How to Hack Anthony Pell 1 min read Nov 23, 2004 This documentation discusses different phases of systems penetration techniques against Windows and Unix based systems. Prev: Analyzing your internet applications' log files Next: Analysis of Format String Bugs