²é¿´: 1009  |  »Ø¸´: 12
µ±Ç°Ö÷ÌâÒѾ­´æµµ¡£

lw1966hhh

Ìú¸Ëľ³æ (ÖøÃûдÊÖ)

[½»Á÷] ¼ìË÷ÃØ¼®£¬ÓëÄã·ÖÏí£¡Hacker Highschool project

×Ðϸ¿´Ò»ÏÂÕâ±¾Ê飬»á¶ÔÄãµÄ¼ìË÷ÓÐÒæ£¬ÊéÖÐÉæ¼°µÄÍøÕ¾¡¢ÂÛ̳¸üÓÐÒæ£¡£¡
All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar.
The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused.

Table of Contents
Lesson 1: Being a Hacker
1.0 Introduction
1.1 Resources
1.1.1 Books
1.1.2 Magazines and Newspapers
1.1.3 Zines and Blogs
1.1.4 Forums and Mailing Lists
1.1.5 Newsgroups
1.1.6 Websites
1.1.7 Chat
1.1.8 P2P
1.2 Further Lessons
Lesson 2: Basic Commands in Linux and Windows
2.1. Introduction and Objectives
2.2. Requirements and Setup
2.2.1 Requirements
2.2.2 Setup
2.3. System Operation: WINDOWS
2.3.1 How to open an MS-DOS window
2.3.2 Commands and tools (Windows)
2.4. System Operations: Linux
2.4.1 How to open a console window
2.4.2 Commands and tools (Linux)
Lesson 3: Ports and Protocols
3.1 Introduction
3.2 Basic concepts of networks
3.2.1 Devices
3.2.2 Topologies
3.3 TCP/IP model
3.3.1 Introduction
3.3.2 Layers
3.3.2.1 Application
3.3.2.2 Transport
3.3.2.3 Internet
3.3.2.4 Network Access
3.3.3 Protocols
3.3.3.1 Application layer protocols
3.3.3.2 Transport layer Protocols
3.3.3.3 Internet layer Protocols
3.3.4 IP Addresses
3.3.5 PortsTABLE OF CONTENTS AND GLOSSARY
3.3.6 Encapsulation
Lesson 4: Services and Connections
4.0 Introduction
4.1 Services
4.1.1 HTTP and The Web
4.1.2 E-Mail ¨C POP and SMTP
4.1.3 IRC
4.1.4 FTP
4.1.5 Telnet and SSH
4.1.6 DNS
4.1.7 DHCP
4.2 Connections
4.2.1 ISPs
4.2.2 Plain Old Telephone Service
4.2.3 DSL
4.2.4 Cable Modems
Lesson 5: System Identification
5.0 Introduction
5.1 Identifying a Server
5.1.1 Identifying the Owner of a domain
5.1.2 Identifying the IP address of a domain
5.2 Identifying Services
5.2.1 Ping and TraceRoute
5.2.2 Banner Grabbing
5.2.3 Identifying Services from Ports and Protocols
5.3 System Fingerprinting
5.3.1 Scanning Remote Computers
Lesson 6: Malware
6.0 Introduction
6.1 Viruses (Virii)
6.1.1 Introduction
6.1.2 Description
6.1.2.1 Boot Sector Viruses
6.1.2.2 The Executable File Virus
6.1.2.3 The Terminate and Stay Resident (TSR) Virus
6.1.2.4 The Polymorphic Virus
6.1.2.5 The Macro Virus
6.2 Worms
6.2.1 Introduction
6.2.2 Description
6.3 Trojans and Spyware
6.3.1 Introduction
6.3.2 Description
6.4 Rootkits and Backdoors
6.4.1 IntroductionTABLE OF CONTENTS AND GLOSSARY
6.4.2 Description
6.5 Logicbombs and Timebombs
6.5.1 Introduction
6.5.2 Description
6.6 Countermeasures
6.6.1 Introduction
6.6.2 Anti-Virus
6.6.3 NIDS
6.6.4 HIDS
6.6.5 Firewalls
6.6.6 Sandboxes
6.7 Good Safety Advice
Lesson 7: Attack Analysis
7.0 Introduction
7.1 Netstat and Host Application Firewalls
7.1.1 Netstat
7.1.2 Firewalls
7.2 Packet Sniffers
7.2.1 Sniffing
7.2.2 Decoding Network Traffic
7.2.3 Sniffing Other Computers
7.2.4 Intrusion Detection Systems
7.3 Honeypots and Honeynets
7.3.1 Types of Honeypots
7.3.2 Building a Honeypot
Lesson 8: Digital Forensics
8.0 Introduction
8.1 Forensic Principals
8.1.0 Introduction
8.1.1 Avoid Contaminiation
8.1.2 Act Methodically
8.1.3 Chain of Evidence
8.1.4 Conclusion
8.2 Stand-alone Forensics
8.2.0 Introduction
8.2.1 Hard Drive and Storage Media Basics
8.2.2 Encryption, Decryption and File Formats
8.2.3 Finding a Needle in a Haystack
8.2.3.1 find
8.2.3.2 grep
8.2.3.3 strings
8.2.3.4 awk
8.2.3.5 The Pipe ¡°|¡±
8.2.4 Making use of other sources
8.3 Network Forensics
8.3.0 Introduction
8.3.1 Firewall LogsTABLE OF CONTENTS AND GLOSSARY
8.3.2 Mail Headers
Lesson 9: Email Security
9.0 Introduction
9.1 How E-mail Works
9.1.1 E-mail Accounts
9.1.2 POP and SMTP
9.1.3 Web Mail
9.2 Safe E-mail Usage Part 1: Receiving
9.2.1 Spam, Phishing and Fraud
9.2.2 HTML E-Mail
9.2.3 Attachment Security
9.2.4 Forged headers
9.3 Safe E-mail Usage Part 2: Sending
9.3.1 Digital Certificates
9.3.2 Digital Signatures
9.3.3 Getting a certificate
9.3.4 Encryption
9.3.5 How does it work?
9.3.6 Decryption
9.3.7 Is Encryption Unbreakable?
9.4 Connection Security
Lesson 10: Web Security
10.1 Fundamentals of Web Security
10.1.1 How the web really works
10.1.2 Rattling the Locks
10.1.3 Looking through Tinted Windows - SSL
10.1.4 Having someone else do it for you ¨C Proxies
10.2 Web Vulnerabilities
10.2.1 Scripting Languages
10.2.2 Top Ten Most Critical Web Application Vulnerabilities
10.2.3 Security Guidelines for Building Secure Web Applications
10.3 HTML Basics ¨C A brief introduction
10.3.1 Reading HTML
10.3.2 Viewing HTML at its Source
10.3.3 Links
10.3.4 Proxy methods for Web Application Manipulation
10.4 Protecting your server
10.4.1 Firewall
10.4.2 Intrusion Detection System (IDS)
10.5 Secure Communications
10.5.1 Privacy and Confidentiality
10.5.2 Knowing if you are communicating securely
10.6 Methods of Verification
10.6.1 OSSTMM
10.6.2 OWASPPLETE TABLE OF CONTENTS AND GLOSSARY
Lesson 11: Passwords
11.0 Introduction
11.1 Types of Passwords
11.1.1 Strings of Characters
11.1.2 Strings of Characters plus a token
11.1.3 Biometric Passwords
11.2 History of Passwords
11.3 Build a Strong Password
11.4 Password Encryption
11.5 Password Cracking (Password Recovery)
11.6 Protection from Password Cracking
Lesson 12: Legalities and Ethics
12.1. Introduction
12.2. Foreign crimes versus local rights
12.3. Crimes related to the TICs
12.4. Prevention of Crimes and Technologies of double use
12.4.1. The global systems of monitoring: concept "COMINT"
12.4.2. "ECHELON" System
12.4.3. The "CARNIVORE" system
12.5. Ethical Hacking
12.6. The 10 most common internet frauds

ÏÂÔØºó£¬±ðÍüÁËÖ§³Ö¶¥Ò»¸öÈö£¡

[ Last edited by lw1966hhh on 2006-8-13 at 18:28 ]
»Ø¸´´ËÂ¥

» ²ÂÄãϲ»¶

Ò»ÍùÎÞǰ
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

ÄæË®ÐÐÖÛ10

ľ³æ (Ö°Òµ×÷¼Ò)

1

great!thank you!!
2Â¥2006-08-13 23:51:39
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

songzg

Ìú¸Ëľ³æ (ÖªÃû×÷¼Ò)

Ì«¼«³æ

0.5

good!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!11good!!!!!
3Â¥2006-08-14 07:50:38
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

bluesnow

4Â¥2007-01-29 00:41:46
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

izon90

¶àл·ÖÏí¡£
5Â¥2007-02-03 01:56:45
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

yin740606

ÖÁ×ðľ³æ (ÖøÃûдÊÖ)

º£Äɰٴ¨£¬ÓÐÈÝÄË´ó¡£±ÚÁ¢Ç§Øð£¬ÎÞÓûÔò¸Õ¡£
6Â¥2007-02-03 08:07:11
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

iahnil

½ð³æ (СÓÐÃûÆø)

0.5

dingÏÈ,ÍíÉÏÔÚÀ´ÏÂ
7Â¥2007-02-03 13:46:08
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

catv2006

½ð³æ (СÓÐÃûÆø)

1

§Ý§Ý
8Â¥2007-02-06 15:20:33
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

1

9Â¥2007-02-07 08:10:17
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

qjleerui

ľ³æ (ÕýʽдÊÖ)

1


Let me try!!!
10Â¥2007-02-12 00:03:11
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ lw1966hhh µÄÖ÷Ìâ¸üÐÂ
×î¾ßÈËÆøÈÈÌûÍÆ¼ö [²é¿´È«²¿] ×÷Õß »Ø/¿´ ×îºó·¢±í
[¿¼²©] É격26Äê +4 °Ë6°Ë68 2026-03-19 4/200 2026-03-24 15:49 by СBenºÇºÇ
[¿¼ÑÐ] 307Çóµ÷¼Á +3 ÓàÒâÇä 2026-03-21 6/300 2026-03-24 15:03 by ÓàÒâÇä
[¿¼ÑÐ] 276Çóµ÷¼Á¡£ÓаëÄêµç³ØºÍ°ëÄê¸ß·Ö×Óʵϰ¾­Àú +9 ²ÄÁÏѧ257Çóµ÷¼Á 2026-03-23 10/500 2026-03-24 07:36 by wangy0907
[¿¼ÑÐ] 335Çóµ÷¼Á +4 yuyuÓî 2026-03-23 5/250 2026-03-23 23:49 by Txy@872106
[¿¼ÑÐ] 341Çóµ÷¼Á(Ò»Ö¾Ô¸ºþÄÏ´óѧ070300) +5 ·¬ÇÑÍ·--- 2026-03-22 6/300 2026-03-23 23:45 by Txy@872106
[¿¼ÑÐ] »¯Ñ§308·ÖÇóµ÷¼Á +3 ÄãºÃÃ÷ÌìÄãºÃ 2026-03-23 3/150 2026-03-23 20:11 by macy2011
[¿¼ÑÐ] 291 Çóµ÷¼Á +4 »¯¹¤2026½ì±ÏÒµÉ 2026-03-21 5/250 2026-03-23 16:46 by »¯¹¤2026½ì±ÏÒµÉ
[¿¼ÑÐ] Çóµ÷¼ÁԺУÐÅÏ¢ +6 CX 330 2026-03-21 6/300 2026-03-22 15:25 by ÎÞи¿É»÷111
[¿¼ÑÐ] 311Çóµ÷¼Á +3 26ÑÐ0 2026-03-20 3/150 2026-03-22 14:46 by ColorlessPI
[¿¼ÑÐ] ¿¼Ñе÷¼Á +4 À´ºÃÔËÀ´À´À´ 2026-03-21 4/200 2026-03-22 12:15 by ÐÇ¿ÕÐÇÔÂ
[¿¼ÑÐ] ²ÄÁÏÇóµ÷¼Á +5 @taotao 2026-03-21 5/250 2026-03-21 20:55 by lbsjt
[¿¼ÑÐ] Çóµ÷¼Á +4 ÒªºÃºÃÎÞÁÄ 2026-03-21 4/200 2026-03-21 18:57 by ѧԱ8dgXkO
[¿¼ÑÐ] 0805²ÄÁÏ320Çóµ÷¼Á +3 ÉÎïÓï 2026-03-20 3/150 2026-03-21 15:46 by Î޼ʵIJÝÔ­
[¿¼ÑÐ] Ò»Ö¾Ô¸»ªÖпƼ¼´óѧ£¬080502£¬354·ÖÇóµ÷¼Á +5 ÊØºòϦÑôCF 2026-03-18 5/250 2026-03-21 01:06 by JourneyLucky
[¿¼ÑÐ] 304Çóµ÷¼Á +7 ˾¿Õ. 2026-03-18 7/350 2026-03-20 23:08 by JourneyLucky
[¿¼ÑÐ] 288Çóµ÷¼Á +16 ÓÚº£º£º£º£ 2026-03-19 16/800 2026-03-20 22:28 by JourneyLucky
[¿¼ÑÐ] ²ÄÁÏѧÇóµ÷¼Á +4 Stella_Yao 2026-03-20 4/200 2026-03-20 20:28 by ms629
[¿¼ÑÐ] 261ÇóBÇøµ÷¼Á£¬¿ÆÑо­Àú·á¸» +3 Å£Ä̺Üæ 2026-03-20 4/200 2026-03-20 19:34 by JourneyLucky
[¿¼ÑÐ] ÕÐÊÕµ÷¼Á˶ʿ +4 lidianxing 2026-03-19 12/600 2026-03-20 12:25 by lidianxing
[¿¼ÑÐ] 320Çóµ÷¼Á0856 +3 ²»ÏëÆðÃû×Ö112 2026-03-19 3/150 2026-03-19 22:53 by ѧԱ8dgXkO
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û