
Ok, lets now talk about my "future" book little bit, i hope by writing it in here, i would gain some good feedback, at least boosting my spirit to finish it. Yesterday ive just finishing the first chapter (
i spent three days for writing 18 pages in chapter one), its about cookies manipulation for gaining administrator priveledge, its also well known bug from some application, so i think it wouldnt be so hard to understand the basic.
Now im working on second chapter, im planning to write about bluetooth hacking and gaining some credential from a mobile phone (
reading sms n phonebook also), after researching it in last year, i never touch it again (
after i lost my notebook, my mobile phone, and all my data) n now im planning to research it n put it on my second chapter. The idea its just showing all the configuration, application, writing some "bluetooth scripts" with perl, till the assessment steps. I hope i could finish it in a week, after finding some other device to support it.
Next chapter would be about wifi hack, Reverse engineering, BufferOverFlowing, another Web hacking thing, cryptography, creating a liveCD/remastering, ARP attack n defense, and else. If u have some topic that u think i need to wrote/put about it on my book (
a must to write), just leave a comment and let see if i could make one chapter about it ?
Wish me luck Pals,- ,
spoiler: in Indonesian language, level for newbie-advanced, Stealing the network series alike, has 8 chapters