Author Topic: Network Hack Course (3 CD)  (Read 17575 times)

0 Members and 1 Guest are viewing this topic.

Offline RzR1911

  • Alive.. Online
  • Alumni
  • Super Member
  • *
  • Points: 475
  • Posts: 1562
  • Alive.. Online
    • _
      Not Specified
    • View Profile
Network Hack Course (3 CD)
« on: September 04, 2011, 10:07:38 am »
Hey guys i'll be sharing a complete hack package that contains complete self explanatory tutorials that will teach you from the scratch. Here's a glimpse of what you get..



Quote/Ask Question


1. Introduction to Information Security & Ethical Hacking
2. Basics of Networking (Tutorial for beginners)
3. Introduction
4. Hacker Vs Cracker
5. Ethical Hacking
6. Precautions
7. Current Cyber Threats
8. Desktop and Server Security
9. Windows Security
10. Hacking into Windows XP, NT
11. SAM (Security Accounts Manager)
12. Registries
13. Counter Measures
14. Linux Security
15. Hacking into Linux
16. Keyloggers - Hardware & Software
17. Anti Keyloggers
18. Trojans or Remote Administration Tools
19. Spywares
20. Viruses and Worms Introduction
21. Classification of Viruses and Worms
22. Examples of Viruses and Worms
23. Countermeasures
24. Anti Virus
25. LAN Security
26. Threats to LAN
27. Countermeasures
28. Network and File Sharing
29. Firewalls
30. Anti Virus
31. Anti Spywares
32. Network Scanners
33. Introduction to Firewalls
34. Working of a Firewall
35. Types of Firewalls
36. Packet Filters
37. Proxy Gateways
38. Network Address Translation
39. Intrusion Detection
40. Logging
41. Network Tools and Commands (Tutorial)
42. TCP/IP Commands
43. ARP Command
44. Trace route Command
45. Netstat Command
46. Finger Command
47. Ping Command
48. Nbtstat Command
49. Ipconfig Command
50. Telnet Command


-
CD 2 Contents:
-


1. Internet Security
2. IP Addresses
3. Finding an IP Address
4. Through Instant Messaging Software
5. Through Internet Relay Chat
6. Through Website
7. Through Email Headers
8. Through Message Board Postings
9. Proxies Servers
10. Transparent Proxies
11. Anonymous Proxies
12. Distorting Proxies
13. Elite Proxies
14. Free Proxy Servers
15. Analysis of Email Headers
16. Yahoo Email
17. Google Email
18. SSL (Secure Sockets Layer)
19. IP Spoofing
20. Information Gathering for a Remote System
21. Daemon Grabbing
22. Port Scanning
23. ICMP Messages
24. Banner Grabbing
25. Sockets
26. Detection of TCP Port Scan TCP SYN Scanning
27. Detection of SYN Scans
28. SYN/ACK Scanning
29. Detection of SYN/ACK Port Scan
30. TCP FIN Scanning
31. TCP XMAS tree scanning
32. ACK Scanning
33. UDP Ports
34. Utility
35. Fingerprinting
36. OS Fingerprinting
37. Remote OS Fingerprinting
38. Attacking the System
39. Nontechnical Attacks
40. Network Infrastructure Attacks
41. Operating System Attacks
42. Technical Attacks
43. Denial of Services attacks (DOS Attacks)
44. Threat from Sniffing and Key Logging
45. Trojan Attacks
46. HTTP Request Smuggling g
47. IP Spoofing
48. Cross site scripting (XSS)
49. Buffer Overflows
50. Format Bugs
51. SQL Injection s
52. Input Validation
53. Viruses & Worms
54. Spy Ware Software
55. Password Cracking
56. All other types of Attacks
57. Password Cracking
58. Password Guessing
59. Dictionary Based Attacks
60. Brute-Force Attacks
61. Default Passwords
62. Attacks on LOG files
63. Sniffer Attacks
64. Wireless & Bluetooth Security (Tutorial only) (Introduction Only )
65. Penetration Testing
66. Definition
67. Methodology
68. Basic Approaches
69. Google Hacking
70. Terminologies
71. Basic Search Techniques
72. Basic Keyword searching
73. Phrase search
74. + Operator search
75. - Operator search
76. Range search
77. Advanced Search Techniques Site
78. Intitle, allintitle
79. Inurl, allinurl
80. Link .
81. Phonebook
82. Rphonebook
83. Bphonebook
84. Daterange
85. Cache
86. Filetype .
87. Robots.txt


