Results 1 to 4 of 4

Thread: Ebook : Stealing The Network - How To Own The Box

  1. #1




    Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com.

    Stealing The Network: How to Own the Box, a compendium of tales written by well-known hackers, is a perfect summer read. The stories are fictional. The technology and techniques described are very real.

    A warning: Those who believe in the theory of "security through obscurity" -- keeping information on hacking techniques under wraps so that fewer people might exploit them -- probably will be infuriated by this book.

    Each chapter details not only the methods used to hack and counterattack, but also explains the thought processes hackers use to carry out assaults on computer systems and people.

    The result is a fascinating look at the tedious and occasionally brilliant mental discipline of hacking. But it is a book that wanders close to what some might consider the ethical edge. Some security experts said that even though Stealing the Network is legal, it isn't right to provide detailed information on hacking to anyone who is willing to spend $50 on the book.

    "We take a rather dim view of teaching folks about hacking," said Chris Wraight, a technology consultant at security firm Sophos. "To us, this serves no practical end; if anything, it greatly facilitates the real apprentice hackers out there in terms of speeding their learning curve."

    "There are many ways to teach security professionals how to defend their systems without resorting to teaching them how to hack in the first place," Wraight said. "In addition, companies hiring an 'ex-hacker' to help them better defend their networks is analogous to the proverbial fox guarding the chicken coop. We feel these folks are not to be trusted."

    Stealing the Network's editor Jon Babcock argued that the book will benefit more than harm.

    "You need to know your enemy if you want to protect yourself from them, and getting to know that enemy from a variety of viewpoints is what this book is all about," Babcock said.

    "I agree that there is a line that should not be crossed when it comes to publishing or otherwise releasing potentially damaging material to the general public," Babcock added. "I think we came close to that line more than a few times in this book, but we never actually crossed it."

    Ken Pfeil, author of one of the social engineering chapters in Stealing the Network, explained why he opted to go into detail in his story.

    "The scenarios we describe in this book can and will happen to someone, if they haven't already. My main objective was to get people thinking," Pfeil, chief security officer for corporate consulting firm Capital IQ, said.

    "By understanding some of the mentalities and motives behind the deed, we can avoid a lot of these situations in the first place," Pfeil said. "When you obscure the truth about security to the point where you're no longer proactive, you're playing into the underground's hands. They love complacency."

    Stealing's 10 chapters include an outstanding analysis of the ins and outs of computer-worm tracking and defense by security consultants Ryan Russell and Tim Mullen (aka Thor).

    Independent security consultant Mark Burnett provides a detailed description on the art of what he calls social reverse-engineering -- using people's own moral ambiguities to encourage them to hack into their own networks.

    Burnett uses an example of leaving a CD-ROM disk marked "Sales Data" at 15 booths at a technology expo, assuming that those who found the disk wouldn't be able to resist having a look. The disk actually contains a Trojan Horse program that gives a hacker access into the dupe's network.

    Joe Grand's chapter documents ways to amuse yourself while you wait for a flight. It is a goose-bump-producing expos

  2. #2


    Talking




    PDF | 329 pages | English | 4,6 MB | publisher:Syngress | ISBN:1931836876

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are false, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else; it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."

    **Hidden Content: To see this hidden content your post count must be 15 or greater.**
    [SIZE=2]ไม่มีอะไรที่มนุษย์ทำไม่ได้[/SIZE][color=#009900][/b]

  3. #3
    Jedi Global Moderator
    Join Date
    Oct 2007
    Location
    Bangkok, TH
    Posts
    327


    Post ผิดหมวดจ่ะ ต้องย้ายไปหมวด E-Book

    PS. เล่นนี้มันเก่ามากแล้ว ลองดูปี Publish สิ 2003 แต่เนื้อหาเล่นนี้ถือว่าโอเคเลยครับ
    <div align="center"><span style="font-family:Tahoma"><span style="color:#3333FF"><div align="center">-= CWH Underground Vulnerabilities Disclosure =-</div></span></span>

    Be Safe,
    /0x5A655133754C


    Send All Submission to lucifer[at]citec.us

    ----------------------------------------------------------------------------------------
    <span style="color:gray">`Hacking isn&#39;t about helping the security industry, Which leeches from Hacker`

  4. #4


    ผิดหมวด ขอย้าย ครับ
    --------------------------------------------------------------------------
    Don't Learn to HACK - Hack to LEARN
    If everyone has one post per day, our forum will be very eventful
    --------------------------------------------------------------------------

Similar Threads

  1. XSS PHPBB3 & COOKIE STEALING
    By postmunnet in forum Hacking Video
    Replies: 0
    Last Post: 01-07-2008, 11:01 PM
  2. Using Open Wifi is Stealing, According to Some
    By newsbot in forum World Hacking/Security News
    Replies: 0
    Last Post: 31-08-2007, 02:43 AM
  3. ebook Hack Proofing Your Wireless Network
    By popvip in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 11-07-2007, 02:56 PM
  4. Stealing the Network: How to Own an Identity
    By HazardMU in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 30-03-2007, 11:43 PM
  5. Stealing the Network: How to Own a Shadow
    By HazardMU in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 30-03-2007, 11:19 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •