Skip to Main Content
Hacking: The Next Generation
book

Hacking: The Next Generation

by Nitesh Dhanjani, Billy Rios, Brett Hardin
August 2009
Beginner content levelBeginner
298 pages
9h 5m
English
O'Reilly Media, Inc.
Content preview from Hacking: The Next Generation

Chapter 10. Case Studies: Different Perspectives

Hacking is not just a skill set. It is also a mindset. As we have shown in this book, attackers have been and will continue to exploit a combination of vulnerabilities to get what they want.

In Chapter 9, we looked at specific examples of how a determined attacker is able to target executives. In this chapter, we will take a look at two examples that further illustrate the motivations of attackers from two different perspectives.

In the first case study, we will look at a situation in which a disgruntled employee chooses to exploit his former employer after resigning and moving on to a competitor. In this example, the former employee’s actions are primarily driven by his emotions.

The second case study illustrates a typical corporate scenario. In this example, we will see how an executive in charge of information security at a major corporation is perpetually wooed by security product vendors who continually promise him the ultimate silver bullet: “just buy our latest product, plug it in, and you will be safe.” Meanwhile, an external attacker is able to use crafty techniques to exploit vulnerabilities and compromise confidential data from the corporation.

The Disgruntled Employee

It is often assumed that the motivation on the part of malicious parties targeting a given corporation is only to seek financial gain. This isn’t always the case. Those who decide to abuse and steal data from a given target can also be driven by their emotions. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Building a Modern Security Program

Building a Modern Security Program

Zane Lackey, Rebecca Huehls
Network Security Hacks

Network Security Hacks

Andrew Lockhart
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9780596806309Errata Page