Home page logo

metasploit logo Metasploit mailing list archives

hack technics
From: gangstified at gmail.com (lord maximus)
Date: Mon, 12 Feb 2007 06:29:05 -0600

well to start it off... Hacking in my own opinion, is a state of mind....

I won't go into what exactly a hacker main focuses are, but they should be
to get in any way possible, leaving no footprint or logs. So thinking using
the state of mind factor, you could say if one think doesn't work (like
subverting windows 2003 SP1 kernel integrity protection", you'd find another
way todo the same thing, or some other way into a machine in a given attack.

It also depends if your talking live hacking of a machine, or hacking of

On 2/12/07, Omid Tavakoli <omid.zs at gmail.com> wrote:

Dear mailing list members ,

This is a Network Security specialist (Penetration Testing Asset) who has
been working on the latest methods of the penetration testing; as part of my
research I have some questions and I would be very thankful if you would
help me find the answers.

I believe in order to provide the required level of security for any
application, network or operating system, we need to look at it from the
hacker's point of view because they have been always one step ahead of us. I
need to know what the hacker's main focuses are. For example, "Subverting
Windows 2003 SP1 Kernel Integrity protection"? or "defeating stack based
overflow prevention mechanism". What are the latest phishing methods? and

And in general, what is the direction of the hacking methods in the near


Omid Tavakolli

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070212/3ef37868/attachment.htm>

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]