Stealing The Network: How to Own the Box
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious network intrusions
What people are saying - Write a review
We haven't found any reviews in the usual places.
imagine the looks on their faces when they find out they were
The Art of TrackingMark Burnett
Other editions - View all
3lph_ admin administrators algorithm anti-virus attack checklogin.asp Cisco routers client company’s configuration connection crypto cryptographers Daddo database device disassembly Dizzy doesn’t dw0rf e-mail employees encryption exploit firewall going guess hacker hacking host IDSs install Internet IP address John the Ripper laptop Linux log entries log files login look machine mail server messages Microsoft Mobitex nmap Okay OpenBSD OpenSSH operating system packet password port port-scanning pretty printer probably problem protocol proxy rootkit router scan scanrand script SMTP someone SQL injection SQL Server stuff sure syslog tanzplatz target tell telnet temor TFTP there’s thing traffic tunnel username virus vulnerable Web server what’s Windows wireless worm
Page v - Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program. Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, Darlene Morrow, lolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product...
Page i - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...
Page v - ... deploying and supporting world-class enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson...
Page v - Mayes, John Mesjak, Peg O'Donnell, Sandra Patterson, Betty Redmond, Roy Remer, Ron Shapiro, Patricia Kelly, Andrea Tetrick, Jennifer Pascal, Doug Reil, David Dahl, Janis Carpenter, and Susan Fryer of Publishers Group West for sharing their incredible marketing experience and expertise.