Skip to main content

Posts

Showing posts with the label ping

Google hack tricks you'v never seen before 1

Google hack tricks you'v never seen before 1  Hi brothers today i will show something cool. Ok today i will show google hack demostration you'v never seen before. You will never find these fucking google hack codes on internet. just watch and learn what i have discovered!!! Ok it's time to show the secrets. and this is the best google hack codes. I can make and combine any text and make google dorks from javascript, from fucking html,css jquery,mootools and so on really fast and find anything on this fucking lol g**gle !!! I can bet what will see not understand what the fucking hell i'm doing. Just sit down,drink some coffee and watch. This is just a demonstration. OK first i will show how to find any hacker forums,site it doesn't matter! I mean profesional hackers! Just read it all because if you are not doing you will not understand these codes and how do they work! Dorks: inurl:"view.asp?page=" intext:"plymouth"...

Solaris Complete Guide:--

Pretty Old But Pretty Good Book! TCP/IP and Data Communications Administration Guide explains how to set up, maintain, and expand a network running the Solaris™ implementation of the TCP/IP protocol suite. The manual • Defines networking concepts used when working with TCP/IP • Describes tasks necessary for setting up a new network • Presents information for maintaining the network • Explains how to expand the existing network by using routers to create an internetwork • Describes how to use Point-to-Point Protocol (PPP) to allow remote machines to connect to the network • Explains how to set up communications with remote machines through th UNIX-to-UNIX Copy Program (UUCP) Download Link:

Cross Site Scripting

                                                 Cross Site Scripting[css]:- Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, se...

Malware Forensics: Investigating and Analyzing Malicious Code

Malware Forensics: Investigating and Analyzing Malicious Code  :-   Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine phys...

Violent Python

                      Violent Python:- Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to ...

-Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

-Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems- It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network? With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You'll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you're on your way to packet analysis proficiency. Learn how to: Use packet analysis to identify and resolve common network problems like loss of connectivity, DNS issues, sluggish speeds, and malware infections Build...

The best guide to the Metasploit Framework

"The best guide to the Metasploit  Framework."  —HD Moore, Founder of the Metasploit  Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching youhow to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. Learn how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform...