Showing posts with label E-Books. Show all posts
Showing posts with label E-Books. Show all posts

Tuesday, April 26, 2011

EC-Council E-Business Certification Series
Developer - Thomas Mathew
Publisher - OSB Publisher
ISBN No - 0972936211

By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide provides the tools necessary for approaching computers with the skill and understanding of an outside hacker.


Introduction
This module attempts to bridge various aspects of ethical hacking by suggesting an approach for undertaking penetration testing. There are different ways of approaching a penetration test.
  • External Approach
    • With some prior knowledge
    • Without prior knowledge
  • Internal Approach
    • With some prior knowledge
    • With deep knowledge
Whatever the approach adopted, it is a fact that penetration testing is constrained by time and availability of resources, which varies from client to client. To effectively utilize both these telling factors, penetration testers adopt some form of structure or methodology. These can be checklists developed by consulting practices, widely available resources such as Open Source Security Testing Methodology or a customized attack strategy.
There are is no single set of methodology that can be adopted across client organizations. The skeletal frame of testing however is more or less similar. The terms of reference used for various phases may differ, but the essence is the same. As discussed in preceding modules, the test begins with:
  • Footprinting / Information Gathering phase
  • Discovery and Planning / Information Analysis phase
  • Detecting a vulnerability / security loophole
  • Attack / Penetration / Compromise
  • Analysis of security posture / Cover up / Report
  • Clean up
The general objective of a penetration test is to reveal where security fails. The result of a penetration test can be:
  • successful attack - when the objective is met within the scope of the attack
  • a partial success - when there has been a compromise, but not enough to achieve the objective
  • a failure - when the systems have been found to be robust to the attack methodology adopted
Foot printing / Information Gathering phase:
  • Client site intelligence
  • Infrastructure fingerprinting
  • Network discovery and Access point discovery
Discovery and Planning / Information Analysis phase
  • Target Identification
  • Resource and Effort Estimation
  • Modeling the Attack strategy (s)
  • Relationship Analysis
Detecting a vulnerability / security loophole
  • Vulnerability Analysis
  • Scanning
  • Enumeration
  • Zeroing the target
Attack / Penetration / Compromise
  • Exploring viable exploits (new / created / present)
  • Executing the attack / Alternate attack strategy
  • Target penetration
  • Escalating the attack
Analysis of security posture / Cover up / Report
  • Consolidation of attack information
  • Analysis and recommendations
  • Presentation and deliverables
Clean up
  • Clean up tasks and procedures
  • Restoring security posture

Download Here:
http://www.ziddu.com/download/13121682/Ethical_Hacking_and_Countermeasures_EC_Council_Exam_312_50_.rar.html
The Hacker’s Underground Handbook

The Hacker’s Underground Handbook
Learn What it Takes to Crack Even the Most Secure Systems
By: David Melnichuk

The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail.

A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration.


Download Here:

PUBLISHED BY- Syngress Publishing, Inc. ISBN-10: 1-59749-154-3
ISBN-13: 978-1-59749-154-9

This book is all about XSS. It will cover these topics on XSS.


Cross-site Scripting Fundamentals.
The XSS Discovery Toolkit
XSS Theory
XSS Attack Methods
Advanced XSS Attack Vectors
XSS Exploited
Exploit Frameworks
XSS Worms
Preventing XSS Attacks

Download Here:

Monday, March 14, 2011

THE OFFICIAL SOCIAL ENGINEERING BOOK We would like to congratulate Social-Engineer.Org for their official release of the book, Social Engineering : The Art of Human Hacking. The book has proven to be a huge success and being marked by the community as the official social engineering book.

We are excited to see Social-Engineer.org lead the way in evloving social engineering’s reputation from the world of scammers and thugs to a science that can be utilized to help improve information security for all of us.

We strongly encourage everyone to increase their awareness of malicious social engineering and the dangers it provides, and this book and the official social engineering framework are the perfect vehicles to start.

Thursday, February 24, 2011


   http://www.ziddu.com/download/13003682/google_hack.pdf.html


  http://www.ziddu.com/download/13003681/Email_Spoofing.pdf.html


  http://www.ziddu.com/download/13003680/FTPExploitsByAnkitFadia.pdf.html


  http://www.ziddu.com/download/13003679/.html


   http://www.ziddu.com/download/13003678/DosAttacked.pdf.html


  http://www.ziddu.com/download/13003677/Corporate-security-excerpt.pdf.html


  http://www.ziddu.com/download/13003676/CREATINGWEBSITEINFLASH.pdf.html


  http://www.ziddu.com/download/13003675/DNS_CACHEPOISONING.pdf.html


  http://www.ziddu.com/download/13003674/ByStepProcessByAnkitFadiaHackingTruths_FTPExploits.pdf.html


  http://www.ziddu.com/download/13003673/FadiaAnkit-EncryptionAlgorithmsExplained.pdf.html


  http://www.ziddu.com/download/13002918/ABeginnersGuideToHackingComputerSystems.pdf.html


  http://www.ziddu.com/download/13002917/eBook-PDFHugoCornwall-TheHackersHandbook.pdf.html


  http://www.ziddu.com/download/13002916/ANKITFADIASBOOK.pdf.html


   http://www.ziddu.com/download/13002915/BookpdfHackingintocomputersystems-abeginnersguide.pdf.html 


   http://www.ziddu.com/download/13002914/Ebook-PdfUntoldWindowsTipsAndSecretsAnkitFadia.pdf.html


   http://www.ziddu.com/download/13002913/ebook_-_pdf_Hacking_IIS_Servers.pdf.html


   http://www.ziddu.com/download/13002912/AnkitFadiaHackingGuide.pdf.html


   http://www.ziddu.com/download/13002911/AttackingtheDNSProtocol.pdf.html


   http://www.ziddu.com/download/13002910/Ebook-ComputerHackingTheWindowsRegistry.pdf.html


   http://www.ziddu.com/download/13002909/BatchFileProgramming-AnkitFadia.pdf.html


  http://www.ziddu.com/download/13007277/hackingbook123456789.pdf.html


  http://www.ziddu.com/download/13007279/HackingforDummies-Wieley.pdf.html


  http://www.ziddu.com/download/13007280/HackingIntoComputerSystems-Beginners.pdf.html


 http://www.ziddu.com/download/13007281/g-FirewallsAndNetworksHowToHackIntoRemoteComputers.pdf.html


 http://www.ziddu.com/download/13007282/hackcrac.pdf.html


 http://www.ziddu.com/download/13007283/hacking-webapplicationshackingexposed.pdf.html