Preview

Chapter Summary Of The Book 'Kingpin' By W. A. K.

Good Essays
Open Document
Open Document
1177 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter Summary Of The Book 'Kingpin' By W. A. K.
Romario Honorat

Kingpin is a story about a godlike Hacker known as Max Butler a.k.a. “Max Vision”. It talks about the illegal actions of this legendary hacker, with help from his hacking associates. In the book kingpin it talks about one of his most famous feats, which was an amazing hacking takeover of four of the criminal underground’s secret credit card forums, all of this which took place in August 2006. It was also said that he is somehow part of the TJX data breach, which was the theft and underground market selling of millions of dollars of credit card information. As great as Max was, sooner or later he would have gotten caught. What got him caught was an FBI sting operation called Operation Firewall. Within this operation an FBI
…show more content…
So no one trusted each other. Max never really knew where the line was for his hacking. One of his early known hacks came about when a security weakness was found in a DNS system. Like any other day, Max thought it was his job as a security researcher to fix the problem. So he created something known as a buffer overflow attack. What this did was control the vulnerability, then scanned the network for other DNS systems that were at risk, and installed his own patch that fixed the security risks. What looked like a good thing to Max was something completely different to the owners of those networks. Max was a researcher, he helped create BRO, which was one of the first experiments for intrusion detection systems. Another accomplishment was known as the Honeynet Project. While helping them he developed a program called Privmsg. This program allowed him to rebuild hacker chat messages by listening to network information. Other times Max would use hacking for bad. He would find vulnerable Wi-Fi sites that he could use to hide his hacking activity, this is called wardriving. Max created a virus to gain entry into other hackers’ networks, in order to see what they were doing and to steal their credit card information

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Quiz One

    • 977 Words
    • 4 Pages

    1) Patty owned Patty’s Cakes in Jacksonville, Florida. She sold her business to Fruity’s, Inc. a national pastry company. There was a non-compete agreement in the contract for the sale of her business. In the non-compete, Patty agreed not to work in any capacity in the food industry for 10 years on the entire east coast. A court would likely determine that the non-compete agreement…

    • 977 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    She makes Max a deal which tells him to kill a being known as Master Blaster. So Master Blaster and Max get in the Thunderdome, which is a two men enter one man leaves arena. As the fight commences Max begins fighting Blaster which turns out to be a overgrown child, a man who has Down Syndrome, really an innocent who has been used to nefarious ends. Max spares the innocent and as a punishment Max gets exiled.…

    • 1024 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 5 research paper

    • 297 Words
    • 2 Pages

    Intel’s attention. When they did not want to listen he spread it to the public over internet. They…

    • 297 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Max finds any ‘loop-holes’ in websites and uses unauthorized access to gain data. Hackers utilized carefully planned strategies to commit their crime such as, “Take advantage of the enemy’s unreadiness, make your way by unexpected routes, and attack unguarded spots” (Poulsen, p. 159). Max obtained unauthorized access to vulnerable websites, and used this as an advantage to easily increase his gain in stolen information.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Max and Blade were dating for a while. She never knew it was a setup for some idiots in white coats who were always carrying a stupid clipboard, studying her. She never knew that Blade was working for the other side. She thought he was a kid that also lived at the lab. One day Max was let out of her room by accident and she overheard everything, from how she was being studied, to how it was all a setup. She was devastated and didn't know why she was being studied, but Blade had seen her. Max ran back to her room, then opened all the other rooms.…

    • 1311 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    After Chanyeol graduated from high school, his father fell ill and the medical bills were just too much for Chanyeol to handle himself. No one would hire him, even if he went looking for jobs from a foreigner due to his records of fighting and troubles in his high school years. That's when the hacking started for Chanyeol, it was a thing Chanyeol did for fun after graduating from college and having nothing to do. But when he realized the things he could do with his ability, it took him nearly one second to get…

    • 693 Words
    • 3 Pages
    Good Essays
  • Good Essays

    On the topic discussed on the radio channel 88.9 on “State of Nevada” was Trump’s ban on immigration. Joe Schoenmann, the radio host, along with his guest, Chris Edward, an assemblyman, has acknowledged the conflict this ban has created in the society, which causes many people to voice their frustrations and anger towards Trump and the new order he signed. The new executive order and its impact on immigration cause an uproar and the people to protest outside the airport, which has become a disturbance to many tourists and could affect Nevada’s profit in tourism. Protestors of all ages gathered at the McCarran Airport, calling the ban “un-American.” Edward expressed his opposite viewpoint to those of the many protestors by agreeing with Trump’s…

    • 435 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Although the federal and state courts systems are different, both have similarities in that they are to base their ruling on the constitution, and to treat each person or state with fairness.…

    • 602 Words
    • 3 Pages
    Satisfactory Essays