“Techniques Adopted by ‘System Crackers’ When Attempting To Break Into Corporate or Sensitive Private Networks.” Whitepaper by Network Security Solutions, Ltd.
You can download it from the following link: https://packetstormsecurity.com/files/download/13822/cracker.txt
Source: https://packetstormsecurity.com/files/13822/cracker.txt.html

