SitePoint
Blog
Forum
Library
Login
Join Premium
Toggle sidebar
Hacking the Hacker
Toggle community discussions
Close
Content
Bookmarks
Preface
Hacking the Hacker: Learn from the Experts Who Take Down Hackers
(ISC) 2®
About the Author
Credits
Acknowledgments
Foreword
Introduction
1
What Type of Hacker Are You?
Most Hackers Aren’t Geniuses
Defenders Are Hackers Plus
Hackers Are Special
Hackers Are Persistent
Hacker Hats
How Hackers Hack
The Secret to Hacking
Hacking Ethically
Bruce Schneier
Profile:
For More Information on Bruce Schneier
Social Engineering
Social Engineering Methods
Social Engineering Defenses
Kevin Mitnick
For More Information on Kevin Mitnick
Software Vulnerabilities
Number of Software Vulnerabilities
Why Are Software Vulnerabilities Still a Big Problem?
Defenses Against Software Vulnerabilities
Perfect Software Won’t Cure All Ills
Profile: Michael Howard
For More Information on Michael Howard
Profile: Gary McGraw
For More Information on Gary McGraw
Malware
Malware Types
Number of Malware Programs
Mostly Criminal in Origin
Defenses Against Malware
Profile: Susan Bradley
For More Information on Susan Bradley
Profile: Mark Russinovich
For More on Mark Russinovich
Cryptography
What Is Cryptography?
Why Can’t Attackers Just Guess All the Possible Keys?
Symmetric Versus Asymmetric Keys
Popular Cryptography
Hashes
Cryptographic Uses
Cryptographic Attacks
Profile: Martin Hellman
For More Information on Martin Hellman
Intrusion Detection/APTs
Traits of a Good Security Event Message
Advanced Persistent Threats (APTs)
Types of Intrusion Detection
Intrusion Detection Tools and Services
Profile: Dr. Dorothy E. Denning
For More Information on Dr. Dorothy E. Denning
Profile: Michael Dubinsky
For More Information on Michael Dubinsky
Firewalls
What Is a Firewall?
Profile: William Cheswick
For More Information on William Cheswick
Honeypots
What Is a Honeypot?
Interaction
Why Use a Honeypot?
Catching My Own Russian Spy
Honeypot Resources to Explore
Profile: Lance Spitzner
For More Information on Lance Spitzner
Password Hacking
Authentication Components
Hacking Passwords
Password Defenses
Profile: Dr. Cormac Herley
For More Information on Dr. Cormac Herley
Wireless Hacking
The Wireless World
Types of Wireless Hacking
Some Wireless Hacking Tools
Wireless Hacking Defenses
Profile: Thomas d’Otreppe de Bouvette
For More Information on Thomas d’Otreppe de Bouvette
Penetration Testing
My Penetration Testing Highlights
How to Be a Pen Tester
Profile: Aaron Higbee
For More Information on Aaron Higbee
Profile: Benild Joseph
For More Information on Benild Joseph
DDoS Attacks
Types of DDoS Attacks
DDoS Tools and Providers
DDoS Defenses
Profile: Brian Krebs
For More Information on Brian Krebs
Secure OS
How to Secure an Operating System
Security Consortiums
Profile: Joanna Rutkowska
For More Information on Joanna Rutkowska
Profile: Aaron Margosis
For More Information on Aaron Margosis
Network Attacks
Types of Network Attacks
Network Attack Defenses
Profile: Laura Chappell
For More Information on Laura Chappell
IoT Hacking
How Do Hackers Hack IoT?
IoT Defenses
Profile: Dr. Charlie Miller
For More Information on Dr. Charlie Miller
Policy and Strategy
Standards
Policies
Procedures
Frameworks
Regulatory Laws
Global Concerns
Systems Support
Profile: Jing de Jong‐Chen
For More Information on Jing de Jong‐Chen
Threat Modeling
Why Threat Model?
Threat Modeling Models
Threat Actors
Profile: Adam Shostack
For More Information on Adam Shostack
Computer Security Education
Computer Security Training Topics
Training Methods
Profile: Stephen Northcutt
For More Information on Stephen Northcutt
Privacy
Privacy Organizations
Privacy‐Protecting Applications
Profile: Eva Galperin
For More Information on Eva Galperin
Patching
Patching Facts
Common Patching Problems
Profile: Window Snyder
For More Information on Window Snyder
Writing as a Career
Computer Security Writing Outlets
Professional Writing Tips
Profile: Fahmida Y. Rashid
For More Information on Fahmida Y. Rashid
Guide for Parents with Young Hackers
Signs Your Kid Is Hacking
Not All Hacking Is Bad
How to Turn Around Your Malicious Hacker
Hacker Code of Ethics
Hacker Code of Ethics
WILEY END USER LICENSE AGREEMENT
Open text modal
Community Questions
Close