Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Hacking Techniques and Tools • Chapter 5 187
Trying 208.37.215.233...
Connected to 208.37.215.233.
Escape character is '^]'.
C:\winnt\system32\>
Success! We now have full control over the system and may install the
rootkit at once.After that step is completed, the system is basically ours
and we may modify whatever we want and take files at will. Even the
administrator of the system is no longer our access-level equal at this
time—for we can detect his presence, but he cannot detect ours.We have
effectively become the new (albeit unauthorized) system administrator.
NOTE
Yes, it really is that easy to break into default NT systems. The
example in this section ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312