Ebook
The best guide to the Metasploit Framework.
"The best guide to the Metasploit
Framework."
—HD Moore, Founder of the Metasploit
Project
The
Metasploit Framework makes discovering, exploiting, and sharing
vulnerabilities quick and relatively painless. But while Metasploit is
used by security professionals everywhere, the tool can be hard to grasp
for first-time users. Metasploit: The Penetration Tester's Guide fills
this gap by teaching youhow to harness the Framework and interact with
the vibrant community of Metasploit contributors.
Once
you've built your foundation for penetration testing, you'll learn the
Framework's conventions, interfaces, and module system as you launch
simulated attacks. You'll move on to advanced penetration testing
techniques, including network reconnaissance and enumeration,
client-side attacks, wireless attacks, and targeted social-engineering
attacks.
Learn how to:
Find and exploit unmaintained, misconfigured, and unpatched systems
Perform reconnaissance and find valuable information about your target
Bypass anti-virus technologies and circumvent security controls
Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
Use the Meterpreter shell to launch further attacks from inside the network
Harness standalone Metasploit utilities, third-party tools, and plug-ins
Learn how to write your own Meterpreter post exploitation modules and scripts
You'll
even touch on exploit discovery for zero-day research, write a fuzzer,
port existing exploits into the Framework, and learn how to cover your
tracks. Whether your goal is to secure your own networks or to put
someone else's to the test, Metasploit: The Penetration Tester's Guide
will take you there and beyond.
Download Link:
python
Violent Python:-
Violent Python:-
Violent Python shows
you how to move from a theoretical understanding of offensive computing
concepts to a practical implementation. Instead of relying on another
attacker's tools, this book will teach you to forge your own weapons
using the Python programming language. This book demonstrates how to
write Python scripts to automate large-scale network attacks, extract
metadata, and investigate forensic artifacts. It also shows how to write
code to intercept and analyze network traffic using Python, craft and
spoof wireless frames to attack wireless and Bluetooth devices, and how
to data-mine popular social media websites and evade modern anti-virus.
-
Demonstrates how to write Python scripts to automate large-scale
network attacks, extract metadata, and investigate forensic artifacts.
-
Write code to intercept and analyze network traffic using Python. Craft
and spoof wireless frames to attack wireless and Bluetooth devices.
- Data-mine popular social media websites and evade modern anti-virus.
<<Back|Track 5 Cook Book->>
<<Back|Track 5 Cook Book->>
Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5
Learn to perform penetration tests with BackTrack 5
Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
Provides detailed step-by-step instructions on the usage of many of BackTrack's popular and not-so- popular tools
In Detail
BackTrack
is a Linux-based penetration testing arsenal that aids security
professionals in the ability to perform assessments in a purely native
environment dedicated to hacking. BackTrack is a distribution based on
the Debian GNU/Linux distribution aimed at digital forensics and
penetration testing use. It is named after backtracking, a search
algorithm.
"BackTrack 5 Cookbook" provides you with practical recipes
featuring many popular tools that cover the basics of a penetration
test: information gathering, vulnerability identification, exploitation,
priviledge escalation, and covering your tracks.
The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.
We
then dip into recipes involving the basic principles of a penetration
test such as information gathering, vulnerability identification, and
exploitation. You will further learn about privilege escalation, radio
network analysis, Voice over IP, Password cracking, and BackTrack
forensics.
"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.
What will you learn from this book
Install and set up BackTrack 5 on multiple platforms
Customize BackTrack to fit your individual needs
Exploit vulnerabilities found with Metasploit
Locate vulnerabilities Nessus and OpenVAS
Provide several solutions to escalate privileges on a compromised machine
Learn how to use BackTrack in all phases of a penetration test
Crack WEP/WPA/WPA2 Encryption
Learn how to monitor and eavesdrop on VOIP networks
Approach
This
is a cookbook with the necessary explained commands and code to learn
BackTrack thoroughly. It smoothes your learning curve through organized
recipes.
Who this book is written for
This book is for anyone who
desires to come up to speed in using BackTrack 5 or for use as a
reference for seasoned penetration testers.
c
C++ by Dissection
Download 50+ Hacking Ebooks Collection.
C++ by Dissection
presents a thorough introduction to the programming process by
carefully developing working programs to illuminate key features of the
C++ programming language. This book presents the concepts of the
programming process using the "dissection" method, the hallmark feature
that has made Ira Pohl's C and Java books of the "By Dissection" series
so popular. Dissection is a unique pedagogical tool first developed by
the author to point out key features of program code. It is similar to a
structured walk-through of the code, with the intention of explaining
newly encountered programming elements and idioms as found in working
code. The book includes a CD-ROM containing a compiler and an electronic
version of the book that allows readers to search, take notes, and
highlight right on their computer. Each chapter presents a number of
carefully explained programs, which lead the reader in a holistic manner
to ever-improving programming skills. Right from the start, the reader
is introduced to complete programs, and at an early point in the book,
the reader is introduced to writing functions as a major feature of
structured programming. It contains four to seven small code dissections
per chapter, and then each chapter culminates with a larger, extended
code dissection. "Software Engineering" sections in each chapter
reinforce sound software engineering skills. The book assumes no
programming background and can be used by first-time computer users or
by experienced programmers who are transitioning to C++.
Download Link:
O'Reilly HTTP Definitive Guide
Behind every web transaction lies the Hypertext
Transfer Protocol (HTTP) --- the language of web browsers and servers,
of portals and search engines, of e-commerce and web services.
Understanding HTTP is essential for practically all web-based
programming, design, analysis, and administration.
While the basics
of HTTP are elegantly simple, the protocol's advanced features are
notoriously confusing, because they knit together complex technologies
and terminology from many disciplines. This book clearly explains HTTP
and these interrelated core technologies, in twenty-one logically
organized chapters, backed up by hundreds of detailed illustrations and
examples, and convenient reference appendices. HTTP: The Definitive
Guide explains everything people need to use HTTP efficiently --
including the "black arts" and "tricks of the trade" -- in a concise and
readable manner.
In addition to explaining the basic HTTP features,
syntax and guidelines, this book clarifies related, but often
misunderstood topics, such as: TCP connection management, web proxy and
cache architectures, web robots and robots.txt files, Basic and Digest
authentication, secure HTTP transactions, entity body processing,
internationalized content, and traffic redirection.
Many technical
professionals will benefit from this book. Internet architects and
developers who need to design and develop software, IT professionals who
need to understand Internet architectural components and interactions,
multimedia designers who need to publish and host multimedia,
performance engineers who need to optimize web performance, technical
marketing professionals who need a clear picture of core web
architectures and protocols, as well as untold numbers of students and
hobbyists will all benefit from the knowledge packed in this volume.
There
are many books that explain how to use the Web, but this is the one
that explains how the Web works. Written by experts with years of design
and implementation experience, this book is the definitive technical
bible that describes the "why" and the "how" of HTTP and web core
technologies. HTTP: The Definitive Guide is an essential reference that
no technically-inclined member of the Internet community should be
without.