I do code in KORN, BASH, and PERL and automation is where I excel.

Thank you everyone There is a lot of good information here.


Adam Flaig
"Its never too late to become what you might have been"


On Tue, Feb 22, 2011 at 5:15 AM, Paul Saenz <forensicneoph...@gmail.com>wrote:

> It seems to me that ethical hacker would also be know as white hat
> hacker, as opposed to black hat hacker. Forensics would, I believe
> refer to data recovery, often in cases where the hardware, hardware
> abstraction layer or software becomes defunct, (Highly Technical Term)
> or has been hacked. I think forensics can also refer to finding out
> who the hacker is. Which was the purpose of Satan:
>
> http://en.wikipedia.org/wiki/Security_Administrator_Tool_for_Analyzing_Networks
>
> Steve Gibson, author of spinRite has an audio collection of security
> issues. Although much of it you will already be familiar with, some of
> it, I'm sure, you will find very informative. Steve often explains, in
> general terms, how hackers access control of a computer through
> various types vulnerabilities. Also he discusses in general many of
> the vulnerabilities that have been discovered over time, currently and
> many solutions. Also he often discusses windows vulnerabilities which
> you may or may not be interested in understanding, but often linux
> SysAdmins have to deal with windows problems.
>
> http://www.grc.com/securitynow.htm
>
> Keep in mind that all security vulnerabilities are based on about 50
> to 60 basic types of vulnerabilities that exist in computer
> architecture. Attempts have been made by hardware developers to
> address some of these problems, such as buffer overruns, but I don't
> know how successful they have been. What happens is that when
> programmers write Operating systems or Application programs, the
> vulnerabilities get written into the code.
>
> Go to the hacker sites, you know the ones from Russia and such, and
> get the hacker tools that they sell the second Tuesday of the month.
> (because that is when Microsoft releases their security patches) You
> can then test out their hacker tools, (on your own personal box and
> you may be able to discover what they are doing. Or read on their
> websites about what they claim to be selling. That may seem extremely
> difficult, but that's how the hacker in Russia, and/or other eastern
> European countries do it. They get the binary code from the Microsoft
> patches, and they have their hacker packages ready to sell the same
> day.
>
>  Also you can look at the patches which Microsoft is releasing on the
> second Tuesday of the month (And I don't mean the code, because do not
> believe it is open source, it will just be binary I think) but if you
> look at what programs the patches are for, and see what Microsoft
> publishes about the vulnerability they are addressing (that is if
> Microsoft does publish release notes on the patches) then that will
> help you understand current real world vulnerabilities. If you open it
> in an assembler, you can see the hexadecimal.
>
> You can compare the hexadecimal of the Microsoft patch with the
> hexadecimal of the hacker tool, and you may be able to find some clues
> about what they are doing.
>
> Here is a website that may be able to help you decipher the
> hexadecimal to some point:
>
> http://mirror.href.com/thestarman/asm/mbr/Win2kmbr.htm
>
> There are other sites like it, and this page probably has some good
> links that if you follow, you will be able to learn a lot. I'm pretty
> sure that reading the hex is one of the techniques that the Eastern
> Europeans use to find vulnerabilities. I'm also pretty sure that when
> those 50 to 60 types of basic computer vulnerabilities are written
> into the code, hackers are able to identify them in the hexadecimal.
>
> Just a little insight from my own personal research on "ethical hacking."
> Paul
>
>
>
>
>
> On Tue, Feb 22, 2011 at 12:00 AM, Mark Holmquist <marktrac...@gmail.com>
> wrote:
> >> Any advice on resources and reading materials videos or applications on
> >> ethical hacking?  I am trying to avoid a $4,000.00 class in some other
> city
> >> to learn.
> >
> > http://www.catb.org/~esr/faqs/hacker-howto.html#what_is
> >
> > Start by knowing your terminology--you mean "cracking," probably.
> Practically all hacking is ethical.
> >
> > --
> > Mark Holmquist
> > Student, Computer Science
> > University of Redlands
> > marktrac...@gmail.com
> > _______________________________________________
> > LinuxUsers mailing list
> > LinuxUsers@socallinux.org
> > http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers
> >
> _______________________________________________
> LinuxUsers mailing list
> LinuxUsers@socallinux.org
> http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers
>
_______________________________________________
LinuxUsers mailing list
LinuxUsers@socallinux.org
http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers

Reply via email to