Shellcoders Programming Uncovered (Uncovered series)
Chapter List
- Chapter 23: Bypassing Firewalls
- Chapter 24: Escaping through the Firewall
- Chapter 25: Organizing a Remote Shell Under UNIX and Windows NT
- Chapter 26: Hackerz Love Honey
- Chapter 27: Sniffing a LAN
- Chapter 28: Databases Under Attack
Part Overview
Perimeters of most corporate networks are protected by strictly configured firewalls, protecting internal users from one another and repelling hacking beginners and the crowd of militant kiddies. However, even a high-quality firewall expertly configured by an experienced administrator doesn't present a serious obstacle for experienced hackers.