Thursday, 7. July 2011
ClubHack Magazine. issue is dedicated to Browser security.
ClubHack Magazine. issue is dedicated to Browser security.

Direct Download:
http://chmag.in/issue/may2011.pdf

Tech Gyan - First ever public disclosure of Password secrets of "Apple
Safari".
Tool Gyan - BeEF (Browser Exploitation Framework)
Mom's Guide - User Agent on my Header.
Legal Gyan - New Rules under Information Technology Act.
Matriux Vibhag - Forensics with Matriux Part - 1

Permalink

 


The Hacker News' Magazine - Social Engineering Edition
The Hacker News' Magazine - Social Engineering Edition - Issue 02 - May,2011 Released !


We are happy to Announce that 'The Hacker News' [THN] Magazine Issue 02 (May 2011) is Out . This time we cover "Social Engineering Edition" . The Index of Content is as Given Below :

Social Engineering
Opsony By Anonymous
Anna Hazare - The Revolution in India
Message By Pattie Galle
Hacking News of Month
Hackers Toolkit updates & Downloads
Defacement News
Security and Hacking Events of Month
Cyber Crime News
Linux News
Security Updates
Vulnerability Exposure

Download:
http://theevilhackerz.com/may-2011.pdf

Permalink

 


The Hacker’s Underground Handbook
The Hacker’s Underground Handbook
Ebook

The Hacker’s Underground Handbook
Learn What it Takes to Crack Even the Most Secure Systems
By: David Melnichuk

The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail.

A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration.

Download PDF
http://3xploit.com/file/The_Hackers_Underground_Handbook.pdf

Permalink

 


XSS Attacks
XSS Attacks
Ebook

PUBLISHED BY- Syngress Publishing, Inc. ISBN-10: 1-59749-154-3
ISBN-13: 978-1-59749-154-9
This book is all about XSS. It will cover these topics on XSS.

Cross-site Scripting Fundamentals.
The XSS Discovery Toolkit
XSS Theory
XSS Attack Methods
Advanced XSS Attack Vectors
XSS Exploited
Exploit Frameworks
XSS Worms
Preventing XSS Attacks

Download PDF
http://3xploit.com/file/Cross_Site_Scripting_Attacks_XSS_Exploits_and_Defense_tqw_darksiderg.rar

Permalink

 


The Art of Computer Virus Research and Defense
Title: The Art of Computer Virus Research and Defense
Author: Peter Szor
Publisher: Addison-Wesley Professional
Hardcover: 744 pages



Part: I Strategies of the Attacker

Chapter 1. Introduction to the Games of Nature
Chapter 2. The Fascination of Malicious Code Analysis
Chapter 3. Malicious Code Environments
Chapter 4. Classification of Infection Strategies
Chapter 5. Classification of In-Memory Strategies
Chapter 6. Basic Self-Protection Strategies
Chapter 7. Advanced Code Evolution Techniques and Computer Virus Generator Kits
Chapter 8. Classification According to Payload
Chapter 9. Strategies of Computer Worms
Chapter 10. Exploits, Vulnerabilities, and Buffer Overflow Attacks

Part: II Strategies of the Defender

Chapter 11. Antivirus Defense Techniques
Chapter 12. Memory Scanning and Disinfection
Chapter 13. Worm-Blocking Techniques and Host-Based Intrusion Prevention
Chapter 14. Network-Level Defense Strategies
Chapter 15. Malicious Code Analysis Techniques

Permalink

 


Title: Kingpin – How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Title: Kingpin – How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Author: Kevin Poulsen
Publisher: Crown
Hardcover: 288 pages
Release Date: February 22, 2011

In KINGPIN, Kevin tells the story of Max Vision, a white hat computer hacker who turned to the dark side. Among other things, Max stole credit card data — “dumps” — on millions of consumers, which he sold in bulk to a card counterfeiter named Chris Aragon. In this excerpt, a new discovery gives him a chance to expand his operation.
Book exposes scary story of how online hackers stocked credit card numbers, fake checks, hacked bank accounts to make millions overnight through well structured ring of criminals operating from dark corners of world. It showcases how attackers used advanced techniques such as remote execution exploits, smart phishing sites, Trojans, advanced keyloggers to sweep the innocent victims around the world and transferred bounties under the nose of security guards from top banks. A good case study for Howard folks to ponder into.

Permalink