Book info:
Stealing the Network: How to Own the Box
Ryan Russell Tim Mullen (Thor) FX Dan “Effugas” Kaminsky
Joe Grand Ken Pfeil Ido Durbrawsky
Mark Burnett Paul Craig
Syngress Publications
ebook format: PDF
ISBN-10: 1-931836-87-6
Product Description
You Are Who the Computer Says You Are
The first two books in this series, Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent, have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques and strategies. But what happens when the tables turn, and the criminal hackers become the targets of both law enforcement and each other? What happens when they must evade detection by creating new identities and applying their skills to get out fast and vanish into thin air. In Stealing the Network: How to Own an Identity, the hacker crew you've grown to both love and hate find themselves on the run, fleeing from both authority and adversary. They must now use their prowess in a way they never expected--to survive...
From the Diary of Robert Knoll, Senior My name, my real name, is Robert Knoll, Senior. No middle name. Most of those who matter right now think of me as Knuth. But I am the man of a thousand faces, the god of infinite forms.
Identity is a precious commodity. In centuries past, those who fancied themselves sorcerers believed that if you knew a being's true name, you could control that being. Near where I live now, there are shamans who impose similar beliefs on their people. The secret is that if you grant such a man, an agency, this power over yourself through your beliefs or actions, then it is true.
Only recently has this become true in the modern world. The people of the world have granted control of their existence to computers, networks, and databases. You own property if a computer says you do. You can buy a house if a computer says you may. You have money in the bank if a computer says so. Your blood type is what the computer says it is. You are who the computer says you are.
About the Author
Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.
TOC
Part I Evasion
Prologue From the Diary of Robert Knoll, Senior
Chapter 1 In The Beginning
Chapter 2 Sins of the Father
Chapter 3 Saul on the Run
Chapter 4 The Seventh Wave
Chapter 5 Bl@ckTo\/\/3r
Chapter 6 The Java Script Caf
Chapter 7 Death by a Thousand Cuts
Chapter 8 A Really Gullible Genius Makes Amends
Chapter 9 Near Miss
Chapter 10 There's Something Else
Epilogue: The Chase
Part II Behind the Scenes
Chapter 11 The Conversation
Chapter 12 Social Insecurity
http://rapidshare.com/files/60170952/stealingthenetworkhowtoownthebox.pdf
Friday, July 11, 2008
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment