Koceljeva Forum


 
PrijemTražiRegistruj sePristupi

Delite
 

 learn hacking

Ići dole 
AutorPoruka
s0n1cK



Broj poruka : 8
Datum upisa : 17.11.2008

learn hacking Empty
PočaljiNaslov: learn hacking   learn hacking Icon_minitimePon Dec 01, 2008 8:03 pm

ljudi ovo je izuzetno dobar skup knjiga koji je tu da vam pomogne da naucite hacking, obavezno procitajte. Evo ja pocinjem odmah

Sec 1: Footprinting & Scanning

- Understanding Ethical Hacking
- Intro to reconnaissance phase
- Understanding footprinting
- Scanning & Footprinting Tools
- Scanning & Footprinting Books
- Understanding port scanning
- Discovering the OS system
- Discovering services running
- Understanding enumerations


Sec 2: Web Security

- Understanding Web Security
- Password Hacking & Security
- IIS web Server Security
- Web Security Tools
- Web Security Books
- Apache Web Server Security
- SQl injection & Security
- Cross-Site Scripting (XSS)
- Web Application Security
- Authentication & Sessions
- Prevention & Countermeasures


Sec 3: Win Hacking & Networking

- Windows System Security
- Cracking Passwords
- Password Recovery
- Hardware Security
- Registry Security
- Win & Networking Tools
- Win & Networking Books
- Cisco Security & Hacks
- Intrusion detection
- Firewalls & Honeypots
- Ip Changing & Security
- Spyware & Anti-Virus Sec


Sec 4: Sniffing & Hijacking

- Understanding sniffers
- Packet capturing
- MAC flooding & ARP poisoning
- How session hijacking works
- Sniffing & Hijacking Tools
- Sniffing & Hijacking Books
- Spoofing attacks & Security
- Many Sniffing countermeasures


Sec 5: Denial of Service

- Denial Of Service Attacks
- Distributed Denial Of Service
- Types of denial of attacks
- Tools for running DOS attacks
- Tools for running DDOS attacks
- Denial Of Service Books
- Denial of Service Countermeasures


6: Social Engineering

- What is Social Engineering
- Policies and Procedures
- Online Social Engineering
- Social Engineering Books
- Who is Kevin Mitnick
- The Common Types of Attack
- Best collection of Ezines
- Social Engineering Countermeasures


Sec 7: Wireless Security

- Understanding Wireless Security
- Introduction to 802.11
- 802.11 Wireless Networks
- Introduction to WEP
- How to Find WLANs
- Cracking WEP Keys
- Wireless DoS attacks
- Wireless Security Books
- Wireless Security Tools
- Wireless Hacking Tools
- WEP Key Encryption
- Securing Wireless Networks


Sec 8: Coding & Buffer Overflow

- Coding Skills Required
- Windows Programming
- What is API Coding
- Linux Programming
- Open Source Coding
- ASM, CGI & Perl
- C/C++, Java & PHP
- What is Secure Coding
- HSC Coding Library
- Reverse Engineering
- What is a Buffer Overflow
- Writing your own exploits
- Understanding Stacks
- Defense from Buffer Overflows
- Understanding shellcodes
- Writing Exploits
- Coders Professional Books


Sec 9: Worms & Virus

- Understanding Viruses
- Viruses different forms
- Viruses & Worms Books
- How Anti-Viruses Work
- How worms spread & infect
- Viruses Codes and Tools
- History of viruses & worms
- Protection against viruses


Sec 10: Linux Security

- Introduction to Linux
- Linux file structure
- Linux Networking
- Basic Linux commands
- How Linux is hacked
- Rootkits for Linux
- Compiling Programs on Linux
- IP Chains and IP Tables
- Linux Security Tools
- Linux Security Books
- Types of Platforms
- Linux Security Methods


Sec 11: Encryption

- Introduction to Encryption
- Encryption Cracking Techniques
- Types of Encryptions
- Understanding hashing
- Know how MD5 works
- Basic cryptographic attacks
- Art of steganography
- SSH, RSA, PGP, SSL & SHA
- Algorithm coding
- Rainbow Tables & Cracking
- Cryptographic Defence
- Cryptographic Tools
- Cryptographic Books
- Online anonymity
- Anonymous surfing Tools
- Understanding Proxy


Sec 12: Trojans & Rats

- Understanding Trojan horses
- Understanding Backdoors
- Understanding Rats
- Trojan infection mechanisms
- Intro to keyloggers
- Overview of Trojan tools
- Security Tools
- Trojan & Rats Books
- How to write your Trojan
- How to remove a Trojan
- What are logic Bombs
- Windows Rootkits
- Trojan & Rat Encryptions
- Types of Attack Methods
- Trojans & Rats Countermeasures


Sec 13: Miscellaneous

- Hackers Dictionary
- Hacking Questions
- Acrobat Reader
- mIRC (chat)
- Archivers
- FireFox 2 (Secure)
- Best Security & Hacking Links
- E.H Policy


Module.1.Ethical.Hacking.and.Penetration.Testing

Kod:
http://www.ashiyane.org/files/HSC/UDK_01.zip

CODE
Module.2.Footprinting.and.Reconnaissance

Kod:
http://www.ashiyane.org/files/HSC/UDK_02.zip

CODE
Module.3.TCP.IP.Basics.and.Scanning

Kod:
http://www.ashiyane.org/files/HSC/UDK_03.zip

CODE
Module.4.Enumeration.and.Verification

Kod:
http://www.ashiyane.org/files/HSC/UDK_04.zip

CODE
Module.5.Hacking.Defending.Wireless.Modems

Kod:
http://www.ashiyane.org/files/HSC/UDK_05.zip
CODE
Module.6.Hacking.Defending.Web.Servers

Kod:
http://www.ashiyane.org/files/HSC/UDK_06.zip

CODE
Module.7.Hacking.Defending.Web.Applications

Kod:
http://www.ashiyane.org/files/HSC/UDK_07.zip
CODE
Module.8.Sniffers.and.Session.Hijacking

Kod:
http://www.ashiyane.org/files/HSC/UDK_08.zip
CODE
Module.9.Hacking.Defending.Windows.Systems

Kod:
http://www.ashiyane.org/files/HSC/UDK_09.zip

CODE
Module.10.Hacking.Defending.Unix.Systems

Kod:
http://www.ashiyane.org/files/HSC/UDK_10.zip
CODE
Module.11.Rootkits.Backdoors.Trojans.Tunnels

Kod:
http://www.ashiyane.org/files/HSC/UDK_11.zip

CODE
Module.12.Denial.of.Service.and.Botnets

Kod:
http://www.ashiyane.org/files/HSC/UDK_12.zip

CODE
Module.13.Automated.Pen.Testing.Tools

Kod:
http://www.ashiyane.org/files/HSC/UDK_13.zip
CODE
Module.14.Intrusion.Detection.Systems

Kod:
http://www.ashiyane.org/files/HSC/UDK_14.zip

CODE
Module.15.Firewalls

Kod:
http://www.ashiyane.org/files/HSC/UDK_15.zip


CODE
Module.16.Honeypots.and.Honeynets

Kod:
http://www.ashiyane.org/files/HSC/UDK_16.zip

CODE
Module.17.Ethics.and.Legal.Issues


Kod:
http://www.ashiyane.org/files/HSC/UDK_17.zip

pass: KELCYRA4EVER@UDK
Nazad na vrh Ići dole
 
learn hacking
Nazad na vrh 
Strana 1 od 1

Dozvole ovog foruma:Ne možete odgovarati na teme u ovom forumu
Koceljeva Forum :: Hi-tech :: Tutorijali-
Skoči na: