اعلان

Website

المدونة

ملاحظات يجب قراءتها:

1. نتبرئ من استخدام أي موضوع في المدونة في طريق الحرام أو ضد المسلمين.
2. إن لم تجد الموضوع الذي بحثت عنه في محرك البحث، استخدم البحث الداخلي في المدونة.
3. هناك مراكز رفع ملفات تحتاج الى استعمال بروكسي للتحميل المجاني دون عمل حساب مدفوع مثل مركز رفع uploading.com
4. نعتذر عن عدم توفر بدائل لبعض الروابط المفقودة
5. الرجاء فحص الملفات جيداً قبل التشغيل فيما يخص أدوات الهاكرز و الفيديو..الخ
6. ليست كل البرامج كاملة و ليست كل البرامج تحتاج الى تسجيل!!؟؟
7. عزيزي الزائر تشرفنا بزيارتك، و أعلم أنك لست أول زائر و لن تكون الاخير بإذن الله تعالى، تمتع بتصفح المدونة دون مشاكل بإذن الله...
8. لا تنس استخدام (رسائل اقدم) لرؤية باقي مواضيع التصنيفات

انشاء المدونة

تم انشاء المدونة في:

07\01\2009

Black ice

كل عام و أنتم بألف خير بمناسبة مرور 4 سنوات على انشاء المدونة و الحمدلله

ĬŖŞĤ@ĮĐ مدونة الخدع و الشروحات إرشيد الجرايدة ĬŖŞĤ@ĮĐ

HAcking Training Course



HAcking Training Course HAcking Training Course 

QUOTE
Package Includes:
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook by Logical Security

Module 1
Ethical Hacking and Penetration Testing 
Security 101 
Hacking Hall of Fame 
What are Today's hackers Like? 
Today's Hackers 
Risk Management 
Evolution of Threats 
Typical Vulnerability Life Cycle 
What is Ethical Hacking? 
Rise of the Ethical Hacker 
Types of Security Test 
Penetration Test (Pen-test) 
Red Teams 
Testing Methodology 
VMWare Workstation 
Windows and Linux Running VMWare 
Linux Is a Must 
Linux Survival Skills 
Useful vi Editor Commands 
Module 1 Review 
Module 2
Footprinting and Reconnaissance 
Desired Information 
Find Information by the Target (Edgar) 
terraserver.microsoft.com 
Network Reconnaissance & DNS Search 
Query Whois Databases 
Command-Line Whois Searches 
ARIN whois: Search IP Address Blocks 
SamSpade Tool and Website 
Internet Presence 
Look Through Source Code 
Mirror Website 
Find Specific Types of Systems 
Big Brother 
AltaVista 
Specific Data Being Available? 
Anonymizers 
Countermeasures to Information Leakage 
Social Engineering 
DNS Zone Transfer 
Nslookup command-line utility 
Zone Transfer from Linux 
Automated Zone Transfers 
Zone Transfer Countermeasures 
www.CheckDNS.net 
Tracing Out a Network Path 
tracert Output 
Free Tools 
Paratrace 
War Dialing for Hanging Modems 
Manual and Automated War Dialing 
Case Study 
Guide Dogs for the Blind: Pairing blind people with Guide Dogs since 1942 
Footprinting Countermeasures 
Demo - Footprinting & Info Gathering 
Module 2 Review 
Module 3
TCP/IP Basics and Scanning 
The OSI Model 
TCP/IP Protocol Suite Layers 
Encapsulation 
Data-Link Protocols 
IP - Internet Protocol, Datagram (Packet) 
ICMP Packets 
UDP – User Datagram Protocol 
UDP Datagram 
TCP – Transmission Control Protocol 
TCP Segment 
TCP/IP 3-Way Handshake and Flags 
TCP and UDP Ports 
Ping Sweeps 
Good Old Ping, Nmap, TCP Ping Sweep 
TCP Sweep Traffic Captured 
Unix Pinging Utilities 
Default TTLs 
Pinging Countermeasures 
Port Scanning 
Nmap 
Advanced Probing Techniques 
Scanrand 
Port Probing Countermeasures 
Watch Your Own Ports 
Demo - Scanning Tools 
Module 3 Review 
Module 4
Enumeration and Verification 
Operating System Identification 
Differences Between OS TCP/IP Stack 
Nmap -O 
Active vs Passive Fingerprinting 
Xprobe/Xprobe2 
Countermeasures 
SNMP Overview 
SNMP Enumeration 
SMTP, Finger, and E-mail Aliases 
Gleaning Information from SMTP 
SMTP E-mail Alias Enumeration 
SMTP Enumeration Countermeasures 
CIFS/SMB 
Attack Methodology 
Find Domains and Computers 
NetBIOS Data 
NBTscan 
NULL Session 
Local and Domain Users 
Find Shares with net view 
enum: the All-in-one 
Winfo and NTInfoScan (ntis.exe) 
Digging in the Registry 
NetBIOS Attack Summary 
NetBIOS Countermeasures 
What’s this SID Thing Anyway? 
Common SIDs and RIDs 
whoami 
RestrictAnonymous 
USER2SID/SID2USER 
psgetsid.exe and UserDump Tool 
LDAP and Active Directory 
GUI Tools to Perform the Same Actions 
Demo - Enumeration 
Module 4 Review 
Module 5
Hacking & Defending Wireless/Modems 
Phone Numbers & Modem Background 
Phone Reconnaissance 
Modem Attacks 
Wireless Reconnaissance 
Wireless Background 
Wireless Reconnaissance Continued 
Wireless Sniffing 
Cracking WEP Keys 
Defending Wireless 
Module 5 Review 
Module 6
Hacking & Defending Web Servers 
Web Servers in General: HTTP 
Uniform Resource Locator: URL 
Apache Web Server Functionality 
Apache: Attacking Mis-configurations 
Apache: Attacking Known Vulnerabilities 
Defending Apache Web Server 
Microsoft Internet Information Server (IIS) 
IIS: Security Features 
IIS: Attacking General Problems 
IIS: IUSER or IWAM Level Access 
IIS: Administrator or Sys Level Access 
IIS: Clearing IIS Logs 
IIS: Defending and Countermeasures 
Web Server Vulnerability Scanners 
Demo - Hacking Web Servers 
Module 6 Review 
Module 7
Hacking & Defending Web Applications 
Background on Web Threat & Design 
Basic Infrastructure Information 
Information Leaks on Web Pages 
Hacking over SSL 
Use the Source, Luke… 
Functional/Logic Testing 
Attacking Authentication 
Attacking Authorization 
Debug Proxies: @stake webproxy 
Input Validation Attacks 
Attacking Session State 
Attacking Web Clients 
Cross-Site Scripting (XSS) Threats 
Defending Web Applications 
Module 7 Review 
Module 8
Sniffers and Session Hijacking 
Sniffers 
Why Are Sniffers so Dangerous? 
Collision & Broadcast Domains 
VLANs and Layer-3 Segmentation 
tcpdump & WinDump 
Berkley Packet Filter (BPF) 
Libpcap & WinPcap 
BUTTSniffing Tool and dSniff 
Ethereal 
Mitigation of Sniffer Attacks 
Antisniff 
ARP Poisoning 
MAC Flooding 
DNS and IP Spoofing 
Session Hijacking 
Sequence Numbers 
Hunt 
Ettercap 
Source Routing 
Hijack Countermeasures 
Demo - Sniffers 
Module 8 Review 
Module 9
Hacking & Defending Windows Systems 
Physical Attacks 
