On Wed, Mar 19, 2008 at 6:08 AM, Petko D. Petkov <
[EMAIL PROTECTED]> wrote:

> you are the only one backing up troth, read on all comments..


 You are very dense. All the people posting bad about thoth have not seen
his work either. They are mindless sheep following your bad example. Have
you looked at his VMX slides yet?


> I don't bash people.


This made me laugh


> Comparing the Agile Hacking project with books such as "How to Own a
> Continent" (by FX, Paul Craig, Joe Grand, and Tim Mullen...), "How to
> Own the Box" (by Ryan Russell, Ido Dubrawsky, FX, and Joe Grand...),
> "How to Own a Shadow" (by Johnny Long, Tim Mullen, and Ryan
> Russell...), "The Art of Intrusion" (by Kevin D. Mitnick, and William
> L. Simon..) and the "Hacking Exposed" series (by some of the most
> recognized information security experts such as, but not only, Johnny
> Cache, Chris Davis, Stuart McClure, Joel Scambray, Andrew Vladimirov,
> Brian Hatch, David Endler...),


Listing the authors does not make a book good.  Have you read any of the
books? Hacking exposed is a collection of lame/outdated/fixed techniques
such as Ping of Death. Lets take a look at the table of contents for hacking
exposed edition 5.

Chapter 1: Footprinting ( lol )
Chapter 2: Scanning ( with no mention of how it works only tools )
Chapter 3: Enumeration
Chapter 4: "Hacking" Windows
Chapter 5: "Hacking" Unix

All these chapters do is tell you how to run a bunch of tools looking for
the first outdated service so that you can run a public exploit against it.
If you  want your book to be in the great line of kiddie manuscripts then
you are well on your way.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to