Chapter 7 P2P Hacking

As we continue our pause from strict no-tech hacking, we’ll cover another low-tech skill: peer-to-peer (P2P) hacking. In keeping with the spirit of no-tech, let’s assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. In fact, let’s even take away Google. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.

Understanding P2P Hacking

A peer-to peer (P2P) network is composed of a number of clients (called peers) who want to share files or data. Most often, peer-to-peer networks carry audio, video or program files shared by users who join the network. The workings of a P2P network are beyond the scope of ...

Get No Tech Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.