[Question] HSC Ethical Hacker Kit |
17/03/2009 15:13:07 (+0700) | #1 | 173521 |
|
ngaongan
Member
|
0 |
|
|
Joined: 09/07/2008 08:47:38
Messages: 50
Offline
|
|
Kit Includes following Sections
Hackers Center has selected for you hundreds among the newest papers and tools to let anyone,
in the middle of his internet security education, learn faster and from a black hat
perspective. We do believe into ethical hacking as the only way to be successful at
understanding and defending your network or your company from remote attacks.
Note: An ethical hacker is like a penetration tester. The ethical hacker is an individual
who is employed or contracted to undertake an attempted penetration test. These individuals
use the same methods employed by hackers. You must acquire written permission to avoid
braking the law. If you brake into a system you have committed a felony, any one that uses
these new acquired teachings will be held responsible for there own actions
Sec 1: Footprinting & Scanning
- Understanding Ethical Hacking
- Intro to reconnaissance phase
- Understanding footprinting
- Scanning & Footprinting Tools
- Scanning & Footprinting Books
- Understanding port scanning
- Discovering the OS system
- Discovering services running
- Understanding enumerations
Sec 2: Web Security
- Understanding Web Security
- Password Hacking & Security
- IIS web Server Security
- Web Security Tools
- Web Security Books
- Apache Web Server Security
- SQl injection & Security
- Cross-Site Scripting (XSS)
- Web Application Security
- Authentication & Sessions
- Prevention & Countermeasures
Sec 3: Win Hacking & Networking
- Windows System Security
- Cracking Passwords
- Password Recovery
- Hardware Security
- Registry Security
- Win & Networking Tools
- Win & Networking Books
- Cisco Security & Hacks
- Intrusion detection
- Firewalls & Honeypots
- Ip Changing & Security
- Spyware & Anti-Virus Sec
Sec 4: Sniffing & Hijacking
- Understanding sniffers
- Packet capturing
- MAC flooding & ARP poisoning
- How session hijacking works
- Sniffing & Hijacking Tools
- Sniffing & Hijacking Books
- Spoofing attacks & Security
- Many Sniffing countermeasures
Sec 5: Denial of Service
- Denial Of Service Attacks
- Distributed Denial Of Service
- Types of denial of attacks
- Tools for running DOS attacks
- Tools for running DDOS attacks
- Denial Of Service Books
- Denial of Service Countermeasures
6: Social Engineering
- What is Social Engineering
- Policies and Procedures
- Online Social Engineering
- Social Engineering Books
- Who is Kevin Mitnick
- The Common Types of Attack
- Best collection of Ezines
- Social Engineering Countermeasures
Sec 7: Wireless Security
- Understanding Wireless Security
- Introduction to 802.11
- 802.11 Wireless Networks
- Introduction to WEP
- How to Find WLANs
- Cracking WEP Keys
- Wireless DoS attacks
- Wireless Security Books
- Wireless Security Tools
- Wireless Hacking Tools
- WEP Key Encryption
- Securing Wireless Networks
Sec 8: Coding & Buffer Overflow
- Coding Skills Required
- Windows Programming
- What is API Coding
- Linux Programming
- Open Source Coding
- ASM, CGI & Perl
- C/C++, Java & PHP
- What is Secure Coding
- HSC Coding Library
- Reverse Engineering
- What is a Buffer Overflow
- Writing your own exploits
- Understanding Stacks
- Defense from Buffer Overflows
- Understanding shellcodes
- Writing Exploits
- Coders Professional Books
Sec 9: Worms & Virus
- Understanding Viruses
- Viruses different forms
- Viruses & Worms Books
- How Anti-Viruses Work
- How worms spread & infect
- Viruses Codes and Tools
- History of viruses & worms
- Protection against viruses
Sec 10: Linux Security
- Introduction to Linux
- Linux file structure
- Linux Networking
- Basic Linux commands
- How Linux is hacked
- Rootkits for Linux
- Compiling Programs on Linux
- IP Chains and IP Tables
- Linux Security Tools
- Linux Security Books
- Types of Platforms
- Linux Security Methods
Sec 11: Encryption
- Introduction to Encryption
- Encryption Cracking Techniques
- Types of Encryptions
- Understanding hashing
- Know how MD5 works
- Basic cryptographic attacks
- Art of steganography
- SSH, RSA, PGP, SSL & SHA
- Algorithm coding
- Rainbow Tables & Cracking
- Cryptographic Defence
- Cryptographic Tools
- Cryptographic Books
- Online anonymity
- Anonymous surfing Tools
- Understanding *****
Sec 12: Trojans & Rats
- Understanding Trojan horses
- Understanding Backdoors
- Understanding Rats
- Trojan infection mechanisms
- Intro to keyloggers
- Overview of Trojan tools
- Security Tools
- Trojan & Rats Books
- How to write your Trojan
- How to remove a Trojan
- What are logic Bombs
