Tuesday, June 3, 2008

Ebook

Hacking: The Art of Exploitation

Spoiler for :


The Fundamental Techniques Of Serious Hacking:
This book does an excellent job of explain various techniques that hackers employ. The explainations include examples, source

code, breakouts, and descriptions. The book progresses from basic examples to more complex by building upon a project a

little at a time.

The book bascially covers 3 broad areas: programming, networking, and cryptogrophy.
Programming covers buffer overflows, stack exploits, heap overflows, polymorphic code, inline loaders and other information.

Examples are presented in C and assembly. Networking covers many different exploits generally centered around the

modification of packets and/or spoofing. Cryptography generally covers password based attacks.

The author has a careful approach that makes the book enjoyable to read and easy to follow. He does not jump from one step to

the next without covering each step in detail. This makes the text both readable and enjoyable.

Most examples are realted to Windows or Linux but the exploits are universal. Several different tools are described and all

were open source.

In Hacking: The Art Of Exploitation you will learn how to:
Exploit programs using buffer overflows and format strings
Write your own printable ASCII polymorphic shellcode
Defeat non-executable stacks by returning into libc
Redirect network traffic, conceal open ports, and hijack TCP connections
krack encrypted 802.11b wireless trafffic using the FMS attack
If you're serious about hacking, this book is for you, no matter what side of the fence you're on.

Download
Code:
http://rapidshare.com/files/74127806/Hacking-The_Art_of_Exploitation__www.area51warez.info.rar



Hacking Exposed - 2nd Edition

Book Description:
Spoiler for :
When a tree falls in the forest and no one is around to hear it, it certainly makes a sound. But if a computer network has a

security vulnerability and no one knows about it, is it insecure? Only the most extreme Berkeleian idealist might argue

against the former, but the latter is not nearly so obvious.

A network with a security vulnerability is insecure to those who know about the vulnerability.If noone knows about it?if it

is literally a vulnerability that has not been discovered?then the network is secure. If one person knows about it, then the

network is insecure to him but secure to everyone else. If the network equipment manufacturer knows about it...if security

researchers know about it...if the hacking community knows about it the insecurity of the network increasesas news of the

vulnerability gets out.

Or does it? The vulnerability exists, whether or not anyone knows about it.Publishing a vulnerability does not cause the

network to be insecure. To claim that would be confusing knowledge about a thing with the thing itself. Publishing increases

the likelihood that an attacker will use the vulnerability, but not the severity of the vulnerability. Publishing also

increases the likelihood that people can defend against the vulnerability. Just as an attacker can't exploit a vulnerability

he does not know about, a defender can't protect against a vulnerability he does not know about.

So if keeping vulnerabilities secret increases security, it does so in a fragile way. Keeping vulnerabilities secret only

works as long as they remain secret?but everything about information works toward spreading information. Some people spread

secrets accidentally; others spread them on purpose. Sometimes secrets are re-derived by someone else. And once a secret is

out, it can never be put back.

TABLE OF CONTENT:
Chapter 01 - Footprinting
Chapter 02 - Scanning
Chapter 03 - Enumeration
Chapter 04 - Hacking Windows 95/98 and ME
Chapter 05 - Hacking Windows NT
Chapter 06 - Hacking Windows 2000
Chapter 07 - Novell NetWare Hacking
Chapter 08 - Hacking UNIX
Chapter 09 - Dial-Up, PBX, Voicemail, and VPN Hacking
Chapter 10 - Network Devices
Chapter 11 - Firewalls
Chapter 12 - Denial of Service (DoS) Attacks
Chapter 13 - Remote Control Insecurities
Chapter 14 - Advanced Techniques
Chapter 15 - Web Hacking
Chapter 16 - Hacking the Internet User
Appendix A - Ports
Appendix B - Top 14 Security Vulnerabilities
Appendix C - About the Companion Web Site
Download
Code:
http://rapidshare.com/files/81794506/Hacking_Exposed__www.area51warez.info.rar



Hacking For Dummies- 2nd Edition

Spoiler for :


While you?re reading this, a hacker could be prying and spying his way into your company?s IT systems, sabotaging your

operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways.

