The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Kevin D. Mitnick, William L. Simon

Language: English

Pages: 288

ISBN: 0471782661

Format: PDF / Kindle (mobi) / ePub

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:

  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access

With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Breakthrough Copywriting: How to Generate Cash with the Written Word

The Rules of Money: How to Make It and How to Hold on to It (Richard Templar's Rules) (Expanded Edition)

Shrubs: An Old Fashioned Drink for Modern Times

Dialogue and Rhetoric

BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic















password. They were then able to transfer the PWL cracking tool and run it to extract the information from the PWL file into a text file, which they then transferred off the driver’s laptop to an FTP server under their control. When Louis examined the file, he found the authentication credentials he had been looking for, including the dial-up number and logon information being used by the driver when connecting to the company’s VPN service. That, Louis thought, was all the information he

reengineering their approach to security and hired him to “try to circumvent any and all processes” in an effort to help them build a better security infrastructure. He had plenty of technical experience, but little experience being in a casino. After a week or so of immersing himself in research on the culture of the Strip, it was time for the real Las Vegas. He usually made it a practice to start a job like this early, getting finished before it was officially scheduled to begin, because over

when a new prison is being built, but I can’t understand destroying one that already exists. At the Sheridan prison, Matt found out another inmate was a former executive from Boeing. “He got in trouble for some type of embezzle-ment or white collar crime.” It seemed somehow ironic. Costa and other Boron inmates were frequently driven half an hour across the desert in a steaming prison bus to do menial labor at nearby Edwards Air Force Base. “They put me in an army hangar where they had a VAX

WINTER Not long ago, several managers and executives of a large New England IT consulting firm gathered in their lobby conference room to meet with a pair of consultants. I can imagine the company technology people at the table must have been curious about one of the consultants, Pieter Zatko, an ex-hacker widely known as “Mudge.” Back in the early 1990s, Mudge and an associate brought together an assortment of like-minded guys to work together in cramped space in a Boston warehouse; the group

translator service called “Babblefish” to hunt for keywords. He also had a friend who spoke the language, which helped. From the chat logs, he was able to find more IP addresses and more passwords. Since the files on the laptop were too disorganized to find anything of value, Erik turned to a different approach, using “dir /s /od ” to list and sort all the files by date so he could look at the ones recently accessed on the drives, and examine them offline. In the process he

Download sample