by M00rlicious on Sun Dec 29, 2013 5:33 am
([msg=78642]see Re: Hacking Exposed 6 by Mcclure, Scambray & Kurtz[/msg])
I just finished chapter 1 which is about Footprinting. I understand and agree that it is the first and a very important step before you do anything, though i don't really understand certain things. For example; Searching the dumpster of a certain person/company just to have extra information(not even necesarrily IT-related.)
Should I/a hacker really be busy with such odd activities?
Isn't it enough to just sit behind our desk and gather whatever information is necesarry?
Also, in the first casestudy it mentioned about "Joe Hacker" can make someones life miserable by just typing in google
intitle:test.page.for.apache "It worked!" "This web site"
and find out whatever information he needs to penetrate and attack a random website.
What I missed was how to find a specific target, are there any preffered ways you guys use?
-- Sun Dec 29, 2013 11:43 am --
Chapter 2; Portscanning
A question I have is it possible to prevent your ports being scanned without pulling your plug to the internet?
-- Sun Dec 29, 2013 12:08 pm --
Chapter 3 enumeration;
It is pretty straightforward and describes various enumeration techniques.
Though I have a question about the Novell enumeration technique; Is Novell still much used?