Ali Jahangiri: Live Hacking Book Plagiarism

Sat Aug 7 19:45:07 CDT 2010

Updated: Sat Aug 27 00:18:13 CDT 2011

[Update: This review was originally based entirely on a sample chapter available to the public. This review has been ammended to include additional plagiarism review after a copy of the book was obtained.]

Dr. Ali Jahangiri released a book titled "Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts" (October 21, 2009). From his website describing the book, he says ".. a world-renowned information technology (IT) expert, brings us the next must-have in IT training: Live Hacking, the definitive and comprehensive guide to computer hacking. Groundbreaking, insightful, and practical .." His summary goes on to say "He brings his many years of academic, professional, and practical experience to the fore in order to equip you and your organization with the know-how needed in this day and age to defend your data against the ever-increasing cyber-thieves on the Internet." There is no confusion over Jahangiri's language, that he authored this book based on 14 years of experience.

After noticing the apparent plagiarism in another of his books, looked at the ( now removed) sample chapter available for the Live Hacking book. Using simple Google queries for key phrases from the one chapter, we found what appears to be wide-scale plagiarism. The table below breaks down the material available, page count and approximate percent of material lifted from other sources. Note: instances of missing pages are due to the entire book not being available.

The copyright page indicates that the book went through a third-party service for editing and proofreading. It is interesting that the company did not find any of these issues. Apparently, spot checking for plagiarism is not part of their service.

Scribendi, Inc.
405 Riverview Drive, Suite 304
Chatham, ON N7M 5J5

Additionally, the sections that appear to be written by Jahangiri contain a wide variety of grammatical errors, as well as issues with capitalization. For example:

Page 183 on MAC Filtering appears to have original content, but desperately in need of an editor. "Rouge Access Point Attack" would clearly pass a spell check, but should not pass a technical editor. Dr. Jahangiri also gets points for quoting parts of the BackTrack manual in his book on LiveHacking, after maintaining that LiveHacking is a better distribution.

Chapter Pages Plag % Original Source
4: Scanning 43-47 95% Wikipedia: Port Scanner
Secrets of Network Cartography: A Comprehensive Guide to nmap
NMAP Book: idle scan
Wright State University: Port Scanning
NMAP Book: man
5: Enumeration 62-69 30% Wikipedia: Server Message Block
Windows Enumeration: user2sid and sid2user
Wikipedia: SMTP
Wikipedia: SNMP
Wikipedia: LDAP
7: Windows Hacking 82-85 99% NTLM
Wikipedia: MS-CHAP
Wikipedia: HMAC
Wikipedia: Kerberos Protocol
Microsoft: SySKey Utility
9: Data Packet Sniffers 126-127 60% Wikipedia: Promiscuous Mode
10: Web Server & Web Application Hacking 140 100% Apache Vulnerabilities
10: Web Server & Web Application Hacking 148-151 100% OWASP: SQL Injection
Advanced SQL Injection in SQL Server Applications
Wikipedia: SQL injection
12: Wireless Network Hacking 173 95% Wikipedia Wireless Networks, Uses
12: Wireless Network Hacking (Wardriving) 174 70% WarDriving: drive, detect, defend : a guide to wireless security
12: Wireless Network Hacking (Warchalking) 175-176 60% Wikipedia Warchalking
12: Wireless Network Hacking (Netstumbler) 177 100% Netstumbler Page (Text & Image)
12: Wireless Network Hacking (WiFi Hopper) 177-178 100% WiFi Hopper page (Text & Image)
12: Wireless Network Hacking (Kismet) 178-179 50% Kismet Home Page
12: Wireless Network Hacking (WEP) 179-180 100% Wikipedia Wired Equivalent Privacy and Decrypting Wep With Backtrack 2: Introduction
12: Wireless Network Hacking (WPA) 180-182 100% Wikipedia Wi-Fi Protected Access (Note: Some LH text from older versions of this page)
12: Wireless Network Hacking (Rogue Access Point) 184-185 85% Wikipedia Rogue Access Point
12: Wireless Network Hacking (Karma) 185 100% Karma Home Page

main page ATTRITION feedback