1 / 116
文档名称:

黑客进阶手册.pdf

格式:pdf   页数:116页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

黑客进阶手册.pdf

上传人:精品库 2016/3/10 文件大小:0 KB

下载得到文件列表

黑客进阶手册.pdf

文档介绍

文档介绍:1 The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk -how - to - Copyright Notice This report may not be copied or reproduced unless specific permissions have been personally given to you by the author David Melnichuk. Any unauthorized use, distributing, reproducing is strictly prohibited. Liability Disclaimer The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information p rovided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Ha ck” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. ? Copyright 2008 Learn -How - To -Hack. net . All Rights Reserved. 3 Table of Contents A. Introduction .............................................................................................. 5 1. How can I use this eB ook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to e a hacker? 5. Disclaimer B. Programming ............................................................................................ 9 1. Do I really need it ? 2. Where should I start? 3. Best way to learn C. Linux ................................................................................................ ....... 1 2 1. What is it? 2. Choosing a distribution 3. Running Linux 4. Learning Linux D. Passwords ............................................................................................... 3 3 1. Password Cracking 2. Phishing 3. Countermeasures 4. More Programs E. Network Hacking ..................................................................................... 4 8 1. Foot printing 2. Port Scanning 3. Banner Grab