Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spies Over Time

3 avg rating
( 7 ratings by Goodreads )
 
9780471055891: Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spies Over Time

A complete library of the hottest, never-before-published underground hack variations
In his highly provocative books, Hack Attacks Revealed (0-471-41624-X) and Hack Attacks Denied (0-471-41625-8), corporate hack master John Chirillo described the tools, techniques, and primary code that hackers use to exploit network security loopholes and then shows specific methods for blocking these attacks. However, now that so many of their standard techniques have been revealed, underground hackers and cyberpunks are again skirting the system, going beyond primary code, and resorting to using complex code variations of old techniques. That's where this book breaks new ground--by providing, for the first time, the most comprehensive compendium of all the complex variations of these techniques, both historical and current, that the hacking underground doesn't want you to see. It offers astounding details on just about every tool used by those who break into corporate networks--information that will go a long way toward helping you close any remaining security gaps. An ideal companion volume to the other "Hack Attacks" books, Hack Attacks Complete:
o Covers hacks from the 1970s all the way to new millennium hacks
o Details every permutation, variation, and category of hacking tools
o Categorizes hacks for easy reference, with such categories as hacking, cracking, phreaking, spying, anarchy and underground spite, and hack/phreak technical library

"synopsis" may belong to another edition of this title.

Review:

Hack Attacks Encyclopedia is a collection of hacker goodies in print and on CD-ROM. Gleaned from file repositories old and new, the collection includes handy, potentially naughty utilities--process listers, password crackers, and port scanners, among others--and scores of text articles. The text articles explain how to extract value from systems of various kinds (mostly the North American telecommunications network and various kinds of computers). Reading articles about how to get free calls from (1980s-vintage) payphones is interesting, and articles (some quite old) written by hackers about themselves and their community reveal a lot of truth.

In order to appreciate this book, you have to take note of the word History in its subtitle. That word appears because the articles in this book, though many of them make excellent reading, deal largely with old technologies and well-known attacks for which defenses now exist. Interesting problems that contemporary hackers may have solved--such as how to get free satellite Internet access, how to defeat ATMs' "service fees," how to defeat password protection on Windows XP, and how to get an overwhelming number of positive reviews to appear for your book--aren't covered. This book is all about the exploits of the past. Articles about how to get free phone calls on old pulse-signaling public phones aren't of much practical value anymore, and viruses for the Amiga computer are of purely academic interest these days (though virus source code, several examples of which appear here, shows up in few other books). Therefore, don't buy this book so much for how-to information as for its history lessons and entertainment value. Read it for its first-hand look at hacker culture.

That said, Hack Attacks Encyclopedia would be a lot better if John Chirillo had looked at his considerable collection of text files and software and unified it with a running narrative. Good historians and documenters of cultures don't just present primary sources without annotating them. They use their knowledge and skill to derive meaning from the primary sources, and perhaps make some predictions about the future. --David Wall

Topics covered: Hack attacks--which is to say, tools and techniques for getting services and information you're not really supposed to have--through the ages (mostly in the 1970s, 1980s, and early 1990s). Emphasis falls on "harmless" hacker exploits, such as getting free phone calls, rather than on "black-hat" stuff like shutting down Web servers for no real reason. A large glossary explains technical terms and hacker lingo.

From the Author:

Hack Attacks Complete (ISBN #0471055891)

I have collected approximately 2.4 gigabytes of hacker tools, exploits, and code for almost twenty years. For those of you that read the other books in the Hack Attacks trilogy, this material specifically pertains to the collections I spoke of in the ‘Intuitive Intermissions’ from Hack Attacks Revealed and Hack Attacks Denied. In this collection, I have files dated back from the seventies to the present time, and have organized this material into categories over this epoch. Based on specific requests and feedback, I’ve compiled some of these texts and program files as an encyclopedia of hacks, cracks, phreaks, and spies—a progression of hacking from the ages. With close to 2,000 text, program files, and code snippets, this collection tallies in the neighborhood of 8,000 pages of historical documentation.

That said; let’s review the contents more specifically. We’ll begin by investigating malicious anarchist secrets on ATM machines, payphones, cellular networks, locks, magnetic stripe cards, credit cards, pirate radio, and television broadcasting. You’ll uncover hacks from tools and exploits developed and used by the world's top hackers to manipulate all types of computer security with topics including: passwords, Trojan horses, Unix and Linux scripts, Windows 3x/9x/NT/2000 remote hacking, nuking, ICQ hacks, admin, scanner, spoofer, firewall, packet, sniffer, flooder, email, keystroke, IP, web, and virus hacks.

You’ll find exposé’s on the files, tools, and techniques used by crackers including: password, ftp, dialup, system, copy protection, and BIOS cracking. There are documentaries on phreaking tools that really work, including boxing emulators with actual plans, plus tone generators for taking control of phone lines and line test device construction. You’ll also find a series of Underground spy techniques involving wiretaps, video, and audio manipulation.

"About this title" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace

1.

Chirillo, John
Published by Wiley (2001)
ISBN 10: 0471055891 ISBN 13: 9780471055891
New Paperback Quantity Available: 2
Seller:
Murray Media
(North Miami Beach, FL, U.S.A.)
Rating
[?]

Book Description Wiley, 2001. Paperback. Book Condition: New. Never used!. Bookseller Inventory # P110471055891

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 53.97
Convert Currency

Add to Basket

Shipping: US$ 1.99
Within U.S.A.
Destination, Rates & Speeds

2.

Chirillo John
Published by John Wiley & Sons
ISBN 10: 0471055891 ISBN 13: 9780471055891
New Quantity Available: 2
Seller:
Majestic Books
(London, ,, United Kingdom)
Rating
[?]

Book Description John Wiley & Sons. Book Condition: New. pp. 960. Bookseller Inventory # 7570547

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 77.93
Convert Currency

Add to Basket

Shipping: US$ 7.27
From United Kingdom to U.S.A.
Destination, Rates & Speeds

3.

John Chirillo
Published by Wiley (2001)
ISBN 10: 0471055891 ISBN 13: 9780471055891
New Paperback Quantity Available: 1
Seller:
Ergodebooks
(RICHMOND, TX, U.S.A.)
Rating
[?]

Book Description Wiley, 2001. Paperback. Book Condition: New. Bookseller Inventory # DADAX0471055891

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 123.00
Convert Currency

Add to Basket

Shipping: US$ 4.99
Within U.S.A.
Destination, Rates & Speeds