AlucardHao Posted June 9, 2007 Report Posted June 9, 2007 Marime totala: 4Gb {17CDuri }Release includes:# Featuring live instructor-led classroom sessions with full audio, video and demonstration components# Printable courseware# 300+ Penetration Testing Review Questions# eWorkbook - 725 pages Student eWorkbook developed by Shon HarrisOur training videos will show you how to scan, test, hack and secure your own systems. The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.Author:Michael J Lester - (CISSP, MCSE:Messaging & Security, MCSE+I, MCSA, MCT, CCNP, CCDP, CCSE+, CCI, CCEA, CTT+, Linux+, Security+, Network+, I-net+, A+)Michael holds a Bachelor of Science degree in Information Technology, and is a senior consultant and instructor for MicroLink Corporation. He divides his time between consulting and teaching. In his consulting work he performs security audits, penetration testing, network reconfigurations and design, and general troubleshooting for a range of small to large businesses. He has taught and written curricula for a variety of courses, including bootcamps for Mic*ft and Cisco certification, Check Point, Citrix and IT security, and has worked for IBM Learning Services, the University of Miami and other institutions. For the individual needs of his clients he has created specialized courses that combine several technologies into week-long, hands-on training workshops.Course Detail:Module 1Ethical Hacking and Penetration TestingSecurity 101Hacking Hall of FameWhat are Today's hackers Like?Today's HackersRisk ManagementEvolution of ThreatsTypical Vulnerability Life CycleWhat is Ethical Hacking?Rise of the Ethical HackerTypes of Security TestPenetration Test (Pen-test)Red TeamsTesting MethodologyVMWare WorkstationWindows and Linux Running VMWareLinux Is a MustLinux Survival SkillsUseful vi Editor CommandsModule 1 ReviewModule 2Footprinting and ReconnaissanceDesired InformationFind Information by the Target (Edgar)terraserver.Mic*ft.comNetwork Reconnaissance & DNS SearchQuery Whois DatabasesCommand-Line Whois SearchesARIN whois: Search IP Address BlocksSamSpade Tool and WebsiteInternet PresenceLook Through Source CodeMirror WebsiteFind Specific Types of SystemsBig BrotherAltaVistaSpecific Data Being Available?AnonymizersCountermeasures to Information LeakageSocial EngineeringDNS Zone TransferNslookup command-line utilityZone Transfer from LinuxAutomated Zone TransfersZone Transfer Countermeasureswww.CheckDNS.netTracing Out a Network Pathtracert OutputFree ToolsParatraceWar Dialing for Hanging ModemsManual and Automated War DialingCase Studywww.guidedogs.comFootprinting CountermeasuresDemo - Footprinting & Info GatheringModule 2 ReviewModule 3TCP/IP Basics and ScanningThe OSI ModelTCP/IP Protocol Suite LayersEncapsulationData-Link ProtocolsIP - Internet Protocol, Datagram (Packet)ICMP PacketsUDP – User Datagram ProtocolUDP DatagramTCP – Transmission Control ProtocolTCP SegmentTCP/IP 3-Way Handshake and FlagsTCP and UDP PortsPing SweepsGood Old Ping, Nmap, TCP Ping SweepTCP Sweep Traffic CapturedUnix Pinging UtilitiesDefault TTLsPinging CountermeasuresPort ScanningNmapAdvanced Probing TechniquesScanrandPort Probing CountermeasuresWatch Your Own PortsDemo - Scanning ToolsModule 3 ReviewModule 4Enumeration and VerificationOperating System IdentificationDifferences Between OS TCP/IP StackNmap -OActive vs Passive