List of Code Listings

Chapter 6: Remote Connectivity and VoIP Hacking

Code Listing 6-1A: An example of what appears to the first domain, which could change if the correct user ID is input
Code Listing 6-1B: An example showing the change once the correct user ID is entered
Code Listing 6-2: An example of a true first domain
Code Listing 6-3: An example of a true second domain
Code Listing 6-4: A sample QBASIC program (called 5551235.BAS)
Code Listing 6-5: A sample third domain target
Code Listing 6-6: A sample QBASIC program (called 5551235.BAS)
Code Listing 6-7: A sample fourth domain target
Code Listing 6-8: A sample QBASIC program (called 5551235.BAS)
Code Listing 6-9: Simple voicemail hacking script in Procomm Plus ASPECT language


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net