|
-: Hacking Tools :-
Packet Sniffers :-
 |
Ethereal :- This (also known as Wireshark) is
a fantastic open source network protocol analyzer for Unix and
Windows. It allows you to examine data from a live network or
from a capture file on disk. You can interactively browse the
capture data, delving down into just the level of packet detail
you need. Ethereal has several powerful features, including
a rich display filter language and the ability to view the reconstructed
stream of a TCP session. It also supports hundreds of protocols
and media types.
Home:- http://www.wireshark.org
Latest Release:- Wireshark 1.0.4 (Ethereal)
Download:- http://www.wireshark.org/download.html
|
 |
Kismet :- A powerful wireless sniffer. Kismet
is a console based 802.11 layer2 wireless network detector,
sniffer, and intrusion detection system. It identifies networks
by passively sniffing, and can even decloak hidden networks
if they are in use. It can automatically detect network IP blocks
by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in
Wireshark/TCPDump compatible format, and even plot detected
networks and estimated ranges on downloaded maps.
Home:- http://www.kismetwireless.net
Latest Release:- Kismet-2008-05-R1
Download:- http://www.kismetwireless.net/download.shtml
|
 |
Tcpdump
:- The classic sniffer for network monitoring
and data acquisition. It is great for tracking down network
problems or monitoring activity. There is a separate Windows
port named WinDump. TCPDump is the source of the Libpcap/WinPcap
packet capture library.
Home:- http://www.tcpdump.org
Latest Release:- TCPDUMP 4.0.0
Download:- http://www.tcpdump.org/
|
 |
Ettercap
:- Ettercap is a terminal-based network sniffer/interceptor/logger
for ethernet LANs. It supports active and passive dissection
of many protocols (even ciphered ones, like ssh and https).
Data injection in an established connection and filtering on
the fly is also possible, keeping the connection synchronized.
Many sniffing modes were implemented to give you a powerful
and complete sniffing suite. Plugins are supported. It has the
ability to check whether you are in a switched LAN or not, and
to use OS fingerprints (active or passive) to let you know the
geometry of the LAN.
Home:- http://ettercap.sourceforge.net
Latest Release:- Ettercap NG-0.7.3
Download:- http://sourceforge.net/projects/ettercap/
|
 |
DSniff
:- A suite of powerful network auditing and
penetration-testing tools. This popular and well-engineered
suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf,
msgsnarf, urlsnarf, and webspy passively monitor a network for
interesting data (passwords, e-mail, files, etc.). arpspoof,
dnsspoof, and macof facilitate the interception of network traffic
normally unavailable to an attacker (e.g, due to layer-2 switching).
sshmitm and webmitm implement active monkey-in-the-middle attacks
against redirected ssh and https sessions by exploiting weak
bindings in ad-hoc PKI. Overall, this is a great toolset. It
handles pretty much all of your password sniffing needs.
Home:- http://www.monkey.org
Latest Release:- dsniff-2.3
Download:- http://www.monkey.org/~dugsong/dsniff/
|
 |
-: Hack Attacks Testing :-
A
network security breach (a hack, crack, or other invasion) occurs when
unauthorized access to the network is achieved and havoc results.
The best possible defense is an offensive strategy that allows you
to regularly test your network to reveal the vulnerabilities and close
the holes before someone gets in.
Written by veteran author and security expert John Chirillo, Hack
Attacks Testing explains how to perform your own security audits.
* Paperback: 576 pages
|
Download |
(Size :- 6.80 MB)  |
 |
-: Secrets Of A Super Hacker :-
Here is the most amazing book ever published on computer hacking.
Step-by-Step illustrated details on the techniques used by hackers to get your data including :-
Guessing Passwords, Stealing Passwords,
Password Lists, Social Engineering,
Reverse Social Engineering,
Crashing Electronic Bulletin Boards,
Dummy Screens, Fake E-mail,
Trojan Horses, Viruses, Worms,
Trap Doors, And Much more.
Anyone concerned with computer security and data privacy needs to read this book.
|
Download |
(Size :- 1.82 MB)  |
 |
-: Hacking GMail :-
Everything about GMail including :-
Inside GMail, Conquering GMail, Desktop Integration, GMail Power Tips,
Skinning GMail, How GMail Works, GMail & Greasemonkey, GMail
Libraries, Building API, Using GMailFS, etc..........!
|
Download |
(Size :- 3.08 MB)  |
 |
-: Stealing The Network :-
How
to Own a Shadow is the final book in Syngress ground breaking,
best-selling, Stealing the Network series. As with previous title, How
to Own a Shadow is a fictional story that demonstrates accurate, highly
detailed scenarios of computer intrusions and counter-strikes.
