Friday, October 18, 2013

java-in-60-minutes-day-book

Java in 60 Minutes Day Ebook

 Java is a programming language and computing platform first released by Sun Micro systems in 1995. There are lots of applications and websites that will not work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to data centers, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere!  Author: Rich Raposa Features: A revolutionary virtual classroom Book Name: Java in 60 minutes a day
Introduction:
 Chapter 1: Getting Started with Java.
 Chapter 2: Java Fundamentals. 
 Chapter 3: Control Structures.
 Chapter 4: Classes and Objects.
 Chapter 5: Methods.
 Chapter 6: Understanding Inheritance.
 Chapter 7: Advanced Java Language Concepts.
 Chapter 8: Polymorphism and Abstraction. 
 Chapter 9: Collections.  Chapter 10: Interfaces.
 Chapter 11: Exception Handling.
 Chapter 12: An Introduction to GUI Programming.
 Chapter 13: GUI Components and Event Handling.
 Chapter 14: Applets.
 Chapter 15: Threads.
 Chapter 16: Input and Output.
 Chapter 17: Network Programming.
 Chapter 18: Database Programming.
 Chapter 19: JavaBeans.
 Appendix:  About the 60 Minutes Web Site.

Download

Wednesday, October 16, 2013

Using Google.com to Find Usernames + Passwords

 ဒီနည္းေလး ေတြက   Google  Dorks  ေတြ သံုး တဲ. နညး္လမး္ေလး ေတြပါ
အေျခ ခံ နညး္နည္း ၇ွိတဲ. သူေတြ နားလည္ မွာပါ

 Prerequisites:
 1. A modern webbrowser and a internet.
2. Time  Method

1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook! 
The Dork: intext:charset_ test= email= default_persist ent= 

Enter that into Google, and you will be presented with several sites that have username and passwords lists!

 Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site!
 The Dork: filetype:sql inurl:wp-conten t/backup-*

 Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users  The Dork: inurl:/ wwwboard/ passwd.txt 

Method 4: FrontPage! This will find all users and passwords, similar to above. 
The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-"

 Method 5: Symfony This finds database information and logins 
The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository 

Method 6: TeamSpeak This will search for the server.dbs file  (A Sqlite database file With the SuperAdmin username and password) 
The Dork: server-dbs"intitle:index of" 

Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:" 
 The Dork: "inurl:Teamspea k2_RC2/ server.log" 

Method 8: Get Admin pass Simple dork which looks for all types of admin info
 The Dork: "admin account info"filetype:log

 Method 9: Private keys This will find any .pem files which contain private keys. 
The Dork: filetype:pem pem intext:private  And the Ultimate one, the regular directory full of passwords.

 Method 10: The Dir of Passwords! Simple one! 

The Dork: intitle:"Index of..etc"passwd

 Refer to:
http://www.backtrack-pages.com

Thursday, October 3, 2013

ninja-hacking-unconventional

Ninja  Hacking Unconventional  Penetration Testing Tactics and Techniques

  About book  Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking andpenetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either.  Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanesewarrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.

Download