Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Syngress, Aug 6, 2010 - Computers - 360 pages
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real (STAR), focuses on these real-world lessons.
The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are “Easter eggs —references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
What people are saying - Write a review
I purchased the revised edition of Dissecting the Hack: The F0rb1dd3n Network, a few months ago and was forced to put it down (just no time to read) about 1/4 of the way in. I recently picked it back up started over and couldn't read part 1 quickly enough.
Part 1 instantly drew me into the story within the first few pages, the story gets off to an amazing start and I found myself sneaking in as much reading as I could. I HAD to know what was going to happen next. Many of the techniques and methods were familiar to me, which put me that much closer to the story. I felt I could easily relate and simply couldn't wait until the next "hack" was performed.
I really liked the STAR section (Part 2) as well, mainly because if there was something I was unfamiliar with I could just look it up right there in the same book. The inclusion of this section AND the ability to treat it either as a stand alone reference OR an integrated part of the story was an excellent idea.
I plan on reading it again but starting with part 2 and looking back at the references of the story. AND looking for more easter eggs.
This book is also approachable from the standpoint of handing it to a manager, parent, or anyone else who may understand how to use computers as an interface to check their email and consider all this "hacking" to be black magic. I think it does a wonderful job of outlining the attacks so they are understood and easily digested.