Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication
Preface
Acknowledgements
Chapter 1 - Hacking the Casinos for a Million Bucks
Research
Developing the Hack
Rewriting the Code
Back to the Casinos — This Time to Play
New Approach
The New Attack
Caught!
Aftermath
Chapter 2 - When Terrorists Come Calling
Khalid the Terrorist Dangles Some Bait
Target for Tonight: SIPRNET
A Time for Worrying
Comrade Gets Busted
Investigating Khalid
The Harkat ul-Mujahideen
In the Aftermath of 9/11
The White House Break-in
Aftermath
Five Years Later
How Great Is the Threat?
Chapter 3 - The Texas Prison Hack
Inside: Discovering Computers
Federal Prisons Are Different
William Gets the Keys to the Castle
Online in Safety
Solution
Nearly Caught
Close Call
Growing Up
Back in the Free World
Chapter 4 - Cops and Robbers
Phreaking
Getting into Court
Guests of the Hotel
Opening a Door
Guarding the Barricades
Under Surveillance
Closing In
The Past Catches Up
On the News
Arrested
An End to Good Luck
Jail Phreaking
Doing Time
What They’re Doing Today
Chapter 5 - The Robin Hood Hacker
Rescue
Roots
Midnight Meetings
MCI WorldCom
Inside Microsoft
A Hero but Not a Saint: The New York Times Hack
The Unique Nature of Adrian’s Skills
Easy Information
These Days
Chapter 6 - The Wisdom and Folly of Penetration Testing
ONE COLD WINTER
ONE ALARMING GAME
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
Chapter 7 - Of Course Your Bank Is Secure–Right ?
IN FARAWAY ESTONIA
THE LONG-DISTANCE BANK HACK
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
NOTES
Chapter 8 - Your Intellectual Property Isn’t Safe
THE TWO-YEAR HACK
ROBERT, THE SPAMMER’S FRIEND
ROBERT THE MAN
SHARING: A CRACKER’S WORLD
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
NOTES
Chapter 9 - On the Continent
Somewhere in London
Diving In
Mapping the Network
Identifying a Router
The Second Day
Looking at the Configuration of the 3COM Device
The Third Day
Some Thoughts about “Hackers’ Intuition”
The Fourth Day
Accessing the Company’s System
Goal Achieved
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
Chapter 10 - Social Engineers — How They Work and How to Stop Them
A SOCIAL ENGINEER AT WORK
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
NOTES
Chapter 11 - Short Takes
THE MISSING PAYCHECK
COME TO HOLLYWOOD, YOU TEEN WIZARD
HACKING A SOFT DRINK MACHINE
CRIPPLING THE IRAQI ARMY IN DESERT STORM
THE BILLION-DOLLAR GIFT CERTIFICATE
THE TEXAS HOLD ’EM HACK
THE TEENAGE PEDOPHILE CHASER
. . . AND YOU DON’T EVEN HAVE TO BE A HACKER
NOTES
INDEX
← Prev
Back
Next →
← Prev
Back
Next →