hack attacks revealed

Status
Not open for further replies.

c_karh9

New member
rfffe.jpg


PDF | 822 Hal | 8.20 MB | John Chirillo​

Contents :

Who Are Hackers, Crackers, Phreaks, and Cyberpunks?
What Is Hacking?
Profiling the Hacker
Security Levels
Test Condition Generation
Well-Known Ports and Their Services
TCP and UDP Ports
Well-Known Port Vulnerabilities
Discovery and Scanning Techniques
Hacking Security Holes
Decimal, Binary, and Hex Conversions
Token Ring
Ethernet
Routing Information Protocol
Interior Gateway Routing Protocol
The C Programming Language
Port, Socket, and Service Vulnerability Penetrations
Backdoor Kits
Decrypting versus Cracking
Sniffing
Trojan Infection
Wardialing
OS : BSD, UNIX, AIX, IRIX, Linux, Macintosh, Windows, Solaris
Proxy and Firewall
Mail Bomber and Spammer
Password Cracker
Remote Controllers
etc.

Sesuai forum rules, dilarang memasukan software yang kemungkinan ilegal seperti crack, bajakan dan semacamnya. Software freeware dan shareware yang dibagikan/direview secara benar diperbolehkan

Link didelete, thread di closed dan di move ke Archive, jika anda merasa ini kesalahan mohon pm saya
 
Last edited by a moderator:
Status
Not open for further replies.
Back
Top