Readers will be amazed at how Knuth, Law Enforcement, and Organized
crime twist and torque everything from game stations, printers and fax
machines to service provider class switches and routers steal, deceive,
and obfuscate.
From physical security to open source information gathering, Stealing
the Network: How to Own a Shadow will entertain and educate the reader
on every page.
The books companion Web site will also provide special,
behind-the-scenes details and hacks for the reader to join in the chase
for Knuth. |
Download |
(Size :- 8.16 MB)  |
 |
-: Network Security :-
Cisco Press(March 19, 2008) CCIE Professional Development Series Network Security Technologies and Solutions
Network Security Technologies and Solutions is a comprehensive reference to the most
cutting-edge security products and methodologies available to networking professionals today.
This book helps you understand and implement current, state-of-the-art network security technologies to ensure
secure communications throughout the network infrastructure.
This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level
instruction on network design, deployment, and support methodologies to help networking professionals manage
complex networks and prepare for CCIE exams.
|
Download |
(Size :- 26.0 MB)  |
 |
-: Hacker's HandBook :-
This
book is a practical guide to discovering and exploiting security flaws
in web applications. The authors explain each category of vulnerability
using real-world examples, screen shots and code extracts.
The book is extremely practical in focus, and describes in detail the
steps involved in detecting and exploiting each kind of security
weakness found within a variety of applications such as online banking,
e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code,
exploiting logic flaws and compromising other users.
This handbook describes a proven methodology that combines the virtues
of human intelligence and computerized brute force, often with
devastating results.
|
Download |
(Size :- 4.60 MB)  |
 |
-: Vulnerability Management :-
Get all the Facts and See How to Implement a Successful Vulnerability
Management Program.
As a business owner, or someone responsible for network security within
your organization, you need to understand how to prevent attacks and
eliminate network weaknesses that leave your business exposed and at
risk.
Vulnerability Management for Dummies arms you with the facts and will help :-
Explain the critical need for Vulnerability Management (VM),
Detail the essential best-practice steps of a successful VM Program,
Outline the various VM Solutions - including the pros & cons of each,
Highlight the award-winning QualysGuard VM solution,
Provide a 10-point checklist for removing vulnerabilities from your key resources.
|
Download |
(Size :- 3.71 MB)  |
 |
-: Hacking Windows Vista :-
Vista
is the most radical revamping of Windows since 1995. However, along
with all the fantastic improvements, there are a couple of things that
likely drive you up the wall. Don\92t worry, though\97just join forces
with author Steve Sinchak and you\92ll end up feeling as though
Microsoft designed Vista just for you!
He shows you how to tweak logon screen settings, build custom Sidebar
gadgets, personalize Aero Glass with themes and visual styles, turn your
PC into an HDTV media center, fine-tune your firewall, and more...! |
Download |
(Size :- 17.6 MB) 
 |
-: Web Hacking :-
Exposes complete methodologies showing the actual techniques and attacks.
Features include :-
* Overview of the Web and what hackers go after
* Complete Web application security methodologies
* Detailed analysis of hack techniques
* Countermeasures
* What to do at development time to eliminate vulnerabilities
* New case studies and eye-opening attack scenarios
* Advanced Web hacking concepts, methodologies, and tools
|
Download |
(Size :- 6.32 MB)  |
 |
-: Viruses Revealed :-
With
the growing number of computer virus infections today--and the billions
of dollars spent on clean-up efforts--virus protection has become
everybody's business.
This detailed guide offers full-scale coverage and analysis of the
origin, structure, and technology behind the expanding array of computer
viruses, and addresses current methods of detection and prevention.
|
Download |
(Size :- 1.67 MB)  |
 |
-: Hacker's Black-Book :-
Easy to understand with many examples.
Every day you hear in the daily news about hackers, virus, worms and
trojans, SUB7, TCP, IP, PING, spoofing, sniffing, DDOS attacks, ...?
And you don't know exactly what it is and how hackers do that.
Don't rest a "lamer", Hacker's Blackbook let's you know and discovers many secrets.
