Table of contents for The art of intrusion : the real stories behind the exploits of hackers, intruders, and deceivers / Kevin D. Mitnick, William L. Simon.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
 
Chapter 1-Hacking the Casinos for a Million Bucks	2
Research	3
Developing the Hack	5
Rewriting the code	7
Back to the Casinos-This Time to Play	10
New Approach	15
The New Attack	17
Caught!	19
Aftermath	22
Countermeasures	24
The Bottom Line	25 
Chapter 2 When Terrorists Come Calling	3
Khalid the Terrorist Dangles Some Bait	5
Target for Tonight: SiprNet	9
A Time for Worrying	10
c0mrade Gets Busted	11
Investigating Khalid	14
The Harkat ul-Mujahideen	15
In the Aftermath of 9/11	16
Are our Most Sensitive National Computers Vulnerable?	17
And he signed it: "the unmerciful, neoh."	21
Five Years Later	21
How Great is the Threat?	22
INSIGHT INTO THE HACK	24
Security in the Federal Government	25
The Bottom Line	26
Chapter 3 The Texas Prison Hack	1
Inside: Discovering Computers	2
William Gets the Keys to the Castle	4
Online in Safety	7
Solution	8
Nearly Caught	10
Close Call	12
Growing Up	13
Back in the Free World	15
INSIGHT INTO THE HACK	16
Countermeasures	17
The Bottom Line	18
 Chapter 4 Cops and Robbers	4
Phreaking	6
Getting into Court	6
Guests of the Hotel	8
Opening a Door	9
Guarding the Barricades	11
Under Surveillance	16
Closing in	18
The Past Catches Up	18
On the News	19
Arrested	19
An End to Good Luck	21
Jail Phreaking	22
Still at It	24
Doing Time	24
What They're Doing Today	25
Countermeasures	26
The Bottom Line	28
Chapter 5 The Robin Hood Hacker	2
Early Days	3
Roots	4
Midnight Meetings	5
Easy Information	11
MCI WorldCom	12
Inside Microsoft	13
A Hero, Not A Saint: the New York Times Hack	13
The Unique Nature of Adrian's Skills	20
These Days	21
INSIGHT	23
Countermeasures	23
 Chapter 6 The Wisdom and Folly of Penetration Testing	2
One Cold Winter	3
Initial Meeting	4
Ground rules	5
Attack!	7
Blackout	9
Voicemail Revelations	10
Final Report	11
One Alarming Game	12
Rules of Engagement	13
Planning	14
The Attack Begins	15
Alarmed	18
The Ghost	19
Unchallenged	20
Hand Warmer Trick	21
End of the Test	22
INSIGHT	23
Countermeasures	24
The Bottom Line	25
Coming Up	26
The Bottom Line	26
Chapter 7	1
Of Course Your Bank is Secure - Right?	1
In Far-Away Estonia	2
The Bank of Perogie	3
Personal Opinion	4
The Long-Distance Bank Hack	4
A Hacker Is Made, Not Born	5
The Bank Break-In	6
Anyone Interested in a Bank Account in Switzerland?	8
20.1.2 Enter/Update Wire Transfers	8
Menu: Wire Transfers (WIRES)	8
Option: Enter/Update Wire Transfers	8
Wire Transfers	8
Aftermath	8
INSIGHT	9
Chapter 8	2
Your Intellectual Property Isn't Safe	3
The Two-Year Hack	4
A Quest Starts	4
The CEO's Computer	6
Getting into the CEO's Computer	7
The CEO Spots a Break-in	8
Gaining Access to the Application	8
Caught!	10
Back into Enemy Territory	11
Not There Yet	11
Robert, the Spammer's Friend	12
Getting the Mailing Lists	12
Porn Payoff	14
Robert the Man	14
Software Temptation	15
Discovering Server Names	15
A Little Help from helpdesk.exe	16
From the Hacker's Bag of Tricks: the "SQL Injection" Attack	18
The Danger of Backing Up Data	21
Password Observations	22
Gaining Full Access	22
Sending the Code Home	23
Sharing: A Cracker's World	24
Insight	26
Countermeasures	27
Corporate Firewalls	27
Personal Firewalls	27
Port Scanning	28
Know Your System	28
Incident Response and Alerting	29
Detecting Authorized Changes in Applications	29
Permissions	29
Passwords	29
Third-Party Applications	30
Protecting Shares	30
Preventing DNS guessing	30
Protecting Microsoft SQL Servers	30
Protecting Sensitive Files	31
Protecting Back-ups	31
Protecting against MS SQL Injection Attacks	31
Using Microsoft VPN Services	31
Removing Installation Files	32
Renaming Administrator Accounts	32
Hardening Windows to Prevent Storing Certain Credentials	32
Defense in Depth	32
The Bottom Line	33
Chapter 9	1
On the Continent	1
Somewhere in London	1
Diving In	2
Mapping the Network	3
Identifying a Router	3
The Second Day	4
Looking at the Configuration of the 3COM Device	6
The Third Day	6
Some Thoughts About "Hackers' Intuition"	10
The Fourth Day	10
Accessing the Company's System	13
Goal Achieved	15
INSIGHT	16
Countermeasures	16
Temporary Workarounds	16
Using High Ports	17
Passwords	17
Securing Personnel Laptops	17
Authentication	17
Filtering Unnecessary Services	18
Hardening	18
The Bottom Line	18
Chapter 10	1
Social Engineers - How They Work and How to Stop Them	1
A Social Engineer at Work	2
INSIGHT	9
Trappings of Role	9
Credibility	10
Forcing the Target into a Role (Altercasting)	10
Distracting from Systematic Thinking	10
Momentum of Compliance	11
The Desire to Help	11
Attribution	12
Liking	12
Fear	13
Reactance	13
Countermeasures	13
Guidelines for Training	14
Programs for Countering Social Engineering	15
On a Lighter Note: Meet the Manipulators in Your Own Family - Your Children	16
The Bottom Line	18
Chapter 11	1
Short Takes	1
The Missing Paycheck	1
Come to Hollywood, You Teen Wizard	2
Hacking a Soft Drink Machine	3
Crippling the Iraqi Army in Desert Storm	3
The Billion Dollar Gift Certificate	5
The Texas Hold 'Em Hack	6
The Teenage Pedophile Chaser	7
... And You Don't Even Have to be a Hacker	9

Library of Congress Subject Headings for this publication:

Computer security.
Computer hackers.