LANMan Hashes and Weaknesses 
WinNT Hash and Weaknesses 
Look for Guest, Temp, Joe Accounts 
Direct Password Attacks 
Before You Crack: Enum Tool 
Finding More Account Information 
Cracking Passwords 
Grabbing the SAM 
Crack the Obtained SAM 
LSA Secrets and Trusts 
Using the Newly Guessed Password 
Bruteforcing Other Services 
Operating System Attacks 
Hiding Tracks: Clearing Logs 
Hardening Windows Systems 
Strong 3-Factor Authentication 
Creating Strong Passwords 
Authentication 
Windows Account Lockouts 
Auditing Passwords 
File Permissions 
Demo - Attacking Windows Systems 
Module 9 Review 
Module 10
Hacking & Defending Unix Systems 
Physical Attacks on Linux 
Password Cracking 
Brute Force Password Attacks 
Stack Operation 
Race Condition Errors 
Format String Errors 
File System Attacks 
Hiding Tracks 
Single User Countermeasure 
Strong Authentication 
Single Sign-On Technologies 
Account Lockouts 
Shadow Password Files 
Buffer Overflow Countermeasures 
LPRng Countermeasures 
Tight File Permissions 
Hiding Tracks Countermeasures 
Removing Unnecessary Applications 
DoS Countermeasures 
Hardening Scripts 
Using SSH & VPNs to Prevent Sniffing 
Demo - Attacking Unix Systems 
Module 10 Review 
Module 11
Rootkits, Backdoors, Trojans & Tunnels 
Types Of Rootkits 
A Look at LRK 
Examples of Trojaned Files 
Windows NT Rootkits 
NT Rootkit 
AFX Windows Rootkit 2003 
Rootkit Prevention Unix 
Rootkit Prevention Windows 
netcat 
netcat: Useful Unix Commands 
netcat: What it Looks Like 
VNC-Virtual Network Computing 
Backdoor Defenses 
Trojans 
Back Orifice 2000 
NetBus 
SubSeven 
Defenses to Trojans 
Tunneling 
Loki 
Other Tunnels 
Q-2.4 by Mixter 
Starting Up Malicious Code 
Defenses Against Tunnels 
Manually Deleting Logs 
Tools to Modify Logs 
Demo - Trojans 
Module 11 Review 
Module 12
Denial of Service and Botnets 
Denial-of-Service Attacks 
CPUHog 
Ping of Death 
Teardrop Attacks 
Jolt2 
Smurf Attacks 
SYN Attacks 
UDP Floods 
Distributed DoS 
DDoS Tool: Trin00 
Other DDoS Variation 
History of Botnets 
Anatomy of a Botnet 
Some Common Bots 
Demo - Denial of Service 
Module 12 Review 
Module 13
Automated Pen Testing Tools 
General: Definitions 
General:What? 
General: Why? 
Core Impact™ Framework 
Core Impact™ Operation 
Canvas™ Framework 
Canvas™ Operation 
Metasploit Framework 
Metasploit Operation 
Demo - Automated Pen Testing 
Module 13 Review 
Module 14
Intrusion Detection Systems 
Types of IDSs 
Network IDSs 
Distributed IDSs (DIDSs) 
Anomaly Detection 
Signature Detection 
Common IDS Software Products 
Introduction to Snort 
Attacking an IDS 
Eluding Techniques 
Testing an IDS 
Hacking Tool - NIDSbench 
Hacking Tool - Fragroute 
Hacking Tool - SideStep 
Hacking Tool - ADMmutate 
Other IDS Evasion Tools 
Demo - IDS and Snort 
Module 14 Review 
Module 15
Firewalls 
Firewall Types 
Application Layer Gateways 
ALGs (Proxies) 
Stateful Inspection Engine 
Hybrid Firewall 
Host-Based Firewall 
Network-Based Firewall 
DMZ (Demilitarized Zone) 
Back-to-Back Firewalls 
Bastion Hosts 
Control Traffic Flow 
Multiple DMZs 
Controlling Traffic Flow 
Why Do I Need a Firewall? 
What Should I Filter? 
Egress Filtering 
Network Address Translation (NAT) 
Firewall Vulnerabilities 
IPTables/NetFilter 
Default Tables and Chains 
iptables Syntax 1 
iptables Syntax 2 
Sample IPTables Script 1 
Sample IPTables Script 2 
Persistent Firewalls 
Firewall Identification 
Firewalk 
Tunneling with Loki 
Tunneling with NetCat/CryptCat 
Port Redirection with Fpipe 
Denial-of-Service Attacks Risk? 
Demo - Firewalls and IP Tables 
Module 15 Review 
Module 16
Honeypots and Honeynets 
What Is a Honeypot? 
Advantages and Disadvantages 
Types and Categories of Honeypots 
Honeypot: Tarpits 
Honeypot: Kfsensor 
Honeypot: Honeyd 
Sample Honeyd Configuration 
High-Interaction Honeypot 
Project HoneyNet 
Types of Honeynets 
The Main Difference is Data Control 
GEN II Data Control: Honeywall CD 
Gen II Data Capture: Sebek & Sebek II 
Automated Alerting 
Testing 
Legal Issues 
Demo - Setting up a Honeypot 
Module 16 Review 
Module 17
Ethics and Legal Issues 
The Costs 
Relation to Ethical Hacking? 
The Dual Nature of Tools 
Good Instead of Evil? 
Recognizing Trouble When It Happens 
Emulating the Attack 
Security Does Not Like Complexity 
Proper and Ethical Disclosure 
CERT’s Current Process 
Full Disclosure Policy 
Organization for Internet Safety (OIS) 
What Should We Do from Here? 
Legal Meets Information Systems 
Addressing Individual Laws 
18 USC SECTION 1029 
18 USC SECTION 1030 
1030: Worms and Viruses 
Blaster Worm Attacks 
Civil vs. Criminal 
18 USC SECTIONS 2510 and 2701 
Digital Millennium Copyright Act 
Cyber Security Enhancement Act 
Module 17 Review 
Course Closure 
Enjoy M8's


