Full Disclosure mailing list archives

Re: agile hacking?


From: reepex <reepex () gmail com>
Date: Wed, 19 Mar 2008 13:56:03 -0500

On Wed, Mar 19, 2008 at 6:08 AM, Petko D. Petkov <
pdp.gnucitizen () googlemail com> wrote:

you are the only one backing up troth, read on all comments..


 You are very dense. All the people posting bad about thoth have not seen
his work either. They are mindless sheep following your bad example. Have
you looked at his VMX slides yet?


I don't bash people.


This made me laugh


Comparing the Agile Hacking project with books such as "How to Own a
Continent" (by FX, Paul Craig, Joe Grand, and Tim Mullen...), "How to
Own the Box" (by Ryan Russell, Ido Dubrawsky, FX, and Joe Grand...),
"How to Own a Shadow" (by Johnny Long, Tim Mullen, and Ryan
Russell...), "The Art of Intrusion" (by Kevin D. Mitnick, and William
L. Simon..) and the "Hacking Exposed" series (by some of the most
recognized information security experts such as, but not only, Johnny
Cache, Chris Davis, Stuart McClure, Joel Scambray, Andrew Vladimirov,
Brian Hatch, David Endler...),


Listing the authors does not make a book good.  Have you read any of the
books? Hacking exposed is a collection of lame/outdated/fixed techniques
such as Ping of Death. Lets take a look at the table of contents for hacking
exposed edition 5.

Chapter 1: Footprinting ( lol )
Chapter 2: Scanning ( with no mention of how it works only tools )
Chapter 3: Enumeration
Chapter 4: "Hacking" Windows
Chapter 5: "Hacking" Unix

All these chapters do is tell you how to run a bunch of tools looking for
the first outdated service so that you can run a public exploit against it.
If you  want your book to be in the great line of kiddie manuscripts then
you are well on your way.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: