Exploitation Hacking

Post Exploitation Hacking – Persistence and Continued Access (2015)

Post Exploitation Hacking – Persistence and Continued Access (2015)
MP4 | AVC 200kbps | English | 1280x720 | 30fps | 6h 38mins | AAC stereo 160kbps | 1.33 GB
Genre: Video Training

As the name implies, Post Exploitation Hacking – Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth—but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps. You’ll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators. Additionally, you’ll master how to use listener shells, metasploit and meterpreter scripting.

Hacking: The Art of Exploitation w/CD [Repost]  

Posted by AlenMiler at July 2, 2014
Hacking: The Art of Exploitation w/CD [Repost]

Hacking: The Art of Exploitation w/CD by Jon Erickson
No Starch Press | October 01 2003 | ISBN: 1593270070 | Pages: 264 | CHM | 1.4 MB

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Hacking: The Art of Exploitation, 2nd Edition (Repost)  eBooks & eLearning

Posted by SoftsandEbooks at Feb. 19, 2011
Hacking: The Art of Exploitation, 2nd Edition (Repost)

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
Publisher: No Starch Press | 2008 | Pages : 480 | PDF/EPUB | ISBN-10: 1593271441 | 4.9 MB

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Ethical Hacking For Beginners-Learn Facebook & Phone hacking (2016)  eBooks & eLearning

Posted by naag at Oct. 20, 2016
Ethical Hacking For Beginners-Learn Facebook & Phone hacking (2016)

Ethical Hacking For Beginners-Learn Facebook & Phone hacking
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 12 | 1.86 GB
Genre: eLearning | Language: English

Learn how to hack systems, phones and Facebook users with Kali Linux online using client side exploitation techniques.

Hacking: The Art of Exploitation [Repost]  

Posted by tanas.olesya at Jan. 16, 2016
Hacking: The Art of Exploitation [Repost]

Hacking: The Art of Exploitation (One Off) by Jon Erickson
English | 11 Oct. 2004 | ISBN: 1593270070 | 241 Pages | CHM | 1 MB

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits.

Hacking - Prevention from this dark art of exploitation  

Posted by AlenMiler at July 4, 2015
Hacking - Prevention from this dark art of exploitation

Hacking - Prevention from this dark art of exploitation by Abhishek Sagar
English | Jul 2, 2015 | ASIN: B010V8JTLQ | 7 Pages | True MOBI (Kindle)/(EPUB/PDF conv) | 1.2 MB

Techniques to protect yourself from hackers…. Having a great knowledge is a good thing but we should never use this to harm people.
Hacking Into Thinking Machines: System is Live... and it's Listening...

Hacking Into Thinking Machines: System is Live… and it's Listening… by yash sawarkar
English | 7 Jun. 2015 | ASIN: B00Z808TPK | 44 Pages | EPUB/AZW3/PDF (conv) | 10.21 MB

Introduce to system hacking, introduce readers the fundamental concept involved in system hacking. Password hacking also where the reader can perform on live machine where you can get real time experience to exploit the vulnerability of system this will also introduce numerous tools on password cracking, also this book focuses on some advance concept on hacking this cover the exploitation of windows xp, 7.
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray[Repost]

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray
McGraw-Hill Osborne Media; 3 edition | December 4, 2007 | English | ISBN: 007149426X | 475 pages | PDF | 8 MB

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures.

Hacking: The Art of Exploitation, 2nd Edition (Repost)  

Posted by Veslefrikk at May 9, 2014
Hacking: The Art of Exploitation, 2nd Edition (Repost)

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
English | 2008-01-11 | ISBN: 1593271441 | 488 pages | PDF | 5 MB

Hacking: The Art of Exploitation, 2nd Edition (Repost)  

Posted by elodar at Feb. 23, 2013
Hacking: The Art of Exploitation, 2nd Edition (Repost)

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
English | 2008-01-11 | ISBN: 1593271441 | 488 pages | EPUB + MOBI + PDF | 1.31 mb + 8.32 mb + 4.35 mb