

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
M**T
Captivating Cybercrime Saga - Kingpin Unveils the Intricate World of Hacking
"Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground" is an enthralling read that delves into the captivating world of cybercrime. The author masterfully narrates the story of Max Butler, a hacker who managed to seize control of the billion-dollar cybercrime realm. The writing style is engaging and accessible, making it easy for readers to follow the complex intricacies of hacking and cyber fraud.The book offers a detailed account of Butler's exploits, painting a vivid picture of the cybercrime underground and the individuals involved. It also provides valuable insights into the ever-evolving nature of cyber threats and the importance of cybersecurity measures. "Kingpin" is a must-read for anyone interested in true crime, technology, or cybersecurity, as it offers a rare glimpse into a world that is both fascinating and frightening. Highly recommended!
J**X
Stellar and true to real life!
Every once and a while I like to break away from the stress that is pentesting and bunker down with a good fiction book. Normally I stick to sci-fi and fantasy but last week I got to keep my head in the game while still recharging my batteries, with Kevin Paulsen's Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground. Having been a fan of what I thought to be similar titles like the Stealing the Network series and a researcher during the ShadowCrew era, I dove into Kingpin and managed to read it on a round trip plane flight between clients.Kingping is the story of Max Butler aka Iceman, a hacker and carder that took over the digital carding scene in 2008. When i say took over, i mean, he really did take over. From a small apartment in San Francisco Iceman forcibly and calculatingly popped almost every single carding forum that opposed him all in an effort to ensure the underground scene was free of law enforcement and scammers. The story chronicles Max and the Law enforcement agents that pursue him at every turn.While most editorial reviews focus on literary prose and plot development, I have less of that expertise and more of the "having lived it" expertise.Kingpin was a non-stop page turner. Well written, it grabs you right away and never lets go. The great thing about the story is it's based on true events and the author depicts the characters with stark realism, almost scarily so. Being a pentester you find yourself thinking " had i made one or two bad decisions, this could have been me" and if you've been in or around "the scene" in the past this story hits so close to home you might find yourself a bit shaken up.While not the half fiction half tech split that most hacking books have adopted these days, Kingpin is a pure chronicle. That's not to say that there's no tech, because there certainly is some sploits referenced in Kingpin but, it's more of passerby than books like STN or Dissecting The Hack.Now onto the verdict:Kingpin was so good, so shockingly real to true events, that it has entered my top 10 book list. Go read it. Now.For some people it will be story, for others a warning, and for some a guide. The book will open your eyes to how the real underground works; where hackers deal with carders, the carders work for the Russians, and Law Enforcement uses old school methods with new school tech to chase them down.Hopefully it will teach you what only the realists among us have realized. Real for-profit hackers do not care about 0-day exploits when larger issues go unpatched. Real hackers will attack weak links like passwords. Real hackers aren't about your informational level findings. Real hackers are about the data. They dont target your firewalls they target your employees. Your compromised network is often a conquest of opportunity from a net cast over the whole internet, and they are more often caught because of the people they confide in than the tech the used to hide.
A**N
Fast-paced, great read. Not too geeky.
