Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD :The Complete Series Collector's Edition, Final Chapter, and DVD

Publication subTitle :The Complete Series Collector's Edition, Final Chapter, and DVD

Author: Long   Johnny;Russell   Ryan;Mullen   Timothy  

Publisher: Elsevier Science‎

Publication year: 2009

E-ISBN: 9780080949208

P-ISBN(Paperback): 9781597492997

P-ISBN(Hardback):  9781597492997

Subject: TP3 Computers;TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today’s best hackers, and even the best hackers will tell you that the game is a mental one." – from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON

For the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage!

These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.

This book contains all of the material from each of the four books in the Stealing the Network series.

All of the stories and tech from:

  • How to Own the Box
  • How to Own a Continent
  • How to Own an Identity
  • How to Own a Shadow

Plus:

  • Finally - find out how the story ends!

Chapter

YOU CAN GET IT IF YOU REALLY WANT

NO LIFE 'TIL LEATHER

IT'S POURING, IT'S RAINING

I LIVE MY LIFE LIKE THERE'S NO TOMORROW

IT'S LIKE BROKEN GLASS; YOU GET CUT BEFORE YOU SEE IT

IF YOU LIKE TO GAMBLE

MUMBLE, MUMBLE, MUMBLE

CHAPTER 3 Just Another Day at the Office

SETUP

WELCOMING COMMITTEE

LOW-HANGING FRUIT

IN THE PALM OF MY HAND

FEELING GOOD IN THE NETWORK NEIGHBORHOOD

WHAT’S THAT SMELL?

WORKING FROM HOME

DINER

THE ONLY WAY OUT

EPILOGUE

REFERENCES

CHAPTER 4 h3X's Adventures in Networkland

HALFWAY AROUND THE GLOBE AT BSZH.EDU

EXPLORING THE PREY

D-DAY

TRAINEES FIRST

SECRET SERVICE(S)

DISCOVERY

THE GIRL IS BACK IN THE HOUSE

AFTERMATH

CHAPTER 5 The Thief No One Saw

THE TIP-OFF

STUDYING THE PREY

THE DNS GIVEAWAY

TIME TO GET MY HANDS DIRTY

GETTING INSIDE THE VPN

FINDING THE SOFTWARE

LOOKING AROUND

CONCLUSION

CHAPTER 6 Flying the Friendly Skies

REFERENCES

CHAPTER 7 dis-card

0-DAYS

REVERSE-ENGINEERING PEOPLE

INFORMATION

CHAPTER 8 Social (In)Security

RECON

WHAT DOES GOOGLE PULL UP?

NSI LOOKUP

SAM SPADE

INTERNET PHONE DIRECTORIES

E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES

JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER

FUN WITH HUMAN RESOURCES

PLAN C: THE DISPLACED EMPLOYEE

SHOULDER SURFING

SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKS

BUSINESS AS USUAL?

CHAPTER 9 BabelNet

HELLO NAVI

MIRROR, MIRROR ON THE WALL

POLYGLOT

WHEN GOOD PACKETS GO BAD

AUTHORSPEAK: PAKETTO BORNE

AND THEY SAY WE’RE SOCIAL CREATURES

KNOCK, KNOCK

WHO’S THERE?

SCANRAND

SCANRAND WHO?

SCANRAND U

BACK TO OUR REGULARLY SCHEDULED HACKERY

CHAPTER 10 The Art of Tracking

TUESDAY

WEDNESDAY

THURSDAY

FRIDAY

MONDAY

Appendix: The Laws of Security

INTRODUCTION

KNOWING THE LAWS OF SECURITY

CLIENT-SIDE SECURITY DOESN’T WORK

YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATION

MALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST

ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION

FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK

ANY IDS CAN BE EVADED

SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE

IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION—YOU HAVE ENCODING

PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM

IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT

SECURITY THROUGH OBSCURITY DOES NOT WORK

SUMMARY

SOLUTIONS FAST TRACK

FREQUENTLY ASKED QUESTIONS

PART II: How to Own a Continent

Foreword

CHAPTER 11 Control Yourself

ALONE

DISCIPLINE

SHELTER

JUST BECAUSE YOU’RE PARANOID…

DAY MINUS 300

DAY MINUS 200

DAY MINUS 100

DAY MINUS 50

THE BEGINNING… THE MAN APPEARS

CHAPTER 12 The Lagos Creeper Box

LAURA19

NOC NOC, WHO'S THERE?

