- Audible Audio Edition
- Listening Length: 13 hours and 59 minutes
- Program Type: Audiobook
- Version: Unabridged
- Publisher: Blackstone Audio, Inc.
- Audible.com Release Date: August 15, 2011
- Whispersync for Voice: Ready
- Language: English
- ASIN: B005HBO3BY
- Amazon Best Sellers Rank:
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Audible – Unabridged
|New from||Used from|
|Free with your Audible trial|
Customers Who Bought This Item Also Bought
Top Customer Reviews
Ghost in the Wires doesn't reach the level of audacity of Catch Me if You Can - impersonating technicians over the phone doesn't rise to the sheer nerve of a teenager impersonating an airline pilot or a doctor, as Abagnale did, and getting away with it. But Ghost in the Wires goes well beyond the adolescent bragfest of phone hacks that it could have been.
I think this is largely due to the co-writer, William L. Simon. Kevin Mitnick describes in his acknowledgments, how he and Simon argued over how detailed and technical the book should be, and apparently Simon prevailed. There's enough detail to explain how the scams were possible, but not so specific as to send the non-programmer into a hexadecimal stupor.
Another big plus is that many of the hacks depended as much on what Mitnick calls "social engineering" as on specialist knowledge. Unlike the stereotypical computer nerd, Mitnick was as comfortable and proficient at schmoozing people as he was writing code - he could talk his way into places that were restricted and convince people he was entitled to classified information. These were scams anyone can understand.
Mitnick also succeeds at not crossing the line from confident to insufferable, which is another pitfall of true crime tell-alls. Perhaps we can once again thank William Simon for this achievement.
I expected to skim this 400-page book but ended up reading every word.Read more ›
I can't help but enjoy reading about someone who has the adept social engineering of a film noir gumshoe, or the undercover detective, who applied it growing up and getting into trouble. Like Kevin, I knew The Three Days of the Condor. I learned it was a favorite of his, and I clung to this fact which fell through the sieve of newspaper myth. Free Kevin!
Now read Kevin's story, where you'll find enough detail to keep any heart racing. Whether or not you have enough awareness for some of the bits, or rely on the plain language, the story can strike sheer terror in the hearts of those who don't know much of anything about bits and bytes. For those who do, this book contains updated method nomenclature and references to security protocol that it's valuable from that perspective.
Kevin possesses the kind of curiosity to dig and uncover gems of hidden info for esoteric purposes in order to unlock a power only a successful hacker knows about. Social engineering is akin to the confidence game, but different all the same when it involves computer networks. The best hackers are never caught, never known about. Kevin has a different distinction: The first and the grandest adventure story, ever.
You don't need to be a hacker or security professional to appreciate and learn from it. Today, security is serious business and hackers typically have bad or misguided intent.Read more ›
For people outside of security this is a great introduction for anyone who is worried about how hackers commonly steal information and break into systems. The book will never leave you with eyes glazed over in getting down to the really techie details. A lot of people have views of hackers that they see from the movies which is really crazy nerds with crazy monitors who can break into anything in minutes (think swordfish). This is far from the case with real attacks often taking months to years. The book really does a good job at making users understand that they are the most critical asset when it comes to securing their organizations data as well as their own. The crazy software products are important, but in the end it comes down to the users and what they will do.
I managed to briefly meet Kevin Mitnick at Derbycon (a security conference) this year and he was nice enough to sign my book which is really a nice added bonus!
Most Recent Customer Reviews
A very interesting story detailing the exploits of one of the world's first hackers, Kevin Mitnick, as told by himself. Read morePublished 5 days ago by MEEng
I loved this book! It was fascinating and well written. I'm glad that Kevin told his side of the story!Published 9 days ago by sarahi
It's a fantastic story about a greatly misunderstood man and misunderstood profession, coming from the poster child of the late 20th century hackers.Published 21 days ago by Amazon Customer
Very exciting book about the early days of hacking. The social engineering parts are very interesting from a psychology perspective.Published 24 days ago by Adam Haas
Great book, couldn't put it down. Finished it in 2 - 3 days. The pacing is nice. it's not overtly technical, which is good. Read morePublished 25 days ago by D. Seipel
Great adventure in physical and virtual digital exploration! Kevin does a great job in escalating the tension as you progress through the story.Published 1 month ago by Terry Zechman
Great book! Kevin Mitnick did a superb job conveying his life experience in the cyber world.Published 1 month ago by Brian Stopper
I really great story about the origins of phreaking and hacking. I recommend it to anyone that has any interest in hacking, computer security, or even technology in general.Published 1 month ago by AParks
Look for Similar Items by Category
- Books > Biographies & Memoirs > Memoirs
- Books > Biographies & Memoirs > Professionals & Academics > Scientists
- Books > Biographies & Memoirs > Specific Groups > Crime & Criminals
- Books > Computers & Technology > History & Culture > Biographies
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Security & Encryption