begood Posted February 6, 2010 Report Posted February 6, 2010 If you do Windows security assessments, this page is for you. We've gathered all of the tools and techniques discussed in Hacking Exposed: Windows and prior editions (that we have used extensively as consultants) and cataloged them here, with live hyperlinks for easy access. Keep your eyes on this space as we post custom scripts and tools from the authors! Third Edition(more updates coming...)Chapter 8, Achieving Stealth and Maintaining PresenceF-Secure BlacklightGMER Rootkit Detection ToolRKUnhooker Rootkit Detection Tool created by authors of Unreal.A rootkitWinObj v2.15Streams v1.56Using Driver Verifier to Troubleshoot Windows 2000 Device DriversChapter 9: Hacking SQL ServerParos ProxyAbsintheBobCatSqlninjaSQL Power InjectorAchillesOWASP WebScarabSqlpoke, sqlbf, sqldict, and assorted dictionariesSQLPing Second Edition, Windows Server 2003Chapter 1: Information Security BasicsISO17799/BS7799Chapter 2: The Windows Server 2003 Security Architecture from the Hacker's PerspectiveUser2sid/sid2userDumpTokenInfowsnameChapter 3: Footprinting and ScanningSam SpadeNmapGoogleSuperScanScanLinenetcatWindows Server 2003 Security GuideARIN whois Web interface (also search RIPE and APNIC for non-U.S. Internet information)IANA Port Number AssignmentsChapter 4: Enumerationnbtscan by Alla Bezroutchkoepdumprpcdump, part of the RPCTools by Todd SabinWinfo by Arne Vidstromnbtdump by David LitchfieldDumpSec by Somarsoftenumnetesid2user/user2sid by Evgenii RudnyiUserInfo and UserDump by Thor at HammerofGodGetAcct by Uritywalksam, part of the RPCTools by Todd SabinSolarWinds Professional Plus Edition Toolset“CIFS: Common Insecurities Fail Scrutiny” by Hobbit, the original SMB hacker's technical referenceChapter 5: Hacking Windows-Specific ServicesDelGuest by Arne VidstromCOAST dictionaries and word listsWinPcap, a free packet capture architecture for Windows by the Politecnico di Torino, Italy (included with L0phtcrack 3 and later)kerbsniff and kerbcrack by Arne VidstromScoopLM and BeatLMSMBRelay by Sir Dysticsnarp by Frank Knobbe, ARP cache poisoning utility, works on NT 4 only, not always reliablyEttercap, a multipurpose sniffer/interceptor/logger for switched LANsEvent Log Monitor (ELM) from TNT SoftwareEventAdmin from Aelita SoftwareL0phtcrack with SMB Packet CaptureChapter 6: Privilege EscalationPipeUpAdmin by Maceonetddemsg.cpp, source code for netddemsg by @stakeDebploit by EliCZWindows kernel exploit source code by eyasChapter 7: Getting InteractivePipelist from SysinternalsNetcat for NTVNC (Virtual Network Computing), the lightweight graphical remote control tool from AT&T Research LaboratoriesWindows 2000 Resource Kits, online version of the printed books, tools, and referencesWinRoute Professional by KerioPersonal Firewall by Tiny SoftwareVision, the port-to-process mapper from FoundstoneChapter 8: Expanding InfluenceFree Sample Windows 2000 Resource Kit Toolspwdump2 by Todd Sabinpwdump3 by e-business technology, Inc.John the Ripper, a great password-cracking toolNTLM algorithm support for John (this is also available off the main John site)—only for UNIX version of JohnMDcrackDictionaries and word lists from Purdue University's COAST Archivelsadump2FakeGINA from Arne VidstromSnort, a free packet sniffer and intrusion detection toolDsniff, UNIX versionEtherealFree SSHD for Windows NT/2000puTTY, a free SH clientrinetdfpipe from Foundstone, Inc.L0phtcrack4Invisible Keylogger Stealth (IKS) for NTVan Dyke Technologies' VShell SS2D