Log in

View Full Version : JUAL DVD Tutorial backtrack, metasploit, wireless hacking


mousekompi
26th May 2012, 11:00 AM
Kondisi Barang : Baru

Harga :



Lokasi Seller : Jawa Barat


Description :



http://a8.sphotos.ak.fbcdn.net/hphotos-ak-ash4/s720x720/430488_2774841332963_1315978124_2086020_540938597_ n.jpg



Seperti yang agan2 lihat dari judul diatas, ane sekarang menjual DVD Tutorial :D, semua tutorial ane pastikan sangat membantu agan2 yang sedang mulai untuk belajar backtrack, metasploit, wireless hacking, dan masih banyak lagi. Semua tutorial berisi informasi yang up to date dan teknik-teknik dari dasar hingga tingkat yang lebih expert. Berikut daftar tutorial yang bakal agan dapetin :




[/spoiler] for 1. Metasploit Framework Expert:






Video yang membahas tentang Metasploit Framework secara mendalam.



- Exploitation Basics

- Why Metasploit?

- Meterpreter Basics

- Armitage

- Framework Organization

- Post Exploitation Kung-Fu

- Post Exploitation Privilege Escalation

- Killing AV and Disabling Firewall

- Stdapi and Priv Extensions

- Token Stealing and Incognito

- Espia and Sniffer Extensions in Post Exploitation

- Post Exploitation Backdoors

- Pivoting after Post Exploitation

- Port Forwarding as part of Post Exploitation

- Client Side Exploits

- Backdoors and Rootkits in Post Exploitation

- Exploit Research with Metasploit

- Railgun Basics

- Railgun Adding Functions

- Railgun Adding New DLLs

- Railgun Adding New DLLs on Windows 7

- Resource Scripts

- Database Support

- Using Plugins

- Meterpreter API Basics

- Meterpreter Scripting Migrate Clone

- Meterpreter Scripting Process Name Search








for 2. Wireless LAN Security and Penetration Testing:






Video yang membahas tentang dasar-dasar Wireless sampai dengan penetrasi menggunakan tehnik sniffing, injeksi, kracking, dan masih banyak lagi tehnik serangan terhadap wireless.



- Getting Started

- Bands, Channels and Sniffing

- Pwning Beacon Frames

- Dissecting AP-Client Connections

- Dissecting WLAN Headers

- Pwning Hidden SSIDs

- Laughing Off MAC Filters

- Hacking WLAN Authentication

- Hotspot Attacks

- Hacking Isolated Clients

- Alfa Card Kung-Fu

- Man-in-the-Middle Attack

- SSL MITM Attack Over Wireless

- SSL MITM Attack Over Wireless Demo

- SSL Man-in-the-Middle Attacks

- Custom Wireless Regulation Database

- WEP In-Depth

- WEP kracking

- Caffe Latte Attack Basics

- Caffe Latte Attack Demo

- Caffe Latte Attack on the iPhone

- KoreK's ChopChop Attack

- Fragmentation and Hirte Attack

- Understanding WPA/WPA2

- Wi-Fi Challenge 1 (Level Easy) : There is no Patch for Stupidity!

- Wi-Fi Challenge 1 Solution : There is no Patch for Stupidity!

- Wi-Fi Challenge 2 (Level - Intermediate) : Know Thy Packets

- Wi-Fi Challenge 2 Solution : Know Thy Packets

- Wi-Fi Challenge 3 (Level Advanced): Never Underestimate your Enemy!

- WPA-PSK

- WPA-PSK kracking

- WPA2-PSK kracking

- Speeding up WPA/WPA2 PSK kracking

- Never Underestimate Your Enemy!

