mousekompi
26th May 2012, 11:00 AM
Kondisi Barang : Baru
Harga :
Lokasi Seller : Jawa Barat
Description :
http://a8.sphotos.ak.fbcdn.net/hphotos-ak-ash4/s720x720/430488_2774841332963_1315978124_2086020_540938597_ n.jpg
Seperti yang agan2 lihat dari judul diatas, ane sekarang menjual DVD Tutorial :D, semua tutorial ane pastikan sangat membantu agan2 yang sedang mulai untuk belajar backtrack, metasploit, wireless hacking, dan masih banyak lagi. Semua tutorial berisi informasi yang up to date dan teknik-teknik dari dasar hingga tingkat yang lebih expert. Berikut daftar tutorial yang bakal agan dapetin :
[/spoiler] for 1. Metasploit Framework Expert:
Video yang membahas tentang Metasploit Framework secara mendalam.
- Exploitation Basics
- Why Metasploit?
- Meterpreter Basics
- Armitage
- Framework Organization
- Post Exploitation Kung-Fu
- Post Exploitation Privilege Escalation
- Killing AV and Disabling Firewall
- Stdapi and Priv Extensions
- Token Stealing and Incognito
- Espia and Sniffer Extensions in Post Exploitation
- Post Exploitation Backdoors
- Pivoting after Post Exploitation
- Port Forwarding as part of Post Exploitation
- Client Side Exploits
- Backdoors and Rootkits in Post Exploitation
- Exploit Research with Metasploit
- Railgun Basics
- Railgun Adding Functions
- Railgun Adding New DLLs
- Railgun Adding New DLLs on Windows 7
- Resource Scripts
- Database Support
- Using Plugins
- Meterpreter API Basics
- Meterpreter Scripting Migrate Clone
- Meterpreter Scripting Process Name Search
for 2. Wireless LAN Security and Penetration Testing:
Video yang membahas tentang dasar-dasar Wireless sampai dengan penetrasi menggunakan tehnik sniffing, injeksi, kracking, dan masih banyak lagi tehnik serangan terhadap wireless.
- Getting Started
- Bands, Channels and Sniffing
- Pwning Beacon Frames
- Dissecting AP-Client Connections
- Dissecting WLAN Headers
- Pwning Hidden SSIDs
- Laughing Off MAC Filters
- Hacking WLAN Authentication
- Hotspot Attacks
- Hacking Isolated Clients
- Alfa Card Kung-Fu
- Man-in-the-Middle Attack
- SSL MITM Attack Over Wireless
- SSL MITM Attack Over Wireless Demo
- SSL Man-in-the-Middle Attacks
- Custom Wireless Regulation Database
- WEP In-Depth
- WEP kracking
- Caffe Latte Attack Basics
- Caffe Latte Attack Demo
- Caffe Latte Attack on the iPhone
- KoreK's ChopChop Attack
- Fragmentation and Hirte Attack
- Understanding WPA/WPA2
- Wi-Fi Challenge 1 (Level Easy) : There is no Patch for Stupidity!
- Wi-Fi Challenge 1 Solution : There is no Patch for Stupidity!
- Wi-Fi Challenge 2 (Level - Intermediate) : Know Thy Packets
- Wi-Fi Challenge 2 Solution : Know Thy Packets
- Wi-Fi Challenge 3 (Level Advanced): Never Underestimate your Enemy!
- WPA-PSK
- WPA-PSK kracking
- WPA2-PSK kracking
- Speeding up WPA/WPA2 PSK kracking
- Never Underestimate Your Enemy!