As an engineer with a passing interest in computer security, I wasn't quite sure what to expect from this book. I ended up being pleasantly surprised, and would easily recommend this title to anyone at all interested in true crime, detective stories, or computer and financial crimes. I ended up reading the book in 3 or 4 sittings, and hated putting it down.The Good Stuff:First and foremost, the book is well written. The prose is lively without hysterics, and the characters and narrative fit together well. Poulsen captures not only the actions of the characters, but treats us to a look inside their motivations and conflicts. Fascinating stuff.The book does not get lost in technical details. For example, while the book talks about encryption of data, it does so in terms of "schemes that are easy to crack" and "schemes that are just about impossible to crack". Good enough detail to keep the narrative on track and avoid bogging the reader down in the arcane science of cryptography.The plot is intriguing. It very much reminded me of a good spy thriller, or more specifically the history of the WWII intelligence services with agents, double-agents, agents-provocateur.The Bad StuffI personally would have liked to see more technical details. To keep the text moving, Poulsen has ruthlessly removed all but the most simplistic overviews of the technical issues. Even keeping to his goal of a mass-market book, I believe more detail could have been added. At the very least it would have helped show off the skills of the main characters.The book also ends a little too abruptly. The actual trials and legal proceedings are only brief summaries-and this is probably one of the more important areas of the whole story-since the book details some of the first successful prosecutions of "hackers".SummaryI liked the book, and would recommend it to any fan of crime, detective or technical thrillers. If you have ever had your identity stolen, the book will shock you with just how easy it was (and probably still is) to land a live credit card number. Or how easy it is to land a couple thousand live credit card numbers.One area I would have liked Poulsen to have spent a little more time on is the responsibility of the corporate networks. When you hand your credit card to the clerk at TJ Maxx, you are entrusting not only the clerk, but the entire TJ MAXX computer infrastructure to safeguard it. The book dances around the point of the shoddy way in which Fortune 500 companies handle their (and their customer's) data.
P**T
A well-written and fascinating book
I think that this is a book written without a target audience in mind, just because Poulson felt it needed to be written. If you are already knowledgeable about black hat hacking, you will know a lot of this already. If you are an ordinary computer user, then a lot of the jargon might go over your head.But it doesn't matter. Poulson writes so engagingly and clearly that, even if some of it is arcane, he can get across the thrill of the chase and into the minds of these amazingly strange and clever people. I had just finished the Millennium trilogy and really didn't believe that the heroine, Salander, could carry out the hacking that she did. Now I know that she could, and how.The detailed accounts of how the security of banks, national security and retailers were penetrated and data and card details stolen make the hairs on the back of your neck stand up. These are organisations that we deal with and give our cards to, such as restaurants and clothes shops. Poulson explains how a combination of software faults, and human laziness and carelessness, make data theft possible. He describes how, to start with, these thefts were covered up and customers told that they were to blame.I finished up with a mix of feelings. I could not help admire the hackers as they attacked institutions and each other. At times the story had the complexity of a mix of John le Carre and CSI. But then I reminded myself that when my bank calls me to cancel a card, it is people like these who caused it.As I put the book down I thought that some of the software described is running on my own computers. So guess what? I put an order in for the most advanced version of the free internet security software that I use. No, they probably aren't interested in me, but who knows? I now have a lot of respect for the hackers' skills.All-in-all a well-written and fascinating book.
H**E
Interesting read on credit card fraund and hacking
Interesting read on credit card fraund and hacking. Some hacking techniques explained. It was sometimes hard to keep track of the numerous persons involved. Nevertheless and exciting and quick read. Similar in many ways to Ghost in the Wire by Kevin Mitnick.
I**S
Couldn't put it down
I bought this title on my Kindle, after reading an extract in Wired magazine.This book makes hacking thrilling. What I liked was that the author doesn't skip over the technical details of how the hacks work. You zoom right in, and discover how the attacks are accomplished.For example, reading Kingpin was the first time I actually understood what a SQL injection attack is. If you're interested in technology, or hacking, I highly recommend you read this book - I loved it.
W**R
Really enjoyed this book
If you have any interest in crime books, technology books, IT security or hacking (black or white) then you will enjoy reading this book. As another reviewers say, it doesnt just mention specific hacks and security loopholes but briefly explains how various hacks actually work. i.e Trojans, SQL injection, network security etc. Also explains how credit card cloning works. It is not a how-to book but an informative read if you have an interest in any of these topics. A good read.
D**D
Well written, interesting, and a bit scary
I really enjoyed this book. As a software developer with experience building websites that accept card payments, I found this book very interesting. As someone who regularly made card payments over the Internet during the 90's, I found it slightly terrifying. Overall I enjoyed it -- I often found myself wanting to read "just one more chapter" when I should have gone to bed.
Trustpilot
2 weeks ago
4 days ago