ABSTRACT

This chapter builds on the basic components of hacking techniques and reviews several case histories. It shows the various malware involved and the technologies which have, and will be again, vulnerable. File replication, viruses and worms are all looked at in depth. Bot nets, DDoS and other attack types are reviewed, as well as motivations behind hacking. The case histories include Stuxnet, Mafiaboy, Jonathan James, Gary Mckinnon and Lauri Love. A look is given at Huawei and the debates concerning this company. Finally, some hacking techniques are reviewed, including code examples and ways of building tools to examine network activity.