Monday, April 23, 2012

DVD Tutorial BackTrack, Metasploit, Wireless Hacking (2 DVD)

DVD Tutorial BackTrack, Metasploit, Wireless Hacking (2 DVD)

Rp 100.000

Kabar gembira untuk anda yang ingin lebih dalam mempelajari BackTrack,berikut adalah dvd berisi semua tutorial yang saya pastikan sangat dibutuhkan oleh sahabat-sahabat yang sedang mulai untuk mempelajari backtrack, metasploit, wireless hacking, dan masih banyak lagi. Semua tutorial berisi informasi yang up to date dan tehnik-tehnik dari dasar hingga tingkat yang lebih Experts. Berikut daftar tutorial yang akan sahabat dapatkan :



1. Metasploit Framework Expert

Video yang membahas tentang Metasploit Framework secara mendalam.

- Exploitation Basics
- Why Metasploit?
- Meterpreter Basics
- Armitage
- Framework Organization
- Post Exploitation Kung-Fu
- Post Exploitation Privilege Escalation
- Killing AV and Disabling Firewall
- Stdapi and Priv Extensions
- Token Stealing and Incognito
- Espia and Sniffer Extensions in Post Exploitation
- Post Exploitation Backdoors
- Pivoting after Post Exploitation
- Port Forwarding as part of Post Exploitation
- Client Side Exploits
- Backdoors and Rootkits in Post Exploitation
- Exploit Research with Metasploit
- Railgun Basics
- Railgun Adding Functions
- Railgun Adding New DLLs
- Railgun Adding New DLLs on Windows 7
- Resource Scripts
- Database Support
- Using Plugins
- Meterpreter API Basics
- Meterpreter Scripting Migrate Clone
- Meterpreter Scripting Process Name Search

2. Wireless LAN Security and Penetration Testing

Video yang membahas tentang dasar-dasar Wireless sampai dengan penetrasi menggunakan tehnik sniffing, injeksi, cracking, dan masih banyak lagi tehnik serangan terhadap wireless.

- Getting Started
- Bands, Channels and Sniffing
- Pwning Beacon Frames
- Dissecting AP-Client Connections
- Dissecting WLAN Headers
- Pwning Hidden SSIDs
- Laughing Off MAC Filters
- Hacking WLAN Authentication
- Hotspot Attacks
- Hacking Isolated Clients
- Alfa Card Kung-Fu
- Man-in-the-Middle Attack
- SSL MITM Attack Over Wireless
- SSL MITM Attack Over Wireless Demo
- SSL Man-in-the-Middle Attacks
- Custom Wireless Regulation Database
- WEP In-Depth
- WEP Cracking
- Caffe Latte Attack Basics
- Caffe Latte Attack Demo
- Caffe Latte Attack on the iPhone
- KoreK's ChopChop Attack
- Fragmentation and Hirte Attack
- Understanding WPA/WPA2
- Wi-Fi Challenge 1 (Level Easy) : There is no Patch for Stupidity!
- Wi-Fi Challenge 1 Solution : There is no Patch for Stupidity!
- Wi-Fi Challenge 2 (Level - Intermediate) : Know Thy Packets
- Wi-Fi Challenge 2 Solution : Know Thy Packets
- Wi-Fi Challenge 3 (Level Advanced): Never Underestimate your Enemy!
- WPA-PSK
- WPA-PSK Cracking
- WPA2-PSK Cracking
- Speeding up WPA/WPA2 PSK Cracking
- Never Underestimate Your Enemy!
- Mood Swings of a Wandering Client
- Cracking WPA/WPA2-PSK with just the Client
- Questions and Answers
- Wpa_Supplicant
- Crack WPA-Personal with only AP
- Setting up FreeRadius-WPE on Backtrack
- EAP-MD5 Basics and Demo
- Cracking EAP-MD5 with Eapmd5pass and Eapmd5crack
- EAP Types and PEAP Demo
- Cracking PEAP
- Cracking PEAP in a Windows Network
- Cracking EAP-TTLS
- Insecurity in 3rd Party Wi-Fi Utilities
- Conclusion and the Road Ahead
- Windows Wireless Kung-Fu (SWSE Addendum 1)
- Creating Wireless Backdoors (SWSE Addendum 2)
- Malware, Metasploit and the Hosted Network (SWSE Addendum 3)
- SecurityTube Certified Wi-Fi Security Expert (SWSE) Student Portal Launch

