AKON FREEDOM-BEAUTIFUL

Wednesday, April 1, 2009

-: White Papers :-


-: White Papers :-


-: White Papers :-


File Size Description
rc4-misuse.pdf 142.7 KB The Misuse of RC4 in Microsoft Word and Excel
802.11_attacks.pdf 701.7 KB 802.11 Attacks
ActiveX_active_expl.pdf 172.5 KB ActiveX - Active Exploitation
address-spoof.txt 15.2 KB Address Bar Spoofing Attacks Against IE 6
Address_Resolution.txt 17.8 KB Understanding Address Resolution Protocol Attacks
adv-buff-overflow.txt 58.8 KB Advanced Buffer Overflow Exploits
Adv-Shell-Tech.txt 7.4 KB Advanced Shellcoding Techniques
Advanced_SQL_Injection.pdf 291.0 KB Advanced SQL Injection In SQL Server Applications
afs.ps 53.6 KB Highjacking AFS
brute_force_analysis.txt 21.9 KB Analysis of Brute Force & Dictionary Attacks
Anatomy_of_Malware.pdf 47.3 KB Anatomy of a Malware
anomaly_rules_def.pdf 21.2 KB Using Snort as an anomaly based IDS
AnonMax.txt 10.0 KB How to maintain your anonymity on the web
appOSfingerprint.txt 11.7 KB Advanced application-level OS fingerprinting
aspmail-spoof.pdf 100.4 KB ASP CDONTS.NEWMAIL object E-mail Spoofing
Oracle_PL_SQL_Injection.pdf 439.4 KB Assault on Oracle PL SQL Injection
xss-attack-defense.txt 17.8 KB Cross Site Scripting - Attack and Defense guide
banking-flaws.pdf 305.0 KB Internet Banking Flaws In India
beginners.txt 24.5 KB Beginners guide to UNIX Hacking
Biologger.pdf 697.5 KB Biologger - A Biometric Keylogger
biosdefault.txt 503.0 B Default BIOS passwords
Blind_MySQL_Injection.pdf 306.3 KB Blind MySQL Injection
cryptography_basics.pdf 84.5 KB Basics of Cryptography
browserhack.txt 5.9 KB Hacking from your Web Browser
bsdkern.htm 143.5 KB Attacking FreeBSD with Kernel Modules
Buffer_Overflow.txt 14.0 KB Buffer Overflow Tutorial
Bypassing_NAC.pdf 868.9 KB Bypassing network access control (NAC) systems
clickjack-xss.txt 10.2 KB The Clickjacking Meets XSS: A State Of Art
Spyware_Intro.pdf 30.9 KB Introduction to Spyware
defaultpasswords.txt 4.8 KB Default Passwords for network switches and devices
dns-writeup.txt 10.5 KB DNS cache poisoning then and now
dsniff_netmon.txt 35.0 KB Network Monitoring with Dsniff
email_and_telnet.txt 4.2 KB Sending Emails via SMTP and Telnet
Erasing_Logs.txt 2.6 KB Erasing Your Presence From System Logs
ErrSQL_Inj.pdf 11.0 KB Error based SQL Injection
format_string_exp.txt 61.3 KB Exploiting Format String Vulnerabilities
faqar.txt 10.6 KB Remailers FAQs
ffp.pdf 169.2 KB Fuzzy Fingerprinting
firewall-stego.txt 3.9 KB Bypassing firewalls through protocol stenography
FirewallsFAQ.txt 72.6 KB Firewalls FAQs
advanced_xss.txt 24 KB Advanced Cross-Site-Scripting
vista_dll_injection.pdf 296 KB Windows Vista DLL Injection
IDS_Agents.pdf 96.8 KB IDS Using Security Agents
whid_2008.pdf 624 KB Web Hacking Incidents Database 2008
expl_buff_ovfl.pdf 72.6 KB Exploiting Buffer Overflows
File Size Description
IIS_Exploitation.txt 27.8 KB Guide to IIS Exploitation
finger.txt 8.9 KB Finger a user via telnet
hacker-howto.html 28.4 KB How To Become A Hacker
hackers-rfc.txt 10.6 KB The Hacker's RFC
hackfaq.zip 98.9 KB The Hack FAQ
hackkit-2.0b.txt 524.5 KB Hacking Kit v2.0
hackpage.txt 9.9 KB Hacking Webpages The Ultimate Guide
hackpw.txt 7.6 KB How to crack a unix password file
HostFingerprinting.pdf 45.6 KB Host Fingerprinting and Firewalking With hping
Honeywalldetection.pdf 190.5 KB How to detect Honeypots using hping
host-detection.doc 142.5 KB Advanced Host Detection Techniques
Bypass_BIOS.txt 9.0 KB How to Bypass BIOS Passwords
find-ftps.txt 588.0 B How To Find Ftp's The Easy Way
modify_exe.txt 2.5 KB How to modify exe files
httprint_paper.zip 576.6 KB Introduction to HTTP fingerprinting
UnicodeExpl.doc 164.0 KB Unicode exploitation with how it works
Info-Gathering.txt 26.2 KB The Info-Gathering Tutorial
int-arr-overfl.txt 25.1 KB Integer array overflows
intv2-8.pdf 87.0 KB A Network Intrusion Detector
ip-faq.htm 10.9 KB An IP address FAQ
tcp-attack.txt 45.3 KB Simple Active Attack Against TCP
ipspoofing_dem.zip 9.3 KB IP-spoofing Demystified
inetsec.txt 8.8 KB A Guide to Internet Security
ip-spoof.txt 79.9 KB A short overview of IP spoofing
anon-ftp-faq.htm 26.2 KB Anonymous FTP FAQ
pack_cap.htm 20.0 KB Network Packet Capture FAQ
javascript_fun.txt 8.5 KB how javascript can be used to bypass html forms
John_The_Ripper.pdf 94.6 KB John The Ripper -An Illustrated Guide
Learning_Perl.pdf 744.3 KB Learning Perl Writing Exploits
Info_Gather.pdf 1.1 MB Learn Information Gathering By Example
vuln_look.txt 4.8 KB Looking for Vulnerabilities
linux-kernel.txt 87.4 KB The Linux Kernel HOWTO
linux-shell-ref.pdf 33.7 KB LINUX SHELLCODING REFERENCE
firewalls-loc.txt 24.2 KB Locating Stateless Firewalls
mac_addr_clon.pdf 157.7 KB "Cloning MAC Addresses" Whitepaper
metasploit_expl.txt 11.4 KB Metasploit 3.0 Automated Exploitation
dns_spoof.htm 17.2 KB DNS Spoofing and Abuse
MiddleMan.pdf 23.4 KB Paper explaining man-in-the-middle attacks
linux_tips.txt 18.5 KB Misc Linux Tips & Tricks
secret_codes.txt 31.1 KB Mobile Secret Codes

0 comments:

Post a Comment

 

HACK Tip Blak Magik is Designed by productive dreams for smashing magazine Bloggerized by Ipiet Distributed by Fractal Enlightenment of Fractal Blog Network © 2008