Book Review: The Hacker's Handbook
Reviewed by Roland Dutton
The Hacker's Handbook by Hugo Cornwall, E. Arthur Brown Company, Alexandria, MN
Strangely enough, this book actually lives up to its title. The author's stated purpose is to help the reader "grasp the methodology" and "develop the appropriate attitudes and skills, provide essential background and some reference material, and point you in the right directions for more knowledge." In this he succeeds, and in the meantime he gives us a lively and entertaining view of the world of British hacking.
The early chapters of The Hacker's Handbook discuss the technical details of computer communications, the typical hacker's equipment, and the types of services or "targets" that a hacker might be interested in. The technical explanations are clear and accurate, and are neither too difficult for the beginner nor so simple that the seasoned system cruncher might not learn a few details from them. In general, the entire book appears to be an excellent beginner's manual, a very good intermediate manual, and enjoyable though certainly not indispensable reading for those who style themselves "advanced."
Two more chapters discuss "Hacker's Intelligence" and "Hacker's Techniques." Then computer networks and videotex are discussed. The videotex (also known as viewdata or videotext) chapter is interesting for American readers since none of those types of services are available here, and it's always interesting to know what's going on elsewhere. As one might expect from a British author, the discussion of computer networks centers around the British public data networks, which are similar to Telenet or Tymnet.
And for those hackers who have too many security officers chasing after them, one chapter discusses "radio computer data," also known as radio teletype or RTTY. This is not really hacking, but just an interesting way to use your computer when you're not moving satellites with tank parts ordered from TRW. You need a shortwave receiver and an interface (which starts at $40), and you will be able to tune in various stations that use the international shortwave bands for transferring computer data. Sample listings in the book show a news bulletin about the Enver Hoxha Automobile and Tractor Combine in Albania, and some typical amateur radio conversations.
Every chapter always has one or two ideas or techniques that the capable hacker can use to expand his or her horizons. Here's one fun idea that rarely gets discussed, under the heading of "Hardware Tricks":
"For the hacker with some knowledge of computer hardware and general electronics, and who is prepared to mess about with circuit diagrams, a soldering iron and perhaps a voltmeter, logic probe, or oscilloscope, still further possibilities open up.
"One of the most useful bits of kit consists of a small, cheap radio receiver (MW/AM band), a microphone, and a tape recorder. Radios in the vicinity of computers, modems, and telephone lines can readily pick up the chirp chirp of digital communications without the need of carrying out a physical phone tap. Alternatively, an inductive loop with a small low-gain amplifier in the vicinity of a telephone or line will give you a recording you can analyze later at your leisure."
(An inductive loop is a long piece of wire wrapped around in circles placed next to the tine that you want to listen to. A typical inductive loop is the suction cup microphone that sticks to a telephone handset and records the conversation without being physically attached to the line.)
Overall, The Hacker's Handbook is a good book for those hackers who want to broaden their horizons, or who just need some new ideas. Hackers on both sides of the pond will get a better understanding of the magical machinery that places all this titillating telecommunications within our grasp.