The beginning and end of all human endeavors are untidy.
Congratulations! You’ve been following along, and have a good grasp on the skills in Hours 1–23. Armed with these skills, you now know enough to reverse-engineer anybody else’s undocumented network, no matter how much it’s snarled up. Hoo-ah!
You’ve probably noticed that documentation has been a major theme of this book. And why? If you’ve turned ahead to this hour out of desperation, you might well be the victim of somebody else’s undocumented network, and you have a good idea of how frustrating it can be. Fret not. This is where we’re going to comb the tangles out of that undocumented network and ...