• Complain

Kevin D. Mitnick - The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Here you can read online Kevin D. Mitnick - The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2005, publisher: Wiley, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Kevin D. Mitnick The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
  • Book:
    The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
  • Author:
  • Publisher:
    Wiley
  • Genre:
  • Year:
    2005
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the worlds most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use social engineering to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnicks reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A Robin Hood hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access
With riveting you are there descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnicks own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media

Kevin D. Mitnick: author's other books


Who wrote The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Table of Contents

Vice President Executive Group Publisher Richard Swadley Vice President - photo 1

Vice President & Executive Group Publisher: Richard Swadley
Vice President and Executive Publisher: Bob Ipsen
Vice President and Publisher: Joseph B. Wikert
Executive Acquisitions Editor: Carol Long
Development Editors: Emilie Herman, Kevin Shafer
Editorial Manager: Kathryn Malm Bourgoine
Senior Production Editor: Angela Smith
Project Coordinator: April Farling
Copy Editor: Joanne Slike
Interior Design: Kathie S. Rickard
Text Design & Composition: Wiley Composition Services

Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com

Copyright 2005 by Kevin D. Mitnick and William L. Simon

Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, e-mail: brandreview@wiley.com.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between then this work was written and when it is read.

For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Library of Congress Cataloging-in-Publication Data:

Mitnick, Kevin D. (Kevin David), 1963-

The art of intrusion : the real stories behind the exploits of hackers, intruders, and deceivers / Kevin D. Mitnick, William L. Simon.

p. cm.

Includes index.

eISBN : 978-0-471-46994-0

1. Computer security. 2. Computer hackers. I. Simon, William L., 1930- II. Title.

QA76.9.A25M587 2005

005.8--dc22

2004025697

For Shelly Jaffe, Reba Vartanian, Chickie Leventhal,
Mitchell Mitnick

For Darci and Briannah

And for the late Alan Mitnick, Adam Mitnick,
Sydney Kramer, Jack Biello.

For Arynne, Victoria, Sheldon, and David, and for Vincent and
Elena

Preface

Hackers play one-up among themselves. Clearly one of the prizes would be bragging rights from hacking into my security companys Web site or my personal system.

Another would be that they had made up a story of a hack and planted it on me and my co-author Bill Simon so convincingly that we were taken in, believed it as true, and included it in this book.

That has presented a fascinating challenge, a game of wits that the two of us have played time after time as we did the interviews for the book. For most reporters and authors, establishing authenticity is a fairly routine matter: Is this really the person he or she claims to be? Is this person or was this person really working for the organization he or she claims? Did this person have the position he or she says? Does this person have documentation to back up the story, and can I verify that the documents are valid? Are there reputable people who will support the story or parts of it?

With hackers, checking the bona fides is tricky. Most of the people whose stories appear in this book, other than a few who have already been to prison, would face felony charges if their true identities could be determined. So, asking for real names, or expecting to be offered as proof, is an iffy proposition.

These people have only come forward with their stories because they trust me. They know Ive done time myself, and they are willing to rely on my not betraying them in a way that could put them in that position. Yet, despite the risks, many did offer tangible proof of their hacks.

Even so, its possible in fact, its likely that some people exaggerated their stories with details intended to make them more compelling, or spun a story that was a total fabrication, but constructed around enough workable exploits to give them the ring of truth.

Because of that risk, we have been diligent in holding to a high standard of reliability. Through all the interviews, I have challenged every technical detail, asking for in-depth explanations of anything that didnt sound quite right, and sometimes following up later to see if the story was still the same or if he or she told it differently the second time around. Or, if this person couldnt remember when asked about some hard-to-accomplish step omitted from the story. Or, if this person just didnt seem to know enough to do what he or she claimed or couldnt explain how he or she got from point A to point B.

Except where specifically noted, every one of the main stories in this book has passed my smell test. My co-author and I agreed on the believability of every person whose story we have included. Nevertheless, details have often been changed to protect the hacker and the victim. In several of the stories, the identities of companies are disguised. I modified the names, industries, and locations of targeted organizations. In some cases, there is misleading information to protect the identity of the victim or to prevent a duplication of the crime. However, the basic vulnerabilities and nature of the incidents are accurate.

At the same time, because software developers and hardware manufacturers are continually fixing security vulnerabilities through patches and new product versions, few of the exploits described in these pages still work as described here. This might lead the overconfident reader to decide that he or she need not be concerned, that, with vulnerabilities attended to and corrected, the reader and his or her company have nothing to be worried about. But the lesson of these stories, whether they happened six months ago or six years ago, is that hackers are finding new vulnerabilities every day. Read the book not to learn specific vulnerabilities in specific products, but to change your attitudes and gain a new resolve.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers»

Look at similar books to The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers»

Discussion, reviews of the book The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.