‘If you know your enemy and know yourself,
you need not fear the result of a hundred battles. If you know yourself but not
the enemy, for every victory gained you will also suffer a defeat. If you know
neither your enemy nor yourself, you will succumb in every battle.’ Sun
Tzu – The Art Of War
All of
the information provided here Can be built on with a
little research on the web. Remember the difference between Good and Bad is PERMISSION!!. You
don’t want to spend the best part of your life sitting in a cell with Bubba so
remember that the techniques explained in these tutorials are meant to give you
an insight into computer security. These tutorials should give you an idea of
what malicious users can do to your (or your corporate) Network. If you are
going to attempt any of the methods described here please make sure you own or
have permission to use the target for this purpose.
What Is a Hacker? Social Engineering Part 1
Buffer Overflows for Beginners Social Engineering Part
2
Bluetooth Hacking SQL Injection Basic Tutorial
Advanced SQL Injection
Techniques Sniffing
via remote GRE Tunnels
Pen Test XP-SP2
Registry Back Door
Avoiding older style wire taps
3G and UMTS
Networks (XDA
Exec/3g Network Tools)
These
are some very (Very) basic tutorials, and give an overview of the types of
attacks that can occur. Please don’t email me asking to teach you to hack. Its an invitation to be ridiculed… I’ve learned through
years of research, several painful exams, hard work
and even now I don’t consider myself to be fully conversant in all areas of
security. It’s a learning curve that will continue right through my career.
There’s always something new to learn J