Jump to content

CoD3

Members
  • Posts

    7
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

CoD3's Achievements

Newbie

Newbie (1/14)

11

Reputation

  1. -: Hackin9 :- This book will help you learn :- * How to use Google to find sources of personal information and other confidential data. * How to find information about vulnerable systems and Web services. * How to locate publicly available network devices using Google. Download
  2. 1. Module 1 - BackTrack Basics 1.1 Finding your way around the tools 1.2 Basic Services 1.3 Basic Bash Environment Overview 1.4 Netcat the Almighty Overview 1.5 Using Wireshark (Ethereal) Overview 2. Module 2- Information Gathering Techniques 2.1 Open W e b Information Gathering Overview 2.2. Miscellaneous W e b Resources 2.3 Exercise 7 3. Module 3- Open Services Information Gathering 3.1 DNS Reconnaissance 3.2 SNMP reconnaissance 3.3 SMTP reconnaissance 3.4 Microsoft Netbios Information Gathering 4. Module 4- Port Scanning A note from the authors 4.1 TCP Port Scanning Basics 4.2 UDP Port Scanning Basics 4.3 Port Scanning Pitfalls 4.4 Nmap 4.5 Scanning across the network 4.6 Unicornscan 5. Module 5- ARP Spoofing A note from the authors 5.1 The Theory 5.2 Doing it the hard way 5.3 Ettercap 6. Module 6- Buffer overflow Exploitation (Win32) Overview 6.1 Looking for Bugs 6.2 Fuzzing 6.3 Replicating the Crash 6.4 Controlling EIP 6.5 Locating Space for our She l l code 6.6 Redirecting the execution flow 6.7 Finding a return address 6.8 Basic She l l code creation 6.9 Getting our She l l 6.10 Improving exploit stability 7. Module 7- Working With Exploits 7.1 Looking for an exploit on BackTrack 7.2 Looking for exploits on the W e b 8. Module 8- Transferring Files 8.1 The non interactive She l l 8.2 Uploading Files 8.3 Exercise 16 9. Module 9 – Exploit frameworks 9.1 Met asploit 9.2 Core Impact 10. Module 10- Client Side Attacks 10.1 Client side attacks 10.2 MS07-017 – From PoC to She l l 10.3 MS06-001 10.4 Client side exploits in action 10.5 Exercise 21 11. Module 11- Port Fun A note from the authors 11.1 Port Redirection 11.2 SSL Encapsulation - Stunnel 11.3 HTTP CONNECT Tunneling 11.4 ProxyTunnel 11.5 SSH Tunneling 11.6 What about content inspection? 12. Module 12- Password Attacks A note from the authors 12.1 Online Password Attacks 12.2 Hydra 12.3 Password profiling 12.5 Physical Access Attacks 13. Module 13 - We B Application Attack vectors 13.1 SQL Injection 13.2 We b Proxies 13.3 Command injection Attacks 14. Module 14 - Trojan Horses 14.1 Binary Trojan Horses 14.2 Open source Trojan horses 14.3 World domination Trojan horses 15. Module 15 - Windows Oddities 15.1 Alternate NTFS data Streams 15.2 Registry Backdoors 16. Module 16 - Rootkits 16.1 Aphex Rootkit 16.2 HXDEF Rootkit 16.3 Exercise R.I.P Final Challenges Download = HeRe
  3. 1- emmm OkééY 2- :DD , Thank You 3- need OCX files because this tool work 100% (coded with vb6 ) test it without ocx files and the tool will not work 4- yes the ocx files is the same used for the other tool bifrost stub Customiser a pic 4 ya : Sorry 4 my bad english .. I'm Tunisian ><
  4. not crypted Bro ... crypt it by yourself yep this is a trojan (stealer no-ip account) not fud ><
  5. Hey Guys, Here Is A new & hot Project For The Users of RST. its No-IP Grabber How To Use This is a tool that allow you to Hack the Victim's No-Ip and send it at your Gmail E-m@il :ohmy: Works on all systems, Windows 7, Vista, XP : 32Bit, 64 Bit :thumbsup: Photo Report Download Now : OCX Files No-IP Grabber If you like this then give me feedback, will appreciate and say little THANKS and RATE THIS THREAD!! :)
  6. This is a new & good fresh Tool (Rolleyes) a friend of Jordan has made ??to another forum: p But I share here: p Well, I thought everyone know the role of this tool Download
×
×
  • Create New...