CoD3 Posted September 27, 2011 Report Share Posted September 27, 2011 1. Module 1 - BackTrack Basics1.1 Finding your way around the tools1.2 Basic Services1.3 Basic Bash EnvironmentOverview1.4 Netcat the AlmightyOverview1.5 Using Wireshark (Ethereal)Overview2. Module 2- Information Gathering Techniques2.1 Open W e b Information GatheringOverview2.2. Miscellaneous W e b Resources2.3 Exercise 73. Module 3- Open Services Information Gathering3.1 DNS Reconnaissance3.2 SNMP reconnaissance3.3 SMTP reconnaissance3.4 Microsoft Netbios Information Gathering4. Module 4- Port ScanningA note from the authors4.1 TCP Port Scanning Basics4.2 UDP Port Scanning Basics4.3 Port Scanning Pitfalls4.4 Nmap4.5 Scanning across the network4.6 Unicornscan5. Module 5- ARP SpoofingA note from the authors5.1 The Theory5.2 Doing it the hard way5.3 Ettercap6. Module 6- Buffer overflow Exploitation (Win32)Overview6.1 Looking for Bugs6.2 Fuzzing6.3 Replicating the Crash6.4 Controlling EIP6.5 Locating Space for our She l l code6.6 Redirecting the execution flow6.7 Finding a return address6.8 Basic She l l code creation6.9 Getting our She l l6.10 Improving exploit stability7. Module 7- Working With Exploits7.1 Looking for an exploit on BackTrack7.2 Looking for exploits on the W e b8. Module 8- Transferring Files8.1 The non interactive She l l8.2 Uploading Files8.3 Exercise 169. Module 9 – Exploit frameworks9.1 Met asploit9.2 Core Impact10. Module 10- Client Side Attacks10.1 Client side attacks10.2 MS07-017 – From PoC to She l l10.3 MS06-00110.4 Client side exploits in action10.5 Exercise 2111. Module 11- Port FunA note from the authors11.1 Port Redirection11.2 SSL Encapsulation - Stunnel11.3 HTTP CONNECT Tunneling11.4 ProxyTunnel11.5 SSH Tunneling11.6 What about content inspection?12. Module 12- Password AttacksA note from the authors12.1 Online Password Attacks12.2 Hydra12.3 Password profiling12.5 Physical Access Attacks13. Module 13 - We B Application Attack vectors13.1 SQL Injection13.2 We b Proxies13.3 Command injection Attacks14. Module 14 - Trojan Horses14.1 Binary Trojan Horses14.2 Open source Trojan horses14.3 World domination Trojan horses15. Module 15 - Windows Oddities15.1 Alternate NTFS data Streams15.2 Registry Backdoors16. Module 16 - Rootkits16.1 Aphex Rootkit16.2 HXDEF Rootkit16.3 Exercise R.I.PFinal Challenges Download = HeRe Link to comment Share on other sites More sharing options...
DuTy^ Posted September 27, 2011 Report Share Posted September 27, 2011 Cam enervante ads-urile alea.Oricum mersi pentru carte! Link to comment Share on other sites More sharing options...
razer_krait Posted September 27, 2011 Report Share Posted September 27, 2011 Nu mai puneti linkuri cu adf.ly, ce nu intelegeti?Direct link catre mediafire Link to comment Share on other sites More sharing options...
Salmana_Alenzi Posted July 26, 2017 Report Share Posted July 26, 2017 the link don't work Link to comment Share on other sites More sharing options...