Just got my hands on this book. To be honest I’m surprised a book like this took so long to make it to print. As a Linux user I chain commands together through something called bash scripting. So why wouldn’t crackers be doing the same thing. Lets be realistic, most crackers are automating their attacks and they’ve been doing this for a long time. So isn’t chaining various attacks together just good sense? I mean from the perspective of the bad guys.
Check out the Amazon reviews