Just Educational Purpose Only For Pentesters And Developers

  • challenge

    I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

    Read More
  • Computer hacking

    Computer hacking really results in financial losses and hassles. The objectives of terrorist groups are more serious. That is not to say that cyber groups can't access a telephone switch in Manhattan on a day like 9/11, shut it down, and therefore cause more casualties.Kevin Mitnick

    Read More
  • The only Entertainment

    Hacking was the only entertainment that would occupy my mind - like a huge video game, but with real consequences. I could have evaded the FBI a lot longer if I had been able to control my passion for hacking.Kevin Mitnick

    Read More
Showing posts with label Ebooks. Show all posts
Showing posts with label Ebooks. Show all posts

Thursday, May 21, 2015

Hacking ASP.Net Website

The best attacking for asp.net web application hacker handbook.


Download

click to begin

1.3MB .pdf

The Webapplication Hackers HandBook

Chapter 1  Web Application (In)security 
Chapter 2  Core Defense Mechanisms
Chapter 3  Web Application Technologies 
Chapter 4  Mapping the Application 
Chapter 5  Bypassing Client-Side Controls 
Chapter 6  Attacking Authentication 
Chapter 7  Attacking Session Management 
Chapter 8  Attacking Access Controls 
Chapter 9  Attacking Data Stores 
Chapter 10  Attacking Back-End Components 
Chapter 11  Attacking Application Logic 
Chapter 12  Attacking Users: Cross-Site Scripting 
Chapter 13  Attacking Users: Other Techniques 
Chapter 14  Automating Customized Attacks 
Chapter 15  Exploiting Information Disclosure 
Chapter 16  Attacking Native Compiled Applications 
Chapter 17  Attacking Application Architecture 
Chapter 18  Attacking the Application Server 
Chapter 19  Finding Vulnerabilities in Source Code 
Chapter 20  A Web Application Hacker’s Toolkit 
Chapter 21  A Web Application Hacker’s Methodology 



Download

click to begin

13MB .pdf

Friday, May 15, 2015

KALI LINUX ASSURING SECURITY BY PENETRATION TESTING 2014


Download

click to begin

1.7MB .zip

Thursday, May 7, 2015

SQL Injection Bypassing HandBook


Content writers :-

Chapter I:::


  • SQL Injection: What is it?
  • SQL Injection: An In-depth Explanation
  • Why is it possible to pass SQL queries directly to a database that is hidden behind a firewall and any other security mechanism?
  • Is my database at risk to SQL Injection?
  • What is the impact of SQL Injection?
  • Example of a SQLInjection Attack

WebApplication Firewalls::

  • Detecting A WAF
  • Prompt Message
  • Dotdefender
  • Observing HTTP Response

Chapter II

Advanced evasion techniques for defeating SQL injection Input validation mechanisms
Web applications are becoming more and more technically complex. Web applications, their

  • Whitespace
  • Null Bytes
  • SQL Comments
  • URL Encoding
  • Changing Cases
  • Encode to Hex Forbidden
  • Replacing keywords technique
  • WAF Bypassing – using characters
  • HTTP Parameter Pollution (HPP)
  • CRLF WAF Bypass technique
  • Buffer Overflow bypassing

Chapter III

Let's see the matter in an orderly fashion from the beginning

  • See If Site vulnerability Or Not
  • Get Column Number
  • Bypassing union select
  • Get Version
  • Group & Concat
  • Bypass with Information_schema.tables
  • Requested Baypassing

Chapter IIII

Other issues related to the subject
  • Null Parameter
  • FIND VULNERABLE COLUMNS
  • Count(*)
  • unhex()
  • Get database
  •  
Download : MediaFire

Thursday, February 19, 2015

Metasploit Penetration Testing Cookbook

Set up a complete penetration testing environment using metasploit and virtual machines.
Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
Avail of exclusive coverage of antivirus bypassing techniques using metasploit
Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc.

Build and analyze meterpreter scripts in Ruby
Build and export exploits to framework
Use extension tools like Armitage, SET etc.



 <div class="abt-button">
      <a href="http://adf.ly/14063G">Download</a>
      <p class="up">click to begin</p>
      <p class="down">1.2MB .zip</p>
    </div>




Tuesday, February 17, 2015

Windows Forensic Analysis Toolkit

Monday, February 16, 2015

C++ HOW TO PROGRAM 8TH EDITION BY PAUL DEITEL


Ebook Info:-
Publication Date: March 25, 2011 | ISBN-10: 0132662361 | ISBN-13: 978-0132662369 | Edition: 8
Size ("56.21 Mb")

Download : www.2shared.com

Download : mediafire

Wednesday, February 11, 2015

Basic Security Testing with Linux

With This Chapers !
Chapter 1 – Introduction
Part 1: Installing and Basic Overview
Chapter 2 – Installing Kali with VMWare Player
Part 2 – Metasploit Tutorial
Chapter 3 – Introduction to Metasploit
Chapter 4 – Meterpreter Shell
Part 3 – Information Gathering & Mapping
Chapter 5 – Recon Tools
Chapter 6 – Shodan
Part 4 - Attacking Hosts
Chapter 7 – Metasploitable Tutorial – Part One
Chapter 8 – Metasploitable – Part Two: Scanners
Chapter 9 – Windows AV Bypass with Veil
Chapter 10 – Windows Privilege Escalation by Bypassing UAC
Chapter 11 – Packet Captures and Man-in-the-Middle Attacks
Chapter 12 – Using the Browser Exploitation Framework
Part 5 - Social Engineering
Chapter 13 – Social Engineering
Chapter 14 – The Social Engineering Toolkit
Chapter 15 – Subterfuge
Part 6 – Password Attacks
Chapter 16 – Cracking Simple LM Hashes
Chapter 17 – Pass the Hash
Chapter 18 – Mimikatz Plain Text Passwords
Chapter 19 – Mimikatz and Utilman
Chapter 20 – Keyscan and Lockout Keylogger
Chapter 21 – HashCat
Chapter 22 – Wordlists
Chapter 23 – Cracking Linux Passwords
Part 7 – Router and Wi-Fi Attacks
Chapter 24 – Router Attacks
Chapter 25 – Wireless Network Attacks
Chapter 26 – Fern WIFI Cracker
Chapter 27 – Wi-Fi Testing with WiFite
Chapter 28 – Kismet
Chapter 29 – Easy Creds
Part 8 – Raspberry Pi
Chapter 30 – Installing Kali on a Raspberry Pi
Chapter 31 – WiFi Pentesting on a Raspberry Pi
Part 9 - Defending your Network
Chapter 32 – Network Defense and Conclusion
Download

click to begin

5MB .zip

Wednesday, February 4, 2015

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing, Second Edition - Ethical Hacking and Penetration Testing Made Easy
2013 | ISBN: 0124116442 | English | Pages: 225 | PDF | 3.48 Mb
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test.