In this book you can read everything you want and everything you wanna know about hacking with internetinto a computer networkBefore we start, a few prerequisites for reading this document. Unless youwant to feel a bit left in the cold you should have knowledge of thefollowing:1. Unix (the basics, scripting, AWK, PERL, etc.)2. TCP/IP (routing, addressing, subnetting etc.)3. The Internet (the services available on the 'net-e.g.
DNS, FTP, HTTP, SSH, telnet etc.)4. Experience in IT security (packetfiltering, firewalling, proxies etc.)I have written this document over a rather long period of time. Sites andtools could be outdated by the time you read this. I wrote the document withno prior knowledge about the "targets". You will find that in many cases Imake assumptions that are later found not to be true. Reading through thetext will thus provide you with an un-edited view of the thought processesthat I had.
In this book you can read everything you want and everything you wanna know about hacking with internetinto a computer networkBefore we start, a few prerequisites for reading this document. Unless youwant to feel a bit left in the cold you should have knowledge of thefollowing:1. Unix (the basics, scripting, AWK, PERL, etc.)2. TCP/IP (routing, addressing, subnetting etc.)3. The Internet (the services available on the 'net-e.g.
DNS, FTP, HTTP, SSH, telnet etc.)4. Experience in IT security (packetfiltering, firewalling, proxies etc.)I have written this document over a rather long period of time. Sites andtools could be outdated by the time you read this. I wrote the document withno prior knowledge about the "targets". You will find that in many cases Imake assumptions that are later found not to be true. Reading through thetext will thus provide you with an un-edited view of the thought processesthat I had.