- Mood Swings of a Wandering Client
- kracking WPA/WPA2-PSK with just the Client
- Questions and Answers
- Wpa_Supplicant
- krack WPA-Personal with only AP
- Setting up FreeRadius-WPE on Backtrack
- EAP-MD5 Basics and Demo
- kracking EAP-MD5 with Eapmd5pass and Eapmd5krack
- EAP Types and PEAP Demo
- kracking PEAP
- kracking PEAP in a Windows Network
- kracking EAP-TTLS
- Insecurity in 3rd Party Wi-Fi Utilities
- Conclusion and the Road Ahead
- Windows Wireless Kung-Fu (SWSE Addendum 1)
- Creating Wireless Backdoors (SWSE Addendum 2)
- Malware, Metasploit and the Hosted Network (SWSE Addendum 3)
- SecurityTube Certified Wi-Fi Security Expert (SWSE) Student Portal Launch
for 3. Exploit Research:
Video yang membahas tentang bagaimana cara membuat kode-kode exploitasi dari memanfaatkan kelemahan pada aplikasi.
- Topic Introduction
- Memcpy Buffer Overflow
- Strcpy Buffer Overflow
- Minishare Buffer Overflow
- FreeSSHD Buffer Overflow
- SEH Basics
- Overwrite SEH
- Exploiting SEH
- Guest Lecture by Andrew King
- Binary Diffing Microsoft Patches
for 4. Metasploit Tutorial:
Video yang membahas tentang menggunakan Metasploit dari awal,sampai dengan menulis skrip dan modul meterpreter.
- Exploitation Basics and need for Metasploit
- Getting Started with Metasploit
- Meterpreter Basics and using Stdapi
- Meterpreter Extensions Stdapi and Priv
- Understanding Windows Tokens and Meterpreter Incognito
- Espia and Sniffer Extensions with Meterpreter Scripts
- Metasploit Database Integration and Automating Exploitation
- Post Exploitation Kung Fu
- Post Exploitation Privilege Escalation
- Post Exploitation Log Deletion and AV Killing
- Post Exploitation and Stealing Data
- Post Exploitation Backdoors and Rootkits
- Post Exploitation Pivoting and Port Forwarding
- Backdooring Executables
- Auxiliary Modules
- Pass the Hash Attack
- Scenario Based Hacking
for 5. Windows Assembly Language for Hackers:
Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi windows.
- Processor Modes
- Protected Mode Assembly
- Win32 ASM using MASM32
- MASM Data Types
- Procedures
- Macros
- Program Control using JMP
- Decision Directives
- Loops
for 6. Assembly Language for Linux:
Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi Linux.
- System Organization
- Virtual Memory Organization
- GDB Usage Primer
- Hello World
- Data Types
- Moving Data
- Working with Strings
- Unconditional Branching
- Conditional Branching
- Functions
- Functions Stack
for 7. Buffer Overflow Exploitation for Linux:
Video yang membahas tentang cara dasar buffer overflows dan melakukan exploitasi terhadap sistem operasi Linux.
- Smashing the Stack
- Writing Exit Shellcode
- Executing Shellcode
- Disassembling Execve
- Shellcode for Execve
- Exploiting a Program
- Exploiting a Program Demo
- Return to Libc Theory
- Return to Libc Demo
for 8. Format String Vulnerabilities:
Video yang membahas tentang cara memanfaatkan kelemahan dalam format penulisan kode program dan mengexploitasinya.
- The Basics
- Understanding Format Functions
- Crashing the Program
- Viewing the Stack
for 9. Scenario Based Hacking and Penetration Testing:
Video yang membahas tentang skenario dari tehnik hacking.
- No Patches, No AV, Direct Access
- No Patches, No AV, Behind NAT
- OS Patched, No AV, Behind NAT
- OS and Software Patched, No AV, Behind NAT
for 10. Router Hacking Series:
Video yang membahas tentang cara melakukan hacking kepada router.
- The Basics
- Service Enumeration, Fingerprinting and Default Accounts
- Bruteforcing and Dictionary Attacks with Hydra
- SNMP Attacks using SNMPCheck
- SNMP Attacks using SNMPEnum
- Dictionary Attack using Metasploit on SNMP
[spoiler=open this] for Harga?:
cukup 130rb aja gan (exclude ongkir)
buat agan2 yang berminat, langsung aja SMS ane di:
087821491894
Harga :
Lokasi Seller : Jawa Barat
Description :
http://a8.sphotos.ak.fbcdn.net/hphotos-ak-ash4/s720x720/430488_2774841332963_1315978124_2086020_540938597_ n.jpg
Seperti yang agan2 lihat dari judul diatas, ane sekarang menjual DVD Tutorial :D, semua tutorial ane pastikan sangat membantu agan2 yang sedang mulai untuk belajar backtrack, metasploit, wireless hacking, dan masih banyak lagi. Semua tutorial berisi informasi yang up to date dan teknik-teknik dari dasar hingga tingkat yang lebih expert. Berikut daftar tutorial yang bakal agan dapetin :
[/spoiler] for 1. Metasploit Framework Expert:
Video yang membahas tentang Metasploit Framework secara mendalam.
- Exploitation Basics
- Why Metasploit?
- Meterpreter Basics
- Armitage
- Framework Organization
- Post Exploitation Kung-Fu
- Post Exploitation Privilege Escalation
- Killing AV and Disabling Firewall
- Stdapi and Priv Extensions
- Token Stealing and Incognito
- Espia and Sniffer Extensions in Post Exploitation
- Post Exploitation Backdoors
- Pivoting after Post Exploitation
- Port Forwarding as part of Post Exploitation
- Client Side Exploits
- Backdoors and Rootkits in Post Exploitation
- Exploit Research with Metasploit
- Railgun Basics
- Railgun Adding Functions
- Railgun Adding New DLLs
- Railgun Adding New DLLs on Windows 7
- Resource Scripts
- Database Support
- Using Plugins
- Meterpreter API Basics
- Meterpreter Scripting Migrate Clone
- Meterpreter Scripting Process Name Search
for 2. Wireless LAN Security and Penetration Testing:
Video yang membahas tentang dasar-dasar Wireless sampai dengan penetrasi menggunakan tehnik sniffing, injeksi, kracking, dan masih banyak lagi tehnik serangan terhadap wireless.
- Getting Started
- Bands, Channels and Sniffing
- Pwning Beacon Frames
- Dissecting AP-Client Connections
- Dissecting WLAN Headers
- Pwning Hidden SSIDs
- Laughing Off MAC Filters
- Hacking WLAN Authentication
- Hotspot Attacks
- Hacking Isolated Clients
- Alfa Card Kung-Fu
- Man-in-the-Middle Attack
- SSL MITM Attack Over Wireless
- SSL MITM Attack Over Wireless Demo
- SSL Man-in-the-Middle Attacks
- Custom Wireless Regulation Database
- WEP In-Depth
- WEP kracking
- Caffe Latte Attack Basics
- Caffe Latte Attack Demo
- Caffe Latte Attack on the iPhone
- KoreK's ChopChop Attack
- Fragmentation and Hirte Attack
- Understanding WPA/WPA2
- Wi-Fi Challenge 1 (Level Easy) : There is no Patch for Stupidity!
- Wi-Fi Challenge 1 Solution : There is no Patch for Stupidity!
- Wi-Fi Challenge 2 (Level - Intermediate) : Know Thy Packets
- Wi-Fi Challenge 2 Solution : Know Thy Packets
- Wi-Fi Challenge 3 (Level Advanced): Never Underestimate your Enemy!
- WPA-PSK
- WPA-PSK kracking
- WPA2-PSK kracking
- Speeding up WPA/WPA2 PSK kracking
- Never Underestimate Your Enemy!
