Jump to content

NeedSans

Members
  • Content Count

    5
  • Joined

  • Last visited

Community Reputation

261 Excellent

About NeedSans

  • Rank
    Junior Member

Recent Profile Visitors

43 profile views
  1. With Covid-19 previously live only classes will be available online with recordings. Awesome trainings like the ones in Recon.cx [Hidden Content] and Ringzer0 [Hidden Content] will be a awesome candidates for exchange or even group buys!
  2. I'm looking for the RED TEAM Operator: Privilege Escalation in Windows Course [Hidden Content]
  3. I'm looking for [Hidden Content] Thanks
  4. The link is dead, please reupload. Thanks
  5. Dissecting the Hack: The V3rb0t3n Network ISBN-13: 978-0128042786 ISBN-10: 0128042788 Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"―references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture. All new volume of Dissecting the Hack by Jayson Street, with technical edit by Brian Martin Uses actual hacking and security tools in its story – helps to familiarize readers with the many devices and their code Features cool new hacks and social engineering techniques, in real life context for ease of learning Amazon Download [hide][Hidden Content]]
  6. Looking for the Dissecting the Hack: The V3rb0t3n Network book, if you can please share. ISBN-13: 978-0128042786 ISBN-10: 0128042788 Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"―references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture. All new volume of Dissecting the Hack by Jayson Street, with technical edit by Brian Martin Uses actual hacking and security tools in its story – helps to familiarize readers with the many devices and their code Features cool new hacks and social engineering techniques, in real life context for ease of learning Amazon Download [hide][Hidden Content]]
  7. Can someone please share the Notes? Thanks
  8. If you can please share Modern Operating Systems, Fourth Edition Publication Date: March 20, 2014 | ISBN-10: 013359162X | ISBN-13: 978-0133591620 | Edition: 4 Thank you in advance.
  9. I would check: Hacking: The Art of Exploitation, 2nd Edition Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition Metasploit The Penetration Tester's Guide (For the Methodology and not for the Metasploit stuff only) Linux Command Line Windows Internals Books also check [Hidden Content] Regards
  10. I'm looking for the Code 2600 documentary. "Code 2600" documents the rise of the Information Technology Age as told through the events and people who helped to build and manipulate it. The film explores the impact of this new and growing connectivity on our human relations, personal privacy, and security as individuals and as a society. As we struggle to comprehend the wide-spanning socio-technical fallout caused by data collection and social networks, our modern culture is caught in an undercurrent of cyber-attacks, identity theft and privacy invasion. Both enlightening and disturbing, "Code 2600" is a provocative wake-up call for a society trapped in the grips of a global IT takeover. If you can share, it would be great. Regards.
  11. Hi, I'm looking for the CHFI v8 Courseware PDFs. This are the files I'm looking for: CHFI v8 Module 00.pdf CHFI v8 Module 01 Computer Forensics in Today’s World.pdf CHFI v8 Module 02 Computer Forensics Investigation Process.pdf CHFI v8 Module 03 Searching and Seizing Computers.pdf CHFI v8 Module 04 Digital Evidence.pdf CHFI v8 Module 05 First Responder Procedures.pdf CHFI v8 Module 06 Computer Forensics Lab.pdf CHFI v8 Module 07 Understanding Hard Disks and File Systems.pdf CHFI v8 Module 08 Windows Forensics.pdf CHFI v8 Module 09 Data Acquisition and Duplication.pdf CHFI v8 Module 10 Recovering Deleted Files and Deleted Partitions.pdf CHFI v8 Module 11 Forensics Investigation Using AccessData FTK.pdf CHFI v8 Module 12 Forensics Investigation Using EnCase.pdf CHFI v8 Module 13 Steganography and Image File Forensics.pdf CHFI v8 Module 14 Application Password Crackers.pdf CHFI v8 Module 15 Log Capturing and Event Correlation.pdf CHFI v8 Module 16 Network Forensics Investigating Logs and Investigating Network Traffic.pdf CHFI v8 Module 17 Investigating Wireless Attacks.pdf CHFI v8 Module 18 Investigating Web Attacks.pdf CHFI v8 Module 19 Tracking Emails and Investigating Email Crimes.pdf CHFI v8 Module 20 Mobile Forensics.pdf CHFI v8 Module 21 Investigative Reports.pdf CHFI v8 Module 22 Becoming an Expert Witness.pdf CHFI v8 References.pdf CHFIv8 Labs.zip If you can please share them. Thanks in advance.
  12. Hi, I'm looking for the Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management book. If you can, please share. Regards
  13. Hi, I'm looking for the English version of Understanding UNIX/LINUX Programming: A Guide to Theory and Practice. If you can please share. Thanks is advanced. Regards
  14. Still can you please share, even if you only have the slides? They are still useful as guidelines. Regards
×
×
  • Create New...