The Hacker's Underground Handbook

seeders: 2
leechers: 0
Added on October 14, 2012 by shael1435in Books > Ebooks
Torrent verified.



The Hacker's Underground Handbook (Size: 2.51 MB)
 The_Hacker's_Underground_Handbook.pdf2.51 MB
 follow meeee.txt170 bytes


Description

follow me on.............
my username is shael1435 image

on all social sites like fb,g+,twitter,linkidn,qeep,kat.ph,



also follow me on
http://www.almightycranes.webatu.com/


this book contains something new......in cs it security field................


A. Introduction..............................................................................................5
1. How can I use this eBook?
2. What is a hacker
3. Hacker Hierarchy
4. What does it take to become a hacker?
5. Disclaimer
B. Programming............................................................................................9
1. Do I really need it?
2. Where should I start?
3. Best way to learn
C. Linux.......................................................................................................12
1. What is it?
2. Choosing a distribution
3. Running Linux
4. Learning Linux
D. Passwords...............................................................................................33
1. Password Cracking
2. Phishing
3. Countermeasures
4. More Programs
E. Network Hacking.....................................................................................48
1. Foot printing
2. Port Scanning
3. Banner Grabbing
4. Searching for Vulnerabilities
5. Penetrating
6. Countermeasures
F. Wireless Hacking.....................................................................................70
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4
4. Countermeasures
G. Windows Hacking...................................................................................79
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures
H. Malware.................................................................................................93
1. Definitions
2. ProRat
3. Countermeasures
I. Web Hacking.........................................................................................104
1. Cross Site Scripting
2. Remote File Inclusion
3. Local File Inclusion
J. Conclusion............................................................................................114
1. Congratulations
2. Keep Learning
3. www.MrCracker.com

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
2.51 MB
seeders:2
leechers:0
The Hacker's Underground Handbook