در اين بخش مي‌توانيد در مورد کليه‌ي مباحث فيلم و سينما به بحث بپردازيد
Old Moderator

Old Moderator



نماد کاربر
پست ها

318

تشکر کرده: 1 مرتبه
تشکر شده: 3 مرتبه
تاريخ عضويت

پنج شنبه 16 شهریور 1385 16:00

آرشيو سپاس: 138 مرتبه در 41 پست

دانلود قويترين فيلم آموزش تخصصی هک

توسط Fantoom121 » چهارشنبه 15 آذر 1385 01:09



Career Academy Hacking, Penetration Testing and Counter 17CD
Total Size: 4Gb



Course Detail:
Module 1
Ethical Hacking and Penetration Testing
Security 101
Hacking Hall of Fame
What are Today's hackers Like?
Today's Hackers
Risk Management
Evolution of Threats
Typical Vulnerability Life Cycle
What is Ethical Hacking?
Rise of the Ethical Hacker
Types of Security Test
Penetration Test (Pen-test)
Red Teams
Testing Methodology
VMWare Workstation
Windows and Linux Running VMWare
Linux Is a Must
Linux Survival Skills
Useful vi Editor Commands
Module 1 Review

Module 2
Footprinting and Reconnaissance
Desired Information
Find Information by the Target (Edgar)
terraserver.microsoft.com
Network Reconnaissance & DNS Search
Query Whois Databases
Command-Line Whois Searches
ARIN whois: Search IP Address Blocks
SamSpade Tool and Website
Internet Presence
Look Through Source Code
Mirror Website
Find Specific Types of Systems
Big Brother
AltaVista
Specific Data Being Available?
Anonymizers
Countermeasures to Information Leakage
Social Engineering
DNS Zone Transfer
Nslookup command-line utility
Zone Transfer from Linux
Automated Zone Transfers
Zone Transfer Countermeasures
www.CheckDNS.net
Tracing Out a Network Path
tracert Output
Free Tools
Paratrace
War Dialing for Hanging Modems
Manual and Automated War Dialing
Case Study
www.guidedogs.com
Footprinting Countermeasures
Demo - Footprinting & Info Gathering
Module 2 Review

Module 3
TCP/IP Basics and Scanning
The OSI Model
TCP/IP Protocol Suite Layers
Encapsulation
Data-Link Protocols
IP - Internet Protocol, Datagram (Packet)
ICMP Packets
UDP – User Datagram Protocol
UDP Datagram
TCP – Transmission Control Protocol
TCP Segment
TCP/IP 3-Way Handshake and Flags
TCP and UDP Ports
Ping Sweeps
Good Old Ping, Nmap, TCP Ping Sweep
TCP Sweep Traffic Captured
Unix Pinging Utilities
Default TTLs
Pinging Countermeasures
Port Scanning
Nmap
Advanced Probing Techniques
Scanrand
Port Probing Countermeasures
Watch Your Own Ports
Demo - Scanning Tools
Module 3 Review

Module 4
Enumeration and Verification
Operating System Identification
Differences Between OS TCP/IP Stack
Nmap -O
Active vs Passive Fingerprinting
Xprobe/Xprobe2
Countermeasures
SNMP Overview
SNMP Enumeration
SMTP, Finger, and E-mail Aliases
Gleaning Information from SMTP
SMTP E-mail Alias Enumeration
SMTP Enumeration Countermeasures
CIFS/SMB
Attack Methodology
Find Domains and Computers
NetBIOS Data
NBTscan
NULL Session
Local and Domain Users
Find Shares with net view
enum: the All-in-one
Winfo and NTInfoScan (ntis.exe)
Digging in the Registry
NetBIOS Attack Summary
NetBIOS Countermeasures
What’s this SID Thing Anyway?
Common SIDs and RIDs
whoami
RestrictAnonymous
USER2SID/SID2USER
psgetsid.exe and UserDump Tool
LDAP and Active Directory
GUI Tools to Perform the Same Actions
Demo - Enumeration
Module 4 Review

