Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $18.91
Usually ships in 1-2 business days
(Save 36%)
Other sellers (Paperback)
  • All (8) from $18.91   
  • New (6) from $18.91   
  • Used (2) from $20.80   

Overview

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.
"The F0rb1dd3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout “The F0rb1dd3n Network” are “Easter eggs”-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on “The F0rb1dd3n Network,” STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.

  • Revised edition includes a completely NEW STAR Section (Part 2)
  • Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
  • Introduces basic hacking techniques in real life context for ease of learning
Read More Show Less

Editorial Reviews

From the Publisher
"Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH "A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc. "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute
Read More Show Less

Product Details

  • ISBN-13: 9781597495684
  • Publisher: Elsevier Science
  • Publication date: 8/6/2010
  • Pages: 360
  • Sales rank: 1,390,873
  • Product dimensions: 7.50 (w) x 9.10 (h) x 1.00 (d)

Meet the Author

Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA.

At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.

Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent’s background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University of Oklahoma.

Brian Baskin is a digital forensics professional employed by CSC and serves as the Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA), part of the Department of Defense Cyber Crime Center (DC3). For more than 10 years, Brian has worked with the DCITA to research, develop, and teach forensic responses to growing cyber threats. Brian devotes much of his time to researching the evolving Internet crimes, network protocol analysis, and Linux and UNIX intrusion responses.
Brian also serves as a technical reviewer for DCITA. He helps to analyze content and procedures for more than two dozen cyber security courses for technical validity and relevance. For fun, he manages a content creation team that develops online Web-based incident response training that provides hands-on experience to military units stationed overseas. His team works with the various federal and military law enforcement groups for information sharing and collaboration on ongoing threats and best practices.
Brian has also served as a subject matter expert for content development for the National White Collar Crime Center (NW3C) and the Federal Law Enforcement Training Center (FLETC).

Marcus J. Carey is well known for being a compulsive mentor in the information security community. Marcus has more than 17 years of experience in the information security field, working in the military, federal, and private sectors. Marcus served more than 8 years active duty in the U.S. Navy Cryptologic Security Group. Marcus ended his naval service by being assigned to the National Security Agency (NSA) where he engineered, monitored, and defended the Department of Defense's secure networks. Marcus earned a Master of Science in Network Security from Capitol College in Laurel, Maryland.

