Preview of Meinel's
latest book, Überhacker!
I teach you the superman. Man
is something to be surpassed. -- Friedrich Nietzsche
in Thus Spake Zarathustra
Be warned: if you don't like our quest for freedom in cyberspace,
or if you have a broken funny bone, put this book down right
now. It will just make you mad.
This introduction covers:
What's New in this Edition?
Welcome to the new Mecca of hacking: Wireless Fidelity (Wi-FI)
Local Area Networks (WLANS). Thanks to the poorly designed IEEE
802.11b standard and the weak encryption of Wireless Equivalent
Privacy (WEP), today spammers, crackers, kode kiddies and the
just plain curious armed with dog-food-can antennas can break
into countless networks from miles away. This book shows exactly
how it's done and exactly why no organization should deploy Wi-Fi.
A new version has just come online, IEEE 802.11g. It remains
to be seen whether it will prove to be secure.
This edition also covers the latest and not so greatest Windows
operating systems, all based upon the old Windows NT operating
system. These are Windows XP Personal Edition, Windows XP Professional,
Windows 2000 Professional, Windows 2000 Server and Windows 2003
Server. It seems that for every advance Microsoft makes in computer
security, it opens up two more ways to break in. As a result,
these NT-code base systems have become the playground of hackers,
crackers, worms and viruses.
We explain much more about how easy it is to create new ways
to deface and make merry with webservers, especially those Microsoft
Internet Information Servers (IIS), that never seem to get Unicode
just right. And then there are those vulnerable database servers,
and all the Warhol worms that explode across cyberspace and take
over tens or hundreds of thousands of web or database servers
in under fifteen minutes.
We offer much more on how easy it is to make end runs on all
sorts of encryption. Many of those Java-enabled Smart Cards are
just begging to be exploited, and all it takes is a light bulb.
Gosh, what a bunch of ways to fold, spindle, mutilate and make
merry at the expense of poorly designed protocols, operating
systems, servers and applications. Yet for five years now the
lead technical editor of this book, Vincent Larsen (http://sage-inc.com)
has been challenging the world to attack the web, email and ftp
servers he has designed. So far nobody has broken in. No worm
or virus has infiltrated them. Maybe it is possible to run secure
computer systems. Check us out at http://thirdpig.com, http://uberhacker.com,
http://cmeinel.com and http://happyhacker.org to see us in
action, fending off all attackers.
More Introduction to Überhacker