No Root for You
A BOOK! Leetupload.com is proud to present the publication of a new book, written by the founder/developer of this site. The book, as seen above, is entitled "No Root for You: A Series of Tutorials, Rants and Raves, and Other Random Nuances Therein." The book is about network auditing, consisting of a step-by-step tutorial guide explaining how one would go about auditing, securing, and learning why certain exploits work, etc. It is available now! Click here!
Below you will find a copy of the exact table of contents, number of pages, and other assortment of goodies!
Actual Back of the Book - Summary of What this is, and what it is not...
As I have noticed over the years, direct spoon-fed information on anything that involves network auditing or anything of the sort has been rather scarce these days. This is why my book has spawned in such a form that resolves this issue. The idea is to prove that such tasks may be explained in an articulate manner, while still maintaining a proper rapport with the individual. People tend to speak in lofty tongue when they have a superiority complex. I negate this completely by drawing back the verbal curtain and cut straight to the point. This is done by speaking in layman's terms while still maintaining proper terminology when absolutely necessary, and explain such thoughts in metaphor to explain the idea in a more descriptive form. As you may have guessed, this is a network auditor's quick reference bible. Not only does it contain step by step illustrated tutorials, but an explanation in regards to why each exploitation or what have you works, and how to defend against such attacks. Be prepared, one might also discover a few rants and raves, as well as a few other random nuances therein.
Stats
416 pgs
37 topics
Price: $22.99
Table of Contents
The Legend VII
Preface IX
General
Reference Page and Requirements 1
Words of Wisdom: Reason for Pursuing Security 18
Spoon-fed Hacking Series
How to Crack WEP 21
Romancing the Victim 34
Gas Lighting is Always a Good Thrill 40
Wireless
Campus Warwalking 45
Applications
Useful Software 55
Operating System
Installing OSX Tiger and Ubuntu onto a PC 60
Installing OSX Leopard onto a PC 83
Art of Spoofing
Technical Practical Jokes are a Real Hoot 105
I Send Your E-mail 113
PHP Exploitation
Remote and Local File Inclusion Explained 120
Miscellaneous Exploitation Methods
Compilation of Exploitation Random ?Goodies 144
Windows Hacking
NetBIOS Hacking 175
Cracking
MD5 181
Live by Example
Real-Life Social Engineering 184
Hypothetical Scenario – Real-Life Exploitation 198
Code Injection
Cross-Site Scripting (XSS) 213
SQL Injection 226
XPATH Injection 239
CRLF Injection 244
Cross Site Request Forgery Injection 252
Two-Faced Programs
Honey Pots 259
Cracking: Part 2
Brute Forcing 264
WPA Cracking 268
Compiling
Compiling Exploits – Windows Style 272
Writing Exploits 276
Bluetooth
Bluetooth Hacking 288
Gotchya!
How Not to Get Caught 297
Hardware ModificationsComputer Modification #1 304
Computer Modification #2 315
Microprocessor 322
Rants and Raves
Digital Rights Management 342
A Series of Uncut Rants and Raves 350