friends keep visiting my blog for updates and comment on the posts if you like them plz.......

recent posts

Thursday, March 11, 2010

Ethical Hacking (EC-Council Exam 312-50): Student Courseware


Open in new window


Author(s): International Council of Electronic Commerce Consultants
Publisher: OSB
Year: 2004
ISBN: 0972936211
Language: English
File type: CHM
Pages: 990
Size (for download): 14 MB


By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.


If you are reading this courseware, it is quite possible that you realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one, and what you can gain from this course.

You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single courseware that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover it at one go.

This doesn't mean that this course is inadequate in any way.

We have tried to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time; as well as gain insight into the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom, supplemented with tools that the reader can readily access and obtain a hands-on experience. The emphasis is on gaining the know-how, and this explains the leaning towards free and accessible tools. You will read about some of the most widespread attacks seen; the popular tools used by attackers and how attacks have been carried out from ordinary resources.

You may also want to know "After this course, what?" This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no ONE template that will meet all your needs. Your testing strategy will vary with client, basic information enumeration, firewall penetration or other domains, you will find something in this courseware that you can definitely use.

Finally, this is not the end! This courseware is to be considered as a 'work-in-progress', because we will be adding value to this courseware over time. You may find some aspects detailed, while others may find it brief. The yardstick that we have used in this respect is simple - "does the content help explain the point at hand?" This doesn't mean that we would not love to hear from you regarding your viewpoints and suggestions. Do send us your feedback so that we can make this course a more useful one.


TABLE OF CONTENT:
Module 01 - Introduction to Ethical Hacking
Module 02 - Footprinting
Module 03 - Scanning
Module 04 - Enumeration
Module 05 - System Hacking
Module 06 - Trojans and Backdoors
Module 07 - Sniffers
Module 08 - Denial of Service
Module 09 - Social Engineering
Module 10 - Session Hijacking
Module 11 - Hacking Web Servers
Module 12 - Web Application Vulnerabilities
Module 13 - Web Based Password Cracking Techniques
Module 14 - SQL Injection
Module 15 - Hacking Wireless Networks
Module 16 - Viruses
Module 17 - Novell Hacking
Module 18 - Linux Hacking
Module 19 - Evading IDS, Firewalls and Honeypots
Module 20 - Buffer Overflows
Module 21 - Cryptography


Download
password:ganelon

Sunday, February 28, 2010

How To Block Websties Without Software, block websites

 Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 www.blablabla.com
127.0.0.4 www.blablabla.com
127.0.0.5 www.blablabla.com

etc

test your anti virus

copy and paste the below code into ur notepad and save it as eicar.com or any batch file with extension .bat. if ur antivirus detects and deletes it ur anti-virus is working,if not detects ur anti-virus is not working.


X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

boot ur xp faster

. Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

WindowsXP should now boot REALLY faster.

Tuesday, February 16, 2010

LEGITIMATE ONLINE JOBS

LEGITIMATE ONLINE JOBS:
Call Center / Customer Service Jobs

  • Alpine Access Premier provider of customer service solutions using home-based employees. NO FEES.
  • Brighten Communications A business-to-business telemarketing company specializing in the outsourcing of lead generation. The clients you will be making calls on behalf of represent professional organizations in industries such as finance, brokerage, and high-tech.
  • Customer Loyalty Concepts You will be contacting existing newspaper subscribers selling a variety of services.
  • LiveOps Outsourcing call center solutions using work at home agents. $30.00 fee for credit and background check.
  • West At Home West agents handle client's interaction with their customers, from customer care and live chat to email and incoming sales calls.
  • Working Solutions A long-standing company, workingsolutions.com offers many legitimate - NO FEE - home based opportunities.
Data Entry
  • Axion Data Sign up as a home-working independent contractor with this long-standing company. NO FEES TO JOIN.
  • Dion Data Solutions Complete an appilcation, and - if approved - you will be contacted to provide work at home data management services for them.  NO FEES TO JOIN.
  • Palm Coast Data Data entry keyers input customer information, such as names and addresses, or revise information already in the database. Work at home on your own personal computer, linked to Palm Coast Data. Currently hiring work at home keyers in Florida and Colorado.  NO COST







Tuesday, February 9, 2010

how to hack any email account by phishing

Steps to Hack Email account password by phishing :


1. First of all, to start with you need a phisher of email account. For example, if you want to hack myspace, you should have myspace phisher. I have explained in my article How to make a myspace phishing site by Myspace Hacking software how to obtain phisher using "phisher creator" - a software to create phishers.

Download Phisher Creator software to hack email password.

The downloaded file is zipped and password protected. Click here to get the password.



2. Using guidelines in that article, construct a phisher. Say you want to make orkut.com phisher. Just enter www.orkut.com in text field of Phisher Creator and you will get required orkut phisher. This phisher will have :
a. Index.htm and
b. write.php

3. Go to www.t35.com - a webhosting service offering free webspace. Now, sign up to this webhost using "Orkut" or "OrkutVerification" as Username. This is very important to make phisher url match with that of orkut.

Update: Many readers have reported (via comments) problems with t35.com. So, if you're having same problem, just try out 110mb.com. Thanks "tryingtolearn" for your update.
Also, you can use http://yourfreehosting.net for uploading your phisher (Recommended).