-
CD 3 Contents:
-


1. Encryption & Cryptography (Introduction Only )
2. Introduction to Cryptography
3. Private Key Encryption
4. Public Key Encryption
5. DES Algorithm
6. RSA Algorithm
7. Hash Functions
8. MD5 HASH algorithm
9. Digital Signatures
10. Encyptorsetup
11. Computer Forensics (Introduction Only )
12. Introduction to Forensics
13. Digital Evidence
14. Requirements for Forensics
15. Steps taken in Forensics investigation
16. Acquisition
17. Identification
18. Evaluation
19. Presentation
20. Forensic Toolkit
21. Steganography and Data Hiding
22. Introduction
23. Digital Watermarking
24. Types of Steganography
25. In band Data Insertion
26. Data Algorithmic
27. Overt based grammar
28. Out-band Data Insertion
29. Overwriting Data Insertion
30. Steganography Tools & Applications
31. Catching Criminals
32. Cyber Terrorism
33. Forms of Cyber Terrorism
34. Factors & Reasons
35. Countermeasures
36. Challenges
37. Honey Pots
38. Definition
39. Research Honey Pots
40. Production Honey Pots
41. Low Involved Honey Pots
42. High Involved Honey Pots
43. Pros & Cons
44. Famous Honey Pots
45. Cyber Laws & IT Act India (Introduction Only )
46. IT Act 2000
47. Domain Name Disputes
48. Definitions and Laws
49. Cyber Crimes & penalties
50. Security Auditing (Introduction Only )
51. Audit Objectives
52. Risk Analysis
53. Auditing Steps
54. Previous Check
55. Planning & Organisation
56. Network Control - Policies / Stds
57. Network Control - Hardware / Software
58. Network Data Standards and Data Access
59. Hardware and Software Backup and Recovery
60. Software Communications
61. Access to Network Operating Systems Software and Facilities
62. Data Encryption and Filtering
63. Internet Applications
64. Password Protection



DOWNLOAD :

DOWNLOAD IS RESTRICTED TO MEMBERS ONLY.! POST HERE AND DOWNLOAD LINKS WILL BE MESSAGED TO YOU.
You do not have permission to give points
point 20 Points

Users who gave points in this topic » anuragjames (5 Pts) » Jack.agg (5 Pts) » Mysterious (5 Pts) » mahesh07 (5 Pts) 

Offline coolsweetshanu

  • Member
  • Jr. Member
  • *
  • Points: 21
  • Posts: 81
    • View Profile
Network Hack Course (3 CD)
« Reply #1 on: September 04, 2011, 10:20:43 am »
please msg me the links
 :frus  :punish life was much more simple when apple n blackberry were just fruits!!!!!!!!! :hd  :think  ):(  :qui  :at wits end  :gunfr  :spam

Offline Shankynayak

  • Member
  • Sr. Member
  • *
  • Points: 224
  • Posts: 469
    • View Profile
Network Hack Course (3 CD)
« Reply #2 on: September 04, 2011, 11:18:10 am »
Sir, Provide the download links
:angel:

Offline AKr

  • Member
  • Newbie
  • *
  • Points: 1
  • Posts: 12
    • View Profile
Network Hack Course (3 CD)
« Reply #3 on: September 04, 2011, 12:44:47 pm »
i also want the download links..

Offline grafixx

  • Alumni
  • Member
  • Full Member
  • *
  • Points: 119
  • Posts: 187

    • MAIT
    • _
      CSE
    • View Profile
Network Hack Course (3 CD)
« Reply #4 on: September 04, 2011, 01:49:22 pm »
plz provide downloading link..

Offline RzR1911

  • Alive.. Online
  • Alumni
  • Super Member
  • *
  • Points: 475
  • Posts: 1562
  • Alive.. Online
    • _
      Not Specified
    • View Profile
Network Hack Course (3 CD)
« Reply #5 on: September 04, 2011, 02:22:59 pm »
Links send to all.. Enjoy

Offline techtycoon

  • Alumni
  • Full Member
  • *
  • Points: 39
  • Posts: 150
    • View Profile
Network Hack Course (3 CD)
« Reply #6 on: September 04, 2011, 02:25:17 pm »
pl send me too
Yogesh Pal
NIEC
ECE
2008-2012

Ask me anything, will try my best to help you :gunfr !
ANY 3rd or 4th YEAR GUY INTERESTED IN BUYING  ATMEL USB BURNER+ DEVELOPMENT KIT (NEW CONDITION), LOTS OF OTHER HARDWARE ,I WILL THEM ALL FREE. THESE WILL BE REQUIRED IN YOUR 7TH SEM AND 8TH SEM PROJECT.
(splendidyogi21@gmail.com or pm me).

Offline descentis

  • think BIG dream BIG
  • Alumni
  • Sr. Member
  • *
  • Points: 24
  • Posts: 299
  • think BIG dream BIG
    • View Profile
Network Hack Course (3 CD)
« Reply #7 on: September 04, 2011, 02:54:50 pm »
 :adore1 mujhe bi mujhe bi
TAKING I.P TO THE WORLD


                                   


Offline pikachu

  • pika......pikaa.........
  • Co-Admin
  • Techbits Elite Member
  • *
  • Points: 8869
  • Posts: 5772
  • pika......pikaa.........
    • _
      Not Specified
    • View Profile
Network Hack Course (3 CD)
« Reply #8 on: September 04, 2011, 05:28:11 pm »


Will i be able to hack any email-id with these tutorials ??? Or these are for some other hacking purpose ?

Offline saa14

  • Member
  • Newbie
  • *
  • Points: 2
  • Posts: 12
    • View Profile
Network Hack Course (3 CD)
« Reply #9 on: September 04, 2011, 06:17:35 pm »
Please send me the links too!!! :adore1  :adore1  :adore1  :adore1

Offline piyushkumarjetwani

  • Member
  • Newbie
  • *
  • Points: 0
  • Posts: 1
    • View Profile
Network Hack Course (3 CD)
« Reply #10 on: September 04, 2011, 07:11:25 pm »
send me a link too

Offline rachit92

  • Member
  • Newbie
  • *
  • Points: 6
  • Posts: 44
    • View Profile
Network Hack Course (3 CD)
« Reply #11 on: September 04, 2011, 07:48:17 pm »
hey pls send the link to me as well... thanks in advance!

Offline RzR1911

  • Alive.. Online
  • Alumni
  • Super Member
  • *
  • Points: 475
  • Posts: 1562
  • Alive.. Online
    • _
      Not Specified
    • View Profile
Network Hack Course (3 CD)
« Reply #12 on: September 04, 2011, 09:01:07 pm »
Quote from: descentis on September 04, 2011, 02:54:50 pm
:adore1 mujhe bi mujhe bi


Download link sent.. :)

Quote/Ask Question
pl send me too


Sent to you too..  :angel:
« Last Edit: September 04, 2011, 09:03:17 pm by RzR1911 »

Offline RzR1911

  • Alive.. Online
  • Alumni
  • Super Member
  • *
  • Points: 475
  • Posts: 1562
  • Alive.. Online
    • _
      Not Specified
    • View Profile
Network Hack Course (3 CD)
« Reply #13 on: September 04, 2011, 09:03:00 pm »
Quote from: pikachu on September 04, 2011, 05:28:11 pm


Will i be able to hack any email-id with these tutorials ??? Or these are for some other hacking purpose ?


grow up dude.. hacking is something beyond tracking down email ids.. for that you need to download my AIO.. go with the link in my signature.. anyways link is sent to you..

@ all

Sent to all..  :angel:

Offline vikas13singla

  • Member
  • Newbie
  • *
  • Points: 1
  • Posts: 5
    • View Profile
Network Hack Course (3 CD)
« Reply #14 on: September 04, 2011, 09:52:47 pm »
send me the links please....
my id is vikas13singla@gmail.com

 

Cryptography and Network Security 4th edition

Started by androgeek

Replies: 0
Views: 1168
Last post February 16, 2012, 05:22:02 pm
by androgeek
hack attacks testing

Started by ab2757

Replies: 3
Views: 1488
Last post May 29, 2010, 06:03:06 pm
by gmax9953
Have a Blackberry.?? Hack it..!!

Started by RzR1911

Replies: 4
Views: 2111
Last post January 26, 2012, 09:05:50 pm
by RzR1911
Sitemap 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49