SitePoint
  • Premium
  • Library
  • Community
  • Jobs
  • Blog
LoginStart Free Trial
Hacking the Hacker
Hacking the Hacker: Learn from the Experts Who Take Down Hackers
(ISC) 2®
About the Author
Credits
Acknowledgments
Foreword
Introduction
Most Hackers Aren’t Geniuses
Defenders Are Hackers Plus
Hackers Are Special
Hackers Are Persistent
Hacker Hats
The Secret to Hacking
Hacking Ethically
Profile:
For More Information on Bruce Schneier
Social Engineering Methods
Social Engineering Defenses
For More Information on Kevin Mitnick
Number of Software Vulnerabilities
Why Are Software Vulnerabilities Still a Big Problem?
Defenses Against Software Vulnerabilities
Perfect Software Won’t Cure All Ills
For More Information on Michael Howard
For More Information on Gary McGraw
Malware Types
Number of Malware Programs
Mostly Criminal in Origin
Defenses Against Malware
For More Information on Susan Bradley
For More on Mark Russinovich
What Is Cryptography?
Why Can’t Attackers Just Guess All the Possible Keys?
Symmetric Versus Asymmetric Keys
Popular Cryptography
Hashes
Cryptographic Uses
Cryptographic Attacks
For More Information on Martin Hellman
Traits of a Good Security Event Message
Advanced Persistent Threats (APTs)
Types of Intrusion Detection
Intrusion Detection Tools and Services
For More Information on Dr. Dorothy E. Denning
For More Information on Michael Dubinsky
What Is a Firewall?
For More Information on William Cheswick
What Is a Honeypot?
Interaction
Why Use a Honeypot?
Catching My Own Russian Spy
Honeypot Resources to Explore
For More Information on Lance Spitzner
Authentication Components
Hacking Passwords
Password Defenses
For More Information on Dr. Cormac Herley
The Wireless World
Types of Wireless Hacking
Some Wireless Hacking Tools
Wireless Hacking Defenses
For More Information on Thomas d’Otreppe de Bouvette
My Penetration Testing Highlights
How to Be a Pen Tester
For More Information on Aaron Higbee
For More Information on Benild Joseph
Types of DDoS Attacks
DDoS Tools and Providers
DDoS Defenses
For More Information on Brian Krebs
How to Secure an Operating System
Security Consortiums
For More Information on Joanna Rutkowska
For More Information on Aaron Margosis
Types of Network Attacks
Network Attack Defenses
For More Information on Laura Chappell
How Do Hackers Hack IoT?
IoT Defenses
For More Information on Dr. Charlie Miller
Standards
Policies
Procedures
Frameworks
Regulatory Laws
Global Concerns
Systems Support
For More Information on Jing de Jong‐Chen
Why Threat Model?
Threat Modeling Models
Threat Actors
For More Information on Adam Shostack
Computer Security Training Topics
Training Methods
For More Information on Stephen Northcutt
Privacy Organizations
Privacy‐Protecting Applications
For More Information on Eva Galperin
Patching Facts
Common Patching Problems
For More Information on Window Snyder
Computer Security Writing Outlets
Professional Writing Tips
For More Information on Fahmida Y. Rashid
Signs Your Kid Is Hacking
Not All Hacking Is Bad
How to Turn Around Your Malicious Hacker
Hacker Code of Ethics
WILEY END USER LICENSE AGREEMENT

Community Questions