Hi,
NO, I think that the "penetration testing with perl" book is completely bad written and with a lot of errors (both code and explanations are wrong some times ),
think that I started studying the network security using that book, after I've decided to study from Tanenbaum's book "Computer Networks" and this gave me the main idea about network protocols and networking, which is better than having a knoweledge about the ""hacking a WEP network"".
I am making a library repository about reverse engineering, wireless penetration test ( I am rewriting Lorcon2 ) and web penetration testing, my general idea would be more similar to a CTF group without the CTFs :)
Regards
Edoardo M
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.
|