Hackers For Dummies helps you hack into a hacker?s mindset and take security precautions to help you avoid a hack attack. It

outlines computer hacker tricks and techniques you can use to assess the security of your own information systems, find

security vulnerabilities, and fix them before malicious and criminal hackers can exploit them. It covers:
Hacking methodology and researching public information to see what a hacker can quickly learn about your operations
Social engineering (how hackers manipulate employees to gain information and access), physical security, and password

vulnerabilities Network infrastructure, including port scanners, SNMP scanning, banner grabbing, scanning, and wireless LAN

vulnerabilities Operating systems, including Windows, Linux, and Novell NetWare Application hacking, including malware

(Trojan horses, viruses, worms, rootkits, logic bombs, and more), e-mail and instant messaging, and Web applications
Tests, tools (commercial, shareware, and freeware), and techniques that offer the most bang for your ethical hacking buck

With this guide you can develop and implement a comprehensive security assessment plan, get essential support from

management, test your system for vulnerabilities, take countermeasures, and protect your network infrastructure. You discover

how to beat hackers at their own game, with: A hacking toolkit, including War dialing software, password kracking software,

network scanning software, network vulnerability assessment software, a network analyzer, a Web application assessment tool,

and more All kinds of countermeasures and ways to plug security holes A list of more than 100 security sites, tools, and

resources

Ethical hacking helps you fight hacking with hacking, pinpoint security flaws within your systems, and implement

countermeasures. Complete with tons of screen shots, step-by-step instructions for some countermeasures, and actual case

studies from IT security professionals, this is an invaluable guide, whether you?re an Internet security professional, part

of a penetration-testing team, or in charge of IT security for a large or small business.
Download
Code:
http://rapidshare.com/files/74813225/Hacking_for_Dummies_-_Ethical_Hacking.rar



Create Your Own Home Networks

Spoiler for :

This book provides you with a guide to some of the most productive, interesting, and just plain fun things you can do with

your computers. Many people these days have more than one computer at home and can easily become bewildered by all the

possibilities. The topics covered in this book will take you from the basics of computer networking to how to use your

computer to accomplish many everyday home networking tasks.

Along the way, this book provides you with enough extra information in the form of sidebars to either pique your interest or

satisfy your curiosity, depending on your level of interest in the topic. Because I am firmly convinced that people learn

best by actually performing a task rather than simply reading about it, this book provides detailed, step-by-step procedures

that show you exactly what to click or type to achieve the desired result. It also provides web links along the way, where

appropriate. When you have your home network set up, you can follow these links to get more information.

The most important assumption this book makes is that you are using Windows XP as your operating system and that you are

familiar with the basic operation and functionality it offers. This book does not cover any background operating system

concepts, but many fine books are available to help you with that sort of information (for example, Sams Teach Yourself

Windows XP All in One from Sams Publishing). Most of the projects presented in this book can be accomplished by using what

ships (and should be installed) with your copy of Windows XP. Where appropriate, this book tells you where and how to obtain

any other software and then describes how to install it.

TABLE OF CONTENT:
Chapter 1 - Understanding Basic Networking
Chapter 2 - Project 1: Making Your Computers Talk to Each Other
Chapter 3 - Project 2: Sharing Files, Printers, and Other Stuff on Your Network
Chapter 4 - Project 3: Creating a Network Jukebox
Chapter 5 - Project 4: Instant Messaging in and out of Your Home Network
Chapter 6 - Project 5: Creating and Sharing Video on Your Home Network
Chapter 7 - When Your Network Doesn't Work the Way It Should
Chapter 8 - Bonus Project: Creating Your Own Website
Download
Code:
http://rapidshare.com/files/74806761/Create_Your_Own_Home_Networks.rar



Advanced Web Sites Made Easy

Spoiler for :

ADVANCED WEB SITES MADE EASY teaches all major concepts of this exciting technology with many well chosen examples. It

contains code and building blocks that can readily be used as the core of web-based applications. Included with the book is

free access to a web site featuring solutions to the exercises, a user forum, book corrections, all the book's code in

downloadable form, and your own copy of HTML/OS free for 30 days.

As you work your way through the book, you'll get a good understanding of this powerful and flexible language. Chapter after

chapter teaches you how easy it is to make sophisticated use of it by adding just a few lines of BASIC-like code to your HTML

documents. You'll also begin to think in a new way about web computing. HTML/OS frees you from the hassles of systems

integration. Whether you just want to add dynamic features to an existing site, design complex web sites, or develop

web-based software, you'll never have to worry about compatibility. It runs on all platforms and includes a built-in database

engine.

You'll be well equipped to build advanced web sites with this clearly written book, its companion web site, the HTML/OS

manual, and the Aestiva User Center with its many ready-made examples of commercial applications and utilities, collection of

sample code, and extensive knowledge base.
Download
Code:
http://rapidshare.com/files/74788784/Advanced_Web_Sites_Made_Easy.rar



Dangerous Google: Searching for Secrets

Spoiler for :

Dangerous Google: Searching for Secrets:
You will get to know how to find confidential data using Google - the most popular Web browser. The article also shows an

effective way of looking for information on vulnerable systems and Web services as well as publicly available network

devices.