- Windows Rootkits
- Trojan & Rat Encryptions
- Types of Attack Methods
- Trojans & Rats Countermeasures
Sec 13: Miscellaneous
- Hackers Dictionary
- Hacking Questions
- Acrobat Reader
- mIRC (chat)
- Archivers
- FireFox 2 (Secure)
- Best Security & Hacking Links
- E.H Policy
Module.1.Ethical.Hacking.and.Penetration.Testing
http://rapidshare.com/files/208614372/UDK_01.zip.001
http://rapidshare.com/files/208618515/UDK_01.zip.002
http://rapidshare.com/files/208632595/UDK_01.zip.003
http://rapidshare.com/files/208632679/UDK_01.zip.004
http://rapidshare.com/files/208632697/UDK_01.zip.005
http://rapidshare.com/files/208632709/UDK_01.zip.006
http://rapidshare.com/files/208640410/UDK_01.zip.007
http://rapidshare.com/files/208640441/UDK_01.zip.008
http://rapidshare.com/files/208955075/UDK_01.zip.009
http://rapidshare.com/files/208960632/UDK_01.zip.010
http://rapidshare.com/files/208962690/UDK_01.zip.011
CODE
Module.2.Footprinting.and.Reconnaissance
http://rapidshare.com/files/208971586/UDK_02.zip.001
http://rapidshare.com/files/208984762/UDK_02.zip.002
http://rapidshare.com/files/208984947/UDK_02.zip.003
http://rapidshare.com/files/208984957/UDK_02.zip.004
http://rapidshare.com/files/208984968/UDK_02.zip.005
http://rapidshare.com/files/208988106/UDK_02.zip.006
http://rapidshare.com/files/208990283/UDK_02.zip.010
http://rapidshare.com/files/208996738/UDK_02.zip.007
http://rapidshare.com/files/208997229/UDK_02.zip.009
http://rapidshare.com/files/208997230/UDK_02.zip.008
CODE
Module.3.TCP.IP.Basics.and.Scanning
http://rapidshare.com/files/209000206/UDK_03.rar.001
http://rapidshare.com/files/209003277/UDK_03.rar.002
http://rapidshare.com/files/209006998/UDK_03.rar.003
http://rapidshare.com/files/209010544/UDK_03.rar.004
http://rapidshare.com/files/209014295/UDK_03.rar.005
http://rapidshare.com/files/209017281/UDK_03.rar.006
CODE
Module.4.Enumeration.and.Verification
http://rapidshare.com/files/209021253/UDK_04.zip.001
http://rapidshare.com/files/209027776/UDK_04.zip.002
http://rapidshare.com/files/209336788/UDK_04.zip.003
http://rapidshare.com/files/209343640/UDK_04.zip.004
http://rapidshare.com/files/209349261/UDK_04.zip.005
http://rapidshare.com/files/209355241/UDK_04.zip.006
http://rapidshare.com/files/209361779/UDK_04.zip.007
http://rapidshare.com/files/209365478/UDK_04.zip.008
http://rapidshare.com/files/209366884/UDK_04.zip.009
CODE
Module.5.Hacking.Defending.Wireless.Modems
http://rapidshare.com/files/207576697/UDK_05.zip
CODE
Module.6.Hacking.Defending.Web.Servers
http://rapidshare.com/files/209370683/UDK_06.zip.001
http://rapidshare.com/files/209374435/UDK_06.zip.002
http://rapidshare.com/files/209384348/UDK_06.zip.003
http://rapidshare.com/files/209384553/UDK_06.zip.004
http://rapidshare.com/files/209386036/UDK_06.zip.006
http://rapidshare.com/files/209386043/UDK_06.zip.005
http://rapidshare.com/files/209404586/UDK_06.zip.007
CODE
Module.7.Hacking.Defending.Web.Applications
UDK_07.zip
http://rapidshare.com/files/207581166/UDK_07.zip
CODE
Module.8.Sniffers.and.Session.Hijacking
UDK_08.zip
http://rapidshare.com/files/207577941/UDK_08.zip
CODE
Module.9.Hacking.Defending.Windows.Systems
UDK_09.zip
http://rapidshare.com/files/207583004/UDK_09.zip
CODE
Module.10.Hacking.Defending.Unix.Systems
UDK_10.zip
http://rapidshare.com/files/207579692/UDK_10.zip
CODE
Module.11.Rootkits.Backdoors.Trojans.Tunnels
UDK_11.zip
http://rapidshare.com/files/207581978/UDK_11.zip
CODE
Module.12.Denial.of.Service.and.Botnets
UDK_12.zip
http://rapidshare.com/files/207580560/UDK_12.zip
CODE
Module.13.Automated.Pen.Testing.Tools
UDK_13.zip
http://rapidshare.com/files/207577291/UDK_13.zip
CODE
Module.14.Intrusion.Detection.Systems
UDK_14.zip
http://rapidshare.com/files/207578538/UDK_14.zip
CODE
Module.15.Firewalls
http://rapidshare.com/files/209404825/UDK_15.zip.001
http://rapidshare.com/files/209404901/UDK_15.zip.002
http://rapidshare.com/files/209404905/UDK_15.zip.003
http://rapidshare.com/files/209412714/UDK_15.zip.007
http://rapidshare.com/files/209416979/UDK_15.zip.004
http://rapidshare.com/files/209417020/UDK_15.zip.005
http://rapidshare.com/files/209417044/UDK_15.zip.006
CODE
Module.16.Honeypots.and.Honeynets
UDK_16.zip
http://rapidshare.com/files/207578337/UDK_16.zip
CODE
Module.17.Ethics.and.Legal.Issues
UDK_17.zip
http://rapidshare.com/files/207577599/UDK_17.zip
pass: KELCYRA4EVER@UDK
Password default : booktraining.net
Home:http://www.booktraining.net/2009/01/hsc-ethical-hacker-kit.html |
|
|
|
|
|
|
|
Users currently in here |
1 Anonymous
|
|
Powered by JForum - Extended by HVAOnline
hvaonline.net | hvaforum.net | hvazone.net | hvanews.net | vnhacker.org
1999 - 2013 ©
v2012|0504|218|
|
|