This series of papers will take an in-depth look at how someone may target and electronically break into an organisation. The second phase can be generically summed up as ‘Scanning’Covered in this paper:War Driving, War Dialling, Network Mapping, Port Scanning
read more | digg story
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment