featured-content
Showing posts with label Tutors. Show all posts
Showing posts with label Tutors. Show all posts
Spyware Basics
What is spyware?
A spyware is a piece of malicious code or program installed in system to monitor activities of a person. A spyware is capable of logging key strokes, it can take screen shots and if there is active Internet connection then it can even mail logs to specified email-address or transfer logs to ftp server. Beyond just monitoring it can record your computing habits including which site you browse more, at what time you prefer to be on system or amount of time you spend on computer.
A spyware can be used to track all information about your social-networking habits and IRC(Internet Relay Chat) Clients including all major and minor chat clients example: Google Talk, Rediff Messenger, Yahoo Messenger, Microsoft Live Chat, absolutely every thing related to IRC client is exposed to spyware. On the basis of its commercial use and monitoring capabilities spywares are classified as follows,
On Basis Of Commercial Use: Domestic Spywares and Commercial Spywares
On Basis Of Monitoring: Key Loggers, E-mail Loggers/Chat Recorders, Screen Recorders.
Domestic Spywares: This kind of spywares are purchased and used by common people to monitor their system. Most of the times parents install this type of spyware to monitor their children or network admin or a company to monitor computing activities of their employees. The most widely and most powerful use of these spywares are done for hacking purposes only.
Example: SniperSpy, Winspy, Sentry PC, Spy Agent
Commercial Spywares: Commercial Spywares incude the services included in your Operating System and softwares to monitor event logs and crash reports. The information about software crash is anonymously sent to software vendors, also the reports about user experience, crash, memory dump etc are sent to Operating System Vendor. The only fact is that this type of spying is legal to improve product and provide better and secure service.
Example:Windows and Linux Crash Logs, Virus info in Anti-Virus program, Event Collectors etc.
Key Loggers: Key loggers are spywares specially made to record keystrokes from keyboard. Key Logging can retrieve information about bank account password, online transactions, login passwords etc.
E-mail Loggers/Chat Recorders:These spywares are used to track e-mails and chat report from your IRC. If you use e-mail client like Windows Mail or Mozilla Thunderbird etc. Then these spywares are capable of modifying internal settings to forward mails to attacker's inbox without keeping a track in your Outbox.
Screen Recorders: Screen recorders are capable of capturing screen and send recording using minimum bandwidth. Such monitoring is done by parents on their children to protect them from online pornography.
Example:Spy Agent, Winspy, Sniper Spy
52 Hacking Videos

52 Hacking Videos | 750.64 MB
Genre: eLearning
Genre: eLearning
A Penetration Attack Reconstructed
A Quick and Dirty Intro to Nessus using the Auditor Boot CD!
Adding Modules to a Slax or Backtrack Live CD from Windows
Airplay replay attack – no wireless client required
Anonym.OS LiveCD with build in Tor Onion routing and Privoxy
BackTrack LiveCD to HD Installation Instruction Video
Basic Nmap Usage!
Basic Tools for Wardriving!
Bluesnarfer attack tool demonstration
Bluesnarfing a Nokia 6310i hand set
Breaking WEP in 10 minutes
Cain to ARP poison and sniff passwords!
Complete Hacking Video using Metasploit – Meterpreter
Cracking a 128 bit WEP key (Auditor)
Cracking a 128 Bit Wep key entering the cridentials
Cracking Syskey and the SAM on Windows Using Samdump2 and John!
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!
Cracking WPA Networks (Auditor)
DoS attack against Windows FTP Server – DoS
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!
Exploiting some bugs of tools used in Windows
Exploiting weaknesses of PPTP VPN (Auditor)
Finding Rogue SMB File Shares On Your Network!
Fun with Ettercap Filters!
How to crack the local windows passwords in the SAM database
How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor)
How to sniff around switches using Arpspoof and Ngrep!
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res)
John The Ripper 1.7 password cracker Installation Instruction Video
Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!
MAC Bridging with Windows XP and Sniffing!
Mass De-Authentication using void11 (Auditor)
Metasploit Flash Tutorial!
MITM Hijacking
Nmap Video Tutorial 2 Port Scan Boogaloo!
