Hacking Exposed has long bridged the demilitarized zone between the digital underground and corporate IT. Its praise has been sung by individuals ranging from well-respected hackers to Vice Presidents of major financial institutions. Says Barnaby Jack, Win32 buffer overflow expert: "The network security book that set the standard takes another leap forward. Whether you're a struggling novice or a seasoned pro - Hacking Exposed is required reading." Pete Murphy, Senior Vice President for Vulnerability and Response Management at Bank of America, affirms in the Foreword to the Third Edition "I hold great respect for the authors of this book. I have sought and received excellent advice from them over the years. In Hacking Exposed, they really have written 'The Book' on vulnerabilities and countermeasures. Read it, heed it, and use it.
well i am always thankful to 'hacking exposed' this is the only book which directed, my domain knoweldge (whicch i collected from here or there) , into a unidiectional path and get me started on .... i love it... and i recommend it for everyone whos intsted in securities or the other side of the same coin "hacking"
-=-=-=-=-==-=-=-=-=-==-
rIDing hIGh oN tH3 sKy
-=-=-=-==-=-=-=-=-=-=-=-
Originally posted by Ravish
Hacking Exposed is a good start. Atleast it can make you a script kiddy which kaplish wants to be .
You should be careful when calling people script kiddies. There are those who act like script kiddies to draw a victim closer. But hey, they're so rare it's hilarious.
Utinam logica falsa tuam philosophiam totam suffodiant
Originally posted by Ravish
Hacking Exposed is a good start. Atleast it can make you a script kiddy which kaplish wants to be .
You should be careful when calling people script kiddies. There are those who act like script kiddies to draw a victim closer. But hey, they're so rare it's hilarious.
I called him script kiddy cuz, I know him in real life.... and I know he is a script kiddy.
I own the book and I read parts of it. The one thing that the book is missing is the middle part. It starts out with footprinting another machine and getting information on it and port scanning. After that, it just asumes that you now have access to the other machine and what you can do to it so that you keep that access or get more.
The middle part is missing!! They fail to explain how to get from the port scanning to the access of the other machine.
Now don't get me wrong, I'm not trying to be cracker, wanting to break into other computers and such, but I'm interested in the subject.
The worst enemy on the battlefield is an officer with a map.
Which edition you've got? I read second edition and it discusses about some vulnerabilities and exploit to gain access. It have different chapters for popular OS. Though those exploit don't work now but it is enought to understand the logic.
hey
is ravish ur boss means u r his servant..
is that so...
LOL
ha ha ha ha
Well for me life is very small and one time oppurtunity given to us by allmighty up above there so i want to make most of that so that after my death i keep living in peoples heart
i didn't know that u know him in personnal life....
i just thaught u r trying to insult our administrator so .........
Well for me life is very small and one time oppurtunity given to us by allmighty up above there so i want to make most of that so that after my death i keep living in peoples heart
ya kaplish u might had got a no. of kicks on ur ass so u can teach him better how to kick....
LOL
hahaha
Well for me life is very small and one time oppurtunity given to us by allmighty up above there so i want to make most of that so that after my death i keep living in peoples heart
has anyone read Real World Linux Security by Toxen???? i think that surpasses Hacking Exposed, oh BTW i have the fourth edition olf Hacking Exposed and wasn't that impressed, but it still is a must have for the book shelf
I haven't read Real World Linux Security by Toxen.... cuz It's not available at my place not even Hacking Exposed Fourth Edition is available. Here a crappy book called "Unofficial Guide to Ethical Hacking" is available. To be true... reading that book is just wastage of time.
Convert URLs: Automatically converts internet addresses into links by adding [url] and [/url] around them. Email Notification: Notifies you by email every time there is a new post in this thread.
Deactivate smilies in this post. Add Signature: Displays your signature in this post.