Sunday, August 17, 2008

Hack - It

Specific topics covered in this book include:

* Hacking myths
* Potential drawbacks of penetration testing
* Announced versus unannounced testing
* Application-level holes and defenses
* Penetration through the Internet, including zone transfer, sniffing, and port scanning
* War dialing
* Enumerating NT systems to expose security holes
* Social engineering methods
* Unix-specific vulnerabilities, such as RPC and buffer overflow attacks
* The Windows NT Resource kit
* Port scanners and discovery tools
* Sniffers and password crackers
* Web testing tools
* Remote control tools
* Firewalls and intrusion detection systems
* Numerous DoS attacks and tools


Bookmark and Share

No comments:

(Works For IE Only)