Showing posts with label Ebooks. Show all posts
Showing posts with label Ebooks. Show all posts
Thursday, May 21, 2015
CoderXEbooks, Web Hacking
CoderXEbooks, Security, Web Hacking
The Webapplication Hackers HandBook
Chapter 1 Web Application (In)security
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Attacking Data Stores
Chapter 10 Attacking Back-End Components
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Users: Cross-Site Scripting
Chapter 13 Attacking Users: Other Techniques
Chapter 14 Automating Customized Attacks
Chapter 15 Exploiting Information Disclosure
Chapter 16 Attacking Native Compiled Applications
Chapter 17 Attacking Application Architecture
Chapter 18 Attacking the Application Server
Chapter 19 Finding Vulnerabilities in Source Code
Chapter 20 A Web Application Hacker’s Toolkit
Chapter 21 A Web Application Hacker’s Methodology
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Attacking Data Stores
Chapter 10 Attacking Back-End Components
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Users: Cross-Site Scripting
Chapter 13 Attacking Users: Other Techniques
Chapter 14 Automating Customized Attacks
Chapter 15 Exploiting Information Disclosure
Chapter 16 Attacking Native Compiled Applications
Chapter 17 Attacking Application Architecture
Chapter 18 Attacking the Application Server
Chapter 19 Finding Vulnerabilities in Source Code
Chapter 20 A Web Application Hacker’s Toolkit
Chapter 21 A Web Application Hacker’s Methodology
Friday, May 15, 2015
Thursday, May 7, 2015
UnknownEbooks, SQL injection, Web Hacking
SQL Injection Bypassing HandBook
Content writers :-
Chapter I:::
- SQL Injection: What is it?
- SQL Injection: An In-depth Explanation
- Why is it possible to pass SQL queries directly to a database that is hidden behind a firewall and any other security mechanism?
- Is my database at risk to SQL Injection?
- What is the impact of SQL Injection?
- Example of a SQLInjection Attack
WebApplication Firewalls::
- Detecting A WAF
- Prompt Message
- Dotdefender
- Observing HTTP Response
Chapter II
Advanced evasion techniques for defeating SQL injection Input validation mechanisms
Web applications are becoming more and more technically complex. Web applications, their
- Whitespace
- Null Bytes
- SQL Comments
- URL Encoding
- Changing Cases
- Encode to Hex Forbidden
- Replacing keywords technique
- WAF Bypassing – using characters
- HTTP Parameter Pollution (HPP)
- CRLF WAF Bypass technique
- Buffer Overflow bypassing
Chapter III
Let's see the matter in an orderly fashion from the beginning
- See If Site vulnerability Or Not
- Get Column Number
- Bypassing union select
- Get Version
- Group & Concat
- Bypass with Information_schema.tables
- Requested Baypassing
Chapter IIII
Other issues related to the subject
- Null Parameter
- FIND VULNERABLE COLUMNS
- Count(*)
- unhex()
- Get database
Thursday, February 19, 2015
UnknownCookBook, Ebooks, Forensic, Kali, knowledge, Linux, Metasploit, Web Hacking, Window
Metasploit Penetration Testing Cookbook
Set up a complete penetration testing environment using metasploit and virtual machines.
Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
Avail of exclusive coverage of antivirus bypassing techniques using metasploit
Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc.
Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
Avail of exclusive coverage of antivirus bypassing techniques using metasploit
Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc.
Build and analyze meterpreter scripts in Ruby
Build and export exploits to framework
Use extension tools like Armitage, SET etc.
Build and export exploits to framework
Use extension tools like Armitage, SET etc.
<div class="abt-button">
<a href="http://adf.ly/14063G">Download</a>
<p class="up">click to begin</p>
<p class="down">1.2MB .zip</p>
</div>
Monday, February 16, 2015
CoderXC++, Ebooks, Programming
C++ HOW TO PROGRAM 8TH EDITION BY PAUL DEITEL
Ebook Info:-
Publication Date: March 25, 2011 | ISBN-10: 0132662361 | ISBN-13: 978-0132662369 | Edition: 8
Size ("56.21 Mb")
Download : www.2shared.com
Download : mediafire
Wednesday, February 11, 2015
Basic Security Testing with Linux
With This Chapers !
Chapter 1 – Introduction
Part 1: Installing and Basic Overview
Chapter 2 – Installing Kali with VMWare Player
Part 2 – Metasploit Tutorial
Chapter 3 – Introduction to Metasploit
Chapter 4 – Meterpreter Shell
Part 3 – Information Gathering & Mapping
Chapter 5 – Recon Tools
Chapter 6 – Shodan
Part 4 - Attacking Hosts
Chapter 7 – Metasploitable Tutorial – Part One
Chapter 8 – Metasploitable – Part Two: Scanners
Chapter 9 – Windows AV Bypass with Veil
Chapter 10 – Windows Privilege Escalation by Bypassing UAC
Chapter 11 – Packet Captures and Man-in-the-Middle Attacks
Chapter 12 – Using the Browser Exploitation Framework
Part 5 - Social Engineering
Chapter 13 – Social Engineering
Chapter 14 – The Social Engineering Toolkit
Chapter 15 – Subterfuge
Part 6 – Password Attacks
Chapter 16 – Cracking Simple LM Hashes
Chapter 17 – Pass the Hash
Chapter 18 – Mimikatz Plain Text Passwords
Chapter 19 – Mimikatz and Utilman
Chapter 20 – Keyscan and Lockout Keylogger
Chapter 21 – HashCat
Chapter 22 – Wordlists
Chapter 23 – Cracking Linux Passwords
Part 7 – Router and Wi-Fi Attacks
Chapter 24 – Router Attacks
Chapter 25 – Wireless Network Attacks
Chapter 26 – Fern WIFI Cracker
Chapter 27 – Wi-Fi Testing with WiFite
Chapter 28 – Kismet
Chapter 29 – Easy Creds
Part 8 – Raspberry Pi
Chapter 30 – Installing Kali on a Raspberry Pi
Chapter 31 – WiFi Pentesting on a Raspberry Pi
Part 9 - Defending your Network
Chapter 32 – Network Defense and Conclusion
Wednesday, February 4, 2015
CoderXEbooks
The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing, Second Edition - Ethical Hacking and Penetration Testing Made Easy
2013 | ISBN: 0124116442 | English | Pages: 225 | PDF | 3.48 Mb
The
Basics of Hacking and Penetration Testing, 2nd Ed. serves as an
introduction to the steps required to complete a penetration test or
perform an ethical hack from beginning to end. No prior hacking
experience is needed. You will learn how to properly utilize and
interpret the results of modern day hacking tools, which are required to
complete a penetration test. 2013 | ISBN: 0124116442 | English | Pages: 225 | PDF | 3.48 Mb
Subscribe to:
Posts (Atom)