Sunday, February 15, 2015

Hacker, Hoaxer, Whistleblower, Spy The Many Faces of Anonymous (e-book)




Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets.”

Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.

Saturday, February 14, 2015

Hackers and Painters - Big Ideas from the Computer Age (e-book)



"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham


We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?


Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.

Hacker Techniques, Tools, and Incident Handling (e-book)




Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

New to the Second Edition:

-  Includes a completely new Chapter 13 on social engineering and what it means in the context of          cybersecurity, including a typical attack, identity theft, and best security practices
-  Provides new information on cryptography and encryption in network protocols
-  Updated references to Windows 8, Server 2008, Server 2012
-  Added information on Active Directory and Symantec Security Suite 10
-  Includes new material on using social networks, Wardriving and Warflying, detecting rogue access    points and WiFi Pineapple
-  New section material on cloud computing and cloud security issues.

Friday, February 13, 2015

Gray Hat Hacking, Third Edition (e-book)




Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.


- Develop and launch exploits using BackTrack and Metasploit
- Employ physical, social engineering, and insider attack techniques
- Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
- Understand and prevent malicious content in Adobe, Office, and multimedia files
- Detect and block client-side, Web server, VoIP, and SCADA attacks
- Reverse engineer, fuzz, and decompile Windows and Linux software
- Develop SQL injection, cross-site scripting, and forgery exploits
- Trap malware and rootkits using honeypots and SandBoxes


Download  Gray Hat Hacking, Third Edition (e-book)  .pdf


Thursday, February 5, 2015

Anti-Hacker Tool Kit, Fourth Edition (e-book)






Format: PDF
Genre: anti hacking/tutorial
Published: 2014


Book Description: Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.

Demonstrates how to configure and use these and other essential tools:

Gray Hat Hacking, Second Edition (e-book)






THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

EC-Council Certified Security Analyst 4.0 instructor slides





Course Description


ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.

EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.


Who Showld Atend

Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.

Defense against the Black Arts - Honest (e-book)



Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It

File type: PDF

Size: 11,5 MB

Number of Pages: 396

===



Description:

===

Computeractive Issue (e-book)


Description

Computeractive Issue 432 - 2014 UK

76 Pages | True PDF | English | 16 MB

The objective of Computeractive is to provide 'Simple Clear Advice In Plain English' on all matters of technology. Computeractive writes about technology issues facing general readers in their day to day life. From buying advice on computers, mobile phones, cameras etc. to increasing productivity on Microsoft Windows to troubleshooting computers and laptops.

Android Magazine (UK) (e-book)





Description

Android Magazine Issue 45 - 2014 UK

100 Pages | True PDF | English | 22 MB

Whether you’re a beginner wanting to get up to speed or an advanced user looking for tips, tricks and hacks Android Magazine is the ultimate guide to cutting-edge mobile and tablet technology.

Hacking Secrets Revealed (e-book)



Hacking Secrets Revealed (e-book)

Step by Step Guide to Learn Hacking in 10 days!

  Table of Contents

Tuesday, February 3, 2015

GTA 3 Android

                         



The sprawling crime epic that changed open-world games forever.

Welcome to Liberty City. Where it all began.

Rockstar Games celebrates the 10th anniversary of one of the most influential games of all time. The critically acclaimed blockbuster Grand Theft Auto III comes to mobile devices, bringing to life the dark and seedy underworld of Liberty City. With a massive and diverse open world, a wild cast of characters from every walk of life and the freedom to explore at will, Grand Theft Auto III puts the dark, intriguing and ruthless world of crime at your fingertips.

With stellar voice acting, a darkly comic storyline, a stunning soundtrack and revolutionary open-world gameplay, Grand Theft Auto III is the game that defined the open world genre for a generation.

Features:
• Visually stunning updated graphics, character and vehicle models
• HD quality resolution
• Gameplay optimized for touch screen devices
• Custom controls for the mobile platform
• Countless hours of gameplay
• Gamepad Support for select USB controllers
• Integrated with Immersion Haptic Vibration Feedback
• Tailor your visual experience with new video display settings

Languages Supported: English, French, Italian, German, Spanish & Japanese.

Grand Theft Auto III 10 Year Anniversary Edition is now available on:
• Android Phones: Galaxy Nexus, HTC Rezound, LG Optimus 2x, Motorola Atrix 4G, Motorola Droid X2, Motorola Droid Bionic, Motorola Photon 4G, Samsung Galaxy R, Samsung Galaxy S2, Sony Ericsson Xperia Play, T-Mobile G2x
• Android Tablets: Acer Iconia, Asus Eee Pad Transformer, Asus Eee Pad Transformer Prime, Dell Streak 7, LG Optimus Pad, Medion Lifetab, Motorola Xoom, Samsung Galaxy Tab 8.9 and 10.1, Sony Tablet S, Toshiba Thrive

For optimal performance, we recommend re-booting your device after downloading and closing other applications when playing Grand Theft Auto III: 10 Year Anniversary Edition.

Please ensure you have at least 1GB of free space before installing Grand Theft Auto III: 10 Year Anniversary Edition.

Saturday, January 31, 2015

Accessing Databases with Object-Oriented PHP Tutorial



- 01. Introduction


 01_01-Welcome 

 01_02-What you should know before watching this course


01_03-Using the exercise files


01_04-Setting SQLite permissions


01_05-A quick primer on using PHP objects



 Downlaod >> 01. Introduction :  Password For 7zip is AlbDll.com


-----------------------------------------------------------


- 02. Why Use Object-Oriented PHP to Access a Database 

02_01-Overview of PHP database APIs


02_02-Using prepared statements



02_03-Using transactions


 Downlaod >> 02. Why Use Object-Oriented PHP to Access a Database  :  Password For 7zip is AlbDll.com

-----------------------------------------------------------

Wednesday, January 21, 2015

EC-Council Certified Ethical Hacker CEH v8 (Tools)




Module 00 - Student Introduction
- Student Introduction
- Course Materials
- CEHv8 Course Outline
- EC-Council Certification Program
- Certified Ethical Hacker Track
- CEHv8 Exam Information
- Lab Sessions
- What Does CEH Teach You?
- What CEH is NOT?
- Remember This!
- CEH Class Speed
- Live Hacking Website
- Advanced Lab Environment
- Student Computer Checklist
- Launching Command Shell
- Snapshots of Virtual Machines
- AirPcap
- Live Hack Website
- Lets Start Hacking!!!!!


Module 01 - Introduction to Ethical Hacking

- Module Flow: Info Security Overview
- Security News
- Internet Crime Current Report: IC3
- Data Breach Investigations Report
- Essential Terminology
- Elements of Information Security
- The Security, Functionality, and Usability Triangle
- Module Flow: Information Security Threats and Attack Vectors
- Top Information Security Attack Vectors
- Motives, Goals, and Objectives of Information Security Attacks
- Information Security Threats
- Information Warfare
- IPv6 Security Threats
- Module Flow: Hacking Concepts
- Hacking vs. Ethical Hacking
- Effects of Hacking on Business
- Who Is a Hacker?
- Hacker Classes
- Hacktivism
- Module Flow: Hacking Phases
- Hacking Phases
- Module Flow: Types of Attacks
- Types of Attacks on a System
- Operating System Attacks
- Misconfiguration Attacks
- Application-Level Attacks
- Examples of Application-Level Attacks
- Shrink Wrap Code Attacks
- Module Flow: Information Security Controls
- Why Ethical Hacking is Necessary
- Scope and Limitations of Ethical Hacking
- Skills of an Ethical Hacker
- Defense in Depth
- Incident Management Process
- Information Security Policies
- Classification of Security Policies
- Structure and Contents of Security Policies
- Types of Security Policies
- Steps to Create and Implement Security Policies
- Examples of Security Policies
- Vulnerability Research
- Vulnerability Research Websites
- Demo - Vulnerability Research Website
- What is Penetration Testing?
- Why Penetration Testing
- Penetration Testing Methodology




Friday, January 9, 2015

Latest Google Dorks.



SQLi Dork list:

trainers.php?id=
article.php?ID=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
gery.php?id=
detail.php?ID=
publications.php?id=
Productinfo.php?id=
releases.php?id=
ray.php?id=
produit.php?id=
pop.php?id=
shopping.php?id=
productdetail.php?id=
post.php?id=
section.php?id=
theme.php?id=
page.php?id=
shredder-categories.php?id=
product_ranges_view.php?ID=
shop_category.php?id=
channel_id=
newsid=
news_display.php?getid=
ages.php?id=
clanek.php4?id=
review.php?id=
iniziativa.php?in=
curriculum.php?id=
labels.php?id=
look.php?ID=
galeri_info.php?l=
tekst.php?idt=
newscat.php?id=
newsticker_info.php?idn=
rubrika.php?idr=
offer.php?idf=
“id=” & intext:”Warning: mysql_fetch_array()
“id=” & intext:”Warning: getimagesize()
“id=” & intext:”Warning: session_start()
“id=” & intext:”Warning: mysql_num_rows()
“id=” & intext:”Warning: mysql_query()
“id=” & intext:”Warning: array_merge()
“id=” & intext:”Warning: preg_match()
“id=” & intext:”Warning: ilesize()
“id=” & intext:”Warning: filesize()