Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
114991

114991

Ratings: (0)|Views: 2|Likes:
Published by tuniya4

More info:

Published by: tuniya4 on Aug 17, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/17/2011

pdf

text

original

 
1
 The Script Kiddie Cookbook  Abstract:
Computer Security for Everyday Users
 Copyright 2005by Matthew J. Basham
 
2
The Script Kiddie Cookbook: Computer Security for Everyday Users
Matthew J. BashamCopyright ©2005Published by:Lulu Press (http://www.lulu.com)All rights reserved. No part of this book may be reproduced or transmitted in any form or  by any means electronic or mechanical, including photocopying, recording, or by anyinformation storage and retrieval system, without written permission from the publisher or the author, except for the inclusion of brief quotations in a review. Any reproductionsfor learning purposes should be reported to authors for accounting purposes(Basham.Matt@spcollege.edu
 
)Printed in the United States of America 1 2 3 4 5 6 7 8 9 0This manuscript was supplied camera-ready by the author.
 
3
Table of Contents of the Script Kiddie Cookbook available athttp://www.lulu.com 
Chapter 1 Introduction ……………………………………………… 5Unit I: Legal Stuff ……………………………………………………… 10Chapter 2: Legal system basics ……………………………………… 11Chapter 3: Cases of Interest ……………………………………… 42Chapter 4: Acceptable Use Policies ……………………………… 94Unit 2: Hacking History and Foundational Stuff ……………………… 105Chapter 5: History and Psychology of Hacking ……………………… 106Chapter 6: Networking Frameworks ……………………………… 115Chapter 7: Logic Problem Fundamentals/Cryptography Fundamentals 119Chapter 8: The “Anatomy of a Hack” ……………………………… 132Unit 3: Tools of the Trade ……………………………………………… 135Chapter 9: Downloading stuff from the web ……………………… 137Chapter 10: DOS ……………………………………………………147Chapter 11: Password Protection ……………………………………… 202Chapter 12: Protocol Inspectors ……………………………………… 215Chapter 13: Port Scanners ……………………………………… 235Chapter 14: Having fun on the Internet…or not ……………………… 252Chapter 15: E-mail and SPAM ……………………………………… 264Chapter 16: H4xor 5p34k ……………………………………………… 286Chapter 17: How to stop those frigging pop-up ads ……………… 289Chapter 18: Knoppix STD: an introduction ……………………… 296Unit 4: Putting it all together ……………………………………………… 335Chapter 19: Case Studies in Hacking ……………………………… 336Chapter 20: Prologue ……………………………………………… 341Cool email from “Phantom” ……………………………………………… 345

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->