Techniques de Hacking

Facebook Twitter

Bonjour,
ce pearltree contient des liens issus du livre "Techniques de hacking".
Evidemment la connaissance des techniques de Hacking n'a pas pour but de lancer des attaques à tout va, mais doit servir de support à la sécurité des systèmes informatiques.
Merci de faire évoluer ce pearltree dans cet esprit.
Bon courage. sofarsogood Apr 25

Learn/hacking

Content / Category / Tutorials - AnonSource Technologies
toolz

unixtoolbox (toutes les commandes UNIX/Linux)
WiFi jamming via deauthentication packets
YAUNBUG - Whois, Traceroute, Ping, Domain Name Server (DNS) Lookup
Web Application Exploits and Defenses Want to beat the hackers at their own game? Learn how hackers find security vulnerabilities! Learn how hackers exploit web applications!

Web Application Exploits and Defenses

Metasploit Framework Penetration Testing Software | Metasploit Project

Metasploit Framework Penetration Testing Software | Metasploit Project

I really like that Metasploit always has the latest exploits and new functionality like the phishing campaigns is introduced all the time. I highly recommend the product. Spending billable hours efficiently is critical, and Metasploit Pro is a huge help on this. Time savings are the biggest reason for us to use Metasploit Pro. Jim O'Gorman, President at Offensive Security
This free information security training is brought to you in a community effort to promote awareness and raise funds for underprivileged children in East Africa. Through a heart-warming effort by several security professionals, we are proud to present the most complete and in-depth open course about the Metasploit Framework. This is a free online course and if you enjoy it and find it useful, we ask that you make a donation to the HFC (Hackers For Charity), $9.00 will feed a child for a month, so any contribution is welcome. We hope you enjoy this course as much as we enjoyed making it. Metasploit Unleashed By Offensive Security

Metasploit Unleashed By Offensive Security

Computer Service
Comment bien sécuriser un site Web Comment bien sécuriser un site Web De Memodev. La sécurité est primordiale sur un site internet. Il est impératif de comprendre que la sécurité est une mesure, pas une caractéristique. Se demander si sont site est sécurisé est aussi subjectif que de se demander si quelque chose est super. Il faut donc que le niveau de sécurité requis soit en équilibre avec les dépenses (passé du temps pour la sécurité en correspondance avec le niveau de sécurité désiré). Pré-requis
Openwall software releases and other related files are also available from the Openwall file archive and its mirrors. You are encouraged to use the mirrors, but be sure to verify the signatures on software you download. The more experienced users and software developers may use our CVSweb server to browse through the source code for most pieces of Openwall software along with revision history information for each source file. We publish articles, make presentations, and offer professional services. We also maintain a wordlists collection for use with password crackers such as John the Ripper and with password recovery utilities, and a collection of pointers to password recovery resources on the Net. Openwall Project - Information Security software for open environments

Openwall Project - Information Security software for open environments

Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources

Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources We're proud to release Nmap 6.25 for the holiday season with hundreds of improvements, including: 85 new Nmap Scripting Engine scripts. Nearly 1,000 new fingerprints for OS detection and service/application version detection . Performance enhancements such as the new kqueue and poll I/O engines. You can read the full details or download it free here .
Core SECURITY TECHNOLOGIES Community
Mozilla Firefox Mozilla Firefox Freedom of speech should not be sacrificed in the recording industry's war to restrict the public from making copies of digital music. EFF has asked a federal court to declare that scientists from Princeton and Rice University can publish their research on digital music security weaknesses at the USENIX Conference in August 2001. When a team led by Princeton Professor Edward Felten accepted a public challenge by the Secure Digital Music Initiative (SDMI) to break new security systems, they did not give up their First Amendment right to teach others what they learned. Yet they have been threatened by SDMI and the Recording Industry Association of America (RIAA) to keep silent or face litigation under the Digital Millennium Copyright Act (DMCA).
Mozilla Firefox Wireless Research This page is currently under construction as we begin a wireless research effort here at College Park. Please bear with us. 802.11 Security Vulnerabilities Mozilla Firefox
ISAAC Group Home Page
(In)Security of the WEP algorithm This is some information about our analysis of the Wired Equivalent Privacy (WEP) algorithm, which is part of the 802.11 standard. This work was performed jointly by Nikita Borisov, Ian Goldberg, and David Wagner. If you have any questions, please contact us at wep@isaac.cs.berkeley.edu. Executive Summary We have discovered a number of flaws in the WEP algorithm, which seriously undermine the security claims of the system. In particular, we found the following types of attacks: (In)Security of the WEP algorithm
ACM SIGMOBILE Seventh Annual International Conference on Mobile Computing and Networking Schedule-at-a-Glance The ACM SIGMOBILE Annual International Conference on Mobile Computing and Networking is dedicated to addressing the challenges of the wireless revolution. The conference serves as the premier international forum addressing networks, systems, algorithms, and applications that support the symbiosis of mobile computers and wireless networks. The conference covers all areas of mobile computing and wireless and mobile networking at the link layer and above. For those of you familiar with this annual conference, you will notice that our usual acronym is missing this year. We were asked not to use our traditional name in Italy on penalty of law since it is an existing Italian trademark. ACM SIGMOBILE Seventh Annual International Conference on Mobile Computing and Networking
MagicPoint presentation foils
wep-slides.pdf (Objet application/pdf)
mobicom.pdf (Objet application/pdf)
Newsflash posted by The Circle of Lost Phrackers As you might have recognized by your worn-out F5 key, Phrack is a little late again. We know, that's a shame. But to shorten the standby time, we have something for you guyz! .:: Phrack Magazine ::.
Warning: include(top.ssi): failed to open stream: No such file or directory in /usr/home/portal/public_html/d.php on line 3 Warning: include(): Failed opening 'top.ssi' for inclusion (include_path='.:/usr/local/share/pear') in /usr/home/portal/public_html/d.php on line 3 invalid req Warning: include(bot.ssi): failed to open stream: No such file or directory in /usr/home/portal/public_html/d.php on line 79 Warning: include(): Failed opening 'bot.ssi' for inclusion (include_path='.:/usr/local/share/pear') in /usr/home/portal/public_html/d.php on line 79

serial numbers, serials, serialkeys, codes - UNLOCK YOUR SOFTWARE, REMOVE ALL KIND OF PROTECTION