Friday 5 July 2013

Free Download : CEH [ Certified Ethical Hacker Ebooks ] -

Free Download : CEH [ Certified Ethical Hacker Ebooks ] -

-----------------------------------------------

 1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
9: Trojans and Backdoors
10: Viruses and Worms
11: Sniffers
12: Social Engineering
13: Phishing
14: Hacking Email Accounts
15: Denial of Service
16: Session Hijacking
17: Hacking Webservers
18: Web Application Vulnerabilities
19: Web based Password Cracking Techniques
20: SQL Injection
21: Hacking Wireless Networks
22: Physical Security
23: Linux Hacking
24: Evading IDS Firewall and Honeypot
25: Buffer Overflows
26: Cryptography
27: Penetration Testing
28: Writing Virus Codes
29: Assembly Language Tutorial

30: Exploit Writing 1
31: Exploit Writing 2 

32: Exploit Writing 3
33: Reverse Engineering Techniques
34: MAC OS X Hacking
35: Hacking Routers, Cable Modems and Firewalls
36: Hacking Mobile Phones, PDA and Handheld Devices
37: Bluetooth Hacking
38: VoIP Hacking
39: RFID Hacking
40: Spamming
41: Hacking USB Devices
42: Hacking Database Servers
43: Cyber Warfare- Hacking Al-Qaida and Terrorism
44: Internet Content Filtering Techniques
45: Privacy on the Internet
46: Securing Laptop Computers
47: Spying Technologies
48: Corporate Espionage by Insiders
49: Creating Security Policies
50: Software Piracy and W
51: Hacking and Cheating Online Games
52: Hacking RSS and Atom.

53: Hacking Web Browsers
54: Proxy Server Technologies
55: Preventing Data Loss
56: Hacking Global Positioning System
57: Computer Forensics and Incident Handling
58: Credit Card Frauds
59: How to Steal Passwords
60: Firewall Technologies
61: Threats and Countermeasures
62: Case Studies
63: Botnets
64: Economic Espionage
65: Patch Management
67: Security Convergence
68: Identifying the Terrorists
69: prova 312-50
70: CEH - Classroom Lab Setup v6 -

& Many More:--

Download:

1st Part

2nd Part

3rd Part

4th Part

5th Part

6th Part

Password:- Maya Badmash

Password:- Maya Badmash
No comments

Chrome Crypter v5.3 Free Download [ 100% FUD ] UPDATED -

Chrome Crypter v5.3 Free Download [ 100% FUD ] UPDATED - 

 

--------------------------------------------------------------------------------------------------------------------------------

-------------------------------------------------------------------------------------


Chrome Crypter v5.3 Free Download [ 100% FUD ] UPDATED - See more at: http://blackhatcrackers.blogspot.in/2013/03/chrome-crypter-v53-free-download-100.html#sthash.TZl9Mu1P.dpuf
No comments

Encrypting Your Hard disk!!

Encrypting Your Hard disk!!

Using True Crypt:-

 Get it From Here:-

 

 

 

----------------------------------------------

Creating A Volume

Step 1: Download TC and open it.

Step 2: Click any "letter" and press create volume. - See more at: http://blackhatcrackers.blogspot.in/2013/06/how-to-encrypt-your-hard-drive.html#sthash.vuf0RVk6.dpuf

 Creating A Volume

Step 1: Download TC and open it.

Step 2: Click any "letter" and press create volume. - 

As Shown In Above Image!!

Step 3: Now click next 3 times.
Step 3: Now click next 3 times.

Step 4: Now press select file and save it somewhere hidden, for this tutorial I saved it to my desktop. - 
Step 5: Now click next with the settings I have on this picture 

Step 6: Here is where you can choose the size of the hidden drive. The bigger the longer it will take to format. - 
Step 7: Now choose a GOOD password. People can crack it. Use numbers, capital letters, symbols.
Step 8: Now once you are at this part, move your mouse in the box of True Crypt, this is a must -
Step 9: Now you will have a file like this, be sure to keep this file in a hidden place. Do Not Lose It.
-----------------------------------------------------------------------------------------------------------------------------

Opening The Volume:-
Step 1: Press select file and find your file, then click on mount.

Step 2: Now Put Your Password ..
Step 3:Now U Shud See like Above image!!

Now Go to Your Computer you Should See a Hidden Drive ,You Can Store Anything What You Want!!
----------------------------------------------------------------------

No comments

Websploit Toolkit!!--


WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability


[+]Autopwn - Used From Metasploit For Scan and Exploit Target Service
[+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector - inject reverse & bind payload into file format
[+]phpmyadmin - Search Target phpmyadmin login page
[+]lfi - Scan,Bypass local file inclusion Vulnerability & can be bypass some WAF
[+]apache users - search server username directory (if use from apache webserver)
[+]Dir Bruter - brute target directory with wordlist
[+]admin finder - search admin & login page of target
[+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks
[+]MITM - Man In The Middle Attack
[+]Java Applet Attack - Java Signed Applet Attack
[+]MFOD Attack Vector - Middle Finger Of Doom Attack Vector
[+]USB Infection Attack - Create Executable Backdoor For Infect USB For Windows

DOWNLOAD LINK: https://adf.ly/Ni5sA
No comments

Netool.sh V2.4 Released:-


Netool.sh V2.4 Released:-



New modules:
1)webcrawler.py
2)Agressive Directory Scanner
3)Fast Directory Scanner
4)Admin Page Finder
5)WebShell.php Scanner
6)File Upload Scanner
[nmap]
7)Scan List.txt of targets

Description of the script:-
netool.sh is a script in bash to automate frameworks like Nmap,Driftnet,SSLstrip, and ettercap MITM attacks, Retrieves metadata, geo-location of target, changes hostname, change IP and Mac-Address to decoy scans, search for admin login page on taget website, search for directorys inside target website, search for webshells.php planted on website and scan Common URL File Upload vulns, also capture pictures of web-browser surfing of the target machine, perform TCP/UDP packets manipulation using etter.filters, DoS attacks local/external network,also uses metasploit [msfpayload+msfencode+msfcli] to gain control of target machine ...

Home project

See WIKI :

DOWNLOAD LINK:

Enjoy, and save hacking .
No comments

Labels

Games