2 Scan
Wardriving
Summary of Wardriving
For More Information
Long-Range Wireless Scanning
Summary of Long-Range Wireless Scanning
For More Information
Scanning Tools
Summary of Scanning Tools
For More Information
Bluetooth Security
Summary of Bluetooth Security
For More Information
Endnotes
3 Explore
Authentication Security
Summary of Authentication Security
For More Information
Physical Security
Summary of Physical Security
For More Information
Network Traffic Sniffing
Summary of Network Traffic Sniffing
For More Information
Dormant Malware
Summary of Dormant Malware
For More Information
Web Browser Security
Summary of Web Browser Security
For More Information
Out-of-Band Communications
Summary of Out-of-Band Communications
For More Information
Endnotes
4 Exploit
Encrypted Storage
Summary of Encrypted Storage
For More Information
Attack Research
Summary of Attack Research
For More Information
Password Security
Summary of Password Security
For More Information
E-Mail Security
Summary of E-Mail Security
For More Information
Windows Null Share Exploit
Summary of Windows Null Share Exploit
For More Information
Credit Card Fraud
Summary of Credit Card Fraud
For More Information
Traffic Obfuscation
Summary of Traffic Obfuscation
For More Information
Metasploit
Summary of Metasploit
For More Information
Endnotes
5 Expunge
Removing Windows Login Traces
Summary of Removing Windows Login Traces
For More Information
Browser Cleanup
Summary of Browser Cleanup
For More Information
Endnotes
6 Hacker Culture
Hacking Celebrities
Conferences
For More Information
Podcasts
Blogs
Hacker Interviews
Summary
Endnotes
7 Bit Bucket
Covert Physical Devices
Oydsseus
Volksbank
Tiger Team
Online Vigilantism
Spot the Fed
Bob Falken
Honey Pots
2600
Capture the Flag
MD5 Hash
Sydney Bristow
CyberBob
Linksys
InfraGard
Echelon
Perl Scripts
Gh0stRAT
Lock Picking
Endnotes
Index
- No. of pages: 360
- Language: English
- Edition: 1
- Published: July 1, 2010
- Imprint: Syngress
- Paperback ISBN: 9781597495684
- eBook ISBN: 9781597495691
BB
Brian Baskin
Brian also serves as a technical reviewer for DCITA. He helps to analyze content and procedures for more than two dozen cyber security courses for technical validity and relevance. For fun, he manages a content creation team that develops online Web-based incident response training that provides hands-on experience to military units stationed overseas. His team works with the various federal and military law enforcement groups for information sharing and collaboration on ongoing threats and best practices.
Brian has also served as a subject matter expert for content development for the National White Collar Crime Center (NW3C) and the Federal Law Enforcement Training Center (FLETC).
MC
Marcus J. Carey
JS
Jayson E Street
At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.
KN