4. Now, after signing up, login to your account and upload the two files created in step 2 using Phisher Creator.

5. Now, sign up at Yahoo.com or gmail.com and use "Orkutsupport@gmail.com" or likewise email address while signing up. This will be email address visible to victim in his inbox. So, be careful while selecting this email address.

6. After signing up, compose mail such that it informs victim about the fact that you are a part of orkut support team and wanted to inform victim that his orkut account is accessed by illegal third party. Hence, you , as part of orkut support have mailed him to verify ownership of his orkut account by logging in his orkut account using the link provided and provide him the link of your orkut phisher ready to hack his orkut account password. You can use different logic to make him login his orkut account using our phisher.

Once, the victim tries to log into his account using our provided phisher link, his orkut account password is recorded at our free webhost. Now, just go to your t35.com account control panel and see your files database or list. You will get their one new file created named "passes.txt". If such file is not present, try refreshing the page and you will get that file. Now, simply click on "Open" and you will get victim userid and password recorded in that file.
Hack email password using orkut phishing

Cheers.... his orkut account password hacked... You are, thus, able to hack orkut account password.

Thats it. I hope this security phishing tutorial is fullproof and you can now hack email account password using Email Phishing. I have tried to keep this email phishing tutorial simple for you to hack email account password.

Monday, January 25, 2010

36 design and photoshop ebooks

remove "*" and type "t" it should look like ftp: //195.135.232.80/Books/design/8.books.Maya.[by.KiN_www.netz.ru].rar

36 Graphics & Design Ebooks

Maya, Photoshop, Macromedia, Bryce, Digital Photography, & more....

Download with FlashGet

f*p://195.135.232.80/Books/design/8.books.Maya.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/A.Short.Course.in.Digital.Photography.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Adobe.Creative.Suite.Keyboard.Shortcuts.[by.KiN_www.netz.ru]_3,1.MB.rar
f*p://195.135.232.80/Books/design/Adobe.Photoshop.CS.in.10.Simple.Steps.or.Less.(2004).[by.KiN_www.netz.ru]_7,84 MB.rar
f*p://195.135.232.80/Books/design/Adobe.Photoshop.Tutorial.7.Day.Course.html.a.[28.84.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Advanced.3D.Photorealism.Techniques[9,76.MB_RUS_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Bill.Flemming.Advanced.3D.Photorealism.Techniques.[RUS].[by.KiN_www.netz.ru]_9,75 MB.rar
f*p://195.135.232.80/Books/design/Bryce.5.Manual.[by.KiN_www.netz.ru_4.01MB].rar
f*p://195.135.232.80/Books/design/Corel.103.tutorials.RUS.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Designing Secure Web-Based Applications for Windows 2000.zip
f*p://195.135.232.80/Books/design/DHTML.Weekend.Crash.Course[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Digital.Photography.Hacks.[by.KiN_www.netz.ru]_11,76.MB.rar
f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Illustrator.[by.KiN_www.netz.ru]_30,58.MB.rar
f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Photoshop.7.[by.KiN_www.netz.ru]_9,8 MB.rar
f*p://195.135.232.80/Books/design/How.To.Draw.Anime.Photoshop.Coloring.Tips.[by.KiN_www.netz.ru]_773 kB.rar
f*p://195.135.232.80/Books/design/How.To.Draw.Manga.Photoshop.Techniques.[by.KiN_www.netz.ru]_343 kB.rar
f*p://195.135.232.80/Books/design/How.To.Use.Adobe.Photoshop.7.[by.KiN_www.netz.ru]_14,66 MB.rar
f*p://195.135.232.80/Books/design/HTML.4.01.Weekend.Crash.Course[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/HTML.Complete.Course.[by.KiN_www.netz.ru]_26,79.MB.rar
f*p://195.135.232.80/Books/design/Learn.How.To.Draw.[by.KiN_www.netz.ru]_1,61.MB.rar
f*p://195.135.232.80/Books/design/Learn.HTML4.In.a.Weekend.[by.KiN_www.netz.ru]_11,02.MB.rar
f*p://195.135.232.80/Books/design/Learning.Macromedia.FlashMX.2004[658.kB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.4.Bible[8,86.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.MX.2004.Web.Application.Recipes[6,5.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.ActionScript.Reference.Guide.rar
f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.Using.Components.rar
f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Actionscript.Reference.Guide.2004[2,66.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Using.Components.2004[979.kB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Press.Macromedia.Dreamweaver.MX.Dynamic.Applications.[10.46.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/New.Riders.Photoshop.7.Power.Shortcuts.[by.KiN_www.netz.ru]_3,5 MB.rar
f*p://195.135.232.80/Books/design/NewRiders.MacromediaDreamweaverMx2004WebApplicationRecipes(6,5MB_www.netz.ru).rar f*p://195.135.232.80/Books/design/PhotoShop.&.Illustrator.Tutorial.[14.37.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.6.Bible.[13.95.MB_www.netz.ru].rar f*p://195.135.232.80/Books/design/Photoshop.75.tutorial.RUS.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.CS.Tips.and.Tricks.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.Rus.4-18[6.5Mb,_www.netz.ru].rar

The Content in this blog is taken from different websites and
owner doesn't bear any responsibility for the mis use of the resources in the blog.
The blog is designed for educational purposes

24counter