Jun 26, 2008
82 Views

Ethical Hacker kit v2 (HSC 2008 kit v2)

Written by

Đây là bộ toolkits bên trong gồm nhìu thứ. của hãng Hackers Center.

Tên bộ kit này là Ethical Hacker Kit

Details thêm :

http://hackerscenter.biz/kit/kitv2/
Hackers Center Ethical Hacker Kit is aimed at helping people new to Hacking & Security learn Ethical Hacking from school view with guidance & little time as possible. Learning Ethical Hacking hasn’t been so easy until now. We make sure that people striving to learn how to Hack & Secure in matter of weeks, & not months. We believe to become a good security professional one must know as much as black hat hacker. After completing this program, you should be able to understand security & advance into professional IT Security. This is the best Educational Kit for unbelievable low price!

Sec 1: Footprinting & Scanning

– Understanding Ethical Hacking
– Intro to reconnaissance phase
– Understanding footprinting
– Scanning & Footprinting Tools
– Scanning & Footprinting Books
– Understanding port scanning
– Discovering the OS system
– Discovering services running
– Understanding enumerations

Sec 2: Web Security

– Understanding Web Security
– Password Hacking & Security
– IIS web Server Security
– Web Security Tools
– Web Security Books
– Apache Web Server Security
– SQl injection & Security
– Cross-Site Scripting (XSS)
– Web Application Security
– Authentication & Sessions
– Prevention & Countermeasures

Sec 3: Win Hacking & Security

– Windows System Security
– Cracking Passwords
– Password Recovery
– Hardware Security
– Registry Security
– Win & Networking Tools
– Win & Networking Books
– Cisco Security & Hacks
– Intrusion detection
– Firewalls & Honeypots
– Ip Changing & Security
– Spyware & Anti-Virus Sec

Sec 4: Sniffing & Hijacking

– Understanding sniffers
– Packet capturing
– MAC flooding & ARP poisoning
– How session hijacking works
– Sniffing & Hijacking Tools
– Sniffing & Hijacking Books
– Spoofing attacks & Security
– Many Sniffing countermeasures

Sec 5: Denial of Service

– Denial Of Service Attacks
– Distributed Denial Of Service
– Types of denial of attacks
– Tools for running DOS attacks
– Tools for running DDOS attacks
– Denial Of Service Books
– Denial of Service Countermeasures

6: Social Engineering

– What is Social Engineering
– Policies and Procedures
– Online Social Engineering
– Social Engineering Books
– Who is Kevin Mitnick
– The Common Types of Attack
– Best collection of E-zines
– Social Engineering Countermeasures

Sec 8: Coding & Buffer Overflow

– Coding Skills Required
– Windows Programming
– What is API Coding
– Linux Programming
– Open Source Coding
– ASM, CGI & Perl
– C/C++, Java & PHP
– What is Secure Coding
– HSC Coding Library
– Reverse Engineering
– What is a Buffer Overflow
– Writing your own exploits
– Understanding Stacks
– Defense from Buffer Overflows
– Understanding shellcodes
– Writing Exploits
– Coders Professional Books

Sec 9: Worms & Virus

– Understanding Viruses
– Viruses different forms
– Viruses & Worms Books
– How Anti-Viruses Work
– How worms spread & infect
– Viruses Codes and Tools
– History of viruses & worms
– Protection against viruses

Sec 10: Linux Security

– Introduction to Linux
– Linux file structure
– Linux Networking
– Basic Linux commands
– How Linux is hacked
– Rootkits for Linux
– Compiling Programs on Linux
– IP Chains and IP Tables
– Linux Security Tools
– Linux Security Books
– Types of Platforms
– Linux Security Methods

Sec 11: Encryption

– Introduction to Encryption
– Encryption Cracking Techniques
– Types of Encryptions
– Understanding hashing
– Know how MD5 works
– Basic cryptographic attacks
– Art of steganography
– SSH, RSA, PGP, SSL & SHA
– Algorithm coding
– Rainbow Tables & Cracking
– Cryptographic Defence
– Cryptographic Tools
– Cryptographic Books
– Online anonymity
– Anonymous surfing Tools
– Understanding Proxy

Sec 12: Trojans & Rats

– Understanding Trojan horses
– Understanding Backdoors
– Understanding Rats
– Trojan infection mechanisms
– Intro to keyloggers
– Security Tools
– Trojan & Rats Books
– How to write your Trojan
– What are logic Bombs
– Windows Rootkits
– Trojan & Rat Encryption
– Types of Attack Methods
– Trojans & Rats Countermeasureses

Article Tags:
· · · · ·
Article Categories:
Bug & Security
    http://linholiver.com

    https://linholiver.com/diary/about/