Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Kevin D. Mitnick, William L. Simon
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Title Page
Copyright Page
Dedication
Preface
Acknowledgements
Chapter 1 - Hacking the Casinos for a Million Bucks
Research
Developing the Hack
Rewriting the Code
Back to the Casinos — This Time to Play
New Approach
The New Attack
Caught!
Aftermath
Chapter 2 - When Terrorists Come Calling
Khalid the Terrorist Dangles Some Bait
Target for Tonight: SIPRNET
A Time for Worrying
Comrade Gets Busted
Investigating Khalid
The Harkat ul-Mujahideen
In the Aftermath of 9/11
The White House Break-in
Aftermath
Five Years Later
How Great Is the Threat?
Chapter 3 - The Texas Prison Hack
Inside: Discovering Computers
Federal Prisons Are Different
William Gets the Keys to the Castle
Online in Safety
Solution
Nearly Caught
Close Call
Growing Up
Back in the Free World
Chapter 4 - Cops and Robbers
Phreaking
Getting into Court
Guests of the Hotel
Opening a Door
Guarding the Barricades
Under Surveillance
Closing In
The Past Catches Up
On the News
Arrested
An End to Good Luck
Jail Phreaking
Doing Time
What They’re Doing Today
Chapter 5 - The Robin Hood Hacker
Rescue
Roots
Midnight Meetings
MCI WorldCom
Inside Microsoft
A Hero but Not a Saint: The New York Times Hack
The Unique Nature of Adrian’s Skills
Easy Information
These Days
Chapter 6 - The Wisdom and Folly of Penetration Testing
ONE COLD WINTER
ONE ALARMING GAME
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
Chapter 7 - Of Course Your Bank Is Secure–Right?
IN FARAWAY ESTONIA
THE LONG-DISTANCE BANK HACK
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
NOTES
Chapter 8 - Your Intellectual Property Isn’t Safe
THE TWO-YEAR HACK
ROBERT, THE SPAMMER’S FRIEND
ROBERT THE MAN
SHARING: A CRACKER’S WORLD
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
NOTES
Chapter 9 - On the Continent
Somewhere in London
Diving In
Mapping the Network
Identifying a Router
The Second Day
Looking at the Configuration of the 3COM Device
The Third Day
Some Thoughts about “Hackers’ Intuition”
The Fourth Day
Accessing the Company’s System
Goal Achieved
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
Chapter 10 - Social Engineers — How They Work and How to Stop Them
A SOCIAL ENGINEER AT WORK
INSIGHT
COUNTERMEASURES
THE BOTTOM LINE
NOTES
INDEX
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
The Art of Intrusion
Next
Next Chapter
Copyright Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset