Sunday, August 17, 2008

Hack - It


Specific topics covered in this book include:

* Hacking myths
* Potential drawbacks of penetration testing
* Announced versus unannounced testing
* Application-level holes and defenses
* Penetration through the Internet, including zone transfer, sniffing, and port scanning
* War dialing
* Enumerating NT systems to expose security holes
* Social engineering methods
* Unix-specific vulnerabilities, such as RPC and buffer overflow attacks
* The Windows NT Resource kit
* Port scanners and discovery tools
* Sniffers and password crackers
* Web testing tools
* Remote control tools
* Firewalls and intrusion detection systems
* Numerous DoS attacks and tools

download:

http://rapidshare.com/files/56316653/Hack-I-T-Security-Through-Penetration.rar

Bookmark and Share

No comments:

(Works For IE Only)