Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 28, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 708
Members: 0
Total: 708
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Suggestions -> some links
Post new topic  Reply to topic View previous topic :: View next topic 
some links
PostPosted: Fri May 23, 2008 4:15 pm Reply with quote
Snoop1990
Advanced user
Advanced user
 
Joined: May 22, 2008
Posts: 65




Hey,
I am quite new in security business, and I guess you know some more sides that explain how hackers work, so I can prevent myself and also others from being hacked. I would be very pleased if you can give my some links to tutorials or pages where to search fir such things.

what I know so far is:
http://www.ethicalhacker.net/
http://www.milw0rm.com/

and this forum Wink but I guess there are a lot more, so please tell me. Or even better create a section where users can present sides they found.

Regrades Snoop1990

_________________
http://snoop1990.co.cc

"I don't hack, I only surf the web to search for security holes ! To prevent my clients and me from being hacked !"
View user's profile Send private message Visit poster's website
PostPosted: Fri May 23, 2008 7:00 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




I suggest to buy books or download e-books. There are so many great stuff written in this days ...
For example look here:

http://www.amazon.com/s/ref=nb_ss_gw/105-6008571-7350801?url=search-alias%3Daps&field-keywords=hacking&x=0&y=0

And if you prefer warez or just want to try this knowledgeware before actual buying, then use p2p (emule, torrents) - hundreds of gigabytes pdf-files are waiting for readers.
Or search for web resources:

http://www.google.ee/search?hl=et&client=firefox-a&channel=s&rls=org.mozilla%3Aen-US%3Aofficial&hs=dXc&q=Hacking+pdf+intitle%3A%22Index+of%22&btnG=Otsi&lr=

example:

http://www.team509.com/download/docs/security/hacking/

Code:

[DIR] Parent Directory                                                                                                                                              -   
[   ] (MSPress) Writing Secure Code.pdf                                                                                                        05-Dec-2006 20:30  4.0M 
[   ] 0072260858.Mcgraw-Hill Osborne Media.19 Deadly Sins of Software Security (Security One-off).chm                                          20-Mar-2007 23:38  1.4M 
[   ] 0131482092.Prentice Hall Ptr.Solaris(TM) Internals- Solaris 10 and OpenSolaris Kernel Architecture (2nd Edition) (Solaris Series).chm    14-Mar-2007 17:53  8.6M 
[   ] 0201549794.Addison-Wesley Professional.The Design and Implementation of the 4.4 BSD Operating System (Unix and Open Systems Series.).pdf 14-Mar-2007 19:24   22M 
[   ] 1931769494.A-List Publishing.Hacker Web Exploitation Uncovered.chm                                                                       20-Feb-2007 00:37  555K 
[   ] 1931769508.A-List Publishing.Hacker Linux Uncovered.chm                                                                                  20-Feb-2007 00:39  4.5M 
[   ] A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm                                                                           30-May-2005 23:30  4.7M 
[   ] A_Buffer_Overflow_Study_-_Attacks_and_Defenses__2002_.pdf                                                                                20-Aug-2005 21:29  470K 
[   ] Addison.Wesley,.Advanced.Programming.in.the.UNIX.Environment.(2005),.2Ed.BBL.LotB.chm                                                    05-Dec-2006 20:22  3.2M 
[   ] Addison.Wesley,.Software.Security.Building.Security.In.(2006).BBL.chm                                                                    13-Nov-2006 15:09  3.8M 
[   ] Addison.Wesley.Advanced.Programming.In.The.Unix.Environment.(2005).2Ed.pdf                                                               05-Dec-2006 20:19   10M 
[   ] Addison.Wesley.Compilers.Principles.Techniques.and.Tools.2nd.Edition.Aug.2006.pdf                                                        09-Nov-2007 23:56   48M 
[   ] Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.chm                                                                   20-Aug-2005 21:32  1.6M 
[   ] Addison.Wesley.Pub.Exploiting.Software.How.to.Break.Code.eBook-kB.pdf                                                                    31-May-2005 16:08  7.6M 
[   ] Addison Wesley - Hack I.T. Security Through Penetration Testing.chm                                                                      31-May-2005 16:46  4.6M 
[   ] Addison Wesley - Secure Programming with Static Analysis - 2007.pdf                                                                      25-Sep-2007 12:36  4.7M 
[   ] Art.of.Software.Security.Assessment.chm                                                                                                  13-Nov-2006 15:18  4.5M 
[   ] Auerbach.Publications,.The.Security.Risk.Assessment.Handbook.(2005).DDU.LotB.pdf                                                         05-Dec-2006 20:03  6.4M 
[   ] C++ and Assembly Language Reference.pdf                                                                                                  25-Sep-2007 12:05  1.2M 
[   ] Cisco.Press.Penetration.Testing.and.Network.Defense.Nov.2005.FIXED.eBook-DDU.chm                                                         08-Nov-2005 19:54   15M 
[   ] Code_Complete.A_Practical_Handbook_of_Software_Construction.2ndEditionDraft.McConnell.pdf                                                05-Dec-2006 19:57  5.1M 
[   ] Computer Security Art And Science.chm                                                                                                    05-Dec-2006 20:32  2.6M 
[   ] Computer_Vulnerability_March_9_2000_.pdf                                                                                                 20-Aug-2005 21:49  390K 
[   ] Ebook - Windows - Programming .NET Security.chm                                                                                          05-Dec-2006 19:51  2.7M 
[   ] John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.pdf                     31-May-2005 16:20  3.1M 
[   ] McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf                                                                      31-May-2005 15:42  3.4M 
[   ] McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf                                                                  31-May-2005 15:57  4.8M 
[   ] McGraw.Hill.Osborne.Media.XML.Security.eBook-TLFeBOOK.pdf                                                                                15-Jul-2005 17:47  3.8M 
[   ] Microsoft.Press.Hunting.Security.Bugs.ebook-Spy.chm                                                                                      08-Feb-2007 15:29   22M 
[   ] Microsoft.Press.Improving.Web.Application.Security.Threats.and.Countermeasures.eBook-LiB.chm                                             05-Dec-2006 19:48  6.1M 
[   ] Microsoft.Press.The.Security.Development.Lifecycle.Jun.2006.chm                                                                          20-Feb-2007 00:41  3.3M 
[   ] OReilly - Oracle.Security.OReilly.1998.chm                                                                                               31-May-2005 16:48  1.3M 
[   ] Oreilly.Security.Warrior.eBook-DDU.chm                                                                                                   31-May-2005 00:36  4.5M 
[   ] Prentice.Hall.PTR.Internet.Denial.of.Service.Attack.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm                                        15-Jul-2005 17:46  2.1M 
[   ] Sams.Inside.Network.Security.Assessment.Guarding.Your.IT.Infrastructure.Nov.2005.chm                                                     05-Dec-2006 19:39  1.9M 
[   ] Sams.Maximum.Security.Fourth.Edition.chm                                                                                                 30-May-2005 23:32  2.9M 
[   ] Secure Coding Principles and Practices.pdf                                                                                               05-Dec-2006 19:37  2.1M 
[   ] Software Vulnerability Analysis.pdf                                                                                                      05-Dec-2006 19:35  2.8M 
[   ] Strengthening Network Security With Web-Based Vulnerability Assessment.pdf                                                               05-Dec-2006 19:33  243K 
[   ] THE SHELLCODER'S HANDBOOK.pdf                                                                                                            02-Jun-2005 17:13  8.2M 
[   ] The.Art.of.Exploitation-FOS.chm                                                                                                          31-May-2005 16:26  1.4M 
[   ] The.Ethical.Hack.A.Framework.for.Business.Value.Penetration.Testing.eBook-EEn.pdf                                                        08-Nov-2005 19:11  3.9M 
[   ] The.International.Handbook.of.Computer.Security.eBook-EEn.pdf                                                                            31-May-2005 17:06  1.8M 
[   ] The.Oracle.Hackers.Handbook.Jan.2007.eBook-BBL.chm                                                                                       09-Jun-2007 13:10  484K 
[   ] The Art Of Computer Virus Research And Defense.chm                                                                                       08-Feb-2007 15:33  6.7M 
[   ] The Database Hacker's Handbook - Defending Database Servers.chm                                                                          29-May-2007 17:39  1.1M 
[   ] The_Art_of_Deception_by_Kevin_Mitnick.pdf                                                                                                20-Aug-2005 21:59  5.2M 
[   ] The_Art_of_Intrusion.pdf                                                                                                                 20-Aug-2005 21:48  3.1M 
[   ] The_ Assembly_ Programming_ Master_ Book.chm                                                                                             18-Dec-2006 22:37   10M 
[   ] Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.rar                                                 30-Aug-2005 18:38  2.1M 
[IMG] Wiley - How Debuggers Work.djvu                                                                                                          05-Dec-2006 19:28  2.6M 
[   ] Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf                                                                                     02-Aug-2005 17:08  9.3M 
[   ] Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007(2).rar                                                                               12-Oct-2007 12:36  3.0M 
[   ] [eBook - Eng] Penetration Tester's - Open Source Toolkit.pdf                                                                             25-Sep-2007 15:54   34M 
[   ] [eBook] Addison Wesley - Enterprise Java 2 Security Building Secure and Robust J2EE Applications (2004).chm                              05-Dec-2006 20:26  3.9M 
[   ] data-compression-the-complete-reference.9781846286025.27230.pdf                                                                          25-Sep-2007 14:58  8.8M 
[   ] ebook - Designing and Writing Secure Application Code.pdf                                                                                05-Dec-2006 19:52  688K 
[   ] network-protocols-handbook.9780974094526.27099.pdf                                                                                       07-Jun-2007 10:18  5.0M 
[   ] programing - Windows.System.Programming.Third.Edition.chm                                                                                05-Dec-2006 19:41  2.3M 
[   ] tlf-spusd.pdf                                                                                                                            13-Jun-2005 09:55  3.8M 
[   ] windowskernel.rar       


And test stuff on your home PC!! Use VMware! try various *nix and windows versions, try metasploit and try to exploit localhost!
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Fri May 23, 2008 7:03 pm Reply with quote
Snoop1990
Advanced user
Advanced user
 
Joined: May 22, 2008
Posts: 65




thank you very much, now I have something to read before going to bed Very Happy
Regrades Snoop1990
View user's profile Send private message Visit poster's website
PostPosted: Sun May 25, 2008 8:03 am Reply with quote
Snoop1990
Advanced user
Advanced user
 
Joined: May 22, 2008
Posts: 65




I also found a nice collection:

Here !

_________________
http://snoop1990.co.cc

"I don't hack, I only surf the web to search for security holes ! To prevent my clients and me from being hacked !"
View user's profile Send private message Visit poster's website
some links
  www.waraxe.us Forum Index -> Suggestions
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.132 Seconds