Read More Show Less

Table of Contents

Foreword

Acknowledgments

How to R34d Dissecting the Hack: The Forb1dd3n Network

About the Authors

PART 1 FORB1DD3N

Prologue 3

A New Assignment 3

Chapter One 15

Problem Solved 15

Getting Started 21

The Acquisition 22

Chapter Two 27

Just Another Day 27

The Installation 32

Chapter Three 35

In Country 35

Chapter Four 47

In Real Life 47

Chapter Five 57

Status Check 57

Log Review 63

Chapter Six 69

The Meeting 69

First Lead 72

The Discovery 75

Chapter Seven 81

Code Review 81

Chapter Eight 91

Battle Plans 91

Data Collection 96

Chapter Nine 105

Data Analysis 105

Shrinking Team 106

Tenuous Connections 107

Loose Ends 112

Expendable Assets 115

Chapter Ten 119

Choosing Sides 119

EPILOGUE 127

End Process 127

PART 2 SECURITY THREATS ARE REAL (STAR) 2.0

Chapter 1 Recon 131

Social Networking 132

Exploit Techniques 133

Best Practices 137

Summary of Social Networking 138

For More Information 138

Google Hacking 138

Exploit Techniques 139

Best Practices 145

Summary of Google Hacking 146

For More Information 146

Deep Web Searching 146

Exploit Techniques 147

Best Practices 151

Summary of Deep Web Searching 152

For More Information 152

Physical Surveillance 152

Exploit Techniques 153

Best Practices 155

Summary of Physical Surveillance 156

For More Information 157

Log Analysis 157

Exploit Techniques 158

Best Practices 158

Summary of Log Analysis 160

For More Information 162

Do It Yourself: Hacking 3DNF 162

Targeting Human Resources 163

Google Apps 167

Blog Recon 168

Domain Information 169

Twitter Recon 170

Endnotes 172

Chapter 2 Scan 175

Wardriving 175

Exploit Techniques 176

Best Practices 181

Summary of Wardriving 182

For More Information 182

Long-Range Wireless Scanning 183

Exploit Techniques 183

Best Practices 185

Summary of Long-Range Wireless Scanning 185

For More Information 185

Scanning Tools 185

Exploit Techniques 186

Best Practices 188

Summary of Scanning Tools 189

For More Information 190

Bluetooth Security 190

Exploit Techniques 190

Best Practices 192

Summary of Bluetooth Security 192

For More Information 193

Endnotes 193

Chapter 3 Explore 195

Authentication Security 195

Exploit Techniques 195

Best Practices 197

Summary of Authentication Security 199

For More Information 199

Physical Security 200

Exploit Techniques 200

Best Practices 203

Summary of Physical Security 206

For More Information 206

Network Traffic Sniffing 207

Exploit Techniques 207

Best Practices 209

Summary of Network Traffic Sniffing 211

For More Information 211

Dormant Malware 212

Exploit Techniques 212

Best Practices 213

Summary of Dormant Malware 215

For More Information 216

Web Browser Security 216

Exploit Techniques 217

Best Practices 218

Summary of Web Browser Security 223

For More Information 224

Out-of-Band Communications 224

Exploit Techniques 225

Best Practices 225

Summary of Out-of-Band Communications 226

For More Information 226

Endnotes 226

Chapter 4 Exploit 229

Encrypted Storage 229

Exploit Techniques 230

Best Practices 232

Summary of Encrypted Storage 234

For More Information 235

Attack Research 235

Exploit Techniques 235

Best Practices 237

Summary of Attack Research 238

For More Information 238

Password Security 239

Exploit Techniques 239

Best Practices 242

Summary of Password Security 245

For More Information 245

E-Mail Security 245

Exploit Techniques 246

Best Practices 247

Summary of E-Mail Security 248

For More Information 248

Windows Null Share Exploit 249

Exploit Techniques 249

Best Practices 250

Summary of Windows Null Share Exploit 250

For More Information 251

Credit Card Fraud 251

Exploit Techniques 251

Best Practices 253

Summary of Credit Card Fraud 254

For More Information 254

Traffic Obfuscation 255

Exploit Techniques 255

Best Practices 259

Summary of Traffic Obfuscation 259

For More Information 259

Metasploit 260

Exploit Techniques 261

Best Practices 262

Summary of Metasploit 263

For More Information 264

Endnotes 264

Chapter 5 Expunge 269

Removing Windows Login Traces 269

Exploit Techniques 269

Best Practices 271

Summary of Removing Windows Login Traces 276

For More Information 276

Browser Cleanup 277

Exploit Techniques 277

Best Practices 279

Summary of Browser Cleanup 279

For More Information 280

Endnotes 280

Chapter 6 Hacker Culture 281

Hacking Celebrities 281

Dan Kaminsky 282

Tony Watson 282

GOBBLES Security 282

n3td3v 283

Stephen Colbert 283

Conferences 283

The Four Points of the Hacking Compass (From BruCON to DEFCON and Beijing to Brazil) 286

Security Meetups 288

For More Information 289

Podcasts 290

Blogs 290

Hacker Interviews 292

Jeff Moss (Dark Tangent) 292

Dan Kaminsky 299

Johnny Long 302

Marcus Ranum 307

Summary 310

Endnotes 310

Chapter 7 Bit Bucket 313

Covert Physical Devices 313

Oydsseus 315

Volksbank 315

Tiger Team 316

Online Vigilantism 316

Spot the Fed 317

Bob Falken 318

Honey Pots 318

2600 319

Capture the Flag 319

MD5 Hash 320

Sydney Bristow 320

CyberBob 321

Linksys 323

InfraGard 323

Echelon 324

Perl Scripts 324

GhOstRAT 325

Lock Picking 325

Endnotes 326

Index 329

Read More Show Less

Customer Reviews

Average Rating 4.5
( 6 )
Rating Distribution

5 Star

(5)

4 Star

(0)

3 Star

(1)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 6 Customer Reviews
  • Posted October 13, 2010

    Must read for anyone that needs Executive buy-in!

