The second in a three-part series on hacking school. "I come in this morning expecting the second day to be much like the first: interesting, but not overly taxing. Boy, am I off base! This day is devoted to . . .
The second in a three-part series on hacking school. "I come in this morning expecting the second day to be much like the first: interesting, but not overly taxing. Boy, am I off base! This day is devoted to attacking NT machines, beginning with platform-specific variations on some of the assessment techniques we learned on Day One, and continuing through the process of gaining control and setting up the target to serve as a point for further attacks. We jump right in, examining and testing various techniques, and are quickly entwined in the technical minutiae of Windows networking: NetBIOS scanning, domain controller enumeration, null sessions.

Like the majority of my classmates, I'm aware of most of the techniques we're looking at but have not spent much time actually trying them out and seeing exactly what their strengths and limitations are. Moving all of that information from the back of the brain to the hands requires a surprising amount of focus and energy. Unfortunately, we have a lot of ground to cover and not much time, and Dane Skagen, our NT instructor, is determined to pack in as much as humanly possible."

The link for this article located at ZDNet is no longer available.