|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 71
Members: 0
Total: 71
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
some links |
|
Posted: Fri May 23, 2008 4:15 pm |
|
|
Snoop1990 |
Advanced user |
|
|
Joined: May 22, 2008 |
Posts: 65 |
|
|
|
|
|
|
|
Hey,
I am quite new in security business, and I guess you know some more sides that explain how hackers work, so I can prevent myself and also others from being hacked. I would be very pleased if you can give my some links to tutorials or pages where to search fir such things.
what I know so far is:
http://www.ethicalhacker.net/
http://www.milw0rm.com/
and this forum but I guess there are a lot more, so please tell me. Or even better create a section where users can present sides they found.
Regrades Snoop1990 |
|
_________________ http://snoop1990.co.cc
"I don't hack, I only surf the web to search for security holes ! To prevent my clients and me from being hacked !" |
|
|
|
|
|
|
|
Posted: Fri May 23, 2008 7:00 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
I suggest to buy books or download e-books. There are so many great stuff written in this days ...
For example look here:
http://www.amazon.com/s/ref=nb_ss_gw/105-6008571-7350801?url=search-alias%3Daps&field-keywords=hacking&x=0&y=0
And if you prefer warez or just want to try this knowledgeware before actual buying, then use p2p (emule, torrents) - hundreds of gigabytes pdf-files are waiting for readers.
Or search for web resources:
http://www.google.ee/search?hl=et&client=firefox-a&channel=s&rls=org.mozilla%3Aen-US%3Aofficial&hs=dXc&q=Hacking+pdf+intitle%3A%22Index+of%22&btnG=Otsi&lr=
example:
http://www.team509.com/download/docs/security/hacking/
Code: |
[DIR] Parent Directory -
[ ] (MSPress) Writing Secure Code.pdf 05-Dec-2006 20:30 4.0M
[ ] 0072260858.Mcgraw-Hill Osborne Media.19 Deadly Sins of Software Security (Security One-off).chm 20-Mar-2007 23:38 1.4M
[ ] 0131482092.Prentice Hall Ptr.Solaris(TM) Internals- Solaris 10 and OpenSolaris Kernel Architecture (2nd Edition) (Solaris Series).chm 14-Mar-2007 17:53 8.6M
[ ] 0201549794.Addison-Wesley Professional.The Design and Implementation of the 4.4 BSD Operating System (Unix and Open Systems Series.).pdf 14-Mar-2007 19:24 22M
[ ] 1931769494.A-List Publishing.Hacker Web Exploitation Uncovered.chm 20-Feb-2007 00:37 555K
[ ] 1931769508.A-List Publishing.Hacker Linux Uncovered.chm 20-Feb-2007 00:39 4.5M
[ ] A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm 30-May-2005 23:30 4.7M
[ ] A_Buffer_Overflow_Study_-_Attacks_and_Defenses__2002_.pdf 20-Aug-2005 21:29 470K
[ ] Addison.Wesley,.Advanced.Programming.in.the.UNIX.Environment.(2005),.2Ed.BBL.LotB.chm 05-Dec-2006 20:22 3.2M
[ ] Addison.Wesley,.Software.Security.Building.Security.In.(2006).BBL.chm 13-Nov-2006 15:09 3.8M
[ ] Addison.Wesley.Advanced.Programming.In.The.Unix.Environment.(2005).2Ed.pdf 05-Dec-2006 20:19 10M
[ ] Addison.Wesley.Compilers.Principles.Techniques.and.Tools.2nd.Edition.Aug.2006.pdf 09-Nov-2007 23:56 48M
[ ] Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.chm 20-Aug-2005 21:32 1.6M
[ ] Addison.Wesley.Pub.Exploiting.Software.How.to.Break.Code.eBook-kB.pdf 31-May-2005 16:08 7.6M
[ ] Addison Wesley - Hack I.T. Security Through Penetration Testing.chm 31-May-2005 16:46 4.6M
[ ] Addison Wesley - Secure Programming with Static Analysis - 2007.pdf 25-Sep-2007 12:36 4.7M
[ ] Art.of.Software.Security.Assessment.chm 13-Nov-2006 15:18 4.5M
[ ] Auerbach.Publications,.The.Security.Risk.Assessment.Handbook.(2005).DDU.LotB.pdf 05-Dec-2006 20:03 6.4M
[ ] C++ and Assembly Language Reference.pdf 25-Sep-2007 12:05 1.2M
[ ] Cisco.Press.Penetration.Testing.and.Network.Defense.Nov.2005.FIXED.eBook-DDU.chm 08-Nov-2005 19:54 15M
[ ] Code_Complete.A_Practical_Handbook_of_Software_Construction.2ndEditionDraft.McConnell.pdf 05-Dec-2006 19:57 5.1M
[ ] Computer Security Art And Science.chm 05-Dec-2006 20:32 2.6M