3. Exploit Research

Video yang membahas tentang bagaimana cara membuat kode-kode exploitasi dari memanfaatkan kelemahan pada aplikasi.

- Topic Introduction
- Memcpy Buffer Overflow
- Strcpy Buffer Overflow
- Minishare Buffer Overflow
- FreeSSHD Buffer Overflow
- SEH Basics
- Overwrite SEH
- Exploiting SEH
- Guest Lecture by Andrew King
- Binary Diffing Microsoft Patches

4. Metasploit Tutorial

Video yang membahas tentang menggunakan Metasploit dari awal,sampai dengan menulis skrip dan modul meterpreter.

- Exploitation Basics and need for Metasploit
- Getting Started with Metasploit
- Meterpreter Basics and using Stdapi
- Meterpreter Extensions Stdapi and Priv
- Understanding Windows Tokens and Meterpreter Incognito
- Espia and Sniffer Extensions with Meterpreter Scripts
- Metasploit Database Integration and Automating Exploitation
- Post Exploitation Kung Fu
- Post Exploitation Privilege Escalation
- Post Exploitation Log Deletion and AV Killing
- Post Exploitation and Stealing Data
- Post Exploitation Backdoors and Rootkits
- Post Exploitation Pivoting and Port Forwarding
- Backdooring Executables
- Auxiliary Modules
- Pass the Hash Attack
- Scenario Based Hacking

5. Windows Assembly Language for Hackers

Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi windows.

- Processor Modes
- Protected Mode Assembly
- Win32 ASM using MASM32
- MASM Data Types
- Procedures
- Macros
- Program Control using JMP
- Decision Directives
- Loops

6. Assembly Language for Linux

Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi Linux.

- System Organization
- Virtual Memory Organization
- GDB Usage Primer
- Hello World
- Data Types
- Moving Data
- Working with Strings
- Unconditional Branching
- Conditional Branching
- Functions
- Functions Stack


7. Buffer Overflow Exploitation for Linux

Video yang membahas tentang cara dasar buffer overflows dan melakukan exploitasi terhadap sistem operasi Linux.

- Smashing the Stack
- Writing Exit Shellcode
- Executing Shellcode
- Disassembling Execve
- Shellcode for Execve
- Exploiting a Program
- Exploiting a Program Demo
- Return to Libc Theory
- Return to Libc Demo


8. Format String Vulnerabilities

Video yang membahas tentang cara memanfaatkan kelemahan dalam format penulisan kode program dan mengexploitasinya.

- The Basics
- Understanding Format Functions
- Crashing the Program
- Viewing the Stack


9. Scenario Based Hacking and Penetration Testing

Video yang membahas tentang skenario dari tehnik hacking.

- No Patches, No AV, Direct Access
- No Patches, No AV, Behind NAT
- OS Patched, No AV, Behind NAT
- OS and Software Patched, No AV, Behind NAT

10. Router Hacking Series

Video yang membahas tentang cara melakukan hacking kepada router.

- The Basics
- Service Enumeration, Fingerprinting and Default Accounts
- Bruteforcing and Dictionary Attacks with Hydra
- SNMP Attacks using SNMPCheck
- SNMP Attacks using SNMPEnum
- Dictionary Attack using Metasploit on SNMP


Cukup dengan Rp. 100.000 [ belum ongkir ] anda bisa mendapatkan semua video tutorial diatas,:)

Pesan Detail

Post a Comment