Part 1 Finding the juicy targets: footprinting; scanning; enumerating. Part 2 System hacking: NT; Novell; Unix; AS/400; Windows 95/98. Part 3 Network hacking: devices; firewalls; RAS; denial of service and hijacking. Part 4 Application hacking: mail servers; databases; web servers; backdoors. Part 5 Telecom hacking: dialup modems; PBX; voice mail. Part 6 Extranet hacking: ISP and partnership security; e-commerce security; VPN security; appendices - ports listing, links and resources, tools.