6.1 Network Hacking ● Network Infrastructure ● Network Infrastructure Vulnerabilities ● Scanning-Ports ● Ping sweeping ● Scanning SNMP ● Grabbing Banners ● MAC-daddy attack Wireless LANs: ● Wireless Network Attacks 6.2 Operating System Hacking ● Introduction of Windows and LinuxVulnerabilities ● Buffer Overflow Attack 6.3 Applications Hacking Messaging Systems ● Vulnerabilities ● E-Mail Attacks- E-Mail Bombs, ● Banners ● Best practices for minimizing e-mail security risks Web Applications: ● Web Vulnerabilities ● Directories Traversal and Countermeasures ● Google Dorking Database system ● Database Vulnerabilities ● Best practices for minimizing database security risks

视频信息