Monday, September 8, 2008

Hacking E-books and Videos:

Hacking E-books and Videos:

1> Collection of Cracking Tutorials by Lena (A must for newbies)

Olly + assembler + patching a basic reverseme

Keyfiling the reverseme + assembler

Basic nag removal + header problems

Basic + aesthetic patching

Comparing on changes in cond jumps, animate over/in, breakpoints

"The plain stupid patching method", searching for textstrings

Intermediate level patching, Kanal in PEiD

Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor

Explaining the Visual Basic concept, introduction to SmartCheck and configuration

Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick

Intermediate patching using Olly's "pane window"

Guiding a program by multiple patching.

The use of API's in software, avoiding doublechecking tricks

More difficult schemes and an introduction to inline patching

How to study behaviour in the code, continued inlining using a pointer

Reversing using resources

Insights and practice in basic (self)keygenning

Diversion code, encryption/decryption, selfmodifying code and polymorphism

Debugger detected and anti-anti-techniques

Packers and protectors : an introduction

Imports rebuilding

API Redirection

Stolen bytes

Patching at runtime using loaders from lena151 original

Continued patching at runtime & unpacking armadillo standard protection

Machine specific loaders, unpacking & debugging armadillo

tElock + advanced patching

Bypassing & killing server checks

Killing & inlining a more difficult server check

SFX, Run Trace & more advanced string searching

Delphi in Olly & DeDe

Author tricks, HIEW & approaches in inline patching

The FPU, integrity checks & loader versus patcher

Reversing techniques in packed software & a S&R loader for ASProtect

Inlining inside polymorphic code

Keygenning

In-depth unpacking & anti-anti-debugging a combination packer / protector

Unpacking continued & debugger detection by DLL's and TLS

Inlining a blowfish scheme in a packed & CRC protected dll + unpacking Asprotect SKE 2.2

Obfuscation and algorithm hiding

Owner : Made by Lena, uploaded by FellowHacker

CODE

http://rapidshare.com/files/75998360/Lena_sTutsUppedByFH.part1.rar

http://rapidshare.com/files/76000022/Lena_sTutsUppedByFH.part2.rar


Online Mirror

CODE

http://mathijs.info/inc/stuff.php?stuff=cracktut

Password for the rar files :

QUOTE

Password : FellowHacker@Forum.astalavista.ms



2> huge hacking tutorials 2008

CODE

http://rapidshare.com/files/131156742/1000HackerTutorials2008-williwacker-www.softarchive.net.rar

mirror

CODE

http://depositfiles.com/en/files/6678884



3> Hack Attacks Testing: How to Conduct Your Own Security Audit

Hack Attacks Testing: How to Conduct Your Own Security Audit (Paperback) [ebook][PDF]

Product Description

Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.

Download:

CODE

http://rapidshare.com/files/129556097/14.07.2008_bigteam.c.la_Hack_Attacks_Testing.rar





4> Google Hacks

Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and powerful methods for using the advanced search interface and the new Google API, including how to build and modify scripts that can become custom business applications based on Google. Google Hacks contains 100 tips, tricks and scripts that you can use to become instantly more effective in your research. Each hack can be read in just a few minutes, but can save hours of searching for the right answers.

Rapidshare download Link:

CODE

http://rapidshare.com/files/128910764/Google_Hacks_-_100_Industrial-Strength_Tips___Tools.rar



5> Harry Potter Collection, Harry Potter is a series of seven fantasy novels by English author J.

CODE

http://rapidshare.com/files/21874543/J._20K._20Rowling_20-_20Harry_20Potter_20and_20the_20Sorcerer_27s_20Stone.pdf


http://rapidshare.com/files/35979594/Book_2_-_Harry_Potter_and_the_Chamber_of_Secrets.pdf


http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf


http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf


http://rapidshare.com/files/35979950/Book_3_-_Harry_Potter_and_the_Prisoner_of_Azkaban.pdf


http://rapidshare.com/files/21874252/Rowling__20J._20K._20-_206_20-_20Harry_20Potter_20and_20The_20Half-Blood_20Prince.pdf




6> REVERSE ENGINEERING

Anybody need an e-book on reverse engineering here it is:

CODE

http://rs44.rapidshare.com/files/10724737/Reversing-Secrets.of.Reverse.Engineering.with.SOURCE-0764574817.rar



7> 200 Hacking Tutorials must see!!