Module 5
Hacking & Defending Wireless/Modems
Phone Numbers & Modem Background
Phone Reconnaissance
Modem Attacks
Wireless Reconnaissance
Wireless Background
Wireless Reconnaissance Continued
Wireless Sniffing
c r 4c k WEP Keys
Defending Wireless
Module 5 Review

Module 6
Hacking & Defending Web Servers
Web Servers in General: HTTP
Uniform Resource Locator: URL
Apache Web Server Functionality
Apache: Attacking Mis-configurations
Apache: Attacking Known Vulnerabilities
Defending Apache Web Server
Microsoft Internet Information Server (IIS)
IIS: Security Features
IIS: Attacking General Problems
IIS: IUSER or IWAM Level Access
IIS: Administrator or Sys Level Access
IIS: Clearing IIS Logs
IIS: Defending and Countermeasures
Web Server Vulnerability Scanners
Demo - Hacking Web Servers
Module 6 Review

Module 7
Hacking & Defending Web Applications
Background on Web Threat & Design
Basic Infrastructure Information
Information Leaks on Web Pages
Hacking over SSL
Use the Source, Luke…
Functional/Logic Testing
Attacking Authentication
Attacking Authorization
Debug Proxies: @stake webproxy
Input Validation Attacks
Attacking Session State
Attacking Web Clients
Cross-Site Scripting (XSS) Threats
Defending Web Applications
Module 7 Review

Module 8
Sniffers and Session Hijacking
Sniffers
Why Are Sniffers so Dangerous?
Collision & Broadcast Domains
VLANs and Layer-3 Segmentation
tcpdump & WinDump
Berkley Packet Filter (BPF)
Libpcap & WinPcap
BUTTSniffing Tool and dSniff
Ethereal
Mitigation of Sniffer Attacks
Antisniff
ARP Poisoning
MAC Flooding
DNS and IP Spoofing
Session Hijacking
Sequence Numbers
Hunt
Ettercap
Source Routing
Hijack Countermeasures
Demo - Sniffers
Module 8 Review

Module 9
Hacking & Defending Windows Systems
Physical Attacks
LANMan Hashes and Weaknesses
WinNT Hash and Weaknesses
Look for Guest, Temp, Joe Accounts
Direct Password Attacks
Before You c r 4c k: Enum Tool
Finding More Account Information
c r 4c k Passwords
Grabbing the SAM
c r 4c k the Obtained SAM
LSA Secrets and Trusts
Using the Newly Guessed Password
Bruteforcing Other Services
Operating System Attacks
Hiding Tracks: Clearing Logs
Hardening Windows Systems
Strong 3-Factor Authentication
Creating Strong Passwords
Authentication
Windows Account Lockouts
Auditing Passwords
File Permissions
Demo - Attacking Windows Systems
Module 9 Review


Module 10
Hacking & Defending Unix Systems
Physical Attacks on Linux
Password c r 4c k
Brute Force Password Attacks
Stack Operation
Race Condition Errors
Format String Errors
File System Attacks
Hiding Tracks
Single User Countermeasure
Strong Authentication
Single Sign-On Technologies
Account Lockouts
Shadow Password Files
Buffer Overflow Countermeasures
LPRng Countermeasures
Tight File Permissions
Hiding Tracks Countermeasures
Removing Unnecessary Applications
DoS Countermeasures
Hardening Scripts
Using SSH & VPNs to Prevent Sniffing
Demo - Attacking Unix Systems
Module 10 Review

Module 11
Rootkits, Backdoors, Trojans & Tunnels
Types Of Rootkits
A Look at LRK
Examples of Trojaned Files
Windows NT Rootkits
NT Rootkit
AFX Windows Rootkit 2003
Rootkit Prevention Unix
Rootkit Prevention Windows
netcat
netcat: Useful Unix Commands
netcat: What it Looks Like
VNC-Virtual Network Computing
Backdoor Defenses
Trojans
Back Orifice 2000
NetBus
SubSeven
Defenses to Trojans
Tunneling
Loki
Other Tunnels
Q-2.4 by Mixter
Starting Up Malicious Code
Defenses Against Tunnels
Manually Deleting Logs
Tools to Modify Logs
Demo - Trojans
Module 11 Review

Module 12
Denial of Service and Botnets
Denial-of-Service Attacks
CPUHog
Ping of Death
Teardrop Attacks
Jolt2
Smurf Attacks
SYN Attacks
UDP Floods
Distributed DoS
DDoS Tool: Trin00
Other DDoS Variation
History of Botnets
Anatomy of a Botnet
Some Common Bots
Demo - Denial of Service
Module 12 Review

Module 13
Automated Pen Testing Tools
General: Definitions
General:What?
General: Why?
Core Impact™ Framework
Core Impact™ Operation
Canvas™ Framework
Canvas™ Operation
Metasploit Framework
Metasploit Operation
Demo - Automated Pen Testing
Module 13 Review

Module 14
Intrusion Detection Systems
Types of IDSs
Network IDSs
Distributed IDSs (DIDSs)
Anomaly Detection
Signature Detection
Common IDS Software Products
Introduction to Snort
Attacking an IDS
Eluding Techniques
Testing an IDS
Hacking Tool - NIDSbench
Hacking Tool - Fragroute
Hacking Tool - SideStep
Hacking Tool - ADMmutate
Other IDS Evasion Tools
Demo - IDS and Snort
Module 14 Review

Module 15
Firewalls
Firewall Types
Application Layer Gateways
ALGs (Proxies)
Stateful Inspection Engine
Hybrid Firewall
Host-Based Firewall
Network-Based Firewall
DMZ (Demilitarized Zone)
Back-to-Back Firewalls
Bastion Hosts
Control Traffic Flow
Multiple DMZs
Controlling Traffic Flow
Why Do I Need a Firewall?
What Should I Filter?
Egress Filtering
Network Address Translation (NAT)
Firewall Vulnerabilities
IPTables/NetFilter
Default Tables and Chains
iptables Syntax 1
iptables Syntax 2
Sample IPTables Script 1
Sample IPTables Script 2
Persistent Firewalls
Firewall Identification
Firewalk
Tunneling with Loki
Tunneling with NetCat/CryptCat
Port Redirection with Fpipe
Denial-of-Service Attacks Risk?
Demo - Firewalls and IP Tables
Module 15 Review

Module 16
Honeypots and Honeynets
What Is a Honeypot?
Advantages and Disadvantages
Types and Categories of Honeypots
Honeypot: Tarpits
Honeypot: Kfsensor
Honeypot: Honeyd
Sample Honeyd Configuration
High-Interaction Honeypot
Project HoneyNet
Types of Honeynets
The Main Difference is Data Control
GEN II Data Control: Honeywall CD
Gen II Data Capture: Sebek & Sebek II
Automated Alerting
Testing
Legal Issues
Demo - Setting up a Honeypot
Module 16 Review

Module 17
Ethics and Legal Issues
The Costs
Relation to Ethical Hacking?
The Dual Nature of Tools
Good Instead of Evil?
Recognizing Trouble When It Happens
Emulating the Attack
Security Does Not Like Complexity
Proper and Ethical Disclosure
CERT’s Current Process
Full Disclosure Policy
Organization for Internet Safety (OIS)
What Should We Do from Here?
Legal Meets Information Systems
Addressing Individual Laws
18 USC SECTION 1029
18 USC SECTION 1030
1030: Worms and Viruses
Blaster Worm Attacks
Civil vs. Criminal
18 USC SECTIONS 2510 and 2701
Digital Millennium Copyright Act
Cyber Security Enhancement Act
Module 17 Review
Course Closure

