"Secrets of a Super Hacker" is an extraordinary manual on the methods of hacking. It covers brute force attacks, social engineering and reverse social engineering, spoofing, superuser abuser, screen stealing, data delivery, stair stepping, and more. The Super Hacker reveals all his secrets: Trojan horses, viruses, worms, trap doors, and dummy accounts. No system can withstand the assaults of The Knightmare. And no person concerned with computer security should miss this amazing manual of mayhem.
|Product dimensions:||8.60(w) x 10.96(h) x 0.49(d)|
Table of ContentsIntroduction: Hackers: Heroes or Villians?, by Gareth Branwyn
PART ONE: Before Hack
1. The Basics
2. The History Of Hacking
3. Researching The Hack
4. Passwords And Access Control
5. Social Engineering
6. Reverse Social Engineering
PART TWO: During Hack
7. Public Access Computers And Terminals
8. On-Site Hacking: The Trespasser-Hacker
9. Hacking At Home: Dialing Up Computers With Your Modem
10. Electronic Bulletin Board Systems
11. Borderling Hacking
12. What To Do When Inside
PART THREE: After Hack
13. This Lawful Land
14. Hacker Security: How To Keep From Getting caught
A: Explanation of Some ASSCII Codes
B: Common Defaults
C: Common Commands
D: Novice Word List
E: Job-Related Word List
F: Technical Word List
G: Social Securtity Number Listing and ICAO Alphabet
H: Additional R/SE Role Playing Situations
Most Helpful Customer Reviews
Secrets of a Super Hacker based on 0 ratings. 4 reviews.
If you know little about computers and nothing about [ha,cr]acking, this book will fascinate you. If you're decently skilled, this book is a quaint look back at what [ha,cr]acking was in the 1980's - dialup systems and guessing passwords. There isn't anything about finding your own exploits, how to leverage programming skills (including familiarity with obscure languages, such as terminal emulators' scripting lanuages), or how any protocols actually work.The book assumes that you don't know the fundamentals, and in fact mentions little to nothing about how to bend the fundamentals to your will.I can't recommend this book as anything but a curiosity. It will give the reader only the barest of knowledge that would be necessary for compromising information security and nothing of what can be done with a computer after you've broken in.
The info is only entry level at best, and quite disappointing to read from someone purportedly a so-called "super hacker." I recommend a skip on this one.
Not much on content here, mostly stories of how 'Knightmare' hacked into things. This is NOT a step by step procedure book, it's just tales of exploits. An example- 'I used a fake log on screen to capture users names and passwords'. He does not mention how he did this. Was it a web server that you changed the page URL? Was it a custom app you wrote? How did you store and retrieve the list of user names and passwords? Pick this up for a good read, but not if you want to learn any techniques.
Yeah this give some 0-day codez to stuff you never knew. I reccommend this mostly to sysadmins and other high level knowledgable people, because this shows you how super these hackers are. I mean when I say super I mean SUPER! Wow! It even talks about the most secret stuff in the work like PHF!