CODE

http://rapidshare.com/files/58388700/200_Hacking_Tutorials.rar

Password : WwW.TheBianryZone.Com



8> Programming books

############### C++ #################

Name: C++ How to Program, Fifth Edition (2005)

Description: You won't find a more detailed book filled with examples about C++.

http://rapidshare.com/files/113266277/C___...dition.rar



Name: Ivor Horton's Beginning Visual C++ 2005 (2006)

Description: This e-book is very detailed and goes into quite the depth about C++, aimed for experienced users. (Has about 50 pages about GUI)

http://rapidshare.com/files/113269931/Ivor...C___2005__2006_ .pdf



############### C# #################

Name: Visual C Sharp 2005 - How To Program, 2nd Edition (2005)

Description: You won't find a more detailed book filled with examples about C#.

http://rapidshare.com/files/113269031/Visu...gram__2nd_Editi on.rar



############### Java #################

Name: Killer Game Programming in Java (2005):

Description: Makes learning Java programming fun! (It's great for beginners)

http://rapidshare.com/files/113231480/Kill...__2005_.chm



Name: Java - How To Program 6th Edition (2004).rar

Description: You won't find a more detailed book filled with examples about Java.

http://rapidshare.com/files/113234791/Java...tion__2004_.rar



############### PHP #################

Name: Wiley - PHP5 and MySQL Bible (2004)

Description: A lot of detailed information about PHP & MySQL.

http://rapidshare.com/files/113274213/Wile...ible__2004_.pdf



Name: Wiley - PHP & MySQL for Dummies (2004)

Description: Good book for beginners on PHP & MySQL.

http://rapidshare.com/files/113276383/PHP_...Wiley_2004_.pdf



9> hacking techniques

Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a computer system can be successfully attacked and compromised. This book shows how an attack is conceptualized, formulated and performed. With the VMware® Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. It also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. This text provides valuable information for constructing a system to defend against attacks.

Product Details

* Hardcover: 737 pages

* Publisher: AUERBACH; Har/Cdr edition (November 2, 2006)

* Language: English

* ISBN-10: 0849370574

* ISBN-13: 978-0849370571

Download: 69.9 MB

CODE

http://rapidshare.com/files/27633312/Practical_Hacking_Techniques_and_Countermeasures.rar



10>hacking exposed

CODE

http://rapidshare.com/files/27443800/McGraw-Hill_-_HaCkInG_ExPoSeD_Web_Applications.zip



11>reventing web attack

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won’t protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you’ll need to do that: step-by-step guidance, hands-on examples, and tested configuration files.

Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and mo

CODE

http://rapidshare.com/files/31906608/PrevWebAttackz.rar



12>Book on Yahoo Hacks...

Yahoo! Hacks: shows you how to use, expand, personalize, and tweak Yahoo! in ways you never dreamed possible. You will learn how to:

* Fine-tune search queries with keyword shortcuts and advanced syntax

* Manage and customize Yahoo! Mail, using it as your universal email client to access all your other accounts

* Explore your social networks with Yahoo! 360, blogging your life, keeping up with friends, and making new contacts

* Store, sort, blog, feed, track, and otherwise share photos with Flickr and RSS

* Make My Yahoo! your Yahoo!, and personalize Yahoo!’s many properties

* Roll your own Yahoo! applications with Yahoo! new Web Services API and Perl, PHP, Java, Python, Ruby, or the programming language of your choice

* Visualize search results and topics, mash up images from around the Web, and remix other web content

* List (or hide) your site with Yahoo!, and integrate Yahoo! Groups, Messenger, contextual search (Y!Q), or other Yahoo! features


CODE

http://rapidshare.com/files/97760770/OReilly__Yahoo_Hacks.rar



13>E-Books on various topics

http://rapidshare.com/users/LT84AQ

http://rapidshare.com/users/JI4BSD




14>A Buffer Overflow Study - Attacks and Defenses (2002).pdf



15>Addison Wesley - 2004 - Wi-Foo The Secrets of Wireless Hacking.chm


16>Advanced SQL Injection In SQL Server Applications.pdf



17>Amazon Hacks - (O'reilly-August 2003).chm




18>Anti-Hacker Tool Kit, Second Edition.chm


19>Bypassing Firewalls Tools and Techniques.pdf



20>Certified Ethical Hacker Exam Prep.chm



21>Computer Vulnerability(March 9 2000).pdf





22>Crackproof Your Software(No Starch-2002).pdf



23>Credit Card Visa Hack(Cambridge Lab-2003).pdf



24>Cyber Terrorism - Political And Economic Implications.pdf


25> DDOS Attack Tools.pdf



26> Ethical Hacking & Countermeasures.pdf




27> Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004).chm




28> Firefox Hacks.chm



29> Firewalking - A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Accessing.pdf