Download from fast server and no restrict with max speed up to 15Mb/s

CD1
http://yofreespace.com/download.php?id=CC83AE1C
http://yofreespace.com/download.php?id=1E3E61C9
http://yofreespace.com/download.php?id=D0506FA2
http://yofreespace.com/download.php?id=14E077DE
http://yofreespace.com/download.php?id=4C7A6FCD
http://yofreespace.com/download.php?id=459A8752
CD2
http://yofreespace.com/download.php?id=638D7509
http://yofreespace.com/download.php?id=CA9A4753
http://yofreespace.com/download.php?id=219DA398
http://yofreespace.com/download.php?id=5E92698B
http://yofreespace.com/download.php?id=AD388F85
http://yofreespace.com/download.php?id=7DCEA525
CD3
http://yofreespace.com/download.php?id=446E7079
http://yofreespace.com/download.php?id=F7DA37B5
http://yofreespace.com/download.php?id=B1227AD3
http://yofreespace.com/download.php?id=BE012364
http://yofreespace.com/download.php?id=AEACB12B
Cd4
http://yofreespace.com/download.php?id=879EB6B1
http://yofreespace.com/download.php?id=39F53865
http://yofreespace.com/download.php?id=2ACB078E
http://yofreespace.com/download.php?id=1958DB29
http://yofreespace.com/download.php?id=8C3AF15F
http://yofreespace.com/download.php?id=97290512
CD5
http://yofreespace.com/download.php?id=E23BED25
http://yofreespace.com/download.php?id=030DA123
http://yofreespace.com/download.php?id=9E653B90
CD6
http://yofreespace.com/download.php?id=676842FB
http://yofreespace.com/download.php?id=2A644BC4
http://yofreespace.com/download.php?id=F384214E
http://yofreespace.com/download.php?id=FA4A753E
http://yofreespace.com/download.php?id=0C7BAB3C
CD7
http://yofreespace.com/download.php?id=1D7E4FFA
http://yofreespace.com/download.php?id=770725BE
http://yofreespace.com/download.php?id=B2004626
http://yofreespace.com/download.php?id=1F977B71
CD8
http://yofreespace.com/download.php?id=399B9246
http://yofreespace.com/download.php?id=00E04536
http://yofreespace.com/download.php?id=4DE90E4A
http://yofreespace.com/download.php?id=7034C4FE
CD9
http://yofreespace.com/download.php?id=631AF99E
http://yofreespace.com/download.php?id=7143A477
http://yofreespace.com/download.php?id=B632C39D
http://yofreespace.com/download.php?id=5330DBAC
CD10
http://yofreespace.com/download.php?id=C6771AE0
http://yofreespace.com/download.php?id=2F5077A0
http://yofreespace.com/download.php?id=D7613ABE
http://yofreespace.com/download.php?id=538940C5
http://yofreespace.com/download.php?id=FD789E9B
CD11
http://yofreespace.com/download.php?id=2C4A6473
http://yofreespace.com/download.php?id=4EDD9A09
http://yofreespace.com/download.php?id=B6B029D7
http://yofreespace.com/download.php?id=C4AD3C89
CD12
http://yofreespace.com/download.php?id=9BCEC5E3
http://yofreespace.com/download.php?id=3B589CEA
http://yofreespace.com/download.php?id=C7399140
CD13
http://yofreespace.com/download.php?id=D3D923D1
http://yofreespace.com/download.php?id=2B99C373
http://yofreespace.com/download.php?id=0378B396
http://yofreespace.com/download.php?id=C506F976
CD14
http://yofreespace.com/download.php?id=0BBA6957
http://yofreespace.com/download.php?id=AB26DD4B
http://yofreespace.com/download.php?id=A72EB09B
http://yofreespace.com/download.php?id=DC7E09C9
Cd15
http://yofreespace.com/download.php?id=8C48DCE9
http://yofreespace.com/download.php?id=0AA4DE2B
http://yofreespace.com/download.php?id=22C59C03
http://yofreespace.com/download.php?id=3A254208
http://yofreespace.com/download.php?id=7B32162A
Cd16
http://yofreespace.com/download.php?id=8F4A67A3
http://yofreespace.com/download.php?id=E2FCD91B
http://yofreespace.com/download.php?id=4E88241C
http://yofreespace.com/download.php?id=9E4FEC42
Cd17
http://yofreespace.com/download.php?id=6A6F677B
http://yofreespace.com/download.php?id=158D4DBF
http://yofreespace.com/download.php?id=F1396FC6