- Mood Swings of a Wandering Client
- kracking WPA/WPA2-PSK with just the Client
- Questions and Answers
- Wpa_Supplicant
- krack WPA-Personal with only AP
- Setting up FreeRadius-WPE on Backtrack
- EAP-MD5 Basics and Demo
- kracking EAP-MD5 with Eapmd5pass and Eapmd5krack
- EAP Types and PEAP Demo
- kracking PEAP
- kracking PEAP in a Windows Network
- kracking EAP-TTLS
- Insecurity in 3rd Party Wi-Fi Utilities
- Conclusion and the Road Ahead
- Windows Wireless Kung-Fu (SWSE Addendum 1)
- Creating Wireless Backdoors (SWSE Addendum 2)
- Malware, Metasploit and the Hosted Network (SWSE Addendum 3)
- SecurityTube Certified Wi-Fi Security Expert (SWSE) Student Portal Launch
for 3. Exploit Research:
Video yang membahas tentang bagaimana cara membuat kode-kode exploitasi dari memanfaatkan kelemahan pada aplikasi.
- Topic Introduction
- Memcpy Buffer Overflow
- Strcpy Buffer Overflow
- Minishare Buffer Overflow
- FreeSSHD Buffer Overflow
- SEH Basics
- Overwrite SEH
- Exploiting SEH
- Guest Lecture by Andrew King
- Binary Diffing Microsoft Patches
for 4. Metasploit Tutorial:
Video yang membahas tentang menggunakan Metasploit dari awal,sampai dengan menulis skrip dan modul meterpreter.
- Exploitation Basics and need for Metasploit
- Getting Started with Metasploit
- Meterpreter Basics and using Stdapi
- Meterpreter Extensions Stdapi and Priv
- Understanding Windows Tokens and Meterpreter Incognito
- Espia and Sniffer Extensions with Meterpreter Scripts
- Metasploit Database Integration and Automating Exploitation
- Post Exploitation Kung Fu
- Post Exploitation Privilege Escalation
- Post Exploitation Log Deletion and AV Killing
- Post Exploitation and Stealing Data
- Post Exploitation Backdoors and Rootkits
- Post Exploitation Pivoting and Port Forwarding
- Backdooring Executables
- Auxiliary Modules
- Pass the Hash Attack
- Scenario Based Hacking
for 5. Windows Assembly Language for Hackers:
Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi windows.
- Processor Modes
- Protected Mode Assembly
- Win32 ASM using MASM32
- MASM Data Types
- Procedures
- Macros
- Program Control using JMP
- Decision Directives
- Loops
for 6. Assembly Language for Linux:
Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi Linux.
- System Organization
- Virtual Memory Organization
- GDB Usage Primer
- Hello World
- Data Types
- Moving Data
- Working with Strings
- Unconditional Branching
- Conditional Branching
- Functions
- Functions Stack
for 7. Buffer Overflow Exploitation for Linux:
Video yang membahas tentang cara dasar buffer overflows dan melakukan exploitasi terhadap sistem operasi Linux.
- Smashing the Stack
- Writing Exit Shellcode
- Executing Shellcode
- Disassembling Execve
- Shellcode for Execve
- Exploiting a Program
- Exploiting a Program Demo
- Return to Libc Theory
- Return to Libc Demo
for 8. Format String Vulnerabilities:
Video yang membahas tentang cara memanfaatkan kelemahan dalam format penulisan kode program dan mengexploitasinya.
- The Basics
- Understanding Format Functions
- Crashing the Program
- Viewing the Stack
for 9. Scenario Based Hacking and Penetration Testing:
Video yang membahas tentang skenario dari tehnik hacking.
- No Patches, No AV, Direct Access
- No Patches, No AV, Behind NAT
- OS Patched, No AV, Behind NAT
- OS and Software Patched, No AV, Behind NAT
for 10. Router Hacking Series:
Video yang membahas tentang cara melakukan hacking kepada router.
- The Basics
- Service Enumeration, Fingerprinting and Default Accounts
- Bruteforcing and Dictionary Attacks with Hydra
- SNMP Attacks using SNMPCheck
- SNMP Attacks using SNMPEnum
- Dictionary Attack using Metasploit on SNMP
[spoiler=open this] for Harga?:
cukup 130rb aja gan (exclude ongkir)
buat agan2 yang berminat, langsung aja SMS ane di:
087821491894