This book explains to you How to search on Google Like for example How to search for Mp3 music in just one click rather than

searching for hours and many more....

After reading this book you will find all what you need in a few seconds.
If you like search on google like a expert, read this!!
Download
Code:
http://rapidshare.com/files/72653885/Dangerous_Google_Searching__www.area51warez.info.rar



Design Accessible Web Sites

Spoiler for :

Description:
It's not a one-browser web anymore. You need to reach audiences that use cell phones, PDAs, game consoles, or other

"alternative" browsers, as well as users with disabilities. Legal requirements for assistive technologies as well as a wide

array of new browsing experiences means you need to concentrate on semantics, alternate access paths, and progressive

enhancement. Give your audience the power to interact with your content on their own terms. It's the right thing to do, and

with a $100 billion a year market for accessible content, new laws and new technologies, you can't afford to ignore

accessibility.

With this book, you'll learn basic principles and techniques for developing accessible HTML, audio, video, and multimedia

content. In addition, you will understand how to apply the principles you learn in this book to new technologies when they

emerge.

You'll learn how to:
- Use best practices of accessibility to develop accessible web content
- Build testing into projects to improve results and reduce costs
- Create high quality alternative representations for your audience
- Add accessibility features to external media like PDF and Flash
- Negotiate the terrain of accessibility standards
- Apply principles of accessiblity to new technologies as they emerge
Download
Code:
http://rapidshare.com/files/77202036/pasado_daws.rar
Code:
RAR Password: www.area51warez.info



Building a Web Site For Dummies - 3rd Edition

Spoiler for :

Maybe you already have your own Web site and you?re not quite satisfied with it. Or perhaps you?re still in the planning

stages and want to know what you can do to make your site as good as it can be. You?ve been to Web sites that have all the

bells and whistles, and you wouldn?t be human if you weren?t just a wee bit envious. Well, now you can have it all, too.
Download
Code:
http://rapidshare.com/files/77198682/pasado_bws4d.rar
Code:
RAR Password: www.area51warez.info



Google Web Toolkit Solutions: More Cool & Useful Stuff

Spoiler for :

Prentice Hall PTR; 1 edition | ISBN: 0132344815 | 408 pages | November 17, 2007 | PDF | 10 Mb

Cutting-Edge GWT: Advanced Recipes for Java Developers
Google Web Toolkit (GWT) is an open source Java development framework for building Ajax-enabled web applications. Instead of

the hodgepodge of technologies that developers typically use for Ajax?JavaScript, HTML, CSS, and XMLHttpRequest?GWT lets

developers implement rich client applications with pure Java, using familiar idioms from the AWT, Swing, and SWT. GWT goes

beyond most Ajax frameworks by making it easy to build desktop-like applications that run in the ubiquitous browser, where

the richness of the user interface is limited only by the developer?s imagination.

This book focuses on the more advanced aspects of GWT that you need to implement real-world applications with rich user

interfaces but without the heavy lifting of JavaScript and other Ajax-related technologies. Each solution in this practical,

hands-on book is more than a recipe. The sample programs are carefully explained in detail to help you quickly master

advanced GWT techniques, such as implementing drag-and-drop, integrating JavaScript libraries, and using advanced event

handling methodologies.

Solutions covered include
? Building custom GWT widgets, including both high-level composites and low-level components
? Implementing a viewport class that includes iPhone-style automated scrolling
? Integrating web services with GWT applications
? Incorporating the Script.aculo.us JavaScript framework into GWT applications
? Combining Hibernate and GWT to implement database-backed web applications
? Extending the GWT PopupPanel class to implement a draggable and resizable window
? Creating a drag-and-drop module, complete with drag sources and drop targets
? Deploying GWT applications to an external server
? Dynamically resizing flex tables
? Using GWT widgets in legacy applications developed with other frameworks, such as Struts and JavaServer Faces
Download
Code:
http://rapidshare.com/files/92025662/0132344815_www.area51warez.info.rar
Mirror:
http://www.paid4share.com/file/3815/0132344815-rar.html
Code:
RAR Password: www.area51warez.info



Windows Vista Resource Kit

Spoiler for :

The Microsoft Windows Vista Resource Kit is a comprehensive technical resource for deploying, maintaining, and

troubleshooting Microsoft Windows Vista.
Microsoft Press
2007
English
PDF
1536 pages
23.44 MB
Download
Code:
http://rapidshare.com/files/76819178/ViReK.zip

No comments: