On the third day of learning, I had not want to continue to learn, but think it is a day to adhere to.
A good result today, combing the knowledge of chapter 6, this is also easy to some of the previous foundation.
The third chapter is a passive search, mainly through public information
The fourth chapter is the active search, mainly grasp of foreign organizations that provide services and some information
The fifth chapter is a vulnerability scanner, it focuses on the use of NMAP and to OpenVAS vulnerability scanning
The sixth chapter is about the basic concepts buffer overflow was found in some of the concept is not very clear
Chapter VII is some of the concepts and methods of the following Windows buffer overflow exploit, very familiar with, is the focus of the next phase of
Chapter VIII are some of the concepts and methods of Linux following buffer overflow exploits, very familiar with, it is the focus of the next phase of
From this point of view carding six chapters, after a stage may be subject-oriented learning, including knowledge-based learning is not clear, there is no need to learn along