The Hackers Underground Handbook 07-04-2011, 02:11 PM
#1
Okay, so here's what's Inclusive:
Table of Contents
A. Introduction.
1. How can I use this eBook?
2. What is a hacker
3. Hacker Hierarchy
4. What does it take to become a hacker?
5. Disclaimer
B. Programming
1. Do I really need it?
2. Where should I start?
3. Best way to learn
C. Linux.
1. What is it?
2. Choosing a distribution
3. Running Linux
4. Learning Linux
D. Passwords.
1. Password Cracking
2. Phishing
3. Countermeasures
4. More Programs
E. Network Hacking.
1. Foot printing
2. Port Scanning
3. Banner Grabbing
4. Searching for Vulnerabilities
5. Penetrating
6. Countermeasures
F. Wireless Hacking.
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4. Countermeasures
G. Windows Hacking.
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures
H. Malware.
1. Definitions
2. ProRat
It's very well written and Illustrated, and certainly worth the time spent reading.
Download: http://www.mediafire.com/?0zxk39hu1j52n05
Enjoy.
Table of Contents
A. Introduction.
1. How can I use this eBook?
2. What is a hacker
3. Hacker Hierarchy
4. What does it take to become a hacker?
5. Disclaimer
B. Programming
1. Do I really need it?
2. Where should I start?
3. Best way to learn
C. Linux.
1. What is it?
2. Choosing a distribution
3. Running Linux
4. Learning Linux
D. Passwords.
1. Password Cracking
2. Phishing
3. Countermeasures
4. More Programs
E. Network Hacking.
1. Foot printing
2. Port Scanning
3. Banner Grabbing
4. Searching for Vulnerabilities
5. Penetrating
6. Countermeasures
F. Wireless Hacking.
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4. Countermeasures
G. Windows Hacking.
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures
H. Malware.
1. Definitions
2. ProRat
It's very well written and Illustrated, and certainly worth the time spent reading.
Download: http://www.mediafire.com/?0zxk39hu1j52n05
Enjoy.
![[Image: AD83g1A.png]](http://i.imgur.com/AD83g1A.png)