Network Security
mobi, epub, pdf |eng | 2009-08-19 | Author:Chris Sanders; Chris Sanders

In this capture file you will see an example of a client computer (192.168.0.2) connecting to a telnet server (192.168.0.1). As you begin to step through the data being transmitted, ...
( Category: Networks March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]

msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category: Hacking March 25,2014 )
mobi | | 2009-08-28 | Author:Nitesh Dhanjani;Billy Rios;Brett Hardin

Ignoring the fact that the credentials could possibly be sent to a clear-text email account, one piece of the message is particularly interesting from a security standpoint. SalesForce.com not only ...
( Category: Hacking March 25,2014 )
mobi, azw3 |eng | 2011-08-15 | Author:Kevin Mitnick & Steve Wozniak & William L. Simon

I booked into a small motel just down the street, afraid to stay in my own apartment. I didn’t sleep very well and was awake early, tossing and turning. Tuesday ...
( Category: Crime & Criminals March 25,2014 )
mobi, epub, pdf |eng | 2013-12-26 | Author:Beaver, Kevin.; Davis, Peter T. [Beaver, Kevin.; Davis, Peter T.]

Chapter 10: Still at War 171 3. Select the directory where you want to install the program. Use the default unless you have a compelling reason not to do so. ...
( Category: LAN March 25,2014 )