Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

601 Excellent

About cls111

  • Rank
    Junior Member

Recent Profile Visitors

151 profile views
  1. hi everyone, the link is down can somebody share the "reversinghero" learning reverse engineering, please and thanks in advance
  2. try these direct links [hide][Hidden Content] [Hidden Content] [Hidden Content]]
  3. I think you are using firefox, use another one or update it
  4. try this links [hide]uploadgig_com: [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] nitroflare_com: [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  5. SEC550: Active Defense, Offensive Countermeasures and Cyber Deception is based on the Active Defense Harbinger Distribution live Linux environment funded by the Defense Advanced Research Projects Agency (DARPA). This virtual machine is built from the ground up for defenders to quickly implement Active Defenses in their environments. The course is very heavy with hands-on activities - we won't just talk about Active Defenses, we will work through labs that will enable you to quickly and easily implement what you learn in your own working environment. [hide] [Hidden Content]]
  6. I found some fast links for "Mcafee Institute an exploration into hacking 101 " , Mcafee Institute How To Work With Informants In Retail Loss Prevention, and Mcafee Institute Learn How To Conduct Digital amp Mobile Forensics. It's waste!!! but take a look!!! [hide][Hidden Content] [Hidden Content] [Hidden Content]] Make use hide tags while posting download links. Read board rules. Usage: [ hide ] link [ /hide ] (without spaces)
  7. don't waste your time try exploit dev from pentester academy or buffer overflow module from offensive security p.w.k
  8. there is no pass needed for the pdf just open it with acrobat reader
  9. This class will cover a wide variety of the publicly available exploit tools and how they can be used specifically against a Cisco infrastructure. A majority of the class time will be spent doing practical labs. Therefore, a certain level of Cisco expertise will be expected. The training will also cover the possible defenses against these attacks. Students will be using 2651 routers, and 1900 switches for their labs. The lab core will consist of 3600s, 2900s, 2500s and servers of various flavors. Students will be required to bring their own laptops to (with appropriate caution) attach to the labs. This class will focus on Cisco Router and Switch vulnerabilities and will not be covering PIX firewalls, VPN concentrators, or IDS tools. Here is a list of some of the topics that will be covered: Ways of Password Nabbing Sniffing traffic on a switch VLAN Hopping and 802.1Q issues Root Bridge Takeovers Local and remote HSRP attacks Routing manipulation/injection with RIP, IGRP, EIGRP, OSPF BGP attacks SNMP Exploits Tunneling attacks DoS and DDoS issues and preventive methods [Hidden Content]
  10. Table of Contents Buffer Overflow Vulnerability Lab Return-to-libc Attack lab Format String Vulnerability Race Condition Vulnerability Lab Chroot Sandbox Vulnerability Lab Set-UID Program Vulnerability Lab Web Security Web Same-Origin-Policy Exploration Lab Cross-Site Request Forgery Attack Lab Cross-Site Scripting Attack Lab Clickjacking Attack Lab Network Security TCP/IP Attack Lab DNS Pharming Attack Lab Packet Sniffing & Spoofing Lab Linux Firewall Lab Crypto Crypto Lab – Secret-Key Encryption Crypto Lab – One-Way Hash Function [Hidden Content]
  • Create New...