Exploitation Hacking

Post Exploitation Hacking – Persistence and Continued Access (2015)  eBooks & eLearning

Posted by house23 at Jan. 22, 2015
Post Exploitation Hacking – Persistence and Continued Access (2015)

Post Exploitation Hacking – Persistence and Continued Access (2015)
MP4 | AVC 200kbps | English | 1280x720 | 30fps | 6h 38mins | AAC stereo 160kbps | 1.33 GB
Genre: Video Training

As the name implies, Post Exploitation Hacking – Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth—but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps. You’ll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators. Additionally, you’ll master how to use listener shells, metasploit and meterpreter scripting.

Peter Engebretson, "Les bases du hacking" (repost)  eBooks & eLearning

Posted by TimMa at Nov. 9, 2017
Peter Engebretson, "Les bases du hacking" (repost)

Patrick Engebretson, "Les bases du hacking"
Pearson | 2013 | ISBN: 2744025984 | French | EPUB | 240 pages | 3.9 Mb

Créez votre propre laboratoire de hacking! Vous souhaitez, comme les hackers, apprendre à pénétrer les réseaux et les systèmes informatiques? …

Ethical Hacking Full Series : From Scratch to Advanced ++  eBooks & eLearning

Posted by naag at Nov. 23, 2017
Ethical Hacking Full Series : From Scratch to Advanced ++

Ethical Hacking Full Series : From Scratch to Advanced ++
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 10 Hours | Lec: 100 | 1.29 GB
Genre: eLearning | Language: English

Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts!
Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing

Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing (Fortran, Python, Android, XML 1) by PG Wizard Books
English | 15 Mar. 2017 | ASIN: B06XPRYW1G | 44 Pages | AZW3 | 42.39 KB

Learning Metasploit Exploitation and Development [Repost]  eBooks & eLearning

Posted by ChrisRedfield at Feb. 8, 2016
Learning Metasploit Exploitation and Development [Repost]

Aditya Balapure - Learning Metasploit Exploitation and Development
Published: 2013-07-24 | ISBN: 1782163581 | PDF | 294 pages | 9.07 MB

Hacking: The Art of Exploitation [Repost]  eBooks & eLearning

Posted by tanas.olesya at Jan. 16, 2016
Hacking: The Art of Exploitation [Repost]

Hacking: The Art of Exploitation (One Off) by Jon Erickson
English | 11 Oct. 2004 | ISBN: 1593270070 | 241 Pages | CHM | 1 MB

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits.

Hacking: The Art of Exploitation w/CD [Repost]  eBooks & eLearning

Posted by AlenMiler at July 2, 2014
Hacking: The Art of Exploitation w/CD [Repost]

Hacking: The Art of Exploitation w/CD by Jon Erickson
No Starch Press | October 01 2003 | ISBN: 1593270070 | Pages: 264 | CHM | 1.4 MB

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Hacking: The Art of Exploitation, 2nd Edition (Repost)  eBooks & eLearning

Posted by elodar at Feb. 23, 2013
Hacking: The Art of Exploitation, 2nd Edition (Repost)

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
English | 2008-01-11 | ISBN: 1593271441 | 488 pages | EPUB + MOBI + PDF | 1.31 mb + 8.32 mb + 4.35 mb

Hacking: The Art of Exploitation by Jon Erickson [REPOST]  eBooks & eLearning

Posted by gin.of.da.game at April 18, 2012
Hacking: The Art of Exploitation by Jon Erickson [REPOST]

Hacking: The Art of Exploitation by Jon Erickson [REPOST]
Publisher: No Starch Press | 2008 | Pages : 480 | CHM | ISBN: 1593271441 | 4.67 MB

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming.

Hacking: The Art of Exploitation, 2nd Edition (Repost)  eBooks & eLearning

Posted by SoftsandEbooks at Feb. 19, 2011
Hacking: The Art of Exploitation, 2nd Edition (Repost)

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
Publisher: No Starch Press | 2008 | Pages : 480 | PDF/EPUB | ISBN-10: 1593271441 | 4.9 MB

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.