![Free-eBooks.net](/resources/img/logo-nfe.png)
![All New Design](/resources/img/allnew.png)
I make a few assumptions about you:-
• You’re familiar with basic computer-, networking related concepts and terms.
• You have a basic understanding of what hackers and malicious users do.
• You have access to a computer and a network on which to use these techniques.
• You have access to the Internet to obtain the various tools used in the ethical hacking process.
• You have permission to perform the hacking techniques described in this book.