pyro7235 wrote:Awesome, I'll look into that. Do the concepts introduced in the book still work for modern programs? Also, will it help me understand the different programming codes?
Some do and some probably won't. Haven't read the book in a while, but one thing I remember them going into right off the bat is using proxychains to do anonymized port-scanning. That still applies.
Other things probably don't, but I wouldn't rule out outdated exploits still being viable in certain environments. For instance, just think about the number of people still running older OSs and/or unpatched. This will always apply to a degree with hacking books/articles, because the time it takes to go to press is slower than most-all entities can patch known exploits.
"I'm going to get into your sister. I'm going to get my hands on your daughter."