Legal Stuff

I must provide a legal warning at this point. Throughout this book, we are going to cover several techniques that can be used to break into sites. My intention in providing this information is for you to learn about the tools for protecting sites, but they can still be used against a company. The techniques and tools described in this book should be used only in an authorized manner, and you should always get permission from superiors before running these tools. Even if you are a network administrator, always get authorization before running these tools, because as you will see throughout this chapter, these tools can have adverse side effects. Just remember, unauthorized access is bad, authorized access is good. Also, I am not a ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.