Hacking Exposed 5th Edition

Chapter 6: Remote Connectivity and VoIP Hacking

Code Listing 6-1A: An example of what appears to the first domain, which could change if the correct user ID is input
Code Listing 6-1B: An example showing the change once the correct user ID is entered
Code Listing 6-2: An example of a true first domain
Code Listing 6-3: An example of a true second domain
Code Listing 6-4: A sample QBASIC program (called 5551235.BAS)
Code Listing 6-5: A sample third domain target
Code Listing 6-6: A sample QBASIC program (called 5551235.BAS)
Code Listing 6-7: A sample fourth domain target
Code Listing 6-8: A sample QBASIC program (called 5551235.BAS)
Code Listing 6-9: Simple voicemail hacking script in Procomm Plus ASPECT language

Категории