- How to identify the different types of hackers
- How to identify the different kinds of malicious programs
- How to compile, decompile, and corrupt codes
- How to attack buffer overflows
- Using the Metasploit framework
- Installing virtual machines on your computer
- How to find the vulnerabilities of your targets
- And much much more!
- How to identify the different types of hackers
- How to identify the different kinds of malicious programs
- How to compile, decompile, and corrupt codes
- How to attack buffer overflows
- Using the Metasploit framework
- Installing virtual machines on your computer
- How to find the vulnerabilities of your targets
- And much much more!
Paperback
$13.34