pass unzip: yoknall



////////////////////////////////////////////////////////////////////////////////

Cisco Documentation DVD August 2006

Download:

http://rapidshare.com/files/4720877/coerdoe.part01.rar
http://rapidshare.com/files/4732011/coerdoe.part02.rar
http://rapidshare.com/files/4730314/coerdoe.part03.rar
http://rapidshare.com/files/4731482/coerdoe.part04.rar
http://rapidshare.com/files/4842449/coerdoe.part05.rar
http://rapidshare.com/files/4900289/coerdoe.part06.rar
http://rapidshare.com/files/4899547/coerdoe.part07.rar
http://rapidshare.com/files/4757516/coerdoe.part08.rar
http://rapidshare.com/files/4757668/coerdoe.part09.rar
http://rapidshare.com/files/4757686/coerdoe.part10.rar
http://rapidshare.com/files/4963335/coerdoe.part11.rar
http://rapidshare.com/files/4963160/coerdoe.part12.rar
http://rapidshare.com/files/4912728/coerdoe.part13.rar
http://rapidshare.com/files/4985152/coerdoe.part14.rar
http://rapidshare.com/files/4985446/coerdoe.part15.rar
http://rapidshare.com/files/4986082/coerdoe.part16.rar
http://rapidshare.com/files/4986738/coerdoe.part17.rar
http://rapidshare.com/files/4987060/coerdoe.part18.rar
http://rapidshare.com/files/4763786/coerdoe.part19.rar
http://rapidshare.com/files/4763434/coerdoe.part20.rar
http://rapidshare.com/files/4991010/coerdoe.part21.rar
http://rapidshare.com/files/4993788/coerdoe.part22.rar
http://rapidshare.com/files/4994227/coerdoe.part23.rar
http://rapidshare.com/files/4995033/coerdoe.part24.rar
http://rapidshare.com/files/4994913/coerdoe.part25.rar
http://rapidshare.com/files/4994941/coerdoe.part26.rar
http://rapidshare.com/files/4993017/coerdoe.part27.rar
http://rapidshare.com/files/4994864/coerdoe.part28.rar
http://rapidshare.com/files/4993495/coerdoe.part29.rar
http://rapidshare.com/files/4994678/coerdoe.part30.rar
http://rapidshare.com/files/4995274/coerdoe.part31.rar
http://rapidshare.com/files/4994093/coerdoe.part32.rar
http://rapidshare.com/files/4995431/coerdoe.part33.rar
http://rapidshare.com/files/4997101/coerdoe.part34.rar
http://rapidshare.com/files/4996687/coerdoe.part35.rar
http://rapidshare.com/files/4996777/coerdoe.part36.rar

/////////////////////////////////////////////////////////////////////////


Cisco Press MPLS and Next Generation Networks Nov 2006
http://rapidshare.com/files/6129715/cmngh.rar

New Member



no avatar
پست ها

2

تشکر کرده: 0 مرتبه
تشکر شده: 0 مرتبه
تاريخ عضويت

يکشنبه 6 خرداد 1386 13:16

آرشيو سپاس: 0 مرتبه در 0 پست

توسط amadeus » يکشنبه 6 خرداد 1386 13:57

لینکهای ها CD 1-17 کار نمی کنند ؟؟؟؟؟؟
به سایت sedoparking.com وصل می شود و error می دهد !!!!!