[ ] Computer_Vulnerability_March_9_2000_.pdf 20-Aug-2005 21:49 390K
[ ] Ebook - Windows - Programming .NET Security.chm 05-Dec-2006 19:51 2.7M
[ ] John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.pdf 31-May-2005 16:20 3.1M
[ ] McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf 31-May-2005 15:42 3.4M
[ ] McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf 31-May-2005 15:57 4.8M
[ ] McGraw.Hill.Osborne.Media.XML.Security.eBook-TLFeBOOK.pdf 15-Jul-2005 17:47 3.8M
[ ] Microsoft.Press.Hunting.Security.Bugs.ebook-Spy.chm 08-Feb-2007 15:29 22M
[ ] Microsoft.Press.Improving.Web.Application.Security.Threats.and.Countermeasures.eBook-LiB.chm 05-Dec-2006 19:48 6.1M
[ ] Microsoft.Press.The.Security.Development.Lifecycle.Jun.2006.chm 20-Feb-2007 00:41 3.3M
[ ] OReilly - Oracle.Security.OReilly.1998.chm 31-May-2005 16:48 1.3M
[ ] Oreilly.Security.Warrior.eBook-DDU.chm 31-May-2005 00:36 4.5M
[ ] Prentice.Hall.PTR.Internet.Denial.of.Service.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm 15-Jul-2005 17:46 2.1M
[ ] Sams.Inside.Network.Security.Assessment.Guarding.Your.IT.Infrastructure.Nov.2005.chm 05-Dec-2006 19:39 1.9M
[ ] Sams.Maximum.Security.Fourth.Edition.chm 30-May-2005 23:32 2.9M
[ ] Secure Coding Principles and Practices.pdf 05-Dec-2006 19:37 2.1M
[ ] Software Vulnerability Analysis.pdf 05-Dec-2006 19:35 2.8M
[ ] Strengthening Network Security With Web-Based Vulnerability Assessment.pdf 05-Dec-2006 19:33 243K
[ ] THE SHELLCODER'S HANDBOOK.pdf 02-Jun-2005 17:13 8.2M
[ ] The.Art.of.Exploitation-FOS.chm 31-May-2005 16:26 1.4M
[ ] The.Ethical.Hack.A.Framework.for.Business.Value.Penetration.Testing.eBook-EEn.pdf 08-Nov-2005 19:11 3.9M
[ ] The.International.Handbook.of.Computer.Security.eBook-EEn.pdf 31-May-2005 17:06 1.8M
[ ] The.Oracle.Hackers.Handbook.Jan.2007.eBook-BBL.chm 09-Jun-2007 13:10 484K
[ ] The Art Of Computer Virus Research And Defense.chm 08-Feb-2007 15:33 6.7M
[ ] The Database Hacker's Handbook - Defending Database Servers.chm 29-May-2007 17:39 1.1M
[ ] The_Art_of_Deception_by_Kevin_Mitnick.pdf 20-Aug-2005 21:59 5.2M
[ ] The_Art_of_Intrusion.pdf 20-Aug-2005 21:48 3.1M
[ ] The_ Assembly_ Programming_ Master_ Book.chm 18-Dec-2006 22:37 10M
[ ] Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.rar 30-Aug-2005 18:38 2.1M
[IMG] Wiley - How Debuggers Work.djvu 05-Dec-2006 19:28 2.6M
[ ] Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf 02-Aug-2005 17:08 9.3M
[ ] Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007(2).rar 12-Oct-2007 12:36 3.0M
[ ] [eBook - Eng] Penetration Tester's - Open Source Toolkit.pdf 25-Sep-2007 15:54 34M
[ ] [eBook] Addison Wesley - Enterprise Java 2 Security Building Secure and Robust J2EE Applications (2004).chm 05-Dec-2006 20:26 3.9M
[ ] data-compression-the-complete-reference.9781846286025.27230.pdf 25-Sep-2007 14:58 8.8M
[ ] ebook - Designing and Writing Secure Application Code.pdf 05-Dec-2006 19:52 688K
[ ] network-protocols-handbook.9780974094526.27099.pdf 07-Jun-2007 10:18 5.0M
[ ] programing - Windows.System.Programming.Third.Edition.chm 05-Dec-2006 19:41 2.3M
[ ] tlf-spusd.pdf 13-Jun-2005 09:55 3.8M
[ ] windowskernel.rar
|
And test stuff on your home PC!! Use VMware! try various *nix and windows versions, try metasploit and try to exploit localhost! |
|
|
|
|
|
|
|
|
Posted: Fri May 23, 2008 7:03 pm |
|
|
Snoop1990 |
Advanced user |
|
|
Joined: May 22, 2008 |
Posts: 65 |
|
|
|
|
|
|
|
thank you very much, now I have something to read before going to bed
Regrades Snoop1990 |
|
|
|
|
Posted: Sun May 25, 2008 8:03 am |
|
|
Snoop1990 |
Advanced user |
|
|
Joined: May 22, 2008 |
Posts: 65 |
|
|
|
|
|
|
|
I also found a nice collection:
Here ! |
|
_________________ http://snoop1990.co.cc
"I don't hack, I only surf the web to search for security holes ! To prevent my clients and me from being hacked !" |
|
|
|
www.waraxe.us Forum Index -> Suggestions
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|