Kev

Forum Replies Created

Viewing 15 posts - 16 through 30 (of 412 total)
  • Author
    Posts
  • #28192
     Kev 
    Participant

    I thought one of the fundamental rules in all warfare is to “know your enemy”. Seems like we sometimes underestimate the cunning of people living in 3rd or 4th world countries. Thats a big mistake not only for the military but anyone involved in security.

  • #28136
     Kev 
    Participant

    Simple nmap scans are not illegal.  However, if you caused a server to crash you might be held responsible for damages.  Most ISPs look down on it and if you are caught scanning, will freeze your service until you give them a good explanation.  My ISP has a 3 times caught and you’re out policy. They have the right to refuse service to whomever they deem undesirable.  So while you probably wont have the FBI banging down your door, loosing your high speed internet connection would blow.

  • #27492
     Kev 
    Participant

    Thanks Don  😉

  • #27967
     Kev 
    Participant

    First class effort and with the exam process included, makes this one of the most complete reviews concerning a training program like this.

  • #27961
     Kev 
    Participant

    Hope everybody had a TG day and didnt eat too much!

  • #27919
     Kev 
    Participant

    @elena wrote:

    I keep you posted how my exam went 🙂

    Ok good luck and dont stress it.  Its really not too bad.

  • #27916
     Kev 
    Participant

    What are you afraid of, failure? That is not the spirit of a true hacker. As hackers we fail daily, but persist till we get in or decide its impossible. There is nothing wrong with failing a test one time and taking it over. How many times it took to pass the test will not be printed on the front of your cert. My thinking would be go ahead and take the test since its already set up and if you need to do it again, so what.

  • #27897
     Kev 
    Participant

    If all you got was the DNS for a you did something wrong. You can easily get the IP, and sometimes even the kind of Browser and OS of the average user. Well,unless he is going through some kind of proxy. One of the two most popular ways of getting an IP is as you mentioned and the other is to send a coded email that when opened returns an IP. Both techniques could be classified as social engineering or tricking the individual as you stated and are not fool proof. The personal information connected to an IP address are usually guarded by an ISP and usually are only given out with a court order.

  • #27783
     Kev 
    Participant

    I will definitely keep an eye out for it! 

  • #27754
     Kev 
    Participant

    Nice site Brian.

  • #26403
     Kev 
    Participant

    Nice !

  • #27534
     Kev 
    Participant

    I havent seen the latest edition but the last one I read was very weak and not worth the time or money. I hope 3.0 corrects this because there is increasing competition out there and some decent books.

  • #27197
     Kev 
    Participant

    @dalepearson wrote:

    Andrew nice review and thanks for taking the time.
    I guess what I am wondering, and not sure if its clear from the review is the following: Alot of the content you mention is available on the interubes, opensource goodness. Granted the book pulls it together but it is worth it for the security professional? I am kinda thinking not?

    I guess as you hint to, this book is for someone new coming to the field.

    Good review, not sure if I will be buying (perhaps I can borrow your copy, lol)

    What training program out there doesn’t include lots of open source  tools,etc… that you find easily on the net?  Its really about how the material is presented and made accessible to those new to the subject.  Good job on the review and thanks for the effort.

  • #27558
     Kev 
    Participant

    Who said writing open source doesn’t pay off in the long run?  I am willing to put money on it going the way of Nessus. 

  • #27578
     Kev 
    Participant

    The heorot.net forum has everything you need to walk through disk 1 including a complete walk through.  I recommend only going there after you have tried everything possible for at least a couple of weeks.  You wont learn much if you just look at the answers so try and resist the temptation.  You are on the right track so now focus on cracking passwords. Google everything you can on that subject. Also remember that some users take their own name and add a few things to it make a password so you might want to create a short password list of your own.

Viewing 15 posts - 16 through 30 (of 412 total)

Copyright ©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?