Friday, 2. September 2011
The Hacker News Magazine September Issue
1. Access to computers should be unlimited and total.
2. All information should be free.
3. Authority should be mistrusted and decentralization promoted.
4. Hackers should be judged solely by their skills at hacking, rather than by race, class, age, gender, or position.
5. Computers can be used to create art and beauty.
6. Computers can change your life for the better.
The understanding of “Hacker Ethics” has three main functions:
1. It promotes the belief of individual activity over any form of corporate authority or system of ideals.
2. It supports a completely free-market approach to the exchange of and access to information.
3. It promotes the belief that computers can have a beneficial and life-changing effect.


Download
http://theevilhackerz.com/THN-Sep2011.rar

Permalink

 


Friday, 26. August 2011
Windows Registry Forensics
Title: Windows Registry Forensics
Author:Harlan A. Carvey
Publisher: Syngress
Pages: 248
Release Date: Feb 7, 2011

Here is the table of contents

Chapter 1. Registry Analysis
Introduction
What Is “Registry Analysis”?
What Is the Window Registry?
Registry Structure
Summary

Chapter 2. Tools
Introduction
Live Analysis
Forensic Analysis
Summary

Chapter 3. Case Studies: The System
Security and SAM Hives
System Hive
Software Hive
BCD Hive
Summary

Chapter 4. Case Studies: Tracking User Activity
Tracking User Activity
Scenarios
Summary
References

Permalink

 


Tuesday, 23. August 2011
ClubHack Mag Issue Issue 19, August 2011
This issue covers Gonna’ Break It on Gonna’ Kick it Root Down in Tech Gyan, RSA Security in Moms Guide, SniffJoke – Defeating Interception Framework in Tool Gyan, Patent Law and Computer Technology in Legal Gyan and Social Engineering Toolkit in Matriux Vibhag

Download PDF
http://chmag.in/issue/aug2011.pdf

Permalink

 


ClubHack Mag Issue 18-July2011
This issue covers following articles:-

0x00 Tech Gyan - Using Metasploit with Nessus Bridge on Ubuntu
0x01 Tool Gyan - Armitage – The Ultimate Attack Platform for Metasploit
0x02 Mom's Guide - Penetration Testing with Metasploit Framework
0x03 Legal Gyan - Trademark Law and Cyberspace
0x04 Matriux Vibhag - The Exploitation Ka Baap MSF

Download PDF
http://chmag.in/issue/jul2011.pdf

Permalink

 


Friday, 29. July 2011
IDA PRO 2nd Edition
Here is the core information about the book,

Title: IDA PRO Book – 2nd Edition
Author:Chris Eagle
Publisher: No Starch Press
Pages: 672
Release Date: July 14, 2011

Here is the table of contents

PART I: Introduction to IDA
Chapter 1: Introduction to Disassembly
Chapter 2: Reversing and Disassembly Tools
Chapter 3: IDA Pro Background

PART II: Basic IDA Usage
Chapter 4: Getting Started with IDA
Chapter 5: IDA Data Displays
Chapter 6: Disassembly Navigation
Chapter 7: Disassembly Manipulation
Chapter 8: Datatypes and Data Structures
Chapter 9: Cross-References and Graphing
Chapter 10: The Many Faces of IDA

PART III: Advanced IDA Usage
Chapter 11: Customizing IDA
Chapter 12: Library Recognition Using FLIRT Signatures
Chapter 13: Extending IDA’s Knowledge
Chapter 14: Patching Binaries and Other IDA Limitations

PART IV: Extending IDA’s Capabilities
Chapter 15: IDA Scripting
Chapter 16: The IDA Software Development Kit
Chapter 17: The IDA Plug-in Architecture
Chapter 18: Binary Files and IDA Loader Modules
Chapter 19: IDA Processor Modules

PART V: Real-World Applications
Chapter 20: Compiler Personalities
Chapter 21: Obfuscated Code Analysis
Chapter 22: Vulnerability Analysis
Chapter 23: Real-World IDA Plug-ins

PART VI: The IDA Debugger
Chapter 24: The IDA Debugger
Chapter 25: Disassembler/Debugger Integration
Chapter 26: Additional Debugger Features

Appendix A: Using IDA Freeware 5.0
Appendix B: IDC/SDK Cross-Reference

Book:
http://www.nostarch.com/idapro2.htm

Permalink

 


Monday, 18. July 2011
Security Concepts - online Book
"This is an online book about computer, network, technical, physical, information and cryptographic security. It is a labor of love, incomplete until the day I am finished."

Book
http://www.subspacefield.org/security/security_concepts/index.html

Permalink

 


Wednesday, 13. July 2011
ClubHack Magazine - July 2011
Topics of interest include, but not limited to:-
Mobile (Cellular), VOIP Exploitation and Security
Firewall Evasion Techniques
Malware Attacks
Sniffing
Forensics
Protocol Security and Exploitation

ClubHack Magazine has as different sections:

1.Tech Gyan - Main article of the magazine. Covers various technical aspects
in security, latest hacking trends and techniques.
2. Tool Gyan - Covers various hacking and security tools.
3. Mom's Guide - Dedicated to common man. Covers basics and fundamentals.
4. Legal Gyan - IT Law with respect to hacking explained in simple language.
5. Matriux Vibhag - Articles on Matriux Security Distro.

Download PDF
http://chmag.in/issue/jul2011.pdf

Permalink

 


Thursday, 7. July 2011
BackTrack 4 : Assuring Security by Penetration Testing
BackTrack 4 : Assuring Security by Penetration Testing

Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.




Download :
http://shrta.com/files/0ZYSOJBV/BackTrack-4-Assuring-Security-by-Penetration-Testing.zip

Permalink

 


Anonymous Super Secret Security Handbook
Anonymous Super Secret Security :P Handbook

Master Table of Contents
1) Preface
2) Setting up Tor
3) Firefox Recommended Add-Ons
4) Setting up i2p
4.1) Installation
4.2) Firefox Configuration
4.3) IRC Client Configuration
4.4) I2p IRC on Android via irssi connectbot
5) Advanced IRC
5.1) Commands
5.2) Browsing
6) Advanced Defense Techniques
7) Portable Solutions
8) ADVANCED GUIDE TO HACKING AND SECURITY VULNERABILITY

Download PDF:
http://adf.ly/313683/http://www.ziddu.com/download/15519429/Anonymous-Super-Secret-Security-Handbook.pdf.html

Permalink

 


SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

Here is the table of contents…

Chapter 1: What is SQL Injection?
Chapter 2: Testing for SQL Injection
Chapter 3: Reviewing Code for SQL Injection
Chapter 4: Exploiting SQL Injection
Chapter 5: Blind SQL Injection Exploitation
Chapter 6: Exploiting the Operating System
Chapter 7: Advanced Topics
Chapter 8: Code-Level Defenses
Chapter 9: Platform-Level Defenses
Chapter 10: References

Permalink