Jump to content

mihnutzu

Members
  • Posts

    41
  • Joined

  • Last visited

    Never

Everything posted by mihnutzu

  1. AIO Wireless Hack Toolz Kismet-2005-08-R NetStumbler-0.4.0 Wellenreiter-v1.9 WEPcrack 0.1.0 airsnort-0.2.7e wepwedgie-0.1.0-alpha Hotspotter-0.4 Advanced Bash-Scripting Guide Bash Guide for Beginners The Linux Network Administrator's Guide, Second Edition DOWNLOAD : http://rapidshare.de/files/25865593/AIO_Wi..._Hack_Toolz.rar
  2. Called “a bold, unsparing tour of information that never swerves from the practical,” this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one. 1. Know the Laws of Security Review the authors’ guidelines for discovering security problems when reviewing or designing a system. 2. Learn the Seven Categories of Attack See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you! 3. Prevent Diffing See how the comparison of a program, library, or file before and after some action can affect your network data. 4. Learn about Standard Cryptographic Algorithms See how secure your encrypted files and passwords really are. 5. Understand Format String Vulnerabilities Learn about one of the newest additions to the hacker’s bag of tricks. 6. Read About Session Hijacking Types Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. 7. Understand the Strategic Constraints of Tunnel Design Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH. 8. Hack Proof Your Hardware Design products with tamper mechanisms: resistance, evidence, detection, and response. 9. Download a Free Sniffer from the Book’s Web Site Access the Hack Proofing Web site for complete source code and Carnivore Source Code. DOWNLOAD : Part 1 : http://rapidshare.de/files/26789228/Hack_P...ition.part1.rar Part 2 : http://rapidshare.de/files/26789338/Hack_P...ition.part2.rar Part 3 : http://rapidshare.de/files/26789739/Hack_P...ition.part3.rar Part 4 : http://rapidshare.de/files/26789952/Hack_P...ition.part4.rar Part 5 : http://rapidshare.de/files/26790254/Hack_P...ition.part5.rar Part 6 : http://rapidshare.de/files/26790304/Hack_P...ition.part6.rar
  3. This is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn how to break into someone else’s system as well, and therein lies much of the controversy surrounding hacking.Who Should Read This Book? You should read this book if you work in the information security field, or have an interest in that field. You should have a pretty good idea of how to use a computer, and ideally have some experience installing an operating system, and various application programs. You should be an Internet user. The material is aimed at mid to advanced level, but we do our best to provide some of the basics for beginners. If you’re a beginning information security student, you may struggle a bit with some of the material, but it is all understandable if you spend the effort. There are some beginner techniques taught, such as diffing, which will serve the learner through all levels of skill. DOWNLOAD : http://rapidshare.de/files/28731487/h_p_yo...trade_craft.rar
  4. If you’re like most people, your day includes writing checks or using a debit card at stores, using credit cards at the gas station, or using an ATM terminal to get cash. If you’re among the growing numbers of Internet users, you’ve probably also bought a thing or two online, and might even do your banking or trade stocks online. If more than half of the following statements are true, you are at high risk for identity theft: - You receive at least one loan solicitation or preapproved credit offer each week. - You usually toss preapproved credit or loan solicitations in the trash without shredding. - You usually toss old banking or credit documents in the trash without shredding. - Mail is delivered to you in an unlocked mailbox. - You send mail by placing it in an unlocked mailbox. - You carry your Social Security or Social Insurance card in your wallet. - Your Social Security Number is printed on the health insurance card in your wallet. - Your Social Security Number is printed on your driver’s license. - Your Social Security or driver’s license number is printed on your personal checks. - You make occasional or frequent purchases online using a credit card. - You seldom check whether a site is “secure” before using a credit card to make an online purchase or before disclosing private data, such as your Social Security Number, to a Web site. - You seldom read Web site privacy policies before disclosing private information. DOWNLOAD : http://rapidshare.de/files/28861307/ha_pr_..._in_the_i_a.rar
  5. TABLE OF CONTENT: Chapter 01 Understanding Communication Protocols Chapter 02 NetWare and NetBIOS Technology Chapter 03 Understanding Communication Mediums Chapter 04 Well-Known Ports and Their Services Chapter 05 Discovery and Scanning Techniques Chapter 06 The Hacker’s Technology Handbook Chapter 07 Hacker Coding Fundamentals Chapter 08 Port, Socket, and Service Vulnerability Penetrations Chapter 09 Gateways and Routers and Internet Server Daemons Chapter 10 Operating Systems Chapter 11 Proxies and Firewalls Chapter 12 TigerSuite: The Complete Internetworking Security Toolbox DOWNLOAD : http://rapidshare.de/files/28860930/ha_ck_...k_reveal_ed.rar
  6. Hacker fara engleza nu prea am vazut...
  7. Desi nu prezinta moduri de a hackui prezinta moduri de a manipula persoane cu scopul de a obtine informatii si bunuri. DOWNLOAD : http://blog.3design.ro/Hack/Kevin%20Mitnic...20deception.pdf PS: Sper ca am postat unde trebuie
  8. Merge perfect... desi degeaba daca nu iti da parola
×
×
  • Create New...