Waraxe IT Security Portal
Login or Register
November 23, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 72
Members: 0
Total: 72
Full disclosure
APPLE-SA-11-19-2024-5 macOS Sequoia 15.1.1
Local Privilege Escalations in needrestart
APPLE-SA-11-19-2024-4 iOS 17.7.2 and iPadOS 17.7.2
APPLE-SA-11-19-2024-3 iOS 18.1.1 and iPadOS 18.1.1
APPLE-SA-11-19-2024-2 visionOS 2.1.1
APPLE-SA-11-19-2024-1 Safari 18.1.1
Reflected XSS - fronsetiav1.1
XXE OOB - fronsetiav1.1
St. Poelten UAS | Path Traversal in Korenix JetPort 5601
St. Poelten UAS | Multiple Stored Cross-Site Scripting in SEH utnserver Pro
Apple web content filter bypass allows unrestricted access to blocked content (macOS/iOS/iPadOS/visionO S/watchOS)
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Suggestions -> some links
Post new topicReply to topic View previous topic :: View next topic
some links
PostPosted: Fri May 23, 2008 4:15 pm Reply with quote
Snoop1990
Advanced user
Advanced user
Joined: May 22, 2008
Posts: 65




Hey,
I am quite new in security business, and I guess you know some more sides that explain how hackers work, so I can prevent myself and also others from being hacked. I would be very pleased if you can give my some links to tutorials or pages where to search fir such things.

what I know so far is:
http://www.ethicalhacker.net/
http://www.milw0rm.com/

and this forum Wink but I guess there are a lot more, so please tell me. Or even better create a section where users can present sides they found.

Regrades Snoop1990

_________________
http://snoop1990.co.cc

"I don't hack, I only surf the web to search for security holes ! To prevent my clients and me from being hacked !"
View user's profile Send private message Visit poster's website
PostPosted: Fri May 23, 2008 7:00 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




I suggest to buy books or download e-books. There are so many great stuff written in this days ...
For example look here:

http://www.amazon.com/s/ref=nb_ss_gw/105-6008571-7350801?url=search-alias%3Daps&field-keywords=hacking&x=0&y=0

And if you prefer warez or just want to try this knowledgeware before actual buying, then use p2p (emule, torrents) - hundreds of gigabytes pdf-files are waiting for readers.
Or search for web resources:

http://www.google.ee/search?hl=et&client=firefox-a&channel=s&rls=org.mozilla%3Aen-US%3Aofficial&hs=dXc&q=Hacking+pdf+intitle%3A%22Index+of%22&btnG=Otsi&lr=

example:

http://www.team509.com/download/docs/security/hacking/

Code:

