|
|
Line 1: |
Line 1: |
| {{cleanup}} | | {{cleanup}} |
| | | |
− | = Misconceptions =
| + | We need serious [[help]] with this wiki. Please join our [[IRC]] in #wiki and help us fix this up! |
| | | |
− | The common misconception about computer security related problems in today's age is that the [[Hackers]] are the ones responsible for [[Security]] holes. This should in fact be corrected, for dangerous [[security]] holes would not exist if it were not for the [[programmer]] of the vulnerable application creating a weakness that could be exploited. Usually the [[programmer]] does this by accident out of lack of care or out of ignorance, or even perhaps just a simple place where he or she "missed a spot".
| + | [http://www.blackhatacademy.org/security101/index.php?title=Special:AllPages All Pages] is a good place to start! |
− | | + | |
− | Many times vulnerabilities are also the result of [[Network Administrators]], either for configuring a system with a configuration that is known to be insecure, for installing [[vulnerability|vulnerable]] [[applications]] themselves, or for ignorance and/or laziness. When systems go [[un-patched]], they become more and more [[vulnerability|vulnerable]]. This is also the Administrator's fault. Sometimes, in fact, administrators are tricked into giving away a [[password]] by a phone call from the remote attacker himself, which introduces [[Social Engineering]].
| + | |
− | | + | |
− | = Preface =
| + | |
− | | + | |
− | This assumes that you have a basic understanding of most generic [[MS-DOS]]. A quick reference of commands can be found here; however typing the command name with -help after the command may [[help]] you a bit more. This also assumes that you have a basic understanding of [[MS-DOS]], [[FTP]], [[HTTP]], [[MSSQL]], [[NetBIOS]], and mmc.exe, see all attached links for references.
| + | |
− | | + | |
− | Most of the code within [http://www.blackhatacademy.org Security 101] will not actually work. It has been abridged for readability as well as optimal learning speed.
| + | |
− | | + | |
− | [[Buffer Overflows]]
| + | |
− | | + | |
− | [[Cryptography]]
| + | |
− | | + | |
− | [[Social Engineering]]
| + | |
− | | + | |
− | [[Fuzzing]]
| + | |
− | | + | |
− | [[Network Security]]
| + | |
− | | + | |
− | [[Web Exploitation]]
| + | |
− | | + | |
− | [[Design Flaws]]
| + | |
− | | + | |
− | [[Wireless Security]]
| + | |
− | | + | |
− | [[Physical Security]]
| + | |
Revision as of 21:56, 4 September 2011
This article needs to be cleaned up, rewritten, updated or removed.
We need serious help with this wiki. Please join our IRC in #wiki and help us fix this up!
All Pages is a good place to start!