05 August, 2012

Usefull Ebooks

rc4-misuse.pdf   The Misuse of RC4 in Microsoft Word and Excel
 802.11_attacks.pdf   802.11 Attacks
 ActiveX_active_expl.pdf   ActiveX - Active Exploitation
 address-spoof.txt   Address Bar Spoofing Attacks Against IE 6
 Address_Resolution.txt   Understanding Address Resolution Protocol Attacks
 adv-buff-overflow.txt   Advanced Buffer Overflow Exploits
 Adv-Shell-Tech.txt   Advanced Shellcoding Techniques
 Advanced_SQL_Injection.pdf   Advanced SQL Injection In SQL Server Applications
 afs.ps   Highjacking AFS
 brute_force_analysis.txt   Analysis of Brute Force & Dictionary Attacks
 Anatomy_of_Malware.pdf   Anatomy of a Malware
 anomaly_rules_def.pdf   Using Snort as an anomaly based IDS
 AnonMax.txt   How to maintain your anonymity on the web
 appOSfingerprint.txt   Advanced application-level OS fingerprinting
 aspmail-spoof.pdf   ASP CDONTS.NEWMAIL object E-mail Spoofing
 Oracle_PL_SQL_Injection.pdf   Assault on Oracle PL SQL Injection
 xss-attack-defense.txt   Cross Site Scripting - Attack and Defense guide
 banking-flaws.pdf   Internet Banking Flaws In India
 beginners.txt   Beginners guide to UNIX Hacking
 Biologger.pdf   Biologger - A Biometric Keylogger
 biosdefault.txt   Default BIOS passwords
 Blind_MySQL_Injection.pdf   Blind MySQL Injection
 cryptography_basics.pdf   Basics of Cryptography
 browserhack.txt   Hacking from your Web Browser
 bsdkern.htm   Attacking FreeBSD with Kernel Modules
 Buffer_Overflow.txt   Buffer Overflow Tutorial
 Bypassing_NAC.pdf   Bypassing network access control (NAC) systems
 clickjack-xss.txt   The Clickjacking Meets XSS: A State Of Art
 Spyware_Intro.pdf   Introduction to Spyware
 defaultpasswords.txt   Default Passwords for network switches and devices
 dns-writeup.txt   DNS cache poisoning then and now
 dsniff_netmon.txt   Network Monitoring with Dsniff
 email_and_telnet.txt   Sending Emails via SMTP and Telnet
 Erasing_Logs.txt   Erasing Your Presence From System Logs
 ErrSQL_Inj.pdf   Error based SQL Injection
 format_string_exp.txt   Exploiting Format String Vulnerabilities
 faqar.txt   Remailers FAQs
 ffp.pdf   Fuzzy Fingerprinting
 firewall-stego.txt   Bypassing firewalls through protocol stenography
 FirewallsFAQ.txt   Firewalls FAQs
 advanced_xss.txt   Advanced Cross-Site-Scripting
 vista_dll_injection.pdf   Windows Vista DLL Injection
 IDS_Agents.pdf   IDS Using Security Agents
 whid_2008.pdf   Web Hacking Incidents Database 2008
 expl_buff_ovfl.pdf   Exploiting Buffer Overflows
 IIS_Exploitation.txt   Guide to IIS Exploitation
 finger.txt   Finger a user via telnet
 hacker-howto.html   How To Become A Hacker
 hackers-rfc.txt   The Hacker's RFC
 hackfaq.zip   The Hack FAQ
  hackkit-2.0b.txt   Hacking Kit v2.0
 hackpage.txt   Hacking Webpages The Ultimate Guide
 hackpw.txt   How to crack a unix password file
 HostFingerprinting.pdf   Host Fingerprinting and Firewalking With hping
 Honeywalldetection.pdf   How to detect Honeypots using hping
 host-detection.doc   Advanced Host Detection Techniques
 Bypass_BIOS.txt   How to Bypass BIOS Passwords
 find-ftps.txt   How To Find Ftp's The Easy Way
 modify_exe.txt   How to modify exe files
 httprint_paper.zip   Introduction to HTTP fingerprinting
 UnicodeExpl.doc   Unicode exploitation with how it works
 Info-Gathering.txt   The Info-Gathering Tutorial
 int-arr-overfl.txt   Integer array overflows
 intv2-8.pdf   A Network Intrusion Detector
 ip-faq.htm   An IP address FAQ
 tcp-attack.txt   Simple Active Attack Against TCP
 ipspoofing_dem.zip   IP-spoofing Demystified
 inetsec.txt   A Guide to Internet Security
 ip-spoof.txt   A short overview of IP spoofing
 anon-ftp-faq.htm   Anonymous FTP FAQ
 pack_cap.htm   Network Packet Capture FAQ
 javascript_fun.txt   how javascript can be used to bypass html forms
 John_The_Ripper.pdf   John The Ripper -An Illustrated Guide
 Learning_Perl.pdf   Learning Perl Writing Exploits
 Info_Gather.pdf   Learn Information Gathering By Example
 vuln_look.txt   Looking for Vulnerabilities
 linux-kernel.txt  The Linux Kernel HOWTO
 linux-shell-ref.pdf   LINUX SHELLCODING REFERENCE
 firewalls-loc.txt   Locating Stateless Firewalls
 mac_addr_clon.pdf   "Cloning MAC Addresses" Whitepaper
 metasploit_expl.txt   Metasploit 3.0 Automated Exploitation
 dns_spoof.htm   DNS Spoofing and Abuse
 MiddleMan.pdf   Paper explaining man-in-the-middle attacks
 linux_tips.txt   Misc Linux Tips & Tricks

 secret_codes.txt   Mobile Secret Codes
 HackingFeeds.pdf   Feed Injection in Web 2.0  

No comments:

Post a Comment

Redirection in IIS

 This config will redirect every request to https://www.domain.com <configuration>     <system.webServer>         <rewrite>...