Part 2:Hacking Tools and Techniques
In this part, you get in to the heart of the attacker’s process by looking the tools and techniques used. Here, we have further broken the areas down into categories of focus, starting with operating systems. We then move on to web servers, applications, and databases. Finally, we finish up this part of the book by discussing network protocols and malware analysis.
This section has the following chapters:
- Chapter 5, Hacking Windows
- Chapter 6, Hacking Unix
- Chapter 7, Hacking Web Servers and Applications
- Chapter 8, Hacking Databases
- Chapter 9, Hacking Packets – TCP/IP
- Chapter 10, Malware Analysis