Skip to Main Content
Dissecting the Hack
book

Dissecting the Hack

by Jayson E Street
July 2015
Intermediate to advanced content levelIntermediate to advanced
234 pages
7h 48m
English
Syngress
Content preview from Dissecting the Hack
3

Security Threats Are Real (STAR)

Abstract

Security Threats Are Real (STAR) documents the reality of the tactics and techniques introduced in the story. Each major technology and topic is called out within the STAR section to detail real life examples of the technology in use. There is no magic featured within the story; all attacks and defenses are based upon realistic implementations.

Keywords

RFID; Bitcoin; Dogecoin; Mt Gox; cryptocurrency; Steganography; SSL; APT; APT1; Espionage; Malware; Trojans; RAT; Adware; Crimeware; Ransomware; reverse engineering; Digital Forensics; Incident Response; Penetration Testing; SCADA; Mobile Phone; SMS; Government surveillance; 3D Printing; Maltego; OSINT; Encryption; Wickr; Firewalls; Hacker Space; Wikileaks; ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Dancing Barefoot

Dancing Barefoot

Wil Wheaton

Publisher Resources

ISBN: 9780128042823