Hacking the Hacker

Book description

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.  Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Read the stories of some of the world's most renowned computer security experts
  • Learn how hackers do what they do—no technical expertise necessary
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Table of contents

  1. Cover
  2. Title Page
  3. Foreword
  4. Introduction
  5. 1 What Type of Hacker Are You?
    1. Most Hackers Aren’t Geniuses
    2. Defenders Are Hackers Plus
    3. Hackers Are Special
    4. Hackers Are Persistent
    5. Hacker Hats
  6. 2 How Hackers Hack
    1. The Secret to Hacking
    2. Hacking Ethically
  7. 3 Profile: Bruce Schneier
    1. For More Information on Bruce Schneier
  8. 4 Social Engineering
    1. Social Engineering Methods
    2. Social Engineering Defenses
  9. 5 Profile: Kevin Mitnick
    1. For More Information on Kevin Mitnick
  10. 6 Software Vulnerabilities
    1. Number of Software Vulnerabilities
    2. Why Are Software Vulnerabilities Still a Big Problem?
    3. Defenses Against Software Vulnerabilities
    4. Perfect Software Won’t Cure All Ills
  11. 7 Profile: Michael Howard
    1. For More Information on Michael Howard
  12. 8 Profile: Gary McGraw
    1. For More Information on Gary McGraw
  13. 9 Malware
    1. Malware Types
    2. Number of Malware Programs
    3. Mostly Criminal in Origin
    4. Defenses Against Malware
  14. 10 Profile: Susan Bradley
    1. For More Information on Susan Bradley
  15. 11 Profile: Mark Russinovich
    1. For More on Mark Russinovich
  16. 12 Cryptography
    1. What Is Cryptography?
    2. Why Can’t Attackers Just Guess All the Possible Keys?
    3. Symmetric Versus Asymmetric Keys
    4. Popular Cryptography
    5. Hashes
    6. Cryptographic Uses
    7. Cryptographic Attacks
  17. 13 Profile: Martin Hellman
    1. For More Information on Martin Hellman
  18. 14 Intrusion Detection/APTs
    1. Traits of a Good Security Event Message
    2. Advanced Persistent Threats (APTs)
    3. Types of Intrusion Detection
    4. Intrusion Detection Tools and Services
  19. 15 Profile: Dr. Dorothy E. Denning
    1. For More Information on Dr. Dorothy E. Denning
  20. 16 Profile: Michael Dubinsky
    1. For More Information on Michael Dubinsky
  21. 17 Firewalls
    1. What Is a Firewall?
  22. 18 Profile: William Cheswick
    1. For More Information on William Cheswick
  23. 19 Honeypots
    1. What Is a Honeypot?
    2. Interaction
    3. Why Use a Honeypot?
    4. Catching My Own Russian Spy
    5. Honeypot Resources to Explore
  24. 20 Profile: Lance Spitzner
    1. For More Information on Lance Spitzner
  25. 21 Password Hacking
    1. Authentication Components
    2. Hacking Passwords
    3. Password Defenses
  26. 22 Profile: Dr. Cormac Herley
    1. For More Information on Dr. Cormac Herley
  27. 23 Wireless Hacking
    1. The Wireless World
    2. Types of Wireless Hacking
    3. Some Wireless Hacking Tools
    4. Wireless Hacking Defenses
  28. 24 Profile: Thomas d’Otreppe de Bouvette
    1. For More Information on Thomas d’Otreppe de Bouvette
  29. 25 Penetration Testing
    1. My Penetration Testing Highlights
    2. How to Be a Pen Tester
  30. 26 Profile: Aaron Higbee
    1. For More Information on Aaron Higbee
  31. 27 Profile: Benild Joseph
    1. For More Information on Benild Joseph
  32. 28 DDoS Attacks
    1. Types of DDoS Attacks
    2. DDoS Tools and Providers
    3. DDoS Defenses
  33. 29 Profile: Brian Krebs
    1. For More Information on Brian Krebs
  34. 30 Secure OS
    1. How to Secure an Operating System
    2. Security Consortiums
  35. 31 Profile: Joanna Rutkowska
    1. For More Information on Joanna Rutkowska
  36. 32 Profile: Aaron Margosis
    1. For More Information on Aaron Margosis
  37. 33 Network Attacks
    1. Types of Network Attacks
    2. Network Attack Defenses
  38. 34 Profile: Laura Chappell
    1. For More Information on Laura Chappell
  39. 35 IoT Hacking
    1. How Do Hackers Hack IoT?
    2. IoT Defenses
  40. 36 Profile: Dr. Charlie Miller
    1. For More Information on Dr. Charlie Miller
  41. 37 Policy and Strategy
    1. Standards
    2. Policies
    3. Procedures
    4. Frameworks
    5. Regulatory Laws
    6. Global Concerns
    7. Systems Support
  42. 38 Profile: Jing de Jong‐Chen
    1. For More Information on Jing de Jong‐Chen
  43. 39 Threat Modeling
    1. Why Threat Model?
    2. Threat Modeling Models
    3. Threat Actors
  44. 40 Profile: Adam Shostack
    1. For More Information on Adam Shostack
  45. 41 Computer Security Education
    1. Computer Security Training Topics
    2. Training Methods
  46. 42 Profile: Stephen Northcutt
    1. For More Information on Stephen Northcutt
  47. 43 Privacy
    1. Privacy Organizations
    2. Privacy‐Protecting Applications
  48. 44 Profile: Eva Galperin
    1. For More Information on Eva Galperin
  49. 45 Patching
    1. Patching Facts
    2. Common Patching Problems
  50. 46 Profile: Window Snyder
    1. For More Information on Window Snyder
  51. 47 Writing as a Career
    1. Computer Security Writing Outlets
    2. Professional Writing Tips
  52. 48 Profile: Fahmida Y. Rashid
    1. For More Information on Fahmida Y. Rashid
  53. 49 Guide for Parents with Young Hackers
    1. Signs Your Kid Is Hacking
    2. Not All Hacking Is Bad
    3. How to Turn Around Your Malicious Hacker
  54. 50 Hacker Code of Ethics
    1. Hacker Code of Ethics
  55. End User License Agreement

Product information

  • Title: Hacking the Hacker
  • Author(s): Roger A. Grimes
  • Release date: May 2017
  • Publisher(s): Wiley
  • ISBN: 9781119396215