banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Forum Index Thông tin về các địa chỉ và tài liệu hữu ích Hướng dẫn lập trình mạng.  XML
  [Question]   Hướng dẫn lập trình mạng. 15/06/2007 22:42:21 (+0700) | #1 | 64848
[Avatar]
eyesdog
Elite Member

[Minus]    0    [Plus]
Joined: 18/01/2002 06:54:01
Messages: 94
Offline
[Profile] [PM]
http://www.security-freak.net/videos.html

1. Basic Socket Programming: (4 videos - 65 mins)

1.1 Presentation on Socket Programming basics (25 mins)
1.2 "Type with Me" exercise - a simple TCP server (19 mins)
1.3 Coding a TCP Echo server (13 mins)
1.4 Coding a TCP Echo client (9 mins)



2. Packet Sniffing using Raw Sockets: (7 videos - 86 mins)

2.1 Presentation on raw socket basics (14 mins)
2.2 Sniffer coding basics (15 mins)
2.3 Sniffer - Ethernet header parsing (10 mins)
2.4 Sniffer - IP header parsing (14 mins)
2.5 Sniffer - TCP header parsing (10 mins)
2.6 Sniffer - Data parsing (9 mins)
2.7 A look at Tcpdump and Ethereal (14 mins)


3. Packet Injection using Raw Sockets: (6 videos - 75 mins)

3.1 Packet injection basics presentation (10 mins)
3.2 Your first packet injection program (9 mins)
3.3 Ethernet header contruction & injection (10 mins)
3.4 IP header construction & injection (14 mins)
3.5 TCP header and data contruction & injection (17 mins)
3.6 ARP Request query injector (15 mins)



4. Architecture of a Proactive Security Tool: (4 videos - 43 mins)

4.1 The "Sniff - Think - Inject" logic - a presentation (10 mins)
4.2 Programming the Framework (7 mins)
4.3 Communication via the Framework (8 mins)
4.4 ARP DoS tool using the Framework (18 mins)



5. Encryption Basics using RC4: (3 videos - 38 mins)

5.1 RC4 basics presentation (13 mins)
5.2 Understanding RC4 via simulations (13 mins)
5.3 File encryption / decryption using RC4 (12 mins)



6. How do Worms work? (Upload started)

6.1 Understand the basics of worms - a presentation (20 mins)
6.2 Scanning techniques used by worms - lets code (26 mins)
6.3 Understanding an exploit - a blackbox approach
6.4 Writing a wrapper over the exploit
6.5 Making a simple framework for creating worms
6.6 How worm authors use Anti Virus sites to make new worms!
[Up] [Print Copy]
[digg] [delicious] [google] [yahoo] [technorati] [reddit] [stumbleupon]
Go to: 
 Users currently in here 
1 Anonymous

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|