    When I read Part 1, I initially thought, "What a great way to trick (scare) a Manager/Executive into fixing obvious security vulnerabilities." It may not make an executive get what you do, but it levels the playing field. Most importantly it keeps the door open for further discussion. However, as I read the book (and became engrossed in the story), the more I realized that this book was of a genre that we do not have enough books in. We need more books that are entertaining and spread technical knowledge simultaneously. Finally, I read Part 2 and realized that there is actually a separate and third audience, the newbie crowd. I would have loved to have had this book available when I first started learning infosec. There is something to be said about teaching yourself through exploration and constant searching, but to have all this information at my fingertips would have streamlined the process and cut the learning time in half.

    Clearly this book is a multi-purpose piece of reference that should be put on all IT Departments' reference shelf. Of course, like most things in life, going back to basics can be good even for the most seasoned of penetration testers. I defy anyone to read Part 2 and not walk away with a single bit of new learned information.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 12, 2013

    Willowsong

    Poor graykit

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 7, 2013

    Starrykit

    Pick my name! Pleeeeease?

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 7, 2013

    Jaysoar's story Part 15

    Jaypaw and Graykit screeched in terror as the hawk flew high. Below them, the cats of Streamclan gathered around to see what was happening. Jaypaw could only reconized Dovestar and Dapplefang twitching their tails nervously. While Icepaw and Krestelpaw jolted in terror, and Krestelpaw has a fear look on his face. Jaypaw remembered that Dovestar told her that Krestelpaw broke his leg from a monster and now she wonders if she is going to broke her leg too. Graykit screeched louder and cried help. Jaypaw didn't know what to do, then she remembers the belly rake that she didn't have the chance to do but now is her chance. Jaypaw took her hind leg and slice through the hawk's belly, claws unsheathed. The hawk shcreeched in terror and surprisement and look down to see Jaypaw raking its belly. The hawk raises one of his tslons, while the other one is still holding on to Graykit, and slices through Jaypaw. Pain came toward her, and let go immediently. The hawk's eyes gleamed in triumph and flew away, with Graykit and drops of blood behind. Jaypaw looked down and seeing the ground coming closer and closer. Cats screamed and some went back to their dens. Jaypaw closed her eyes, but before she does that, she looked back up to the sky and still see the hawk flying away. Jaypaw then felt pain on her back and she drift into darkness. "Ratwhisker!" Jaypaw called out in the middle of a dark forest. "What happened? What did I do wrong? Please tell me!" A mysterious gray figure came close to her, and he seems familiar to her. "Stonestar!" Jaypaw exclaimed and ran towards him to hug him. "Jaypaw, I am so sorry." Stonestar's voice was calm and gentle. Jaypaw stopped hugging and looked at him with her dark amber eyes. "About what?" She asked. Stonestar looked down and behind him came a light gray tom, who was really small. Jaypaw feel like she could faint. "Graykit, I am so sorry!" She screamed as Graykit came closer. "It is alright. You were brave enough to come and rescue me, even though you failed. I don't want my brother and sister to know I am dead yet, but Moonpoppy knows you she also knows your bravery and courage to help out." Graykit finished his speech and touch noses with Jaypaw's and he and Stonestar begin to fade. Jaypaw woke up in terror. "Jaypaw! You're awake!" A orange figure exclaimed. It was Krestelpaw, and behind him was Graycloud. "I know you wouldn't leave us! I know it!" Krestelpaw begin to cheer. "Where am I?" Jaypaw looked around. "You are in the Med. Cat den." Graycloud explained. "You failed to rescue Graykit, though." Jaypaw stood up and open her mouth to reply, but her front paw suddenly slipped and she fell back down. "One more thing." Krestelpaw added. "You need to be careful not to put too much weigh on that paw. You can slip back down." Jaypaw nodded and try again. This time she got up and meowed, "I already know he is gone to join Starclan. I spoke to him and he said that his death needs to be kept secret to his littermates until the right time." The two Med. Cats nodded as Jaypaw padded out side. Alot of cats sighed with relief that Jaypaw woke up. At the same time, Dovestar came to her. "Good that you are here!" She exclaimed. "I pick you to come to the gathering." Jaypaw's amber eyes shimmered. 'I can't wait!' She thought. END OF PART FIFTHTEEN!!!! PART SIXTEEN COMING SOON!!!!!!!!!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 16, 2011

    No text was provided for this review.

  • Anonymous

    Posted April 10, 2011

    No text was provided for this review.

Sort by: Showing all of 6 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)