Description
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today’s best hackers, and even the best hackers will tell you that the game is a mental one." – from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON
For the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage!
These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.
This book contains all of the material from each of the four books in the Stealing the Network series.
All of the stories and tech from:
- How to Own the Box
- How to Own a Continent
- How to Own an Identity
- How to Own a Shadow
Plus:
- Finally - find out how the story ends!
Chapter
YOU CAN GET IT IF YOU REALLY WANT
IT'S POURING, IT'S RAINING
I LIVE MY LIFE LIKE THERE'S NO TOMORROW
IT'S LIKE BROKEN GLASS; YOU GET CUT BEFORE YOU SEE IT
CHAPTER 3 Just Another Day at the Office
FEELING GOOD IN THE NETWORK NEIGHBORHOOD
CHAPTER 4 h3X's Adventures in Networkland
HALFWAY AROUND THE GLOBE AT BSZH.EDU
THE GIRL IS BACK IN THE HOUSE
CHAPTER 5 The Thief No One Saw
TIME TO GET MY HANDS DIRTY
CHAPTER 6 Flying the Friendly Skies
REVERSE-ENGINEERING PEOPLE
CHAPTER 8 Social (In)Security
WHAT DOES GOOGLE PULL UP?
INTERNET PHONE DIRECTORIES
E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES
JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER
PLAN C: THE DISPLACED EMPLOYEE
SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKS
MIRROR, MIRROR ON THE WALL
AUTHORSPEAK: PAKETTO BORNE
AND THEY SAY WE’RE SOCIAL CREATURES
BACK TO OUR REGULARLY SCHEDULED HACKERY
CHAPTER 10 The Art of Tracking
Appendix: The Laws of Security
KNOWING THE LAWS OF SECURITY
CLIENT-SIDE SECURITY DOESN’T WORK
YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATION
MALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST
ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION
FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK
SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE
IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION—YOU HAVE ENCODING
PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM
IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT
SECURITY THROUGH OBSCURITY DOES NOT WORK
FREQUENTLY ASKED QUESTIONS
PART II: How to Own a Continent
CHAPTER 11 Control Yourself
JUST BECAUSE YOU’RE PARANOID…
THE BEGINNING… THE MAN APPEARS
CHAPTER 12 The Lagos Creeper Box
AFTERMATH… THE LAST DIARY ENTRY OF DEMETRI FERNANDEZ
CHAPTER 13 Product of Fate: The Evolution of a Hacker
INTEREST PIQUED: THE FIRE IS STARTED
WHAT?! YOU'VE GOT TO BE KIDDING ME!
IT WAS ONLY HARMLESS FUN…
REAPING THE REWARDS: A LITTLE BIT GOES A LONG WAY
MONEY—THE ROOT OF ALL EVIL
STEPPING WAY OVER THE LINE
AFTERMATH… REPORT OF AN AUDIT
CHAPTER 14 A Real Gullible Genius
DAY 1: THOUGHTS AND RECON
DAY 2: DEPLOYING THE ROGUE
DAY 3: ACCESSING THE NETWORK
DAY 4: BUSTING ROOT ON THE APPLE
DAY 5: OVER 20,000 SOCIAL SECURITY NUMBERS
AFTERMATH… SECURITY—A PEOPLE PROBLEM
CHAPTER 15 For Whom Ma Bell Tolls
INSIDE THE GOLDEN PYRAMID
AFTERMATH… THE INVESTIGATION
CHAPTER 16 Return on Investment
INFORMATION LEAKAGE AT THE PACKET LEVEL
SHRAX: THE ULTIMATE ROOTKIT
AFTERMATH… THE INVESTIGATION CONTINUES
CHAPTER 17 h3X and The Big Picture
EXCEPTIONAL CIRCUMSTANCES
EVOLUTION AND LACK THEREOF
HYPERTEXT TARGET PROTOCOL
AFTERMATH… THE KNUTH PERSPECTIVE
CHAPTER 18 The Story of Dex
DRUGS, SEX, AND DIRTY MONEY
CHAPTER 19 Automatic Terror Machine
PART III: How to Own an Identity
Prologue: From the Diary of Robert Knoll, Senior
CHAPTER 21 In the Beginning…
CHAPTER 22 Sins of the Father
CHAPTER 23 Saul on the Run
I LOVE IT WHEN A PLAN COMES TOGETHER
GATHERING THE REQUIRED INFORMATION
CHAPTER 24 The Seventh Wave
CHAPTER 26 The Java Script Café
CHAPTER 27 Death by a Thousand Cuts
CHAPTER 28 A Really Gullible Genius Makes Amends
CREDIT CARD CREATION WITHOUT AUTHENTICATION
MAN-IN-THE-MIDDLE: HUSHMAIL.COM
REAL-TIME PERCEPTION CONTROL
CHAPTER 30 There's Something Else
CHAPTER 31 Epilogue—The Chase
Section II: Behind the Scenes
CHAPTER 32 The Conversation
PROBLEM ONE: ACCESS AND MOVEMENT OF THE LOOT
PROBLEM TWO: ACCOUNT SETUP
PROBLEM THREE: ACCOUNT RECON
PROBLEM FOUR: GETTING YOUR HANDS ON THE MONEY
PROBLEM FIVE: EVERYONE IS AFTER YOU
PROBLEM SIX: LIVING IT UP, BIG STYLE
PROBLEM SEVEN: DO YOU HAVE WHAT IT TAKES?
CHAPTER 33 Social Insecurity
PART IV: How to Own a Shadow
FROM THE DIARY OF ROBERT KNOLL, SENIOR
CHAPTER 35 Back in the Saddle
CHAPTER 36 Old Man and a Ghost
FROM THE DIARY OF ROBERT KNOLL, SENIOR
CHAPTER 39 The Birth of Pawn
CHAPTER 40 Dishonorable Discharge
JUST ANOTHER RANDOM ENCOUNTER
YOU’RE NOT JUST A CUSTOMER
TESTING THE SHARK-INFESTED WATERS
I’VE GOT GOOD NEWS AND BAD NEWS
CHAPTER 42 The Final Chapter