Introduces some of the leaders in the field of ethical hacking, discussing why they chose the field, the areas in which they excel, their most notable accomplishments, and a brief overview of the different types of cyberattacks they battle Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Foreword xxxi
Introduction xxxiii
1 What Type of Hacker Are You? 1
2 How Hackers Hack 9
3 Profile: Bruce Schneier 23
4 Social Engineering 27
5 Profile: Kevin Mitnick 33
6 Software Vulnerabilities 39
7 Profile: Michael Howard 45
8 Profile: Gary McGraw 51
9 Malware 55
10 Profile: Susan Bradley 61
11 Profile: Mark Russinovich 65
12 Cryptography 69
13 Profile: Martin Hellman 75
14 Intrusion Detection/APTs 81
15 Profile: Dr. Dorothy E. Denning 87
16 Profile: Michael Dubinsky 91
17 Firewalls 95
18 Profile: William Cheswick 101
19 Honeypots 107
20 Profile: Lance Spitzner 111
21 Password Hacking 115
22 Profile: Dr. Cormac Herley 123
23 Wireless Hacking 127
24 Profile: Thomas d Otreppe de Bouvette 133
25 Penetration Testing 137
26 Profile: Aaron Higbee 147
27 Profile: Benild Joseph 151
28 DDoS Attacks 155
29 Profile: Brian Krebs 161
30 Secure OS 165
31 Profile: Joanna Rutkowska 171
32 Profile: Aaron Margosis 175
33 Network Attacks 181
34 Profile: Laura Chappell 185
35 IoT Hacking 189
36 Profile: Dr. Charlie Miller 193
37 Policy and Strategy 201
38 Profile: Jing de Jong-Chen 205
39 Threat Modeling 211
40 Profile: Adam Shostack 217
41 Computer Security Education 221
42 Profile: Stephen Northcutt 227
43 Privacy 231
44 Profile: Eva Galperin 235
45 Patching 239
46 Profile: Window Snyder 245
47 Writing as a Career 249
48 Profile: Fahmida Y. Rashid 259
49 Guide for Parents with Young Hackers 263
50 Hacker Code of Ethics 271
Index 275