Hack attacks encyclopedia: a complete history of hacks, cracks, phreaks, and spies over time

Front Cover
Wiley, Sep 7, 2001 - Computers - 945 pages
0 Reviews
A complete library of the hottest, never-before-published underground hack variations In his highly provocative books, Hack Attacks Revealed (0-471-41624-X) and Hack Attacks Denied (0-471-41625-8), corporate hack master John Chirillo described the tools, techniques, and primary code that hackers use to exploit network security loopholes and then shows specific methods for blocking these attacks. However, now that so many of their standard techniques have been revealed, underground hackers and cyberpunks are again skirting the system, going beyond primary code, and resorting to using complex code variations of old techniques. That’s where this book breaks new ground—by providing, for the first time, the most comprehensive compendium of all the complex variations of these techniques, both historical and current, that the hacking underground doesn’t want you to see. It offers astounding details on just about every tool used by those who break into corporate networks—information that will go a long way toward helping you close any remaining security gaps. An ideal companion volume to the other "Hack Attacks" books, Hack Attacks Complete: • Covers hacks from the 1970s all the way to new millennium hacks • Details every permutation, variation, and category of hacking tools • Categorizes hacks for easy reference, with such categories as hacking, cracking, phreaking, spying, anarchy and underground spite, and hack/phreak

What people are saying - Write a review

We haven't found any reviews in the usual places.


The Golden Age 19801989
The Great Hacker War 19901994
Early Millennium Resurrection
The Eighties
Collected Hacks
Phreaker Philes
Hacker Spies and Virus Hacking
The Nineties
Phreaking and Virus Hacking
The Millennium
Appendix A Exploits
Appendix B The TigerTools net Message Board

About the author (2001)

JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.

Bibliographic information