Stealing the network: the complete series collector’s edition

Free Download

Authors:

ISBN: 9781597492997, 159749299X

Size: 11 MB (11356588 bytes)

Pages: 1067/1067

File format:

Language:

Publishing Year:

Category: Tags: ,

Johnny Long, Ryan Russell, Timothy Mullen9781597492997, 159749299X

“Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today’s best hackers, and even the best hackers will tell you that the game is a mental one.” – from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON

For the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage!

These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.

This book contains all of the material from each of the four books in the Stealing the Network series.

All of the stories and tech from:

How to Own the Box

How to Own a Continent

How to Own an Identity

How to Own a Shadow

Plus:

Finally – find out how the story ends! The final chapter is here!

A DVD full of behind the scenes stories and insider info about the making of these cult classics!

* Now for the first time the entire series is one 1000+ page book * The DVD contains 20 minutes of behind the scenes footage * Readers will finally learn the fate of “Knuth” in the much anticipated Final Chapter


Table of contents :
Front Cover……Page 1
Stealing the Network: The Complete Series Collector’s Edition……Page 4
Copyright Page……Page 5
Contents……Page 6
AUTHORS AND TECHNICAL EDITORS……Page 18
CONTRIBUTING AUTHORS……Page 20
PART I: How to Own the Box……Page 30
Foreword……Page 32
CHAPTER 1 Hide and Sneak……Page 36
TOOLS……Page 37
THE SCAN……Page 39
STUPID CISCO TRICKS……Page 40
THE COMPUTER IS THE COMPUTER, MR. MCNEALY……Page 42
THE WEB, THE WEB … IT’S ALWAYS THE WEB……Page 43
THE JACKPOT……Page 48
WITH CUSTOMERS LIKE ME………Page 50
CHAPTER 2 The Worm Turns……Page 52
MR. WORM……Page 53
YOU CAN GET IT IF YOU REALLY WANT……Page 58
NO LIFE ‘TIL LEATHER……Page 60
IT’S POURING, IT’S RAINING……Page 62
I LIVE MY LIFE LIKE THERE’S NO TOMORROW……Page 64
IT’S LIKE BROKEN GLASS; YOU GET CUT BEFORE YOU SEE IT……Page 66
IF YOU LIKE TO GAMBLE……Page 67
MUMBLE, MUMBLE, MUMBLE……Page 69
SETUP……Page 70
LOW-HANGING FRUIT……Page 71
IN THE PALM OF MY HAND……Page 72
FEELING GOOD IN THE NETWORK NEIGHBORHOOD……Page 75
WHAT’S THAT SMELL?……Page 77
WORKING FROM HOME……Page 80
DINER……Page 85
THE ONLY WAY OUT……Page 86
REFERENCES……Page 89
CHAPTER 4 h3X’s Adventures in Networkland……Page 92
HALFWAY AROUND THE GLOBE AT BSZH.EDU……Page 95
EXPLORING THE PREY……Page 96
D-DAY……Page 105
TRAINEES FIRST……Page 113
SECRET SERVICE(S)……Page 114
DISCOVERY……Page 119
THE GIRL IS BACK IN THE HOUSE……Page 125
AFTERMATH……Page 130
THE TIP-OFF……Page 132
STUDYING THE PREY……Page 133
THE DNS GIVEAWAY……Page 135
TIME TO GET MY HANDS DIRTY……Page 138
GETTING INSIDE THE VPN……Page 142
LOOKING AROUND……Page 144
CONCLUSION……Page 147
CHAPTER 6 Flying the Friendly Skies……Page 148
REFERENCES……Page 157
CHAPTER 7 dis-card……Page 158
0-DAYS……Page 160
REVERSE-ENGINEERING PEOPLE……Page 166
INFORMATION……Page 169
RECON……Page 172
WHAT DOES GOOGLE PULL UP?……Page 173
NSI LOOKUP……Page 174
SAM SPADE……Page 175
INTERNET PHONE DIRECTORIES……Page 176
E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES……Page 177
JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER……Page 179
FUN WITH HUMAN RESOURCES……Page 180
PLAN C: THE DISPLACED EMPLOYEE……Page 182
SHOULDER SURFING……Page 183
SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKS……Page 184
BUSINESS AS USUAL?……Page 185
HELLO NAVI……Page 186
POLYGLOT……Page 187
WHEN GOOD PACKETS GO BAD……Page 189
AUTHORSPEAK: PAKETTO BORNE……Page 190
AND THEY SAY WE’RE SOCIAL CREATURES……Page 191
KNOCK, KNOCK……Page 193
WHO’S THERE?……Page 194
SCANRAND……Page 195
SCANRAND WHO?……Page 196
SCANRAND U……Page 197
BACK TO OUR REGULARLY SCHEDULED HACKERY……Page 203
TUESDAY……Page 204
WEDNESDAY……Page 213
THURSDAY……Page 216
FRIDAY……Page 222
MONDAY……Page 224
KNOWING THE LAWS OF SECURITY……Page 228
CLIENT-SIDE SECURITY DOESN’T WORK……Page 229
YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATION……Page 230
MALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST……Page 232
ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION……Page 234
FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK……Page 235
ANY IDS CAN BE EVADED……Page 238
SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE……Page 239
IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION—YOU HAVE ENCODING……Page 240
PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM……Page 242
IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT……Page 244
SECURITY THROUGH OBSCURITY DOES NOT WORK……Page 245
SOLUTIONS FAST TRACK……Page 246
FREQUENTLY ASKED QUESTIONS……Page 248
PART II: How to Own a Continent……Page 250
Foreword……Page 252
ALONE……Page 256
DISCIPLINE……Page 257
SHELTER……Page 258
JUST BECAUSE YOU’RE PARANOID………Page 260
DAY MINUS 300……Page 261
DAY MINUS 200……Page 262
DAY MINUS 100……Page 264
DAY MINUS 50……Page 265
THE BEGINNING… THE MAN APPEARS……Page 267
LAURA19……Page 270
NOC NOC, WHO’S THERE?……Page 273
DOING THE MEAT THING……Page 275
AFTERMATH… THE LAST DIARY ENTRY OF DEMETRI FERNANDEZ……Page 279
CHAPTER 13 Product of Fate: The Evolution of a Hacker……Page 284
WHAT?! YOU’VE GOT TO BE KIDDING ME!……Page 285
YOU WANT ME TO DO WHAT?!……Page 287
IT WAS ONLY HARMLESS FUN………Page 288
REAPING THE REWARDS: A LITTLE BIT GOES A LONG WAY……Page 290
MONEY—THE ROOT OF ALL EVIL……Page 291
INNOCENCE LURED……Page 293
SPREADING THE NET WIDE……Page 294
MAKING PLANS……Page 295
PLANS BECOME ACTIONS……Page 296
BREAKING THE CODE……Page 298
CHOOSING THE EQUIPMENT……Page 300
STEPPING WAY OVER THE LINE……Page 301
AFTERMATH… REPORT OF AN AUDIT……Page 303
CHAPTER 14 A Real Gullible Genius……Page 310
DAY 1: THOUGHTS AND RECON……Page 311
DAY 2: DEPLOYING THE ROGUE……Page 319
DAY 3: ACCESSING THE NETWORK……Page 320
DAY 4: BUSTING ROOT ON THE APPLE……Page 335
DAY 5: OVER 20,000 SOCIAL SECURITY NUMBERS……Page 341
FLIR’S LATE NIGHT……Page 346
RETRACTING THE TENDRILS……Page 347
ENDNOTES……Page 348
AFTERMATH… SECURITY—A PEOPLE PROBLEM……Page 349
THE CALL……Page 354
MAXIM’S……Page 355
SHALL WE PLAY A GAME?……Page 357
THE BOOTY……Page 359
THE SWITCH……Page 365
THE MARKETPLACE……Page 369
LANDLINE……Page 370
KEYS TO THE KINGDOM……Page 371
INSIDE THE GOLDEN PYRAMID……Page 373
WIRETAP……Page 375
AFTERMATH… THE INVESTIGATION……Page 376
CHAPTER 16 Return on Investment……Page 380
PLAYING THE MARKET……Page 381
INFORMATION LEAKAGE AT THE PACKET LEVEL……Page 382
CORRUPTED BY GREED……Page 384
REVENGE OF THE NERD……Page 385
A LEAD FROM LAS VEGAS……Page 386
THE CALL OF OPPORTUNITY……Page 387
INITIAL RECONNAISSANCE……Page 388
SHRAX: THE ULTIMATE ROOTKIT……Page 389
THROWAWAY ACCOUNT……Page 392
SEEKING THE PRIZE……Page 395
HACKING .MIL……Page 400
ENDNOTES……Page 403
AFTERMATH… THE INVESTIGATION CONTINUES……Page 404
CHAPTER 17 h3X and The Big Picture……Page 408
EXCEPTIONAL CIRCUMSTANCES……Page 410
EVOLUTION AND LACK THEREOF……Page 419
HYPERTEXT TARGET PROTOCOL……Page 423
SETUP.EXE……Page 427
HARD WORK……Page 431
WORKING ON WEEKENDS……Page 432
R&D……Page 433
DON’T LIKE MONDAYS……Page 442
AFTERMATH… THE KNUTH PERSPECTIVE……Page 443
CHAPTER 18 The Story of Dex……Page 446
A NEW DAY—A NEW DOLLAR……Page 449
THE HUNT……Page 452
AND SO IT BEGINS……Page 454
THE REAL FUN BEGINS……Page 463
THE SETUP……Page 467
DRUGS, SEX, AND DIRTY MONEY……Page 472
RALPH BECHIE……Page 475
ROBERT MONTAGUE……Page 476
NIKLAS FLESICHER……Page 477
REALITY COMES BACK……Page 480
AFTERMATH… THE WATCHERS……Page 482
SMOKE GETS IN YOUR EYES……Page 484
THE GAMES BEGIN……Page 486
AN ARMY OF ONE……Page 488
LET’S GET PHYSICAL……Page 490
OF GREED AND GIRLS……Page 493
A WORM BY ANY OTHER NAME……Page 496
HUMAN AFTER ALL……Page 497
0-DAY……Page 500
DAY PLUS 1……Page 503
TIME ZONE UNKNOWN……Page 507
PART III: How to Own an Identity……Page 508
Foreword……Page 510
Section I: Evasion……Page 512
Prologue: From the Diary of Robert Knoll, Senior……Page 514
CHAPTER 21 In the Beginning………Page 518
CHAPTER 22 Sins of the Father……Page 530
THE INTERVIEW……Page 531
THE POST OFFICE……Page 533
THE KEY……Page 535
CODEWHEELS……Page 537
THE RESTROOOM……Page 546
THE ADDRESS……Page 549
IT HAD TO BE DONE……Page 554
THE INVESTIGATION BEGINS……Page 556
TIPPED OFF……Page 558
HITTING THE ROAD……Page 561
A MEETING……Page 562
PLANS IN MOTION……Page 563
A LITTLE RECON……Page 565
YOU LOOK LIKE A NEW MAN……Page 567
I LOVE IT WHEN A PLAN COMES TOGETHER……Page 568
GATHERING THE REQUIRED INFORMATION……Page 569
GATHERING INFORMATION……Page 573
SAUL REBORN……Page 576
CHAPTER 24 The Seventh Wave……Page 580
CHAPTER 25 Bl@ckToW3r……Page 600
CHAPTER 26 The Java Script Café……Page 624
CHAPTER 27 Death by a Thousand Cuts……Page 634
CHAPTER 28 A Really Gullible Genius Makes Amends……Page 678
STYMIED BY SSL……Page 683
REDIRECTION……Page 684
A CODING BREAKTHROUGH……Page 686
CALLING LASLO……Page 688
REDIRECTING MAIL……Page 689
MAN-IN-THE-MIDDLE: HUSHMAIL.COM……Page 690
REAL-TIME PERCEPTION CONTROL……Page 691
DOUBLE CROSSED?……Page 696
CHAPTER 29 Near Miss……Page 698
AGENT SUMMERS……Page 700
THE RACE……Page 715
CLOSER TO KNUTH……Page 719
CHAPTER 30 There’s Something Else……Page 726
CHAPTER 31 Epilogue—The Chase……Page 742
Section II: Behind the Scenes……Page 748
CHAPTER 32 The Conversation……Page 750
PROBLEM TWO: ACCOUNT SETUP……Page 758
PROBLEM THREE: ACCOUNT RECON……Page 759
PROBLEM FOUR: GETTING YOUR HANDS ON THE MONEY……Page 761
PROBLEM FIVE: EVERYONE IS AFTER YOU……Page 764
PROBLEM SIX: LIVING IT UP, BIG STYLE……Page 768
PROBLEM SEVEN: DO YOU HAVE WHAT IT TAKES?……Page 771
CHAPTER 33 Social Insecurity……Page 776
PART IV: How to Own a Shadow……Page 778
Foreword……Page 780
CHAPTER 34 Travel Plans……Page 782
FROM THE DIARY OF ROBERT KNOLL, SENIOR……Page 802
CHAPTER 35 Back in the Saddle……Page 804
CHAPTER 36 Old Man and a Ghost……Page 832
CHAPTER 37 Rootkit……Page 838
FROM THE DIARY OF ROBERT KNOLL, SENIOR……Page 852
CHAPTER 38 Paul……Page 856
BLUE PAINT, DARK SKIES……Page 857
RUBBER BOUNCING SWORDS……Page 869
A HACKER IN THE MAKING……Page 889
CHAPTER 39 The Birth of Pawn……Page 898
SHOWING OFF FOR RAFA……Page 923
THE POST CHALLENGE……Page 927
“C” IS FOR COOKIE……Page 938
CHAPTER 40 Dishonorable Discharge……Page 966
A ‘BLAH’ SORT OF DAY……Page 969
JUST ANOTHER RANDOM ENCOUNTER……Page 983
DAMSEL IN DISTRESS……Page 985
YOU’RE NOT JUST A CUSTOMER……Page 987
FIRST CONTACT……Page 989
I’VE GOT AN RFIDEA………Page 992
TESTING THE SHARK-INFESTED WATERS……Page 1010
I’VE GOT GOOD NEWS AND BAD NEWS……Page 1027
CHAPTER 41 McGaylver……Page 1032
CHAPTER 42 The Final Chapter……Page 1048

Reviews

There are no reviews yet.

Be the first to review “Stealing the network: the complete series collector’s edition”
Shopping Cart
Scroll to Top