CoD3 Posted September 27, 2011 Report Posted September 27, 2011 1. Module 1 - BackTrack Basics1.1 Finding your way around the tools1.2 Basic Services1.3 Basic Bash EnvironmentOverview1.4 Netcat the AlmightyOverview1.5 Using Wireshark (Ethereal)Overview2. Module 2- Information Gathering Techniques2.1 Open W e b Information GatheringOverview2.2. Miscellaneous W e b Resources2.3 Exercise 73. Module 3- Open Services Information Gathering3.1 DNS Reconnaissance3.2 SNMP reconnaissance3.3 SMTP reconnaissance3.4 Microsoft Netbios Information Gathering4. Module 4- Port ScanningA note from the authors4.1 TCP Port Scanning Basics4.2 UDP Port Scanning Basics4.3 Port Scanning Pitfalls4.4 Nmap4.5 Scanning across the network4.6 Unicornscan5. Module 5- ARP SpoofingA note from the authors5.1 The Theory5.2 Doing it the hard way5.3 Ettercap6. Module 6- Buffer overflow Exploitation (Win32)Overview6.1 Looking for Bugs6.2 Fuzzing6.3 Replicating the Crash6.4 Controlling EIP6.5 Locating Space for our She l l code6.6 Redirecting the execution flow6.7 Finding a return address6.8 Basic She l l code creation6.9 Getting our She l l6.10 Improving exploit stability7. Module 7- Working With Exploits7.1 Looking for an exploit on BackTrack7.2 Looking for exploits on the W e b8. Module 8- Transferring Files8.1 The non interactive She l l8.2 Uploading Files8.3 Exercise 169. Module 9 – Exploit frameworks9.1 Met asploit9.2 Core Impact10. Module 10- Client Side Attacks10.1 Client side attacks10.2 MS07-017 – From PoC to She l l10.3 MS06-00110.4 Client side exploits in action10.5 Exercise 2111. Module 11- Port FunA note from the authors11.1 Port Redirection11.2 SSL Encapsulation - Stunnel11.3 HTTP CONNECT Tunneling11.4 ProxyTunnel11.5 SSH Tunneling11.6 What about content inspection?12. Module 12- Password AttacksA note from the authors12.1 Online Password Attacks12.2 Hydra12.3 Password profiling12.5 Physical Access Attacks13. Module 13 - We B Application Attack vectors13.1 SQL Injection13.2 We b Proxies13.3 Command injection Attacks14. Module 14 - Trojan Horses14.1 Binary Trojan Horses14.2 Open source Trojan horses14.3 World domination Trojan horses15. Module 15 - Windows Oddities15.1 Alternate NTFS data Streams15.2 Registry Backdoors16. Module 16 - Rootkits16.1 Aphex Rootkit16.2 HXDEF Rootkit16.3 Exercise R.I.PFinal Challenges Download = HeRe
DuTy^ Posted September 27, 2011 Report Posted September 27, 2011 Cam enervante ads-urile alea.Oricum mersi pentru carte!
razer_krait Posted September 27, 2011 Report Posted September 27, 2011 Nu mai puneti linkuri cu adf.ly, ce nu intelegeti?Direct link catre mediafire