- Mood Swings of a Wandering Client

- kracking WPA/WPA2-PSK with just the Client

- Questions and Answers

- Wpa_Supplicant

- krack WPA-Personal with only AP

- Setting up FreeRadius-WPE on Backtrack

- EAP-MD5 Basics and Demo

- kracking EAP-MD5 with Eapmd5pass and Eapmd5krack

- EAP Types and PEAP Demo

- kracking PEAP

- kracking PEAP in a Windows Network

- kracking EAP-TTLS

- Insecurity in 3rd Party Wi-Fi Utilities

- Conclusion and the Road Ahead

- Windows Wireless Kung-Fu (SWSE Addendum 1)

- Creating Wireless Backdoors (SWSE Addendum 2)

- Malware, Metasploit and the Hosted Network (SWSE Addendum 3)

- SecurityTube Certified Wi-Fi Security Expert (SWSE) Student Portal Launch








for 3. Exploit Research:






Video yang membahas tentang bagaimana cara membuat kode-kode exploitasi dari memanfaatkan kelemahan pada aplikasi.



- Topic Introduction

- Memcpy Buffer Overflow

- Strcpy Buffer Overflow

- Minishare Buffer Overflow

- FreeSSHD Buffer Overflow

- SEH Basics

- Overwrite SEH

- Exploiting SEH

- Guest Lecture by Andrew King

- Binary Diffing Microsoft Patches








for 4. Metasploit Tutorial:




Video yang membahas tentang menggunakan Metasploit dari awal,sampai dengan menulis skrip dan modul meterpreter.



- Exploitation Basics and need for Metasploit

- Getting Started with Metasploit

- Meterpreter Basics and using Stdapi

- Meterpreter Extensions Stdapi and Priv

- Understanding Windows Tokens and Meterpreter Incognito

- Espia and Sniffer Extensions with Meterpreter Scripts

- Metasploit Database Integration and Automating Exploitation

- Post Exploitation Kung Fu

- Post Exploitation Privilege Escalation

- Post Exploitation Log Deletion and AV Killing

- Post Exploitation and Stealing Data

- Post Exploitation Backdoors and Rootkits

- Post Exploitation Pivoting and Port Forwarding

- Backdooring Executables

- Auxiliary Modules

- Pass the Hash Attack

- Scenario Based Hacking








for 5. Windows Assembly Language for Hackers:




Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi windows.



- Processor Modes

- Protected Mode Assembly

- Win32 ASM using MASM32

- MASM Data Types

- Procedures

- Macros

- Program Control using JMP

- Decision Directives

- Loops








for 6. Assembly Language for Linux:




Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi Linux.



- System Organization

- Virtual Memory Organization

- GDB Usage Primer

- Hello World

- Data Types

- Moving Data

- Working with Strings

- Unconditional Branching

- Conditional Branching

- Functions

- Functions Stack








for 7. Buffer Overflow Exploitation for Linux:




Video yang membahas tentang cara dasar buffer overflows dan melakukan exploitasi terhadap sistem operasi Linux.



- Smashing the Stack

- Writing Exit Shellcode

- Executing Shellcode

- Disassembling Execve

- Shellcode for Execve

- Exploiting a Program

- Exploiting a Program Demo

- Return to Libc Theory

- Return to Libc Demo








for 8. Format String Vulnerabilities:




Video yang membahas tentang cara memanfaatkan kelemahan dalam format penulisan kode program dan mengexploitasinya.



- The Basics

- Understanding Format Functions

- Crashing the Program

- Viewing the Stack








for 9. Scenario Based Hacking and Penetration Testing:




Video yang membahas tentang skenario dari tehnik hacking.



- No Patches, No AV, Direct Access

- No Patches, No AV, Behind NAT

- OS Patched, No AV, Behind NAT

- OS and Software Patched, No AV, Behind NAT








for 10. Router Hacking Series:




Video yang membahas tentang cara melakukan hacking kepada router.



- The Basics

- Service Enumeration, Fingerprinting and Default Accounts

- Bruteforcing and Dictionary Attacks with Hydra

- SNMP Attacks using SNMPCheck

- SNMP Attacks using SNMPEnum

- Dictionary Attack using Metasploit on SNMP








[spoiler=open this] for Harga?:




cukup 130rb aja gan (exclude ongkir)







buat agan2 yang berminat, langsung aja SMS ane di:

087821491894