General Description
A book of 240 pages, consisting of 7 chapters. It contains numerous images (mostly screenshots from various programs and system utilities), as well as code snippets. The level of presentation of the material is somewhere between easy and intermediate.
Table of Contents
- Chapter 1. Why it has become harder to steal login passwords for social networks like 'VKontakte', 'Odnoklassniki'... Phishing. Social engineering in practice.
- Chapter 2. Password hash functions. Network connection encryption.
- Chapter 3. Anonymity online.
- Chapter 4. Hacking Wi-Fi routers: myths and reality.
- Chapter 5. The final cycle of the attacker, or what a hacker does after hacking a Wi-Fi network.
- Chapter 6. Hacking programs are by no means toys.
- Chapter 7. Rainbow tables, or not everything is in rainbow colors.
Opinion
This is not the largest book about methods for attacking networks and websites and, consequently, about protection methods against them. It examines many tools from Kali Linux to SSH clients. Approaches to working not only with desktop operating systems, but also with mobile ones are described. Also, basic concepts important for understanding by many programmers are considered: encryption, hashing, and others.
Nevertheless, my summary turned out to be quite short, which indicates the limited value of the book to me personally, at least because the topic of security, and especially attacks, is not my area of expertise. However, for many, this book can be quite useful, interesting, and informative. And thanks to the lightweight and fast style of presentation, I would probably recommend getting acquainted with it to those interested in the security topic.
This text is exclusively a book review and is not of a recommendatory nature. The tools and methods described in the book are presented exclusively for informational purposes — this is not a call to action on my part. Moreover, some technologies or practices may be restricted, blocked, or illegal in one or another country, and everyone should evaluate their use independently, taking into account local legislation and personal responsibility.