17933180-Hack-Faq

Page 2

1. General FAQ Info 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8

How do I add to this FAQ? How was this FAQ prepared? Is this FAQ available by anonymous FTP or WWW? What is the mission and goal of the FAQ? Where is the disclaimer? Contributions (and thanks to...) Other credits... Changelog

2. Attack Basics 2.1 What are the four steps to hacking? 3. Account Basics 3.1 What are accounts? 3.2 What are groups? 4. Password Basics 4.1 4.2 4.3 4.4 4.5 4.6 4.7

What are some password basics? Why protect the hashes? What is a "dictionary" password cracker? What is a "brute force" password cracker? Which method is best for cracking? What is a "salt"? What are the "dangers" of cracking passwords?

5. Denial of Service Basics 5.1 5.2 5.3 5.4

What What What What

is "Denial of Service"? is the Ping of Death? is a SYN Flood attack? are other popular Denial of Service attacks?

6. Misc Info 6.1 6.2 6.3 6.4 6.5

What is a "backdoor"? Why do I care about auditing, accounting, and logging? What are some different logging techniques used by Admins? Why should I not just delete the log files? What is a buffer overflow?

7. NT Basics 7.1 What are the components of NT security? 7.2 How does the authentication of a user actually work? 7.3 What is "standalone" vs. "workgroup" vs. "domain"?


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.