Hacker's Laboratory

Aleksandr Shitik
Aleksandr Shitik

I write my own posts and books, and review movies and books. Expert in cosmology and astronomy, IT, productivity, and planning.

Hacker's Laboratory
Sergey Babin
Genres: Programming, Cybersecurity
Year of publication: 2016
Year of reading: 2021
My rating: Normal
Number of reads: 1
Total pages: 240
Summary (pages): 3
Original language of publication: Russian
Translations to other languages: No translations to other languages found

General Description

A book of 240 pages, consisting of 7 chapters. It contains numerous images (mostly screenshots from various programs and system utilities), as well as code snippets. The level of presentation of the material is somewhere between easy and intermediate.

Table of Contents

  • Chapter 1. Why it has become harder to steal login passwords for social networks like 'VKontakte', 'Odnoklassniki'... Phishing. Social engineering in practice.
  • Chapter 2. Password hash functions. Network connection encryption.
  • Chapter 3. Anonymity online.
  • Chapter 4. Hacking Wi-Fi routers: myths and reality.
  • Chapter 5. The final cycle of the attacker, or what a hacker does after hacking a Wi-Fi network.
  • Chapter 6. Hacking programs are by no means toys.
  • Chapter 7. Rainbow tables, or not everything is in rainbow colors.

Opinion

This is not the largest book about methods for attacking networks and websites and, consequently, about protection methods against them. It examines many tools from Kali Linux to SSH clients. Approaches to working not only with desktop operating systems, but also with mobile ones are described. Also, basic concepts important for understanding by many programmers are considered: encryption, hashing, and others.

Nevertheless, my summary turned out to be quite short, which indicates the limited value of the book to me personally, at least because the topic of security, and especially attacks, is not my area of expertise. However, for many, this book can be quite useful, interesting, and informative. And thanks to the lightweight and fast style of presentation, I would probably recommend getting acquainted with it to those interested in the security topic.

This text is exclusively a book review and is not of a recommendatory nature. The tools and methods described in the book are presented exclusively for informational purposes — this is not a call to action on my part. Moreover, some technologies or practices may be restricted, blocked, or illegal in one or another country, and everyone should evaluate their use independently, taking into account local legislation and personal responsibility.

Вверх