Incredible how easy hacking and cracking is!
The book shows how simple you can use these programs.
And many more themes in 19 detailed chapters...
|
Download |
(Size :- 4.38 MB)  |
 |
-: 501 Website Secrets :-
What
kind of secrets are included in 501 Web Site Secrets? Well, using this
book is as simple as turning to the chapter on a particular site,
reading through the secrets, then trying them on your own.
You don\92t need any particular technical expertise to take advantage of
these secrets, although some familiarity with the sites in question is
helpful.
There\92s no fancy programming, no high-level coding, just a lot of
common-sense information that you probably didn\92t know before.
Containing:-
Yahoo!, Google, AOL, MSN, Amazon, Lycos, Ask, Altavista, Microsoft, etc........! |
Download |
(Size :- 8.20 MB) 
|
-: Ethical Hacking eBooks :-
 |
-: Gray Hat Hacking :-
A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in.
Very highly recommended whether you are a seasoned professional or just starting out in the security business.
Basically divided into five parts :-
Part I: Introduction to Ethical Disclosure,
Part II: Penetration Testing and Tools
,
Part III: Exploits 101,
Part IV: Vulnerability Analysis,
Part V: Malware Analysis |
Download |
(Size :- 8.08 MB)  |
 |
-: Hacker Highschool :-
The
Hacker Highschool project is the development of license-free, security
and privacy awareness teaching materials and back-end support for
teachers of elementary, junior high, and high school students.
Today's teens are in a world with major communication and productivity
channels open to them and they don't have the knowledge to defend
themselves against the fraud, identity theft, privacy leaks and other
attacks made against them just for using the Internet. This is the
reason for Hacker Highschool. |
Download |
(Size :- 3.83 MB)  |
 |
-: CheatBook-2008 :-
Cheat-Book
(02/2008) - Issue February 2008 - A Cheat-Code Tracker with Hints for
several popular PC Action and adventure Games.
488 PC Games, 53 Walktroughs for PC and 114 Console Cheats are
represented in this new version from Strategy Games, Adventure Games to
Action Games.
This Database represents all genres and focuses on recent releases. |
Download |
(Size :- 3.88 MB)  |
 |
-: Windows-XP Hacks :-
Completely
revised and updated, this smart collection of insider tips and tricks
covers the XP operating system from start to finish, including all the
new features that come with Service Pack 2 (SP2).
You'll also find time saving hacks for security, file distribution, digital media, web browsing, and more.
An ideal all-in-one resource for XP beginners, as well as more experienced power users. |
Download |
(Size :- 1.78 MB)  |
 |
-: A Little Black Book :-
"A
Little Black Book Of Computer Viruses" is the first in the series of
three. Deeply covers all the basic types along with source codes.
It focuses on topics like:- types of viruses, functional elements of
viruses, tools used for writing viruses, storage for viruses,
installation in memory, etc.
Source codes also given for TIMID, INTRUDER, KILROY, STEALTH, Basic Boot
Sector, etc. viruses. |
Download |
(Size :- 1.29 MB) 
|
-: Ethical Hacking eBooks :-
 |
-: Hacking GPS :-
Hacking GPS shows you how to get more out of owning a GPS receiver.
Written with the Extreme Technology community in mind, this
book shows you how to do a variety of different things with
your receiver:
* Build custom cabling
* Protecting your GPS from the elements
* Connecting your GPS to a PC or PDA
* Build and mount external antennas
* Load new, modified, firmware onto your device
* Access secret diagnostic screens and test utilities
* GPS games & much more...!
If you've got a GPS and you want to be able to make the most
of it then this is the book for you! |
Download |
(Size :- 8.50 MB)  |
 |
-: Oracle Hackers Handbook :-
While Oracle continues to improve the security features of its
product, it still has a long way to go. David Litchfield has
devoted years to relentlessly searching out the flaws in this
ubiquitous database system and creating defenses against them.
Now he offers you his complete arsenal to assess and defend
your own Oracle systems.
This in-depth guide explores every technique and tool used
by black hat hackers to invade and compromise Oracle. It shows
you how to find the weak spots and defend them. Without that
knowledge, you have little chance of keeping your databases
truly secure.
Discover how to deal with the security flaws revealed in
the Oracle RDBMS.
