- Shopping Bag ( 0 items )
Ships from: Silver Springs, NV
Usually ships in 1-2 business days
Posted May 29, 2001
Not much on content here, mostly stories of how 'Knightmare' hacked into things. This is NOT a step by step procedure book, it's just tales of exploits. An example- 'I used a fake log on screen to capture users names and passwords'. He does not mention how he did this. Was it a web server that you changed the page URL? Was it a custom app you wrote? How did you store and retrieve the list of user names and passwords? Pick this up for a good read, but not if you want to learn any techniques.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted June 23, 2000
Yeah this give some 0-day codez to stuff you never knew. I reccommend this mostly to sysadmins and other high level knowledgable people, because this shows you how super these hackers are. I mean when I say super I mean SUPER! Wow! It even talks about the most secret stuff in the work like PHF!Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.