Security Basics mailing list archives

Re: learning ethical hacking


From: "Mike" <securitybasics () infinity77 net>
Date: Wed, 22 Sep 2004 16:20:48 -0400

Thanks for the reply about the learnkey series. I didn't even know about the
hacking web applications book but I'll be jumping on amazon and checking
that out soon. I loved hacking exposed, good book i found to be very
informative.

Mike

----- Original Message ----- 
From: "Chris Griffin" <cgriffin () dcmindiana com>
To: "Mike" <securitybasics () infinity77 net>
Cc: "security basics" <security-basics () securityfocus com>
Sent: Wednesday, September 22, 2004 2:49 PM
Subject: Re: learning ethical hacking


Mike,
I just got the learnkey "hacking revealed" kit last week.
I am just an info sec officer, not a pen tester, and I felt the CDs were
a little to basic,
I think it would be good for a beginner, a sys admin, or someone that
wants to protect their network, but I already knew alot of what was on
the CDs just from stuff on the web, and the hacking web applications
book by the people that put out hacking exposed.
on another note, just my 2 cents, the hacking web applications book is
priceless, i learned a great deal from it.

Chris


Mike wrote:

While we're on the topic of learning ethical hacking. I thought I point
out
the "Hacking Revealed" series from LearnkKey. I haven't had time to check
it
out yet but plan on getting around to it soon. I have heard no reviews of
it
yet, if anyone has checked it out already I'd love to hear from you.

Mike

----- Original Message ----- 
From: "Eddie Adlfs" <tsmayhem () gmail com>
To: <tech.louie () verizon net>
Cc: <karora () opsource net>; "D K" <dwarkeeper () gmail com>; "linux user"
<linuxteam () gmail com>; <security-basics () securityfocus com>
Sent: Monday, September 13, 2004 6:38 AM
Subject: Re: learning ethical hacking




If you really want to get into systems and try som real exploiting + a
wad of tricky levels I'd like to suggest http:///www.dievo.org/ which
once was wargames.unix.se


On Thu, 9 Sep 2004 08:45:08 -0700, Louie <tech.louie () verizon net> wrote:


Hey well any info on this topic with book or does anyone have any pdf
files or something to start with?


-----Original Message-----
From: karora () opsource net [mailto:karora () opsource net]
Sent: Wednesday, September 08, 2004 9:21 PM
To: D K
Cc: tech.louie () verizon net; linux user;
security-basics () securityfocus com
Subject: Re: learning ethical hacking

Could you suggest a few books, Websites...??

It'll be great help
Thanks
Kapil




Get your hands on hacking exposed books u should be able to do well
with that. Or if you can take some of the foundstone ultimate hacking
courses they will give u a good insight.




On Sat, 4 Sep 2004 08:20:15 -0700, Louie <tech.louie () verizon net>
wrote:


Did you ever find the site you were looking for? I'm also thinking
about security but most people tell me to learn how to hack first
then get into security...

Louie

-----Original Message-----
From: linux user [mailto:linuxteam () gmail com]
Sent: Tuesday, August 31, 2004 1:14 AM
To: security-basics () securityfocus com
Subject: learning ethical hacking

Hi All,

Could you please let me know where should i start learning about
network, and web security, I   have been using linux mainly for
several years, windows for a couple of years, and solaris from time
to time, I would like to consolidate  my knoweldge regarding the
above operatings system through a deep exopsure to security. i am
thinking of books, mailing lists, and training courses, i also
stumbled once on a hacker group that would let you joing if you solve


a puzzle, some kind of message encryption, but i do not remmber the
site any more, the main objective is secure a career in network
security.

TIA

ant ant

---------------------------------------------------------------------
---
---
Computer Forensics Training at the InfoSec Institute. All of our


class


sizes are guaranteed to be 12 students or less to facilitate


one-on-one


interaction with one of our expert instructors. Gain the in-demand
skills of a certified computer examiner, learn to recover trace data
left behind by fraud, theft, and cybercrime perpetrators. Discover


the


source of computer crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.h
tml




------------------------------------------------------------------------


----

---------------------------------------------------------------------
------
Computer Forensics Training at the InfoSec Institute. All of our


class


sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand
skills of
a certified computer examiner, learn to recover trace data left


behind


by
fraud, theft, and cybercrime perpetrators. Discover the source of
computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.h
tml



-----------------------------------------------------------------------
-
----




----------------------------------------------------------------------
-----
Computer Forensics Training at the InfoSec Institute. All of our class
sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand


skills


of
a certified computer examiner, learn to recover trace data left behind


by


fraud, theft, and cybercrime perpetrators. Discover the source of


computer


crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.ht
ml




------------------------------------------------------------------------
----









--------------------------------------------------------------------------


-


Computer Forensics Training at the InfoSec Institute. All of our class


sizes


are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand


skills of


a certified computer examiner, learn to recover trace data left behind


by


fraud, theft, and cybercrime perpetrators. Discover the source of


computer


crime and abuse so that it never happens again.


http://www.infosecinstitute.com/courses/computer_forensics_training.html



--------------------------------------------------------------------------


--





-- 
Eddie
-----------------------------------------------------------------------
All e-mails sent to me is subject to de-html'izing
-----------------------------------------------------------------------


--------------------------------------------------------------------------


-


Computer Forensics Training at the InfoSec Institute. All of our class


sizes


are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand
skills


of


a certified computer examiner, learn to recover trace data left behind
by
fraud, theft, and cybercrime perpetrators. Discover the source of
computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html

--------------------------------------------------------------------------


--










---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class
sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills
of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of
computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html

---------------------------------------------------------------------------
-









---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: