Unlimited WordPress themes, plugins & video downloads!

Research

Research – enemy2.html

The follow-up article to “Know Your Enemy: The Attack of the Script Kiddie”, “Know your Enemy II” focuses on intelligence gathering, specifically how to determine what the enemy is doing by analyzing your system log files. Includes examples based on two of the most commonly used scanning tools on the Internet, sscan and nmap.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/13826/enemy2.html

Source: https://packetstormsecurity.com/files/13826/enemy2.html.html

Related posts
Research

Research - EUSecWest 2012 Call For Papers

Research

Research - Examples Of Cross Site Scripting Tests

Research

Research - exploit_remote_fmtstring.txt

Research

Research - Exploiting Game Engines For Fun and Profit

Sign up for our Newsletter and
stay informed