FAQ |
Calendar |
![]() |
|
Shareware & Freeware Bertukar informasi mengenai Software berbayar ataupun gratis. |
![]() |
|
Thread Tools |
#1
|
||||
|
||||
![]()
SPIRALZER WAS HERE! berhubung ane suka sama hacking.. tp biarpun belajar tetep aja ane newbie.. ![]() makanya byk kumpulan hacking2 tools... saia share sini aja dah.. ![]() biar di pelajarin sama2.. karna sering share juga.. biar gak acak2an sama hacking2 tools dari saia.. saia satuin aja deh disini.. ![]() ![]() ![]() ada byk bgt juragan.. ![]() pelajari aja.. di jamin bisa jadi hacker beneran.. ![]() saia aja sampe sekarang lom pelajarin semuanya.. ![]() byk bgt.. nih makan aja sama juragan.. ![]() sepuasnya lah.. ![]() ![]() ![]() nih kumpulan 17cd Hacking Tools Lengkap ![]() ati browser error sama [/spoiler] Spoiler for open this:
1. Hacking, Penetration Testing, and Countermeasure training. 17 CD. Package Includes: Featuring live instructor-led classroom sessions with full audio, video and demonstration components Printable courseware 300+ Penetration Testing Review Questions eWorkbook - 725 pages Student eWorkbook by Logical Security Module 1 Ethical Hacking and Penetration Testing Security 101 Hacking Hall of Fame What are Today's hackers Like? Today's Hackers Risk Management Evolution of Threats Typical Vulnerability Life Cycle What is Ethical Hacking? Rise of the Ethical Hacker Types of Security Test Penetration Test (Pen-test) Red Teams Testing Methodology VMWare Workstation Windows and Linux Running VMWare Linux Is a Must Linux Survival Skills Useful vi Editor Commands Module 1 Review Module 2 Footprinting and Reconnaissance Desired Information Find Information by the Target (Edgar) terraserver.micr*soft.com Network Reconnaissance & DNS Search Query Whois Databases Command-Line Whois Searches ARIN whois: Search IP Address Blocks SamSpade Tool and Website Internet Presence Look Through Source Code Mirror Website Find Specific Types of Systems Big Brother AltaVista Specific Data Being Available? Anonymizers Countermeasures to Information Leakage Social Engineering DNS Zone Transfer Nslookup command-line utility Zone Transfer from Linux Automated Zone Transfers Zone Transfer Countermeasures www.CheckDNS.net (DNS Quick Check - DNS Report Tool, Test your DNS delegation, DNS Servers, Mail and Web Servers, Network Admins, Webmasters, Hosting) Tracing Out a Network Path tracert Output Free Tools Paratrace War Dialing for Hanging Modems Manual and Automated War Dialing Case Study www.guidedogs.com (Pairing people with trained service dogs at no charge - Guide Dogs for the Blind) Footprinting Countermeasures Demo - Footprinting & Info Gathering Module 2 Review Module 3 TCP/IP Basics and Scanning The OSI Model TCP/IP Protocol Suite Layers Encapsulation Data-Link Protocols IP - Internet Protocol, Datagram (Packet) ICMP Packets UDP � User Datagram Protocol UDP Datagram TCP � Transmission Control Protocol TCP Segment TCP/IP 3-Way Handshake and Flags TCP and UDP Ports Ping Sweeps Good Old Ping, Nmap, TCP Ping Sweep TCP Sweep Traffic Captured Unix Pinging Utilities Default TTLs Pinging Countermeasures Port Scanning Nmap Advanced Probing Techniques Scanrand Port Probing Countermeasures Watch Your Own Ports Demo - Scanning Tools Module 3 Review Module 4 Enumeration and Verification Operating System Identification Differences Between OS TCP/IP Stack Nmap -O Active vs Passive Fingerprinting Xprobe/Xprobe2 Countermeasures SNMP Overview SNMP Enumeration SMTP, Finger, and E-mail Aliases Gleaning Information from SMTP SMTP E-mail Alias Enumeration SMTP Enumeration Countermeasures CIFS/SMB Attack Methodology Find Domains and Computers NetBIOS Data NBTscan NULL Session Local and Domain Users Find Shares with net view enum: the All-in-one