CD1.Ethical.Hacking.and.Penetration



CODE
http://rapidshare.com/files/31155161/Module_1.part01.rar
http://rapidshare.com/files/31155163/Module_1.part02.rar
http://rapidshare.com/files/31155164/Module_1.part03.rar
http://rapidshare.com/files/31171269/Module_1.part04.rar
http://rapidshare.com/files/31171270/Module_1.part05.rar
http://rapidshare.com/files/31171271/Module_1.part06.rar
http://rapidshare.com/files/31190434/Module_1.part07.rar
http://rapidshare.com/files/31190436/Module_1.part08.rar
http://rapidshare.com/files/31190437/Module_1.part09.rar


CD2 Footprinting and Reconnaissance

CODE
http://rapidshare.com/files/24168655/Module_2.part01.rar
http://rapidshare.com/files/24168656/Module_2.part02.rar
http://rapidshare.com/files/24168657/Module_2.part03.rar
http://rapidshare.com/files/24168658/Module_2.part04.rar
http://rapidshare.com/files/24174114/Module_2.part05.rar
http://rapidshare.com/files/24174115/Module_2.part06.rar
http://rapidshare.com/files/24310589/Module_2.part07.rar
http://rapidshare.com/files/24310590/Module_2.part08.rar
http://rapidshare.com/files/24310591/Module_2.part09.rar


CD3 TCP/IP Basics and Scanning


CODE
http://rapidshare.com/files/24321107/mod.3.part1.rar
http://rapidshare.com/files/24321109/mod.3.part2.rar
http://rapidshare.com/files/24339724/mod.3.part3.rar


CD4 Enumeration and Verification


CODE
http://rapidshare.com/files/25291513/module.4.part1.rar
http://rapidshare.com/files/25291516/module.4.part2.rar
http://rapidshare.com/files/25297786/module.4.part3.rar
http://rapidshare.com/files/25297787/module.4.part4.rar



CD5 Hacking & Defending Wireless/Modems


CODE
http://rapidshare.com/files/24480780/module_5.part1.rar
http://rapidshare.com/files/24480781/module_5.part2.rar
http://rapidshare.com/files/24480784/module_5.part3.rar
http://rapidshare.com/files/24480785/module_5.part4.rar
http://rapidshare.com/files/24480786/module_5.part5.rar
http://rapidshare.com/files/24480787/module_5.part6.rar


CD6 Hacking & Defending Web Servers


CODE
http://rapidshare.com/files/28925031/Module.6.Hacking.Defending.Web.Servs.part01.rar
http://rapidshare.com/files/28925032/Module.6.Hacking.Defending.Web.Servs.part02.rar
http://rapidshare.com/files/28925034/Module.6.Hacking.Defending.Web.Servs.part03.rar
http://rapidshare.com/files/28925035/Module.6.Hacking.Defending.Web.Servs.part04.rar
http://rapidshare.com/files/28931012/Module.6.Hacking.Defending.Web.Servs.part05.rar
http://rapidshare.com/files/28931013/Module.6.Hacking.Defending.Web.Servs.part06.rar


CD7.Hacking.Defending.Web.Applications


CODE
http://rapidshare.com/files/26188740/Module.7.part1.rar
http://rapidshare.com/files/26188742/Module.7.part2.rar
http://rapidshare.com/files/26196529/Module.7.part3.rar


CD8. .Sniffers.and.Session.Hijacking


CODE
http://rapidshare.com/files/26196533/Module.8.part1.rar
http://rapidshare.com/files/26360406/Module.8.part2.rar
http://rapidshare.com/files/26360407/Module.8.part3.rar


CD9.Hacking.Defending.Windows.Systems


CODE
http://rapidshare.com/files/26370153/Module.9.part1.rar
http://rapidshare.com/files/26376136/Module.9.part2.rar
http://rapidshare.com/files/26370156/Module.9.part3.rar


