Read more
Informationen zum Autor Chris Hurley is a Senior Penetration Tester in the Washington! DC area. He has more than 10 years of experience performing penetration testing! vulnerability assessments! and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive! a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive! Detect! Defend (Syngress Publishing! ISBN: 19318360305). He has contributed to several other Syngress publications! including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210)! Stealing the Network: How to Own an Identity (ISBN: 1597490067)! InfoSec Career Hacking (ISBN: 1597490113)! and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important. Klappentext You Are Who the Computer Says You Are The first two books in this series! "Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent! have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques and strategies. But what happens when the tables turn! and the criminal hackers become the targets of both law enforcement and each other? What happens when they must evade detection by creating new identities and applying their skills to get out fast and vanish into thin air. In "Stealing the Network: How to Own an Identity! the hacker crew you've grown to both love and hate find themselves on the run! fleeing from both authority and adversary. They must now use their prowess in a way they never expected--to survive... From the Diary of Robert Knoll! Senior My name! my real name! is Robert Knoll! Senior. No middle name. Most of those who matter right now think of me as Knuth. But I am the man of a thousand faces! the god of infinite forms. Identity is a precious commodity. In centuries past! those who fancied themselves sorcerers believed that if you knew a being's true name! you could control that being. Near where I live now! there are shamans who impose similar beliefs on their people. The secret is that if you grant such a man! an agency! this power over yourself through your beliefs or actions! then it is true. Only recently has this become true in the modern world. The people of the world have granted control of their existence to computers! networks! and databases. You own property if a computer says you do. You can buy a house if a computer saysyou may. You have money in the bank if a computer says so. Your blood type is what the computer says it is. You are who the computer says you are. TOC Part I Evasion Prologue From the Diary of Robert Knoll! Senior Chapter 1 In The Beginning Chapter 2 Sins of the Fathe Zusammenfassung Tackles one of the fastest growing crimes in the world: identity theft. This book features real-world network attack methodologies and hacking techniques within a context of original fictional accounts. Inhaltsverzeichnis In the Beginning; Sins of the Father; Saul on the Run; The Seventh Wave; Bl@cktoWer; The java Script Cafe; Death by a Thousand Cuts; A Really Gullible Genius Makes Amends; Near Miss; Ther's Something Else; The Chase; part II: Behind the Scenes; The Conversation; Social Insecurity; ...
List of contents
In the Beginning; Sins of the Father; Saul on the Run; The Seventh Wave; Bl@cktoWer; The java Script Cafe; Death by a Thousand Cuts; A Really Gullible Genius Makes Amends; Near Miss; Ther's Something Else; The Chase; part II: Behind the Scenes; The Conversation; Social Insecurity;