Winfo and NTInfoScan (ntis.exe) Digging in the Registry NetBIOS Attack Summary NetBIOS Countermeasures What�s this SID Thing Anyway? Common SIDs and RIDs whoami RestrictAnonymous USER2SID/SID2USER psgetsid.exe and UserDump Tool LDAP and Active Directory GUI Tools to Perform the Same Actions Demo - Enumeration Module 4 Review Module 5 Hacking & Defending Wireless/Modems Phone Numbers & Modem Background Phone Reconnaissance Modem Attacks Wireless Reconnaissance Wireless Background Wireless Reconnaissance Continued Wireless Sniffing kracking WEP Keys Defending Wireless Module 5 Review Module 6 Hacking & Defending Web Servers Web Servers in General: HTTP Uniform Resource Locator: URL Apache Web Server Functionality Apache: Attacking Mis-configurations Apache: Attacking Known Vulnerabilities Defending Apache Web Server micr*soft Internet Information Server (IIS) IIS: Security Features IIS: Attacking General Problems IIS: IUSER or IWAM Level Access IIS: Administrator or Sys Level Access IIS: Clearing IIS Logs IIS: Defending and Countermeasures Web Server Vulnerability Scanners Demo - Hacking Web Servers Module 6 Review Module 7 Hacking & Defending Web Applications Background on Web Threat & Design Basic Infrastructure Information Information Leaks on Web Pages Hacking over SSL Use the Source, Luke� Functional/Logic Testing Attacking Authentication Attacking Authorization Debug Proxies: @stake webproxy Input Validation Attacks Attacking Session State Attacking Web Clients Cross-Site Scripting (XSS) Threats Defending Web Applications Module 7 Review Module 8 Sniffers and Session Hijacking Sniffers Why Are Sniffers so Dangerous? Collision & Broadcast Domains VLANs and Layer-3 Segmentation tcpdump & WinDump Berkley Packet Filter (BPF) Libpcap & WinPcap BUTTSniffing Tool and dSniff Ethereal Mitigation of Sniffer Attacks Antisniff ARP Poisoning MAC Flooding DNS and IP Spoofing Session Hijacking Sequence Numbers Hunt Ettercap Source Routing Hijack Countermeasures Demo - Sniffers Module 8 Review Module 9 Hacking & Defending Windows Systems Physical Attacks LANMan Hashes and Weaknesses WinNT Hash and Weaknesses Look for Guest, Temp, Joe Accounts Direct Password Attacks Before You krack: Enum Tool Finding More Account Information kracking Passwords Grabbing the SAM krack the Obtained SAM LSA Secrets and Trusts Using the Newly Guessed Password Bruteforcing Other Services CD1.Ethical.Hacking.and.Penetration http://rapid*share.com/files/31155161/Mo ... part01.rar http://rapid*share.com/files/31155163/Mo ... part02.rar http://rapid*share.com/files/31155164/Mo ... part03.rar http://rapid*share.com/files/31171269/Mo ... part04.rar http://rapid*share.com/files/31171270/Mo ... part05.rar http://rapid*share.com/files/31171271/Mo ... part06.rar http://rapid*share.com/files/31190434/Mo ... part07.rar http://rapid*share.com/files/31190436/Mo ... part08.rar http://rapid*share.com/files/2416395...e_1.part09.rar http://rapid*share.com/files/2416395...e_1.part10.rar CD2 Footprinting and Reconnaissance http://rapid*share.com/files/24168655/Mo ... part01.rar http://rapid*share.com/files/24168656/Mo ... part02.rar http://rapid*share.com/files/24168657/Mo ... part03.rar http://rapid*share.com/files/24168658/Mo ... part04.rar http://rapid*share.com/files/24174114/Mo ... part05.rar http://rapid*share.com/files/24174115/Mo ... part06.rar http://rapid*share.com/files/24310589/Mo ... part07.rar http://rapid*share.com/files/24310590/Mo ... part08.rar CD3 TCP/IP Basics and Scanning http://rapid*share.com/files/24321107/mod.3.part1.rar http://rapid*share.com/files/24321109/mod.3.part2.rar Buat yg mw lokalin ane kasih melon 10 biji.. ![]() ![]() ![]() Lanjut di bawah ![]() Cd 4 sama 17nya gag muat.. ![]() Terkait:
|
![]() |
|
|