Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spies Over Time

Front Cover
Wiley, Sep 7, 2001 - Computers - 960 pages
A complete library of the hottest, never-before-published underground hack variations
In his highly provocative books, Hack Attacks Revealed (0-471-41624-X) and Hack Attacks Denied (0-471-41625-8), corporate hack master John Chirillo described the tools, techniques, and primary code that hackers use to exploit network security loopholes and then shows specific methods for blocking these attacks. However, now that so many of their standard techniques have been revealed, underground hackers and cyberpunks are again skirting the system, going beyond primary code, and resorting to using complex code variations of old techniques. That's where this book breaks new ground--by providing, for the first time, the most comprehensive compendium of all the complex variations of these techniques, both historical and current, that the hacking underground doesn't want you to see. It offers astounding details on just about every tool used by those who break into corporate networks--information that will go a long way toward helping you close any remaining security gaps. An ideal companion volume to the other "Hack Attacks" books, Hack Attacks Complete:
o Covers hacks from the 1970s all the way to new millennium hacks
o Details every permutation, variation, and category of hacking tools
o Categorizes hacks for easy reference, with such categories as hacking, cracking, phreaking, spying, anarchy and underground spite, and hack/phreak technical library

Contents

The Golden Age 19801989
6
The Great Hacker War 19901994
12
Early Millennium Resurrection
19
The Eighties
41
Collected Hacks
61
vii
99
6
118
Phreaker Philes
193
22222
424
Part III
426
The Nineties
441
24
559
29
585
Chapter 2
591
Phreaking and Virus Hacking
593
Part IV
643

Chapter 3
213
19
353
21
389
Hacker Spies and Virus Hacking
397
Virus Files
403
The Millennium
645
Hacking and Cracking
647
Appendix A Exploits
685
Appendix B The TigerTools net Message Board
703
Copyright

About the author (2001)

JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.

Bibliographic information