FingerprintingXprobe/Xprobe2CountermeasuresSNMP OverviewSNMP EnumerationSMTP, Finger, and E-mail AliasesGleaning Information from SMTPSMTP E-mail Alias EnumerationSMTP Enumeration CountermeasuresCIFS/SMBAttack MethodologyFind Domains and ComputersNetBIOS DataNBTscanNULL SessionLocal and Domain UsersFind Shares with net viewenum: the All-in-oneWinfo and NTInfoScan (ntis.exe)Digging in the RegistryNetBIOS Attack SummaryNetBIOS CountermeasuresWhat’s this SID Thing Anyway?Common SIDs and RIDswhoamiRestrictAnonymousUSER2SID/SID2USERpsgetsid.exe and UserDump ToolLDAP and Active DirectoryGUI Tools to Perform the Same ActionsDemo - EnumerationModule 4 ReviewModule 5Hacking & Defending Wireless/ModemsPhone Numbers & Modem BackgroundPhone ReconnaissanceModem AttacksWireless ReconnaissanceWireless BackgroundWireless Reconnaissance ContinuedWireless SniffingCracking WEP KeysDefending WirelessModule 5 ReviewModule 6Hacking & Defending Web ServersWeb Servers in General: HTTPUniform Resource Locator: URLApache Web Server FunctionalityApache: Attacking Mis-configurationsApache: Attacking Known VulnerabilitiesDefending Apache Web ServerMic*ft Internet Information Server (IIS)IIS: Security FeaturesIIS: Attacking General ProblemsIIS: IUSER or IWAM Level AccessIIS: Administrator or Sys Level AccessIIS: Clearing IIS LogsIIS: Defending and CountermeasuresWeb Server Vulnerability ScannersDemo - Hacking Web ServersModule 6 ReviewModule 7Hacking & Defending Web ApplicationsBackground on Web Threat & DesignBasic Infrastructure InformationInformation Leaks on Web PagesHacking over SSLUse the Source, Luke…Functional/Logic TestingAttacking AuthenticationAttacking AuthorizationDebug Proxies: @stake webproxyInput Validation AttacksAttacking Session StateAttacking Web ClientsCross-Site Scripting (XSS) ThreatsDefending Web ApplicationsModule 7 ReviewModule 8Sniffers and Session HijackingSniffersWhy Are Sniffers so Dangerous?Collision & Broadcast DomainsVLANs and Layer-3 Segmentationtcpdump & WinDumpBerkley Packet Filter (BPF)Libpcap & WinPcapBUTTSniffing Tool and dSniffEtherealMitigation of Sniffer AttacksAntisniffARP PoisoningMAC FloodingDNS and IP SpoofingSession HijackingSequence NumbersHuntEttercapSource RoutingHijack CountermeasuresDemo - SniffersModule 8 ReviewModule 9Hacking & Defending Windows SystemsPhysical AttacksLANMan Hashes and WeaknessesWinNT Hash and WeaknessesLook for Guest, Temp, Joe AccountsDirect Password AttacksBefore You Crack: Enum ToolFinding More Account InformationCracking PasswordsGrabbing the SAMCrack the Obtained SAMLSA Secrets and TrustsUsing the Newly Guessed PasswordBruteforcing Other ServicesOperating System AttacksHiding Tracks: Clearing LogsHardening Windows SystemsStrong 3-Factor AuthenticationCreating Strong PasswordsAuthenticationWindows Account LockoutsAuditing PasswordsFile PermissionsDemo - Attacking Windows SystemsModule 9 ReviewModule 10Hacking & Defending Unix SystemsPhysical Attacks on LinuxPassword CrackingBrute Force Password AttacksStack OperationRace Condition ErrorsFormat String ErrorsFile System AttacksHiding TracksSingle User CountermeasureStrong AuthenticationSingle Sign-On TechnologiesAccount LockoutsShadow Password FilesBuffer Overflow CountermeasuresLPRng CountermeasuresTight File PermissionsHiding Tracks CountermeasuresRemoving Unnecessary ApplicationsDoS CountermeasuresHardening ScriptsUsing SSH & VPNs to Prevent SniffingDemo - Attacking Unix SystemsModule 10 ReviewModule 11Rootkits, Backdoors, Trojans & TunnelsTypes Of RootkitsA Look at LRKExamples of Trojaned FilesWindows NT RootkitsNT RootkitAFX Windows Rootkit 2003Rootkit Prevention UnixRootkit Prevention Windowsnetcatnetcat: Useful Unix Commandsnetcat: What it Looks LikeVNC-Virtual Network ComputingBackdoor DefensesTrojansBack Orifice 2000NetBusSubSevenDefenses to TrojansTunnelingLokiOther TunnelsQ-2.4 by MixterStarting Up Malicious CodeDefenses Against TunnelsManually Deleting LogsTools to Modify LogsDemo - TrojansModule 11 ReviewModule 12Denial of Service and BotnetsDenial-of-Service AttacksCPUHogPing of DeathTeardrop AttacksJolt2Smurf AttacksSYN AttacksUDP FloodsDistributed DoSDDoS Tool: Trin00Other DDoS VariationHistory of BotnetsAnatomy of a BotnetSome Common BotsDemo - Denial of ServiceModule 12 ReviewModule 13Automated Pen Testing ToolsGeneral: DefinitionsGeneral:What?General: Why?Core Impact™ FrameworkCore Impact™ OperationCanvas™ FrameworkCanvas™ OperationMetasploit FrameworkMetasploit OperationDemo - Automated Pen TestingModule 13 ReviewModule 14Intrusion Detection SystemsTypes of IDSsNetwork IDSsDistributed IDSs (DIDSs)Anomaly DetectionSignature DetectionCommon IDS Software ProductsIntroduction to SnortAttacking an IDSEluding TechniquesTesting an IDSHacking Tool - NIDSbenchHacking Tool - FragrouteHacking Tool - SideStepHacking Tool - ADMmutateOther IDS Evasion ToolsDemo - IDS and SnortModule 14 ReviewModule 15FirewallsFirewall TypesApplication Layer GatewaysALGs (Proxies)Stateful Inspection EngineHybrid FirewallHost-Based FirewallNetwork-Based FirewallDMZ (Demilitarized Zone)Back-to-Back FirewallsBastion HostsControl Traffic FlowMultiple DMZsControlling Traffic FlowWhy Do I Need a Firewall?What Should I Filter?Egress FilteringNetwork Address Translation (NAT)Firewall VulnerabilitiesIPTables/NetFilterDefault Tables and Chainsiptables Syntax 1iptables Syntax 2Sample IPTables Script 1Sample IPTables Script 2Persistent FirewallsFirewall IdentificationFirewalkTunneling with LokiTunneling with NetCat/CryptCatPort Redirection with FpipeDenial-of-Service Attacks Risk?Demo - Firewalls and IP TablesModule 15 ReviewModule 16Honeypots and HoneynetsWhat Is a Honeypot?Advantages and DisadvantagesTypes and Categories of HoneypotsHoneypot: TarpitsHoneypot: KfsensorHoneypot: HoneydSample Honeyd ConfigurationHigh-Interaction HoneypotProject HoneyNetTypes of HoneynetsThe Main Difference is Data ControlGEN II Data Control: Honeywall CDGen II Data Capture: Sebek & Sebek IIAutomated AlertingTestingLegal IssuesDemo - Setting up a HoneypotModule 16 ReviewModule 17Ethics and Legal IssuesThe CostsRelation to Ethical Hacking?The Dual Nature of ToolsGood Instead of Evil?Recognizing Trouble When It HappensEmulating the AttackSecurity Does Not Like ComplexityProper and Ethical DisclosureCERT’s Current ProcessFull Disclosure PolicyOrganization for Internet Safety (OIS)What Should We Do from Here?Legal Meets Information SystemsAddressing Individual Laws18 USC SECTION 102918 USC SECTION 10301030: Worms and VirusesBlaster Worm AttacksCivil vs. Criminal18 USC SECTIONS 2510 and 2701Digital Millennium Copyright ActCyber Security Enhancement ActModule 17 ReviewCourse ClosureDownload from fast server and no restrict with max speed up to 15Mb/sQuote:Module.17.Ethics.and.Legal.Issues-LiBiSOhttp://rapidshare.com/files/6840462/UDK_17.rar.htmlhttp://rapidshare.com/files/6728633/UDK_17.r00.htmlModule.16.Honeypots.and.Honeynets-LiBiSOhttp://rapidshare.com/files/6728267/UDK_16.rar.htmlhttp://rapidshare.com/files/6726954/UDK_16.r00.htmlModule.15.Firewalls-LiBiSOhttp://rapidshare.com/files/6726260/UDK_15.rar.htmlpass: KELCYRA4EVER@UDKhttp://rapidshare.com/files/6725396/UDK_15.r01.htmlhttp://rapidshare.com/files/6725197/UDK_15.r00.htmlModule.14.Intrusion.Detection.Systems-LiBiSOhttp://rapidshare.com/files/6724069/UDK_14.rar.htmlhttp://rapidshare.com/files/6722015/UDK_14.r00.htmlModule.13.Automated.Pen.Testing.Tools-LiBiSOhttp://rapidshare.com/files/6720596/UDK_13.rar.htmlhttp://rapidshare.com/files/6719802/UDK_13.r00.htmlModule.12.Denial.of.Service.and.Botnets-LiBiSOhttp://rapidshare.com/files/6719274/UDK_12.rar.htmlhttp://rapidshare.com/files/6718584/UDK_12.r00.htmlModule.11.Rootkits.Backdoors.Trojans.Tunnels-LiBiSOhttp://rapidshare.com/files/6718324/UDK_11.rar.htmlhttp://rapidshare.com/files/6717488/UDK_11.r00.htmlModule.10.Hacking.Defending.Unix.Systems-LiBiSOhttp://rapidshare.com/files/6717040/UDK_10.rar.htmlhttp://rapidshare.com/files/6716095/UDK_10.r01.htmlhttp://rapidshare.com/files/6715972/UDK_10.r00.htmlModule.9.Hacking.Defending.Windows.Systems-LiBiSOhttp://rapidshare.com/files/6715069/UDK_09.rar.htmlhttp://rapidshare.com/files/6713938/UDK_09.r00.htmlModule.8.Sniffers.and.Session.Hijacking-LiBiSOhttp://rapidshare.com/files/6713247/UDK_08.rar.htmlhttp://rapidshare.com/files/6712499/UDK_08.r00.htmlModule.7.Hacking.Defending.Web.Applications-LiBiSOhttp://rapidshare.com/files/6711979/UDK_07.rar.htmlhttp://rapidshare.com/files/6711299/UDK_07.r00.htmlModule.6.Hacking.Defending.Web.Servers-LiBiSOhttp://rapidshare.com/files/6710708/UDK_06.rar.htmlhttp://rapidshare.com/files/6709868/UDK_06.r01.htmlhttp://rapidshare.com/files/6709625/UDK_06.r00.htmlModule.5.Hacking.Defending.Wireless.Modems-LiBiSOhttp://rapidshare.com/files/6708894/UDK_05.rar.htmlhttp://rapidshare.com/files/6708175/UDK_05.r00.htmlModule.4.Enumeration.and.Verification-LiBiSOhttp://rapidshare.com/files/6708011/UDK_04.rar.htmlhttp://rapidshare.com/files/6707208/UDK_04.r01.htmlhttp://rapidshare.com/files/6706652/UDK_04.r00.htmlModule.3.TCP.IP.Basics.and.Scanning-LiBiSOhttp://rapidshare.com/files/6705955/UDK_03.rar.htmlhttp://rapidshare.com/files/6705537/UDK_03.r01.htmlhttp://rapidshare.com/files/6705496/UDK_03.r00.htmlModule.2.Footprinting.and.Reconnaissance-LiBiSOhttp://rapidshare.com/files/6705071/UDK_02.rar.htmlhttp://rapidshare.com/files/6704509/UDK_02.r01.htmlhttp://rapidshare.com/files/6704019/UDK_02.r00.htmlModule.1.Ethical.Hacking.and.Penetration.Testing-LiBiSOhttp://rapidshare.com/files/6703435/UDK_01.rar.htmlhttp://rapidshare.com/files/6702722/UDK_01.r02.htmlhttp://rapidshare.com/files/6702600/UDK_01.r01.htmlhttp://rapidshare.com/files/6702161/UDK_01.r00.htmlcheck files:http://rapidshare.com/files/6701699/sfv.sfv.htmlhttp://rapidshare.com/files/6701698/md5.md5.htmlpass: KELCYRA4EVER@UDK Quote
Black Pitbull- Posted August 24, 2007 Report Posted August 24, 2007 Cam mare postu :shock: cred ca satu o sapt sa iau astea :shock: Quote
moubik Posted August 24, 2007 Report Posted August 24, 2007 daca nu s-ar folosi rapidshare ar fi ceva.. Quote
and87 Posted November 6, 2007 Report Posted November 6, 2007 link nu mai exista ... ci au fost sterse astea...poate le mai bagati odata la download :roll: Quote