CD10.Hacking.Defending.Unix.Systems



CD .11.Rootkits.Backdoors.Trojans.Tunnels


CODE
http://rapidshare.com/files/28236225/Module_11.part01.rar
http://rapidshare.com/files/28236226/Module_11.part02.rar
http://rapidshare.com/files/28236228/Module_11.part03.rar
http://rapidshare.com/files/28236229/Module_11.part04.rar
http://rapidshare.com/files/28236231/Module_11.part05.rar
http://rapidshare.com/files/28236233/Module_11.part06.rar
http://rapidshare.com/files/28238956/Module_11.part07.rar
http://rapidshare.com/files/28238959/Module_11.part08.rar


CD.12.Denial.of.Service.and.Botnets

CODE
http://rapidshare.com/files/28250428/Module_12.part1.rar
http://rapidshare.com/files/28250430/Module_12.part2.rar
http://rapidshare.com/files/28250431/Module_12.part3.rar
http://rapidshare.com/files/28250432/Module_12.part4.rar
http://rapidshare.com/files/28250433/Module_12.part5.rar
http://rapidshare.com/files/28250434/Module_12.part6.rar
http://rapidshare.com/files/28250435/Module_12.part7.rar


CD.13..Automated.Pen.Testing.Tools

CODE
http://rapidshare.com/files/28259605/Module.13.part01.rar
http://rapidshare.com/files/28259607/Module.13.part02.rar
http://rapidshare.com/files/28259608/Module.13.part03.rar
http://rapidshare.com/files/28259610/Module.13.part04.rar
http://rapidshare.com/files/28259612/Module.13.part05.rar
http://rapidshare.com/files/28259613/Module.13.part06.rar
http://rapidshare.com/files/28259614/Module.13.part07.rar


CD.14.Intrusion.Detection.Systems


CODE
http://rapidshare.com/files/28268932/Module_14.part01.rar
http://rapidshare.com/files/28268933/Module_14.part02.rar
http://rapidshare.com/files/28268935/Module_14.part03.rar
http://rapidshare.com/files/28268936/Module_14.part04.rar
http://rapidshare.com/files/28268937/Module_14.part05.rar
http://rapidshare.com/files/28268938/Module_14.part06.rar
http://rapidshare.com/files/28275713/Module_14.part07.rar
http://rapidshare.com/files/28275714/Module_14.part08.rar
http://rapidshare.com/files/28275715/Module_14.part09.rar
http://rapidshare.com/files/28275716/Module_14.part10.rar


CD .15.Firewalls

CODE
http://rapidshare.com/files/28283458/Module_15.part01.rar
http://rapidshare.com/files/28283459/Module_15.part02.rar
http://rapidshare.com/files/28283460/Module_15.part03.rar
http://rapidshare.com/files/28283461/Module_15.part04.rar
http://rapidshare.com/files/28283464/Module_15.part05.rar
http://rapidshare.com/files/28283465/Module_15.part06.rar
http://rapidshare.com/files/28338024/Module_15.part07.rar
http://rapidshare.com/files/28338028/Module_15.part08.rar
http://rapidshare.com/files/28338029/Module_15.part09.rar
http://rapidshare.com/files/28338030/Module_15.part10.rar
http://rapidshare.com/files/28338032/Module_15.part11.rar

CD. 16.Honeypots.and.Honeynets


CODE
http://rapidshare.com/files/28345006/Module_16.part01.rar
http://rapidshare.com/files/28345007/Module_16.part02.rar
http://rapidshare.com/files/28345008/Module_16.part03.rar
http://rapidshare.com/files/28345009/Module_16.part04.rar
http://rapidshare.com/files/28345010/Module_16.part05.rar
http://rapidshare.com/files/28345011/Module_16.part06.rar
http://rapidshare.com/files/28354433/Module_16.part07.rar
http://rapidshare.com/files/28354435/Module_16.part08.rar


CD. 17 .Ethics.and.Legal.Issues

CODE
http://rapidshare.com/files/28354436/Module_17.part1.rar
http://rapidshare.com/files/28354437/Module_17.part2.rar
http://rapidshare.com/files/28354438/Module_17.part3.rar
http://rapidshare.com/files/28354439/Module_17.part4.rar
http://rapidshare.com/files/28357536/Module_17.part5.rar
http://rapidshare.com/files/28357537/Module_17.part6.rar

ليست هناك تعليقات:

إرسال تعليق