No credit card required
Chapter 1. Here There Be Hackers!
Essentials First: Looking for a Target
Hacking Innocent Information
Targets of Opportunity
Are You a Target of Opportunity?
Targets of Choice
Are You a Target of Choice?
The Process of an Attack
Reconnaissance and Footprinting (a.k.a. Casing the Joint)
Operating System Attacks
Network Security Organizations
CERT Coordination Center
Center for Internet Security (CIS)
Internet Storm Center
Learning from the Network Security Organizations
Overview of Common Attacks and Exploits