Pages

Subscribe:

Selasa, 07 Agustus 2012

Ebook Hacking Cracking Collection 2012 Part 4


Hackers Underground Training 2011 (Ebook + Video)
English | 2010 | PDF + AVI | ISO | 1GB
Genre: eLearning
The Hacker?s Underground Training will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail.
How will the skills uncovered in this handbook affect me?
- You will learn all the hackers underground tricks and learn to apply them in real world situations.
- You will be put into a hackers mindset and learn to think like one.
- By Learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
- You will aquire knowledge nonexistant to 99.9% of the people in the world!
- This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.
CD1 Content
Session 1
# Understand the Purpose of the Course and the Phases of Hacking
# Acquire the Hardware and Software for Your Laboratory
# Build the Windows 2000/XP Hacker Tool Analysis Laboratory
# Build the Linux Hacker Tool Analysis Laboratory
# Test Your Laboratory and Keep It Secure
Session 2
# Understand Low-Tech and Computer-Based Reconnaissance
# Use Sam Spade to Gather Information About Target
# Search the Web for Interesting Target Information
Session 3
# Understand Scanning Techniques
# Search for Modems Using THC-Scan
# Develop a Network Map Using Cheops-ng
# Conduct a Port Scan Using Nmap
# Scan for Vulnerabilities Using Nessus
CD2 Content
Session 4
# Analyze Buffer Overflows
# Crack Passwords on Windows and Linux
# Sniff Data from the Network Using Sniffit
# Use Netcat, the Swiss Army Knife of Hacker Tools
Session 5
# Analyze an Application-Level Trojan Horse Backdoor (VNC)
# Analyze a Traditional RootKit (LRK4)
# Analyze a Kernel-Level RootKit (Kernel Intrusion System)
Session 6
# Understand File Hiding in Windows
# Understand File Hiding in UNIX
# Analyze Protocol Tunneling Using Reverse WWW Shell
# Analyze Covert Channels Using Covert-TCP
DOWNLOAD LINK
Password: Warez-home.net

0 Komentar:

SIlahkan Berkomentar dan Mematuhi Aturan-aturan Disini
* Silahkan Anda Komentar Sesuai Artikel Di Atas

* Gunakan Bahasa Yg Sopan, Baik, dan Tertib

* Jangan Menebar SPAM, FLOOD, FLAMING

* Hindari Dari Duplikat Komentar

* Dilarang memakai Kata-kata Kotor, Kasar