Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

3 Neutral

About shree420

  • Rank
    Junior Member

Recent Profile Visitors

56 profile views
  1. Certfirends I am Looking for sans 542 virtualbox/ vmware image for study I would be really thankfull if some one could share that
  2. "Web Application Security, A Beginner's Guide" Bryan Sullivan, Vincent Liu, 2012 | ISBN-10: 0071776168 | PDF | 352 pages | 60 MB "Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks. This practical resource includes chapters on authentication, authorization, and session management, along with browser, database, and file security--all supported by true stories from industry. You'll also get best practices for vulnerability detection and secure development, as well as a chapter that covers essential security fundamentals. This book's templates, checklists, and examples are designed to help you get started right away." [Hidden Content]
  3. Infosec Institute: Advanced ethical hacking Infosec Institute: Advanced ethical hacking English | h264, yuv420p, 720x480, 30.00 fps | aac, 44100 Hz, stereo | 1.24 GB Genre: Video Training Modern networks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear --- but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary? InfoSec Institute’s Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. You take this knowledge back to your organization and can then formulate a way to defend against these sophisticated attacks. In this hands-on training class, you will learn how to: Leverage 0day (private unreleased exploits) attacks as part of the “Advanced Persistent Threat” Run sophisticated attacks against client side applications Use fuzzers and dynamic analysis to attack custom and COTS apps Reverse engineer binaries to find new vulnerabilities never discovered before Exploit secured web applications Run chained exploits to pivot from multiple exploitable systems Attack and defeat VPNs, IDS/IPS and other security technologies More: [Hidden Content] [Hidden Content]
  4. sanskrut is most next speaking language in the world and also most ancient then any other languages India Rocks
  5. While browsing website i am facing error in sql ----- on pages many times i have seen these mai i know the reason
  6. Which course do you suggest is best ceh or sans 504 560
  7. i am for banglore india
  8. shree420


    removing DRM is not so easy buddy can you help me with its source so i can check if possible
  9. shree420


    Drm protection is not so easy to break but you can try that
  • Create New...