banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Forum Index Thông tin về các địa chỉ và tài liệu hữu ích [torrent] Infosec Institute AEH/CEH slides and tools  XML
  [Question]   [torrent] Infosec Institute AEH/CEH slides and tools 10/03/2009 07:45:03 (+0700) | #1 | 172612
Kihote
Member

[Minus]    0    [Plus]
Joined: 27/10/2008 17:00:46
Messages: 24
Offline
[Profile] [PM]
Yên tâm torrent này rất chất lượng download nhanh.Lưu ý khi down dùng utorrent nhé.


AEH slides

Module 1 Intro.PDF
Module 10 - Metasploit Overflows.pdf
Module 11 Exploiting Format String Bugs.PDF
Module 12 Fault Injection.PDF
Module 13 -Windows Overflows.pdf
Module 14 - Heap Overflows.pdf
Module 15 Cracking with Disassemblers .PDF
Module 16 Cracking with the Debugger.PDF
Module 17 Cracking Win32 with IDA.PDF
Module 18 CDROM Protections.PDF
Module 19 Encoders and Compressor.PDF
Module 2 Advanced Ethical Hacking.PDF
Module 20 Detecting Debuggers and Disassemblers.PDF
Module 21 Web App Hacking.PDF
Module 22 SQL Injection with MSSQL.PDF
Module 23 SQL Injection with MySQL.PDF
Module 24 Exploiting Web Apps.PDF
Module 25Attacking HTTP.PDF
Module 3 Advanced Recon.PDF
Module 4 - Advanced Exploitation.pdf
Module 5 IP Spoofing And Redirection.PDF
Module 6 Blinding IDSs.PDF
Module 7 Buffer Overflows.PDF
Module 8 Exploiting Buffer Overflows.PDF
Module 9 Shellcoding.PDF

CEH slides

Module 1 Intro.PDF
Module 10 TCP-IP for Hackers.PDF
Module 11 Network Recon.PDF
Module 12 Stealthy Network Recon.PDF
Module 13 Service Identification.PDF
Module 14 Defeating Password Security.PDF
Module 15 Breaking Windows Passwords.PDF
Module 16 Breaking Unix Passwords.PDF
Module 17 Vulnerability Assessment.PDF
Module 18 Learning Exploitation.PDF
Module 19 Exploiting Windows.PDF
Module 2 Ethical Hacking.PDF
Module 20 Exploiting Windows Apps.PDF
Module 21 Exploiting Linux.PDF
Module 22 - Automated Pen Testing.pdf
Module 24 Deep Target Penetration.PDF
Module 25 Offensive Sniffing.PDF
Module 26 Covert Channels.PDF
Module 27 Covering Tracks.PDF
Module 28 Wireless Insecurity.PDF
Module 29 Attacking Routers.PDF
Module 31 Web App Overview.PDF
Module 32 SQL Injection.PDF
Module 33 Web App Hacking.PDF
Module 4 VMware and Linux.PDF
Module 5 Methodologies.PDF
Module 6 Abusing DNS.PDF
Module 7 Abusing SNMP.PDF
Module 9 Passive Intelligence Gathering.PDF

Xin lỗi vì lý do khách quan tớ không thể share bằng torrent tớ sẽ sớm upload lên host khác.Cảm ơn.
[Up] [Print Copy]
[digg] [delicious] [google] [yahoo] [technorati] [reddit] [stumbleupon]
Go to: 
 Users currently in here 
1 Anonymous

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|