server and SecureCRT clientSSH Communications Security's Secure Shell for Windows, server and clientNetwork Associates' CyberCop Monitor and Sniffer ProChapter 9: CleanupSubSevenBoDetect v2.01 from Chris BensonNTRoot, NullSys, NTKap rootkitsElitewrapelsave from Jesper LauritsenWinZapper, selective Event Log entry eraserForensic Toolkit, including the afind, hfind, and sfind utilitiesTextutils from GNUCygwinBinTextDumpSec (formerly DumpACL), DumpReg, and DumpEvt from SomarsoftHexEdit, by Expert Commercial SoftwareTripwireNetwork Associates’ EnterceptChapter 10: Hacking IISMain Microsoft Tools and Checklists page; go here if any subsequent links are brokenIISLockdownUrlScanMicrosoft Network Security Hotfix Checker (Hfnetchk.exe)IIS 4 Security ChecklistSecure Internet Information Services 5 ChecklistHow to Disable WebDAV for IIS 5.0unicodeloader by Roelof TemminghChapter 11: Hacking SQL ServersqlpokesqlbfsqldictSqlpingAssorted dictionaries for brute-forcing passwordsEncryptionizerISS Database ScannerXP_Crypt v3.1Chapter 12: Hacking Terminal ServerThe Remote Desktop Client (RDC), including information on the Remote Desktop Web ConnectionRDC Web Connection (ActiveX control that was formerly called Terminal Server Advanced Client, TSAC)ProbeTS.exeTSEnum.exeTSGrinder.exeTSCrack (under “Downloads”)Selected Windows 2000 Resource Kit tools, including AppsecChapter 13: Hacking Internet Clientsmpack, for encoding email attachments to MIME/Base64 formatHTML Help Workshop, a free tool from Microsoft for creating .chm filesSenna Spy VBS Worm GeneratorChapter 14: Physical AttacksNTFSDOS Prodskprobe.exe (from the Windows 2000 Support Tools on the Windows 2000 installation CD-ROM)ERD Commander, boots dead systems directly from CD into a Windows-like repair environment and can reset admin passwordsWindows PreInstallation Environment (WinPE), essentially a Windows XP boot CD-ROMChapter 15: Denial of ServiceZombie Zapper by Bindview's Razor teamDDOSPing, a utility for remotely detecting the most common DDoS programsArbor Networks Peakflow DoSChapter 16: NT Family Security Features and ToolsMicrosoft Security Tools Home PageChapter 17: The Future of Windows SecurityL2TP/IPSec NAT-T Update for Windows XP and Windows 2000Windows Server 2003 Downloads (includes Tools and Ad-ins)Active Directory in Application Mode (ADAM)Microsoft Operations Framework (MOF)Microsoft Operations ManagerPatch Management Using Microsoft Systems Management Server - Operations GuideSecuring IT with Systems Management Server (SMS)Microsoft Guide to Security Patch ManagementShavlik Technologies LLC, makers of HfNetChkPro for patch managementMicrosoft Identity Integration Server 2003Hacking Exposed - Windows Quote
pyth0n3 Posted February 6, 2010 Report Posted February 6, 2010 Oricum winhackingexposed este o carte foarte recomandata , in multe carti de securitate face exemplu pt ea . Citisem cateva scrise de Stuart McClure in care face referinte la aceasta carte si cateva exemple . Quote
prodil89 Posted February 6, 2010 Report Posted February 6, 2010 Mda ca si toate cartiile de la mcgraw hill adica alea de genul hacking exposed...sunt mai multe Quote
Flubber Posted March 8, 2010 Report Posted March 8, 2010 Aveti cumva cartile in forma .pdf? Eu am gasit asta: Hacking Exposed 6: Network Security Secrets & Solutions / McClure & Scambray -- am citit cateva pagini si deja mi-a captivat toata atentia, foarte foarte interesant-- nu stiu ce capitol e, aparent 3 sau 4 (cred)Daca aveti si voi altele de genul, va rog anuntati-ma prin PM Quote