30> Google A Hacker's Best Friend.pdf



31> Google Hacking for Penetration Tester (Syngress-2005).pdf





32> Google Hacking for Penetration Testers.pdf



33> Google Secrets - How To Get A Top 10Ranking.pdf



34>GoogleSpamguide.pdf




35>Guide To Using Google Discover Google's Buried Treasure.pdf




36>Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit.chm



37>Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf





38>Hack I.T. - Security Through Penetration Testing.chm



39>Hack IT Security Through Penetration Testing (Addison Wesley-2002).chm




40>Hack Proofing Linux.pdf



41>Hack Proofing Your Identity in the Information Age (Syngress-2002).pdf



42>Hack Proofing Your Network - Internet Tradecraft (Syngress-2000).pdf



43>Hacker Disassembling Uncovered (A List- 2003).chm



44>Hacker Disassembling Uncovered.chm



45>Hacker Web Exploitation Uncovered.chm




46>Hacker'sDelight.chm



47>Hacker's Desk Reference.pdf




48>Hackers Beware (NewRiders -2002).pdf



49>HackersBeware.pdf




50>Hackers Delight( Addison Wesley- 2003 ).chm



51>Hacking -TheArtofExploitation.chm




52>HackingExposedWebApplications.pdf



53>Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001).pdf




54>Hacking Exposed- Web Applications (MCGraw-Hill-2002).pdf



55>Hacking Exposed- Windows 2003 Chapter 5.pdf




56>Hacking Firefox - More Than 150 Hacks, Mods, and Customizations.pdf



57>Hacking GPS.pdf



58>Hacking Guide v3.1[www.netz.ru].pdf



59>Hacking Windows XP.pdf



60>Hacking Wireless Networks For Dummies.pdf



61>Hacking a Terror Network.pdf



62>Hacking for Dummies (John Wiley-2004).pdf



63>Hacking for Dummies-Access to Other Peoples Systems Made Simple.pdf



64>Hacking-The Art of Exploitation(No Starch-2003).chm



65>How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003).pdf





66>How To Build A Freebsd-Stable Firewall With Ipfilter.pdf



67>How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure.pdf



68>Introduction To Algorithms 2nd Edition Solutions (Instructors.Manual).pdf



69>Malware - Fighting Malicious Code (Prentice Hall-November 21 2003).chm




70>Maximum Security, 3rd Edition(Sams-April 2001).chm



71>Maximum Security_-A Hackers Guide to Protect Your Internet .chm




72>Methods of Hacking - Social Engineering.pdf



73>Network Security Tools (OReilly- Apr 2005).chm



74>PC Hacks(Oct 2004).chm


75>PDF Hack(Aug 2004).chm




76>Placing Backdoors Through Firewalls.pdf



77>Practical Study Remote Access (Cisco-December 22, 2003).chm




78>Reversing - Secrets of Reverse Engineering.pdf



79>Reversing Secrets of Reverse Engineering (Apr 2005).pdf




80>SQL Injection, Are Your Web Applications Vulnerable.pdf



81>Skype Hacks.chm




82>Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf



83>Spidering Hacks(O'Reilly- October 2003).chm





84>Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press © 2003 ).chm



85>Stealing the Network; How to Own the Box ( Syngress-2003).pdf




86>Switching to VoIP.chm



87>The Art of Deception by Kevin Mitnick.pdf





88>The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005).pdf



89>The Complete History of Hacking.pdf




90>The Database Hacker's Handbook - Defending Database Servers.chm



91>The Ethical Hack - A Framework for Business Value Penetration Testing.pdf




92>The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004).pdf



93>The Hacker Ethic.pdf





94>Tricks of the Internet Gurus (April 1999).pdf



95>Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001).pdf




96>Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002).chm


97>WebJacking.pdf




98>Website Secrets Unleash the Power of, Google, Amazon, eBay & more.pdf



99>Well Known Trojans and Their Ports.pdf



100>Wi-Foo - The Secrets of Wireless Hacking.chm



101>Windows Server Hack(O'Reilly - March 2004).chm



102>Windows XP Hacks (O'reilly- Auguest 2003).chm


103>Wireless Hacking - The Invisible Network.pdf


104>Wireless Hacks.chm

105> Telnet Basics:

http://www.esnips.com/doc/42eea4d6-0941-43b9-93e1-6ae99ef7d2a3/Telnet-hacking

106> Bypass Intenet Blocking:
http://www.esnips.com/doc/b0d10ace-b85e-44bb-8413-6de5f0646283/Bypass-Internet-blocking


url:http://sanjaypatel.weebly.com/hacking-e-books.html

No comments: