Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf

Size 3.665 MB   64 seeders     Added 2012-07-29 02:31:48

To download or stream you need BitLord. Visit them at BitLord.com
<div class="center">
image
CONTENTS
The Web Application angle
Cross Site Scripting Attacks – Scenario #1
Stealing Cookies
Optimizing the attack
Directory traversal – Scenario #2
Stealing MySQL Tables
Using the password hash to login
0wning the Server
The Backdoor angle
Backdooring PE files under Windows Vista
Peeking around the file
Hijacking Execution Flow
Super Trojan [T]
Bypassing Antivirus Systems - More Olly games
The Cave and the Stub
AV, AV wherefore art thou AV?
Advanced Exploitation Techniques
MS07-017 – Dealing with Vista
2 byte overwrite
Jumping to our shellcode
Cracking the Egghunter
The Egghunter
The Shell
The 0Day angle
Windows TFTP Server – Case study #1
HP Openview NNM – Case study #2
Advanced ARP spoofing attacks
image
image
image
</div>
Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0.pdf 3.665 MB
Gathering some info...

Register and log in Isohunt and see no captcha anymore!

4000 symbols left
Hash 414A0DE5AC2DBD54867CD06DAB345F8DAB9B9392