O'Reilly logo

Chained Exploits: Advanced Hacking Attacks from Start to Finish by Jack B. Voth, Keatron Evans, Andrew Whitaker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4. Corporate Espionage

Setting the Stage

Phoenix is slightly startled at his desk as his prepaid personal cell phone vibrates in his pocket. But shock is immediately replaced by excitement. Phoenix knows that if this phone is ringing it means one thing: Time for some real work and real money. Phoenix doesn’t exactly like his day job and dislikes his boss more. But Phoenix has a secret. For a few years now he’s had a second job. A job that he’s not allowed to mention. And, more importantly, a job that is illegal. Phoenix has been involved in stealing corporate secrets for some time. It’s fun, it keeps his skills sharp, and it pays very well. Phoenix makes more on one three-week corporate espionage side job than he does the entire year ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required