DOING THE MEAT THING

AFTERMATH… THE LAST DIARY ENTRY OF DEMETRI FERNANDEZ

CHAPTER 13 Product of Fate: The Evolution of a Hacker

INTEREST PIQUED: THE FIRE IS STARTED

WHAT?! YOU'VE GOT TO BE KIDDING ME!

YOU WANT ME TO DO WHAT?!

IT WAS ONLY HARMLESS FUN…

REAPING THE REWARDS: A LITTLE BIT GOES A LONG WAY

MONEY—THE ROOT OF ALL EVIL

INNOCENCE LURED

SPREADING THE NET WIDE

MAKING PLANS

PLANS BECOME ACTIONS

BREAKING THE CODE

CHOOSING THE EQUIPMENT

WORKING WITH FRIENDS

STEPPING WAY OVER THE LINE

AFTERMATH… REPORT OF AN AUDIT

CHAPTER 14 A Real Gullible Genius

DAY 1: THOUGHTS AND RECON

DAY 2: DEPLOYING THE ROGUE

DAY 3: ACCESSING THE NETWORK

DAY 4: BUSTING ROOT ON THE APPLE

DAY 5: OVER 20,000 SOCIAL SECURITY NUMBERS

FLIR'S LATE NIGHT

LATER THAT MORNING…

RETRACTING THE TENDRILS

EPILOGUE

ENDNOTES

AFTERMATH… SECURITY—A PEOPLE PROBLEM

CHAPTER 15 For Whom Ma Bell Tolls

THE CALL

MAXIM’S

SHALL WE PLAY A GAME?

