Wednesday, November 6, 2013

Secrets of a Super Hacker



Once more, Loompanics publishes something other houses wouldn't: a guide to violating computer security. Covering hacking scenarios ranging from the merely mischievous to the criminal, the super hacker known as the Knightmare gives step-by-step instructions in meaningful hacking from a personal computer. Fortunately, he also includes a section on state and federal computer laws, allowing potential hackers to be cognizant of the sanctions they risk with any particular project. Appendixes offer an array of technical explanations and tips for understanding database and system structures; tips cover password divination and searching strategies; and a glossary, besides explaining terms likely to be encountered in any particular documentation being hacked, enhances the hacker's ability to share experiences and tips. As science outstrips society's control of information, systems of secretkeeping proliferate maddeningly. Yet with this book, the keyboard jockey can enter all sorts of "secure" systems, databases, and records; and a hacker-security chapter explains both why hacking is a valuable and useful activity and--equally important because entering and altering systems without clearance is generally illegal--how to avoid getting caught. Mike Tribby




 
 

Hacking Vim 7.2

This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The minimum version of Vim required for each hack is clearly indicated.
If you are a Vim user who wants to get more out of this legendary text editor, this book is for you. It focuses on making life easier for intermediate to experienced Vim users.

Download PDF

Refer To : http://www.backtrack-pages.com



Tuesday, November 5, 2013

iOS Hacker's Handbook


Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
Also examines kernel debugging and exploitation
Companion website includes source code and tools to facilitate your efforts

iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

Download PDF

Refer to : http://www.backtrack-pages.com

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition
The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.

Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks

Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws..


Download PDF



Refer to:  http://www.backtrack-pages.com

Friday, October 18, 2013

java-in-60-minutes-day-book

Java in 60 Minutes Day Ebook

 Java is a programming language and computing platform first released by Sun Micro systems in 1995. There are lots of applications and websites that will not work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to data centers, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere!  Author: Rich Raposa Features: A revolutionary virtual classroom Book Name: Java in 60 minutes a day
Introduction:
 Chapter 1: Getting Started with Java.
 Chapter 2: Java Fundamentals. 
 Chapter 3: Control Structures.
 Chapter 4: Classes and Objects.
 Chapter 5: Methods.
 Chapter 6: Understanding Inheritance.
 Chapter 7: Advanced Java Language Concepts.
 Chapter 8: Polymorphism and Abstraction. 
 Chapter 9: Collections.  Chapter 10: Interfaces.
 Chapter 11: Exception Handling.
 Chapter 12: An Introduction to GUI Programming.
 Chapter 13: GUI Components and Event Handling.
 Chapter 14: Applets.
 Chapter 15: Threads.
 Chapter 16: Input and Output.
 Chapter 17: Network Programming.
 Chapter 18: Database Programming.
 Chapter 19: JavaBeans.
 Appendix:  About the 60 Minutes Web Site.

Download

Wednesday, October 16, 2013

Using Google.com to Find Usernames + Passwords

 ဒီနည္းေလး ေတြက   Google  Dorks  ေတြ သံုး တဲ. နညး္လမး္ေလး ေတြပါ
အေျခ ခံ နညး္နည္း ၇ွိတဲ. သူေတြ နားလည္ မွာပါ

 Prerequisites:
 1. A modern webbrowser and a internet.
2. Time  Method

1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook! 
The Dork: intext:charset_ test= email= default_persist ent= 

Enter that into Google, and you will be presented with several sites that have username and passwords lists!

 Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site!
 The Dork: filetype:sql inurl:wp-conten t/backup-*

 Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users  The Dork: inurl:/ wwwboard/ passwd.txt 

Method 4: FrontPage! This will find all users and passwords, similar to above. 
The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-"

 Method 5: Symfony This finds database information and logins 
The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository 

Method 6: TeamSpeak This will search for the server.dbs file  (A Sqlite database file With the SuperAdmin username and password) 
The Dork: server-dbs"intitle:index of" 

Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:" 
 The Dork: "inurl:Teamspea k2_RC2/ server.log" 

Method 8: Get Admin pass Simple dork which looks for all types of admin info
 The Dork: "admin account info"filetype:log

 Method 9: Private keys This will find any .pem files which contain private keys. 
The Dork: filetype:pem pem intext:private  And the Ultimate one, the regular directory full of passwords.

 Method 10: The Dir of Passwords! Simple one! 

The Dork: intitle:"Index of..etc"passwd

 Refer to:
http://www.backtrack-pages.com

Thursday, October 3, 2013

ninja-hacking-unconventional

Ninja  Hacking Unconventional  Penetration Testing Tactics and Techniques

  About book  Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking andpenetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either.  Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanesewarrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.

Download