aiPHYTHOGEIN~01

gamer220

کاربر سایت
Sep 29, 2005
301
هک دوست داری ؟ بیا :

http://h4cky0u.org/viewtopic.php?t=12762&highlight=private
Ethical hacker Tools (Tutorials and Toolz)

Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. When students leave this intensive five-day class, they will have hands-on understanding and experience in ethical hacking.

http://rapidshare.de/files/11738668/part01.rar.html
http://rapidshare.de/files/11754462/part02.rar.html
http://rapidshare.de/files/11793722/part03.rar.html
http://rapidshare.de/files/11810032/part04.rar.html
http://rapidshare.de/files/11862816/part05.rar.html
http://rapidshare.de/files/11873142/part06.rar.html
http://rapidshare.de/files/11890833/part07.rar.html
http://rapidshare.de/files/11829873/part08.rar.html
http://rapidshare.de/files/11936680/part09.rar.html
http://rapidshare.de/files/11943801/part10.rar.html

-----------

Use Pass: from_soft_to_games
Look includes: http://rapidshare.de/files/21197794/include.txt.html


Chapter 1 - Introduction to Ethical Hacking
Chapter 2 - Footprinting
Chapter 3 - Scanning
Chapter 4 - Enumeration
Chapter 5 - System Hacking
Chapter 6 - Trojans and Backdoors
Chapter 7 - Sniffers
Chapter 8 - Denial of Service
Chapter 9 - Social Engineering
Chapter 10 - Session Hijacking
Chapter 11 - Hacking Web Servers
Chapter 12 - Web Application Vulnerabilities
Chapter 13 - Web Based Password Cracking Techniques
Chapter 14 - SQL Injection
Chapter 15 - Hacking Wireless Networks
Chapter 16 - Evading IDS, Firewalls and Honey Pots
Chapter 17 - Linux Hacking
Chapter 18 - Buffer Overflows
Chapter 19 - Cryptography
Chapter 20 - Virus and Worms
Chapter 21 - Physical Security
Chapter 22 - Penetration Testing


extract the file (no PW) and rename it to ISO


http://www.megaupload.com/?d=VOUDZCCD
http://www.megaupload.com/?d=S43BLLWQ
http://www.megaupload.com/?d=7BW82RQ3
http://www.megaupload.com/?d=FJTZNC39
http://www.megaupload.com/?d=HQJ26BGM
http://www.megaupload.com/?d=DN9JE0AL

**********************************************

Hacking Toolbox

Backdoor: Intrude computer and control the computer with client program.
Crack tool: Crack passwords of systems or applications, crack the serial numbers.
Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it.
DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer.
Document: Documents about hacker, cracker, etc.
E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several tools about e-mail, for example, email bomber, tool to find someone's email address, etc.
Editor: Edit or modify your program with them.
Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.
Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one.
ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ's password, sharing your files, and encrypting your ICQ messages, and so on.
Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password.
MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.
Packet forging: Modify the data packet on network at will.
Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.
Scanner: Acquire the system information, for example, open ports, OS, and so on.
Sniffer: Intercept and capture the data on the network.
Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on.
Source code: Source code of many tools.
Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.
Virus: Source code of virus and executable virus.


extract the file (no PW) and rename it to ISO


http://www.megaupload.com/?d=Z3RK5G91
http://www.megaupload.com/?d=X3AQJ4P2
http://www.megaupload.com/?d=3NEGK6RJ
http://www.megaupload.com/?d=V2JMPQUY (re-uploaded)
http://www.megaupload.com/?d=FA2XYT4A
http://www.megaupload.com/?d=YZ9W0LA0
http://www.megaupload.com/?d=YJP8RZHT

************************************************************
Other Security Links



L0phtCrack.v5.00 with Keygen&.SAMInside.v2.2. (Find User account's passwords)

http://www.megaupload.com/?d=B8VH1L7Z



Cisco Fundamentals of Network Security

http://www.megaupload.com/?d=BS7I370H


One Step CableModem Hacking Toolkit (Very Good)

http://www.megaupload.com/?d=TQ8Q48PN



Symantec_Antivirus_Corporate_Edition 10

http://www.megaupload.com/?d=SMCJXQ15


Norton Internet Security 2003

http://www.megaupload.com/?d=BWXPTKMU

موفق باشید
 

کاربرانی که این قسمت را مشاهده می‌کنند

Top
رمز عبور خود را فراموش کرده اید؟
or ثبت‌نام سریع از طریق سرویس‌های زیر