Old Moderator

Old Moderator



نماد کاربر
پست ها

318

تشکر کرده: 1 مرتبه
تشکر شده: 3 مرتبه
تاريخ عضويت

پنج شنبه 16 شهریور 1385 16:00

آرشيو سپاس: 138 مرتبه در 41 پست

توسط Fantoom121 » يکشنبه 6 خرداد 1386 15:26

دوست خوبم يه نگاه به تاريخ پست بکنيد اين پست بکنيد اين پست تقريبا مال 6 ماه پيش هست و اينکه بقيه لينکها کار ميکنند جای تعجب داره به هر صورت چشم ميگردم اگر لينک تازه پيدا کردم ميزارم حتماً  
:razz:  :razz:  :razz:


[align=center]پرسه در خاک غریب پرسه بی انتهاست - هم گریز غربتم زادگاه من کجاست؟

Old Moderator

Old Moderator



نماد کاربر
پست ها

318

تشکر کرده: 1 مرتبه
تشکر شده: 3 مرتبه
تاريخ عضويت

پنج شنبه 16 شهریور 1385 16:00

آرشيو سپاس: 138 مرتبه در 41 پست

توسط Fantoom121 » يکشنبه 6 خرداد 1386 16:32

[align=center]rapidshare mirror
کد: انتخاب همه
 لينکها براي کاربران مهمان قابل دسترسي نيست، براي مشاهده ي لينکها لطفا ثبت نام کرده و وارد شويد 

@ JoseRizal You are right. I have extracted all of CD images and the total is 2.77GB.

The data from all 17 CDs are in a seperate directories.
Starting each training CD through launch.exe doesn't work for me.
It says that it can't find shell.htm

So in order to start any training CD you go to its directory, then go to 'course' directory, then directory named 'shell' and start file named 'shell.htm' with your browser.
It will open another window/tab, so (in my case it is Firefox) you might have to let it open this other window.



[align=center]پرسه در خاک غریب پرسه بی انتهاست - هم گریز غربتم زادگاه من کجاست؟

New Member



no avatar
پست ها

2

تشکر کرده: 0 مرتبه
تشکر شده: 0 مرتبه
تاريخ عضويت

يکشنبه 6 خرداد 1386 13:16

آرشيو سپاس: 0 مرتبه در 0 پست

توسط amadeus » سه شنبه 8 خرداد 1386 08:38

با تشکر از Fantoom121  عزیز
در حال دانلود هستم ..... :D

New Member



no avatar
پست ها

1

تشکر کرده: 0 مرتبه
تشکر شده: 0 مرتبه
تاريخ عضويت

چهارشنبه 16 خرداد 1386 19:27

آرشيو سپاس: 0 مرتبه در 0 پست

توسط afshin123 » چهارشنبه 16 خرداد 1386 19:29

آقا لینک این DDos رو ندارین که با آیپی DDos میکنه ممنون میشم بزارید!!!

Major II

Major II



نماد کاربر
پست ها

54

تشکر کرده: 0 مرتبه
تشکر شده: 0 مرتبه
تاريخ عضويت

سه شنبه 18 اردیبهشت 1386 00:15

آرشيو سپاس: 0 مرتبه در 0 پست

توسط saher_2 » چهارشنبه 16 خرداد 1386 22:55

دوستان اگر کسي سي دي ها ويا دي وي دي اين فيلم رو داره وميتونه براي من پست کنه لطفا هزينه ونحوه ارسال  مبلغ رو برا م پيغام بزاره  چون دانلودش خيلي مشکله وزمان ميبره.


 


چه کسي حاضر است ؟

کاربران حاضر در اين انجمن: بدون كاربران آنلاين و 3 مهمان



phpBB | CentralClubs