Sniffing logins and passwords
Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res)
Sniffing VoIP Using Cain!
Snort Instruction video – howto install into backtrack
SSH Dynamic Port Forwarding!
Start a session and get interactive commandline access to a remote Windows box!
Telnet Bruteforce
Tunneling Exploits through SSH
Use Brutus to crack a box running telnet!
Using NetworkActiv to sniff webpages on a Wi-Fi network!
WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)
WMF File Code Execution Vulnerability With Metasploit!
WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)
Hotfile
http://hotfile.com/dl/76309040/b6f221d/52.Hacking.Videos.part1.rar.html
http://hotfile.com/dl/76317574/3f8083a/52.Hacking.Videos.part2.rar.html
http://hotfile.com/dl/76321202/35839cc/52.Hacking.Videos.part3.rar.html
http://hotfile.com/dl/76336369/2421a23/52.Hacking.Videos.part4.rar.html
http://hotfile.com/dl/76337428/ce1be69/52.Hacking.Videos.part5.rar.html
http://hotfile.com/dl/76307349/e038283/52.Hacking.Videos.part6.rar.html
Career Academy – Hacking, Penetration Testing and Countermeasures Training – Module 1 & 2
Career Academy – Hacking, Penetration Testing and Countermeasures Training – Module 1 & 2 | 312.74 Mb
Module 1
Ethical Hacking and Penetration TestingSecurity 101
Hacking Hall of Fame
What are Today’s hackers Like?
Today’s Hackers
Risk Management
Evolution of Threats
Typical Vulnerability Life Cycle
What is Ethical Hacking?
Rise of the Ethical Hacker
Types of Security Test
Penetration Test (Pen-test)
Red Teams
Testing Methodology
VMWare Workstation
Windows and Linux Running VMWare
Linux Is a Must
Linux Survival Skills
Useful vi Editor Commands
Module 1 Review
Module 2
Footprinting and ReconnaissanceDesired Information
Find Information by the Target (Edgar)
terraserver.microsoft.com
Network Reconnaissance & DNS Search
Query Whois Databases
Command-Line Whois Searches
ARIN whois: Search IP Address Blocks
SamSpade Tool and Website
Internet Presence
Look Through Source Code
Mirror Website
Find Specific Types of Systems
Big Brother
AltaVista
Specific Data Being Available?
Anonymizers
Countermeasures to Information Leakage
Social Engineering
DNS Zone Transfer
Nslookup command-line utility
Zone Transfer from Linux
Automated Zone Transfers
Zone Transfer Countermeasures
CheckDNS.net
Tracing Out a Network Path
tracert Output
Free Tools
Paratrace
War Dialing for Hanging Modems
Manual and Automated War Dialing
Case Study
guidedogs.com
Footprinting Countermeasures
Demo – Footprinting & Info Gathering
Download-Hotfile
http://hotfile.com/dl/92740859/738b0b2/07-041-12-2k10.part1.rar.html
http://hotfile.com/dl/92741044/fe11bbd/07-041-12-2k10.part2.rar.html
http://hotfile.com/dl/92741247/5a709e8/07-041-12-2k10.part3.rar.html
http://hotfile.com/dl/92741258/b127a95/07-041-12-2k10.part4.rar.html
Download-Uploading
http://uploading.com/files/332899d2/07-041-12-2k10.part1.rar/
http://uploading.com/files/b91d6333/07-041-12-2k10.part2.rar/
http://uploading.com/files/f4c7b26d/07-041-12-2k10.part3.rar/
http://uploading.com/files/b6171414/07-041-12-2k10.part4.rar/
Download-Filesonic
http://www.filesonic.com/file/49124230/07-041-12-2k10.part1.rar
http://www.filesonic.com/file/49124238/07-041-12-2k10.part2.rar
http://www.filesonic.com/file/49124198/07-041-12-2k10.part3.rar
http://www.filesonic.com/file/49123852/07-041-12-2k10.part4.rar
Download-Fileserve
http://www.fileserve.com/file/VzqbejS
http://www.fileserve.com/file/ygah38u
http://www.fileserve.com/file/QAHSKNs
http://www.fileserve.com/file/h9aWn3t