Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0seeders: 10
leechers: 2
Offensive Security - BackTrack to the Max Cracking the Perimeter V 1.0 (Size: 3.5 MB)
DescriptionCONTENTS The Web Application angle Cross Site Scripting Attacks – Scenario #1 Stealing Cookies Optimizing the attack Directory traversal – Scenario #2 Stealing MySQL Tables Using the password hash to login 0wning the Server The Backdoor angle Backdooring PE files under Windows Vista Peeking around the file Hijacking Execution Flow Super Trojan [T] Bypassing Antivirus Systems - More Olly games The Cave and the Stub AV, AV wherefore art thou AV? Advanced Exploitation Techniques MS07-017 – Dealing with Vista 2 byte overwrite Jumping to our shellcode Cracking the Egghunter The Egghunter The Shell The 0Day angle Windows TFTP Server – Case study #1 HP Openview NNM – Case study #2 Advanced ARP spoofing attacks Related Torrents
Sharing Widget |
All Comments