Explore some never-before-published forays into Oracle security
holes and learn to defend them from attack.
|
Download |
(Size :- 480 KB)  |
 |
-: Security & Cryptography :-
6th International Conference, SCN 2008, Amalfi, Italy, September
10-12, 2008, Proceedings
Editors: Rafail Ostrovsky, Roberto De Prisco and Ivan Visconti
Hardcover: 423 pages
Publisher: Springer; 1 edition (September 1, 2008)
Language: English
ISBN-10: 3540858547
ISBN-13: 978-3540858546
Format: pdf
This book constitutes the refereed proceedings of the 6th
International Conference on Security and Cryptology for Networks,
SCN 2008, held in Amalfi, Italy, in September 2008 |
Download |
(Size :- 4.86 MB)  |
 |
-: Shellcoder's Handbook :-
The Shellcoders Handbook, discovering and exploiting security
holes is the second edition. It covers introduction to exploitation:
linux on x86 contains stack overflows, shellcodes, format string
bugs, heap overflows. Also for windows platform and solaris
exploitation too. OS X shellcode, cisco ios exploitaion, unix
kernel overflows, windows kernel hacking, protection mechnism
and much more.....! |
| |
(Size :- 2.98 MB) 
|
-: Ethical Hacking eBooks :-
 |
-: Hacking Exposed VoIP :-
This book illuminates how remote users can probe, sniff, and modify your
phones, phone switches, and networks that offer VoIP services. Most
importantly, the authors offer solutions to mitigate the risk of
deploying VoIP technologies.
Block debilitating VoIP attacks by learning how to look at your network
and devices through the eyes of the malicious intruder. Hacking Exposed
VoIP shows you, step-by-step, how online criminals perform
reconnaissance, gain access, steal data, and penetrate vulnerable
systems. All hardware-specific and network-centered security issues are
covered alongside detailed countermeasures, in-depth examples, and
hands-on implementation techniques.
Inside, you'll learn how to defend against the latest DoS,
man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling
and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
|
Download |
(Size :- 16.3 MB)  |
 |
-: Google Apps Hacks :-
Can
Google applications really become an alternative to the venerable
Microsoft Office suite? Conventional wisdom may say no, but practical
wisdom says otherwise. Right now, 100,000 small businesses are currently
running trials of Google office applications. So are large corporations
such as General Electric and Proctor & Gamble. Google Apps Hacks
gets you in on the action with several ingenious ways to push Google's
web, mobile, and desktop apps to the limit.
The scores of clever hacks and workarounds in this book help you get
more than the obvious out of a whole host of Google's web-based
applications for word processing, spreadsheets, PowerPoint-style
presentations, email, calendar, and more by giving you ways to exploit
the suite's unique network functionality. |
Download |
(Size :- 11.7 MB)  |
 |
-: Botnets: The Killer Web Applications :-
The
book begins with real world cases of botnet attacks to underscore the
need for action. Next the book will explain botnet fundamentals using
real world examples. These chapters will cover what they are, how they
operate, and the environment and technology that makes them possible.
The following chapters will analyze botnets for opportunities to detect,
track, and remove them. Then the book will describe intelligence
gathering efforts and results obtained to date. Public domain tools like
OurMon, developed by Jim Binkley of Portland State University, will be
described in detail along with discussions of other tools and resources
that are useful in the fight against Botnets.
* This is the first book to explain the newest internet threat Botnets,
zombie armies, bot herders, what is being done, and what you can do to
protect your enterprise.
* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself. |
Download |
(Size :- 5.31 MB)  |
 |
-: Hacking Exposed - 6 :-
The world's bestselling computer security book--fully expanded and updated.
* New chapter on hacking hardware, including lock bumping, access
card cloning, RFID hacks, USB U3 exploits, and Bluetooth device
hijacking
* Updated Windows attacks and countermeasures, including new Vista
and Server 2008 vulnerabilities and Metasploit exploits
* The latest UNIX Trojan and rootkit techniques and dangling pointer
and input validation exploits
* New wireless and RFID security tools, including multilayered
encryption and gateways
* All-new tracerouting and eavesdropping techniques used to target
network hardware and Cisco devices
* Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow
coverage
* VPN and VoIP exploits, including Google and TFTP tricks, SIP
flooding, and IPsec hacking
* Fully updated chapters on hacking the Internet user, web hacking,
and securing code |
Download |
(Size :- 7.79 MB) Download
|
|
|
|
|
|
|
|
|
No comments:
Post a Comment