[DIR] Parent Directory -
[ ] (MSPress) Writing Secure Code.pdf 05-Dec-2006 20:30 4.0M
[ ] 0072260858.Mcgraw-Hill Osborne Media.19 Deadly Sins of Software Security (Security One-off).chm 20-Mar-2007 23:38 1.4M
[ ] 0131482092.Prentice Hall Ptr.Solaris(TM) Internals- Solaris 10 and OpenSolaris Kernel Architecture (2nd Edition) (Solaris Series).chm 14-Mar-2007 17:53 8.6M
[ ] 0201549794.Addison-Wesley Professional.The Design and Implementation of the 4.4 BSD Operating System (Unix and Open Systems Series.).pdf 14-Mar-2007 19:24 22M
[ ] 1931769494.A-List Publishing.Hacker Web Exploitation Uncovered.chm 20-Feb-2007 00:37 555K
[ ] 1931769508.A-List Publishing.Hacker Linux Uncovered.chm 20-Feb-2007 00:39 4.5M
[ ] A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm 30-May-2005 23:30 4.7M
[ ] A_Buffer_Overflow_Study_-_Attacks_and_Defenses__2002_.pdf 20-Aug-2005 21:29 470K
[ ] Addison.Wesley,.Advanced.Programming.in.the.UNIX.Environment.(2005),.2Ed.BBL.LotB.chm 05-Dec-2006 20:22 3.2M
[ ] Addison.Wesley,.Software.Security.Building.Security.In.(2006).BBL.chm 13-Nov-2006 15:09 3.8M
[ ] Addison.Wesley.Advanced.Programming.In.The.Unix.Environment.(2005).2Ed.pdf 05-Dec-2006 20:19 10M
[ ] Addison.Wesley.Compilers.Principles.Techniques.and.Tools.2nd.Edition.Aug.2006.pdf 09-Nov-2007 23:56 48M
[ ] Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.chm 20-Aug-2005 21:32 1.6M
[ ] Addison.Wesley.Pub.Exploiting.Software.How.to.Break.Code.eBook-kB.pdf 31-May-2005 16:08 7.6M
[ ] Addison Wesley - Hack I.T. Security Through Penetration Testing.chm 31-May-2005 16:46 4.6M
[ ] Addison Wesley - Secure Programming with Static Analysis - 2007.pdf 25-Sep-2007 12:36 4.7M
[ ] Art.of.Software.Security.Assessment.chm 13-Nov-2006 15:18 4.5M
[ ] Auerbach.Publications,.The.Security.Risk.Assessment.Handbook.(2005).DDU.LotB.pdf 05-Dec-2006 20:03 6.4M
[ ] C++ and Assembly Language Reference.pdf 25-Sep-2007 12:05 1.2M
[ ] Cisco.Press.Penetration.Testing.and.Network.Defense.Nov.2005.FIXED.eBook-DDU.chm 08-Nov-2005 19:54 15M
[ ] Code_Complete.A_Practical_Handbook_of_Software_Construction.2ndEditionDraft.McConnell.pdf 05-Dec-2006 19:57 5.1M
[ ] Computer Security Art And Science.chm 05-Dec-2006 20:32 2.6M
[ ] Computer_Vulnerability_March_9_2000_.pdf 20-Aug-2005 21:49 390K
[ ] Ebook - Windows - Programming .NET Security.chm 05-Dec-2006 19:51 2.7M
[ ] John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.pdf 31-May-2005 16:20 3.1M
[ ] McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf 31-May-2005 15:42 3.4M
[ ] McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf 31-May-2005 15:57 4.8M
[ ] McGraw.Hill.Osborne.Media.XML.Security.eBook-TLFeBOOK.pdf 15-Jul-2005 17:47 3.8M
[ ] Microsoft.Press.Hunting.Security.Bugs.ebook-Spy.chm 08-Feb-2007 15:29 22M
[ ] Microsoft.Press.Improving.Web.Application.Security.Threats.and.Countermeasures.eBook-LiB.chm 05-Dec-2006 19:48 6.1M
[ ] Microsoft.Press.The.Security.Development.Lifecycle.Jun.2006.chm 20-Feb-2007 00:41 3.3M
[ ] OReilly - Oracle.Security.OReilly.1998.chm 31-May-2005 16:48 1.3M
[ ] Oreilly.Security.Warrior.eBook-DDU.chm 31-May-2005 00:36 4.5M
[ ] Prentice.Hall.PTR.Internet.Denial.of.Service.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm 15-Jul-2005 17:46 2.1M
[ ] Sams.Inside.Network.Security.Assessment.Guarding.Your.IT.Infrastructure.Nov.2005.chm 05-Dec-2006 19:39 1.9M
[ ] Sams.Maximum.Security.Fourth.Edition.chm 30-May-2005 23:32 2.9M
[ ] Secure Coding Principles and Practices.pdf 05-Dec-2006 19:37 2.1M
[ ] Software Vulnerability Analysis.pdf 05-Dec-2006 19:35 2.8M
[ ] Strengthening Network Security With Web-Based Vulnerability Assessment.pdf 05-Dec-2006 19:33 243K
[ ] THE SHELLCODER'S HANDBOOK.pdf 02-Jun-2005 17:13 8.2M
[ ] The.Art.of.Exploitation-FOS.chm 31-May-2005 16:26 1.4M
[ ] The.Ethical.Hack.A.Framework.for.Business.Value.Penetration.Testing.eBook-EEn.pdf 08-Nov-2005 19:11 3.9M
[ ] The.International.Handbook.of.Computer.Security.eBook-EEn.pdf 31-May-2005 17:06 1.8M
[ ] The.Oracle.Hackers.Handbook.Jan.2007.eBook-BBL.chm 09-Jun-2007 13:10 484K
[ ] The Art Of Computer Virus Research And Defense.chm 08-Feb-2007 15:33 6.7M
[ ] The Database Hacker's Handbook - Defending Database Servers.chm 29-May-2007 17:39 1.1M
[ ] The_Art_of_Deception_by_Kevin_Mitnick.pdf 20-Aug-2005 21:59 5.2M
[ ] The_Art_of_Intrusion.pdf 20-Aug-2005 21:48 3.1M
[ ] The_ Assembly_ Programming_ Master_ Book.chm 18-Dec-2006 22:37 10M
[ ] Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.rar 30-Aug-2005 18:38 2.1M
[IMG] Wiley - How Debuggers Work.djvu 05-Dec-2006 19:28 2.6M
[ ] Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf 02-Aug-2005 17:08 9.3M
[ ] Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007(2).rar 12-Oct-2007 12:36 3.0M
[ ] [eBook - Eng] Penetration Tester's - Open Source Toolkit.pdf 25-Sep-2007 15:54 34M
[ ] [eBook] Addison Wesley - Enterprise Java 2 Security Building Secure and Robust J2EE Applications (2004).chm 05-Dec-2006 20:26 3.9M
[ ] data-compression-the-complete-reference.9781846286025.27230.pdf 25-Sep-2007 14:58 8.8M
[ ] ebook - Designing and Writing Secure Application Code.pdf 05-Dec-2006 19:52 688K
[ ] network-protocols-handbook.9780974094526.27099.pdf 07-Jun-2007 10:18 5.0M
[ ] programing - Windows.System.Programming.Third.Edition.chm 05-Dec-2006 19:41 2.3M
[ ] tlf-spusd.pdf 13-Jun-2005 09:55 3.8M
[ ] windowskernel.rar


And test stuff on your home PC!! Use VMware! try various *nix and windows versions, try metasploit and try to exploit localhost!
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Fri May 23, 2008 7:03 pm Reply with quote
Snoop1990
Advanced user
Advanced user
Joined: May 22, 2008
Posts: 65




thank you very much, now I have something to read before going to bed Very Happy
Regrades Snoop1990
View user's profile Send private message Visit poster's website
PostPosted: Sun May 25, 2008 8:03 am Reply with quote
Snoop1990
Advanced user
Advanced user
Joined: May 22, 2008
Posts: 65




I also found a nice collection:

Here !

_________________
http://snoop1990.co.cc

"I don't hack, I only surf the web to search for security holes ! To prevent my clients and me from being hacked !"
View user's profile Send private message Visit poster's website
some links
www.waraxe.us Forum Index -> Suggestions
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.052 Seconds