c_karh9
New member
PDF | 822 Hal | 8.20 MB | John Chirillo
Contents :
Who Are Hackers, Crackers, Phreaks, and Cyberpunks?
What Is Hacking?
Profiling the Hacker
Security Levels
Test Condition Generation
Well-Known Ports and Their Services
TCP and UDP Ports
Well-Known Port Vulnerabilities
Discovery and Scanning Techniques
Hacking Security Holes
Decimal, Binary, and Hex Conversions
Token Ring
Ethernet
Routing Information Protocol
Interior Gateway Routing Protocol
The C Programming Language
Port, Socket, and Service Vulnerability Penetrations
Backdoor Kits
Decrypting versus Cracking
Sniffing
Trojan Infection
Wardialing
OS : BSD, UNIX, AIX, IRIX, Linux, Macintosh, Windows, Solaris
Proxy and Firewall
Mail Bomber and Spammer
Password Cracker
Remote Controllers
etc.
Sesuai forum rules, dilarang memasukan software yang kemungkinan ilegal seperti crack, bajakan dan semacamnya. Software freeware dan shareware yang dibagikan/direview secara benar diperbolehkan
Link didelete, thread di closed dan di move ke Archive, jika anda merasa ini kesalahan mohon pm saya
Last edited by a moderator: