||This details some of the default/factory shipped accounts
and/or passwords that feature in many applications, OS's and network
devices. I've also made a small password file that contains all of the
|Intelligence gathering pointers
||A list of useful intelligence sources for supporting a
system penetration exercise. Post collection analysis is described along
with some useful tools and techniques to maximise your results.
||An aging collection of texts, source code and binaries.