... Kong’s goal is to make you smarter, not
to teach you how to write exploits or launch attacks.
You’ll learn how to maintain root access long after gain-
ing access to a computer, and how to hack FreeBSD. ... book concentrates on how to employ a technique,
rather than what to do with it.
Note that this book has nothing to do with exploit writing or how to gain
root access...
...
www.SanctumInc.com
Ethical Hacking Techniques to Audit and Secure Web-enabled Applications
As public and private organizations migrate more of their critical functions to the Internet,
criminals ... changing the form it is possible to put more characters into the parameter
causing the application to crash upon receiving the input. Of course, it is also possible to
cr...