Stealing the Network: How to Own an Identity: How to Own an Identity [NOOK Book]


The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to ...
See more details below
Stealing the Network: How to Own an Identity: How to Own an Identity

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$23.99 price
(Save 42%)$41.95 List Price


The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.

Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities
* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005
* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and All of these outlets will be used to promote the book

"Steal This Network" is not another of the countless hacker books out there, but an edgy, provocative, attack-oriented series of chapters written in a firsthand, conversational style. World-renowned network security personalities present a series of 25-to-30-page chapters written from the point of view of an attacker who is gaining access to a particular system.

Read More Show Less

Editorial Reviews

From The Critics
Stealing the Network is a refreshing change from more traditional computer books. The authors have created fictional stories based on non-fictional concepts that could really happen to our computer systems today. The realistic fiction approach makes the book much lighter to read and actually entertaining. I also believe this approach makes the true methods behind the fictional stores much more memorable then memorizing thousand page textbooks.

Stealing The Network: How to Own the Box, a compendium of tales written by well-known hackers, is a perfect summer read. The stories are fictional. The technology and techniques described are very real … At 328 pages, Stealing the Network is a summer blockbuster without the nonsense that packs the pages of most warm-weather reads. It's entertaining, but it won't leave your brain gagging on an overdose of fluff.
Read More Show Less

Product Details

  • ISBN-13: 9780080517742
  • Publisher: Elsevier Science
  • Publication date: 8/24/2005
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 450
  • File size: 13 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.
Read More Show Less

Read an Excerpt

From Chapter 5, The Thief No One Saw

This is my story. My name is Dex. I'm a 22-year-old systems administrator. I live in an upper-class apartment in New York's CBD. My apartment is lined with computers, coffee cups, and cables. I work eight hours a day for a small online e-commerce site, mostly managing servers and security.

In my free time, I run my own contract development company, writing mostly C/C++. I also moonlight as a "Rent a Thief" for a black market media "distribution" company based out of Taiwan. On demand, I hack into companies and steal whatever is required. Usually, it's a new, highly anticipated game or a large, expensive CAD (computer-aided design) software package. Once, I was even asked to steal software used to design a nuclear power plant. I don't ask questions. This thievery doesn't stop at software, though. There is big money in commercial plans, financial data, and customer contact lists, as well.

I do this because I enjoy the rush and the feeling of outsmarting someone else. I never tell anyone else about a hack, and to date, only a few companies I've hit even suspected that they had been hacked. I am not a part of the typical hacker community, and I always work alone....

Read More Show Less

Table of Contents

In the Beginning; Sins of the Father; Saul on the Run; The Seventh Wave; Bl@cktoWer; The java Script Cafe; Death by a Thousand Cuts; A Really Gullible Genius Makes Amends; Near Miss; Ther's Something Else; The Chase; part II: Behind the Scenes; The Conversation; Social Insecurity;
Read More Show Less

Customer Reviews

Average Rating 4
( 4 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 4 Customer Reviews
  • Anonymous

    Posted August 29, 2014


    A ginger she-cat- really, she looked to be about a kit- walked around the Two-leg place. "Wow! This place is huge!" She exclaimed. She caught sight of the large steel fence. "I bet l could climb that..." she jumped, catching a metal ring each with her paws, sticking them part-way through. She jumped again, falling short and tumbling to the ground. She hissed in frustration. "Pinky..." she heard her housefolk call in the distance. "Hold ON!" She grumbled in exaspration. She tried scaling the fence again. By the time she got to the top, she didn't stop. She balanced on the top, and jumped down. "Ow!" She cried when her right front paw twisted. She sat down, holding it in the air awkwardly. She thought about her choices. 'If l go back, my housefolk ll take me to the... to the... the vet.' She narrowed her eyes. 'They might take to the Cutter, because l went outside the Fence! They're always telling me not to. Or, l can keep going, and find out if those rumors about wild cats are true.' She considered this. 'If they are, then there will be someone to fix my paw!' I'm going to keep going. She stopped at the Thunderpath when she got to it. "It's just a bigger version than the ones l crossed near home. I just wait until none of those... monsters," she mewed finally, amd shivered, "are around. Then l run as fast as l can." So she waited. Eventually, there were no monsters nearby. Pinky could see them in the distance, but she decided that she could make it. She made a dash for it. But one monster started roaring towards her. "Uh oh! They're smelly, big, AND fast!" She made it across in the knick of time. "Whew!"

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 28, 2014

    Twoleg Place

    Beyond the fence, there is a twoleg town. Monsters roar down their paths, and kittypets, loners and rouges reside here. Some are friendly, must most are not. Clan cats are not allowed here.<br>

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 12, 2006

    Holy steaming piles Batman!

    If only hollywood could make a movie as good and realistic as this book.... Not a lot of specific details, but fairly realistic in terms of what people do. I can't decide if I want to be a criminal hacker or one of the 'good guys' now.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 4, 2005

    Entertaining and shocking

    This book is disturbing¿it¿s so insanely simple to steal an identity. But this shock is not without purpose. Through reading the very entertaining anecdotes about social engineering, hacking, and just plain fraud, you get a sense of what can be done to protect your identity. The book is different from what you might expect. Rather than chapter after chapter about how to do this or that, this book reads more like a novel. Through the story you get a little entertainment, learn a little about security, and learn a little about identity theft. It¿s a very different type of book than I was expecting, but I think it works well. In fact, I wonder if the only way you could write a ¿how-to¿ book of sorts on identity theft would be to write it the way this book is written. This certainly isn¿t a book that I¿d pull out and read over and over, like many of my reference books. This is a book I would read once, then think about for a very long time. Like I said, it¿s unlike anything I was ever expecting¿in a good way. Do check this one out.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 4 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)