T H E A R T O F I N T R U S I O N
The Real Stories
Behind the Exploits of Hackers, Intruders & Deceivers
Kevin D. Mitnick, William L. Simon
The Art of Intrusion |
"Hackers play one-up among themselves.
Clearly one of the prizes would
be bragging rights from hacking into my security company’s Web site or my personal system.
Another would be that they had made up a story of a hack and planted it on me and my co-author Bill Simon so convincingly that we were taken in, believed it as true, and included it in this book."
=====================
Vice President & Executive Group Publisher: Richard Swadley
Vice President and Executive Publisher: Bob Ipsen
Vice President and Publisher: Joseph B. Wikert
Executive Acquisitions Editor: Carol Long
Development Editors: Emilie Herman, Kevin Shafer
Editorial Manager: Kathryn Malm Bourgoine
Senior Production Editor: Angela Smith
Project Coordinator: April Farling
Copy Editor: Joanne Slike
Interior Design: Kathie S. Rickard
Text Design & Composition: Wiley Composition Services
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
======================
Contents
-----------------------------------
Screenshot
Vice President & Executive Group Publisher: Richard Swadley
Vice President and Executive Publisher: Bob Ipsen
Vice President and Publisher: Joseph B. Wikert
Executive Acquisitions Editor: Carol Long
Development Editors: Emilie Herman, Kevin Shafer
Editorial Manager: Kathryn Malm Bourgoine
Senior Production Editor: Angela Smith
Project Coordinator: April Farling
Copy Editor: Joanne Slike
Interior Design: Kathie S. Rickard
Text Design & Composition: Wiley Composition Services
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
======================
Contents
Chapter 1 Hacking the Casinos for a Million Bucks . . . .. .1
Chapter 2 When Terrorists Come Calling . . . . . . . . . .. ..23
Chapter 3 The Texas Prison Hack . . . . . . . . . . . . . . . .49
Chapter 4 Cops and Robbers . . . . . . . . . . . . . . . . . .69
Chapter 5 The Robin Hood Hacker . . . . . . . . . . .91
Chapter 6 The Wisdom and Folly of Penetration Testing . .115
Chapter 7 Of Course Your Bank Is Secure — Right? . . .139
Chapter 8 Your Intellectual Property Isn’t Safe . . . . .153
Chapter 9 On the Continent . . . . . . . . . . . . . . . . . . .195
Chapter 10 Social Engineers — How They Work and How to Stop Them ... 221
Chapter 11 Short Takes . . . . . . . . . . . . . . . . . . .247
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261
-----------------------------------
Screenshot