Cover image for
Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks, and spies over time / John Chirillo.
Chirillo, John, 1970-
New York : Wiley, c2001.
xiii, 945 p. : ill. ; 24 cm. + 1 computer optical disc (4 3/4 in.)
CD-ROM contains historical documentation, techniques, and source code.

"Wiley Computer Publishing."

Includes index.
0471055891 (pbk. : alk. paper)


Material Type
Call Number
Reference Book QA76.9.A25C541 + 1 CD

On Order



A complete library of the hottest, never-before-published underground hack variations
In his highly provocative books, Hack Attacks Revealed (0-471-41624-X) and Hack Attacks Denied (0-471-41625-8), corporate hack master John Chirillo described the tools, techniques, and primary code that hackers use to exploit network security loopholes and then shows specific methods for blocking these attacks. However, now that so many of their standard techniques have been revealed, underground hackers and cyberpunks are again skirting the system, going beyond primary code, and resorting to using complex code variations of old techniques. That's where this book breaks new ground--by providing, for the first time, the most comprehensive compendium of all the complex variations of these techniques, both historical and current, that the hacking underground doesn't want you to see. It offers astounding details on just about every tool used by those who break into corporate networks--information that will go a long way toward helping you close any remaining security gaps. An ideal companion volume to the other "Hack Attacks" books, Hack Attacks Complete:
o Covers hacks from the 1970s all the way to new millennium hacks
o Details every permutation, variation, and category of hacking tools
o Categorizes hacks for easy reference, with such categories as hacking, cracking, phreaking, spying, anarchy and underground spite, and hack/phreak technical library

Author Notes

JOHN CHIRILLO is Senior Internetworking Engineer at a technology management company in Illinois. His consulting work includes breaking into Fortune 1000 company networks to evaluate their security policies and other award-winning projects assisting security managers. He is a frequent speaker at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco security candidates.

Table of Contents

Acknowledgmentsp. vii
A Note to the Readerp. ix
Introductionp. xi
About the Authorp. xiii
A Historical Synopsisp. 1
Prehistory (before 1969)p. 1
Elder Days (1970-1979)p. 4
The Golden Age (1980-1989)p. 6
The Great Hacker War (1990-1994)p. 12
Zero Tolerance (1994-present)p. 16
Early Millennium (Resurrection of Tiger Teams)p. 19
Part I The Seventiesp. 21
Chapter 1 The Beginning of Hacksp. 23
Anarchyp. 23
Anarchist Hack Extractsp. 24
Phreakingp. 29
Part II The Eightiesp. 41
Chapter 2 The Evolution of Hacksp. 43
Hacking and Crackingp. 43
Gaining Entryp. 44
Hacker Motivationp. 46
Mythologizing Hackersp. 48
Classic Microcomputersp. 49
Chapter 3 Collected Hacksp. 61
Hackingp. 61
Chapter 4 Phreaker Philesp. 193
Phreakingp. 193
Chapter 5 Hacker Spies and Virus Hackingp. 397
Spy Filesp. 398
Virus Filesp. 424
Part III The Ninetiesp. 441
Chapter 6 Hacking and Crackingp. 443
Hackingp. 443
Crackingp. 528
Chapter 7 Phreaking and Virus Hackingp. 593
Phreakingp. 593
Virus Hackingp. 633
Part IV The Millenniump. 645
Chapter 8 Hack Progressionp. 647
Hacking and Crackingp. 647
Appendix A Exploitsp. 685
Exploit Collectionp. 685
Appendix B The Message Boardp. 703
Glossaryp. 705
Hacking Termsp. 705
Indexp. 923