It seems to me that ethical hacker would also be know as white hat hacker, as opposed to black hat hacker. Forensics would, I believe refer to data recovery, often in cases where the hardware, hardware abstraction layer or software becomes defunct, (Highly Technical Term) or has been hacked. I think forensics can also refer to finding out who the hacker is. Which was the purpose of Satan: http://en.wikipedia.org/wiki/Security_Administrator_Tool_for_Analyzing_Networks
Steve Gibson, author of spinRite has an audio collection of security issues. Although much of it you will already be familiar with, some of it, I'm sure, you will find very informative. Steve often explains, in general terms, how hackers access control of a computer through various types vulnerabilities. Also he discusses in general many of the vulnerabilities that have been discovered over time, currently and many solutions. Also he often discusses windows vulnerabilities which you may or may not be interested in understanding, but often linux SysAdmins have to deal with windows problems. http://www.grc.com/securitynow.htm Keep in mind that all security vulnerabilities are based on about 50 to 60 basic types of vulnerabilities that exist in computer architecture. Attempts have been made by hardware developers to address some of these problems, such as buffer overruns, but I don't know how successful they have been. What happens is that when programmers write Operating systems or Application programs, the vulnerabilities get written into the code. Go to the hacker sites, you know the ones from Russia and such, and get the hacker tools that they sell the second Tuesday of the month. (because that is when Microsoft releases their security patches) You can then test out their hacker tools, (on your own personal box and you may be able to discover what they are doing. Or read on their websites about what they claim to be selling. That may seem extremely difficult, but that's how the hacker in Russia, and/or other eastern European countries do it. They get the binary code from the Microsoft patches, and they have their hacker packages ready to sell the same day. Also you can look at the patches which Microsoft is releasing on the second Tuesday of the month (And I don't mean the code, because do not believe it is open source, it will just be binary I think) but if you look at what programs the patches are for, and see what Microsoft publishes about the vulnerability they are addressing (that is if Microsoft does publish release notes on the patches) then that will help you understand current real world vulnerabilities. If you open it in an assembler, you can see the hexadecimal. You can compare the hexadecimal of the Microsoft patch with the hexadecimal of the hacker tool, and you may be able to find some clues about what they are doing. Here is a website that may be able to help you decipher the hexadecimal to some point: http://mirror.href.com/thestarman/asm/mbr/Win2kmbr.htm There are other sites like it, and this page probably has some good links that if you follow, you will be able to learn a lot. I'm pretty sure that reading the hex is one of the techniques that the Eastern Europeans use to find vulnerabilities. I'm also pretty sure that when those 50 to 60 types of basic computer vulnerabilities are written into the code, hackers are able to identify them in the hexadecimal. Just a little insight from my own personal research on "ethical hacking." Paul On Tue, Feb 22, 2011 at 12:00 AM, Mark Holmquist <marktrac...@gmail.com> wrote: >> Any advice on resources and reading materials videos or applications on >> ethical hacking? I am trying to avoid a $4,000.00 class in some other city >> to learn. > > http://www.catb.org/~esr/faqs/hacker-howto.html#what_is > > Start by knowing your terminology--you mean "cracking," probably. Practically > all hacking is ethical. > > -- > Mark Holmquist > Student, Computer Science > University of Redlands > marktrac...@gmail.com > _______________________________________________ > LinuxUsers mailing list > LinuxUsers@socallinux.org > http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers > _______________________________________________ LinuxUsers mailing list LinuxUsers@socallinux.org http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers