Specific topics covered in this book include:
* Hacking myths
* Potential drawbacks of penetration testing
* Announced versus unannounced testing
* Application-level holes and defenses
* Penetration through the Internet, including zone transfer, sniffing, and port scanning
* War dialing
* Enumerating NT systems to expose security holes
* Social engineering methods
* Unix-specific vulnerabilities, such as RPC and buffer overflow attacks
* The Windows NT Resource kit
* Port scanners and discovery tools
* Sniffers and password crackers
* Web testing tools
* Remote control tools
* Firewalls and intrusion detection systems
* Numerous DoS attacks and tools
download:
http://rapidshare.com/files/56316653/Hack-I-T-Security-Through-Penetration.rar
STARTING
-
*i don't know how to start these type of blogs but let me start like
this"When the Going Gets Tough, the Tough Get Going" which means when
situatio...
16 years ago
No comments:
Post a Comment