THE BOOTY

THE SWITCH

THE DROP

THE MARKETPLACE

LANDLINE

KEYS TO THE KINGDOM

INSIDE THE GOLDEN PYRAMID

WIRETAP

AFTERMATH

AFTERMATH… THE INVESTIGATION

CHAPTER 16 Return on Investment

PLAYING THE MARKET

INFORMATION LEAKAGE AT THE PACKET LEVEL

CORRUPTED BY GREED

REVENGE OF THE NERD

A LEAD FROM LAS VEGAS

THE CALL OF OPPORTUNITY

INITIAL RECONNAISSANCE

SHRAX: THE ULTIMATE ROOTKIT

THROWAWAY ACCOUNT

SEEKING THE PRIZE

HACKING .MIL

TRIUMPH AND NEW TOYS

ENDNOTES

AFTERMATH… THE INVESTIGATION CONTINUES

CHAPTER 17 h3X and The Big Picture

EXCEPTIONAL CIRCUMSTANCES

EVOLUTION AND LACK THEREOF

HYPERTEXT TARGET PROTOCOL

SETUP.EXE

HARD WORK

WORKING ON WEEKENDS

R&D

DON’T LIKE MONDAYS

AFTERMATH… THE KNUTH PERSPECTIVE

CHAPTER 18 The Story of Dex

A NEW DAY—A NEW DOLLAR

THE HUNT

AND SO IT BEGINS

THE REAL FUN BEGINS

FRIDAY, RIGHT ON TIME

THE SETUP

DRUGS, SEX, AND DIRTY MONEY

RALPH BECHIE

ROBERT MONTAGUE

NIKLAS FLESICHER

REALITY COMES BACK

AFTERMATH… THE WATCHERS

CHAPTER 19 Automatic Terror Machine

SMOKE GETS IN YOUR EYES

THE GAMES BEGIN

AN ARMY OF ONE

LET’S GET PHYSICAL

OF GREED AND GIRLS

A WORM BY ANY OTHER NAME

HUMAN AFTER ALL

CHAPTER 20 Get Out Quick

0-DAY

DAY PLUS 1

TIME ZONE UNKNOWN

PART III: How to Own an Identity

Foreword

Section I: Evasion

Prologue: From the Diary of Robert Knoll, Senior

CHAPTER 21 In the Beginning…

CHAPTER 22 Sins of the Father

THE INTERVIEW

THE POST OFFICE

THE KEY

THE SPREADSHEET

CODEWHEELS

THE RESTROOOM

THE ADDRESS

CHAPTER 23 Saul on the Run

IT HAD TO BE DONE

THE INVESTIGATION BEGINS

TIPPED OFF

HITTING THE ROAD

A MEETING

PLANS IN MOTION

A LITTLE RECON

YOU LOOK LIKE A NEW MAN

I LOVE IT WHEN A PLAN COMES TOGETHER

GATHERING THE REQUIRED INFORMATION

GATHERING INFORMATION

SAUL REBORN

CHAPTER 24 The Seventh Wave

CHAPTER 25 Bl@ckToW3r

CHAPTER 26 The Java Script Café

CHAPTER 27 Death by a Thousand Cuts

CHAPTER 28 A Really Gullible Genius Makes Amends

STYMIED BY SSL

REDIRECTION

A CODING BREAKTHROUGH

CALLING LASLO

CREDIT CARD CREATION WITHOUT AUTHENTICATION

REDIRECTING MAIL

MAN-IN-THE-MIDDLE: HUSHMAIL.COM

REAL-TIME PERCEPTION CONTROL

DOUBLE CROSSED?

CHAPTER 29 Near Miss

AGENT SUMMERS

THE RACE

CLOSER TO KNUTH

CHAPTER 30 There's Something Else

CHAPTER 31 Epilogue—The Chase

Section II: Behind the Scenes

CHAPTER 32 The Conversation

PROBLEM ONE: ACCESS AND MOVEMENT OF THE LOOT

PROBLEM TWO: ACCOUNT SETUP

PROBLEM THREE: ACCOUNT RECON

PROBLEM FOUR: GETTING YOUR HANDS ON THE MONEY

PROBLEM FIVE: EVERYONE IS AFTER YOU

PROBLEM SIX: LIVING IT UP, BIG STYLE

PROBLEM SEVEN: DO YOU HAVE WHAT IT TAKES?

CHAPTER 33 Social Insecurity

PART IV: How to Own a Shadow

Foreword

CHAPTER 34 Travel Plans

FROM THE DIARY OF ROBERT KNOLL, SENIOR

CHAPTER 35 Back in the Saddle

CHAPTER 36 Old Man and a Ghost

CHAPTER 37 Rootkit

FROM THE DIARY OF ROBERT KNOLL, SENIOR

CHAPTER 38 Paul

BLUE PAINT, DARK SKIES

RUBBER BOUNCING SWORDS

A HACKER IN THE MAKING

CHAPTER 39 The Birth of Pawn

SHOWING OFF FOR RAFA

THE POST CHALLENGE

“C” IS FOR COOKIE

CHAPTER 40 Dishonorable Discharge

A ‘BLAH’ SORT OF DAY

JUST ANOTHER RANDOM ENCOUNTER

DAMSEL IN DISTRESS

YOU’RE NOT JUST A CUSTOMER

FIRST CONTACT

I’VE GOT AN RFIDEA…

TESTING THE SHARK-INFESTED WATERS

I’VE GOT GOOD NEWS AND BAD NEWS

CHAPTER 41 McGaylver

CHAPTER 42 The Final Chapter

The users who browse this book also browse