Exploitation Hacking

Post Exploitation Hacking – Persistence and Continued Access (2015)  eBooks & eLearning

Posted by house23 at Jan. 22, 2015
Post Exploitation Hacking – Persistence and Continued Access (2015)

Post Exploitation Hacking – Persistence and Continued Access (2015)
MP4 | AVC 200kbps | English | 1280x720 | 30fps | 6h 38mins | AAC stereo 160kbps | 1.33 GB
Genre: Video Training

As the name implies, Post Exploitation Hacking – Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth—but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps. You’ll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators. Additionally, you’ll master how to use listener shells, metasploit and meterpreter scripting.

Learning Metasploit Exploitation and Development [Repost]  eBooks & eLearning

Posted by ChrisRedfield at Feb. 8, 2016
Learning Metasploit Exploitation and Development [Repost]

Aditya Balapure - Learning Metasploit Exploitation and Development
Published: 2013-07-24 | ISBN: 1782163581 | PDF | 294 pages | 9.07 MB

Hacking: The Art of Exploitation [Repost]  eBooks & eLearning

Posted by tanas.olesya at Jan. 16, 2016
Hacking: The Art of Exploitation [Repost]

Hacking: The Art of Exploitation (One Off) by Jon Erickson
English | 11 Oct. 2004 | ISBN: 1593270070 | 241 Pages | CHM | 1 MB

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits.

Hacking - Prevention from this dark art of exploitation  eBooks & eLearning

Posted by AlenMiler at July 4, 2015
Hacking - Prevention from this dark art of exploitation

Hacking - Prevention from this dark art of exploitation by Abhishek Sagar
English | Jul 2, 2015 | ASIN: B010V8JTLQ | 7 Pages | True MOBI (Kindle)/(EPUB/PDF conv) | 1.2 MB

Techniques to protect yourself from hackers…. Having a great knowledge is a good thing but we should never use this to harm people.

Udemy - Learn The Basics of Ethical Hacking and Penetration Testing (2015)  eBooks & eLearning

Posted by house23 at April 4, 2015
Udemy - Learn The Basics of Ethical Hacking and Penetration Testing (2015)

Udemy - Learn The Basics of Ethical Hacking and Penetration Testing (2015)
MP4 | AVC 328kbps | English | 1280x720 | 5fps | 18 hours | AAC stereo 60kbps | 3.15 GB
Genre: Video Training

Become a Master Computer Security Expert by Learning How to Use Ethical Hacking to Reveal Potential Vulnerabilities in Information Systems. This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system. In this course, students interested in learning ethical hacking techniques and penetration testing and who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker. Get started with this course today to be on your way towards finding real-world computer security solutions.

Udemy - IT Security and Ethical Hacking (3/4, 247 - 371)  eBooks & eLearning

Posted by house23 at April 1, 2015
Udemy - IT Security and Ethical Hacking (3/4, 247 - 371)

Udemy - IT Security and Ethical Hacking (3/4, 247 - 371)
MP4 | AVC 771kbps | English | 1280x720 | 29.97fps | 6 hours | AAC stereo 54kbps | 5.04 GB
Genre: Video Training

Learn the basics of IT Security, Ethical Hacking and its various concepts. Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area.

Hacking: The Art of Exploitation w/CD [Repost]  eBooks & eLearning

Posted by AlenMiler at July 2, 2014
Hacking: The Art of Exploitation w/CD [Repost]

Hacking: The Art of Exploitation w/CD by Jon Erickson
No Starch Press | October 01 2003 | ISBN: 1593270070 | Pages: 264 | CHM | 1.4 MB

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Hacking: The Art of Exploitation, 2nd Edition (Repost)  eBooks & eLearning

Posted by Veslefrikk at May 9, 2014
Hacking: The Art of Exploitation, 2nd Edition (Repost)

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
English | 2008-01-11 | ISBN: 1593271441 | 488 pages | PDF | 5 MB

Hacking: The Art of Exploitation, 2nd Edition (Repost)  eBooks & eLearning

Posted by elodar at Feb. 23, 2013
Hacking: The Art of Exploitation, 2nd Edition (Repost)

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
English | 2008-01-11 | ISBN: 1593271441 | 488 pages | EPUB + MOBI + PDF | 1.31 mb + 8.32 mb + 4.35 mb

Jon Erickson, "Hacking The Art of Exploitation" (Repost)  eBooks & eLearning

Posted by lenami at Aug. 17, 2012
Jon Erickson, "Hacking The Art of Exploitation" (Repost)

Jon Erickson, "Hacking The Art of Exploitation"
ISBN: 1593270070 | edition 2003 | CHM | 241 pages | 1 mb

This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.