The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Hardback
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders.
In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems.
Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: * A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines* Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems* Two convicts who joined forces to become hackers inside a Texas prison* A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained accessWith riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
- Format: Hardback
- Pages: 270 pages, Illustrations
- Publisher: John Wiley & Sons Inc
- Publication Date: 04/03/2005
- Category: Computer fraud & hacking
- ISBN: 9780764569593
Showing 1 - 1 of 1 reviews.
Review by Meggo
This is a quick read, and is entirely devoted to stories of hackers and crackers who break into systems - some maliciously, and some for the sheer fun of it. I particularly enjoyed the story about the company who was hired by a company who had made an offer to buy it, to conduct a penetration test and attempt to break into their system. The prospective target company not only cracked the prospective purchaser's computer system, they also broke into their voice mails and were able to know the company's exact negotiating strategy and plans for the company once the purchase went through. The target wisely held the negotiation meeting before the meeting at which they revealed their successful penetration, and declined the purchase offer. Each chapter is followed by Mitnick's insights and recommendations, which only serve to remind me of the vulnerabilities of my office's systems. Interesting, for people who like computers and this sort of thing.