Ebook
The best guide to the Metasploit  Framework.
"The best guide to the Metasploit 
Framework." 
—HD Moore, Founder of the Metasploit
 Project
The
 Metasploit Framework makes discovering, exploiting, and sharing 
vulnerabilities quick and relatively painless. But while Metasploit is 
used by security professionals everywhere, the tool can be hard to grasp
 for first-time users. Metasploit: The Penetration Tester's Guide fills 
this gap by teaching youhow to harness the Framework and interact with 
the vibrant community of Metasploit contributors.
Once
 you've built your foundation for penetration testing, you'll learn the 
Framework's conventions, interfaces, and module system as you launch 
simulated attacks. You'll move on to advanced penetration testing 
techniques, including network reconnaissance and enumeration, 
client-side attacks, wireless attacks, and targeted social-engineering 
attacks.
Learn how to:
Find and exploit unmaintained, misconfigured, and unpatched systems
Perform reconnaissance and find valuable information about your target
Bypass anti-virus technologies and circumvent security controls
Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
Use the Meterpreter shell to launch further attacks from inside the network
Harness standalone Metasploit utilities, third-party tools, and plug-ins
Learn how to write your own Meterpreter post exploitation modules and scripts
You'll
 even touch on exploit discovery for zero-day research, write a fuzzer, 
port existing exploits into the Framework, and learn how to cover your 
tracks. Whether your goal is to secure your own networks or to put 
someone else's to the test, Metasploit: The Penetration Tester's Guide 
will take you there and beyond.
Download Link:
 
 
 
 
 
 
python
Violent Python:-
         Violent Python:-

 
Violent Python shows 
you how to move from a theoretical understanding of offensive computing 
concepts to a practical implementation. Instead of relying on another 
attacker's tools, this book will teach you to forge your own weapons 
using the Python programming language. This book demonstrates how to 
write Python scripts to automate large-scale network attacks, extract 
metadata, and investigate forensic artifacts. It also shows how to write
 code to intercept and analyze network traffic using Python, craft and 
spoof wireless frames to attack wireless and Bluetooth devices, and how 
to data-mine popular social media websites and evade modern anti-virus.
-
 Demonstrates how to write Python scripts to automate large-scale 
network attacks, extract metadata, and investigate forensic artifacts.
-
 Write code to intercept and analyze network traffic using Python. Craft
 and spoof wireless frames to attack wireless and Bluetooth devices.
- Data-mine popular social media websites and evade modern anti-virus.
 
 
 
 
 
<<Back|Track 5 Cook Book->>
      <<Back|Track 5 Cook Book->>

 
Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5
Learn to perform penetration tests with BackTrack 5
Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
Provides detailed step-by-step instructions on the usage of many of BackTrack's popular and not-so- popular tools
In Detail
BackTrack
 is a Linux-based penetration testing arsenal that aids security 
professionals in the ability to perform assessments in a purely native 
environment dedicated to hacking. BackTrack is a distribution based on 
the Debian GNU/Linux distribution aimed at digital forensics and 
penetration testing use. It is named after backtracking, a search 
algorithm.
"BackTrack 5 Cookbook" provides you with practical recipes
 featuring many popular tools that cover the basics of a penetration 
test: information gathering, vulnerability identification, exploitation,
 priviledge escalation, and covering your tracks.
The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.
We
 then dip into recipes involving the basic principles of a penetration 
test such as information gathering, vulnerability identification, and 
exploitation. You will further learn about privilege escalation, radio 
network analysis, Voice over IP, Password cracking, and BackTrack 
forensics.
"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.
What will you learn from this book
Install and set up BackTrack 5 on multiple platforms
Customize BackTrack to fit your individual needs
Exploit vulnerabilities found with Metasploit
Locate vulnerabilities Nessus and OpenVAS
Provide several solutions to escalate privileges on a compromised machine
Learn how to use BackTrack in all phases of a penetration test
Crack WEP/WPA/WPA2 Encryption
Learn how to monitor and eavesdrop on VOIP networks
Approach
This
 is a cookbook with the necessary explained commands and code to learn 
BackTrack thoroughly. It smoothes your learning curve through organized 
recipes.
Who this book is written for
This book is for anyone who 
desires to come up to speed in using BackTrack 5 or for use as a 
reference for seasoned penetration testers.
 
 
 
 
 
c
C++ by Dissection
Download 50+ Hacking Ebooks Collection.
C++ by Dissection
 presents a thorough introduction to the programming process by 
carefully developing working programs to illuminate key features of the 
C++ programming language. This book presents the concepts of the 
programming process using the "dissection" method, the hallmark feature 
that has made Ira Pohl's C and Java books of the "By Dissection" series 
so popular. Dissection is a unique pedagogical tool first developed by 
the author to point out key features of program code. It is similar to a
 structured walk-through of the code, with the intention of explaining 
newly encountered programming elements and idioms as found in working 
code. The book includes a CD-ROM containing a compiler and an electronic
 version of the book that allows readers to search, take notes, and 
highlight right on their computer. Each chapter presents a number of 
carefully explained programs, which lead the reader in a holistic manner
 to ever-improving programming skills. Right from the start, the reader 
is introduced to complete programs, and at an early point in the book, 
the reader is introduced to writing functions as a major feature of 
structured programming. It contains four to seven small code dissections
 per chapter, and then each chapter culminates with a larger, extended 
code dissection. "Software Engineering" sections in each chapter 
reinforce sound software engineering skills. The book assumes no 
programming background and can be used by first-time computer users or 
by experienced programmers who are transitioning to C++.
Download Link:
 
 
 
 
 
O'Reilly HTTP Definitive Guide

 
Behind every web transaction lies the Hypertext 
Transfer Protocol (HTTP) --- the language of web browsers and servers, 
of portals and search engines, of e-commerce and web services. 
Understanding HTTP is essential for practically all web-based 
programming, design, analysis, and administration.
While the basics 
of HTTP are elegantly simple, the protocol's advanced features are 
notoriously confusing, because they knit together complex technologies 
and terminology from many disciplines. This book clearly explains HTTP 
and these interrelated core technologies, in twenty-one logically 
organized chapters, backed up by hundreds of detailed illustrations and 
examples, and convenient reference appendices. HTTP: The Definitive 
Guide explains everything people need to use HTTP efficiently -- 
including the "black arts" and "tricks of the trade" -- in a concise and
 readable manner.
In addition to explaining the basic HTTP features, 
syntax and guidelines, this book clarifies related, but often 
misunderstood topics, such as: TCP connection management, web proxy and 
cache architectures, web robots and robots.txt files, Basic and Digest 
authentication, secure HTTP transactions, entity body processing, 
internationalized content, and traffic redirection.
Many technical 
professionals will benefit from this book. Internet architects and 
developers who need to design and develop software, IT professionals who
 need to understand Internet architectural components and interactions, 
multimedia designers who need to publish and host multimedia, 
performance engineers who need to optimize web performance, technical 
marketing professionals who need a clear picture of core web 
architectures and protocols, as well as untold numbers of students and 
hobbyists will all benefit from the knowledge packed in this volume.
There
 are many books that explain how to use the Web, but this is the one 
that explains how the Web works. Written by experts with years of design
 and implementation experience, this book is the definitive technical 
bible that describes the "why" and the "how" of HTTP and web core 
technologies. HTTP: The Definitive Guide is an essential reference that 
no technically-inclined member of the Internet community should be 
without.