Chapter 3. Hackers and Crackers
IN THIS CHAPTER
The purpose of this chapter is to illustrate the methodology and steps a hacker or cracker employs when attacking a network. It also provides an overview of the System Administration Network Security (SANS) Top 20 vulnerabilities that crackers can exploit.
The Difference Between Hackers and Crackers
To understand the methodology of a hacker or cracker, one must understand what a hacker or a cracker is. Internet enthusiasts have argued the difference between hackers and crackers for many years. This chapter contains my contribution to that debate.
If I were forced to define the terms hacker and cracker, my bottom ...
Get Maximum Security, Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.