lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 19 Mar 2008 13:56:03 -0500
From: reepex <reepex@...il.com>
To: "Petko D. Petkov" <pdp.gnucitizen@...glemail.com>, 
	full-disclosure@...ts.grok.org.uk
Subject: Re: agile hacking?

On Wed, Mar 19, 2008 at 6:08 AM, Petko D. Petkov <
pdp.gnucitizen@...glemail.com> wrote:

> you are the only one backing up troth, read on all comments..


 You are very dense. All the people posting bad about thoth have not seen
his work either. They are mindless sheep following your bad example. Have
you looked at his VMX slides yet?


> I don't bash people.


This made me laugh


> Comparing the Agile Hacking project with books such as "How to Own a
> Continent" (by FX, Paul Craig, Joe Grand, and Tim Mullen...), "How to
> Own the Box" (by Ryan Russell, Ido Dubrawsky, FX, and Joe Grand...),
> "How to Own a Shadow" (by Johnny Long, Tim Mullen, and Ryan
> Russell...), "The Art of Intrusion" (by Kevin D. Mitnick, and William
> L. Simon..) and the "Hacking Exposed" series (by some of the most
> recognized information security experts such as, but not only, Johnny
> Cache, Chris Davis, Stuart McClure, Joel Scambray, Andrew Vladimirov,
> Brian Hatch, David Endler...),


Listing the authors does not make a book good.  Have you read any of the
books? Hacking exposed is a collection of lame/outdated/fixed techniques
such as Ping of Death. Lets take a look at the table of contents for hacking
exposed edition 5.

Chapter 1: Footprinting ( lol )
Chapter 2: Scanning ( with no mention of how it works only tools )
Chapter 3: Enumeration
Chapter 4: "Hacking" Windows
Chapter 5: "Hacking" Unix

All these chapters do is tell you how to run a bunch of tools looking for
the first outdated service so that you can run a public exploit against it.
If you  want your book to be in the great line of kiddie manuscripts then
you are well on your way.

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