XfrogPlants 3.0 Landscaping Library Vol.1

XfrogPlants 3.0 Landscaping Library Vol.1

XfrogPlants 3.0 Landscaping Library Vol.1

XfrogPlants 3.0 Landscaping Library Vol.1 | 3.97 Gb

Landscaping vol.1 contains 3D plant models of trees and shrubs pruned into a wide array of hedges and topiaries. Each species includes 9 variations in age, size and shape for a total of 180 highly detailed, fully textured 3D models. Use these specialized outdoor landscaping forms in any outdoor scenes requiring \’human touch\’. Читать далее XfrogPlants 3.0 Landscaping Library Vol.1

LinuxCBT SFTP Edition

LinuxCBT SFTP Edition
LinuxCBT SFTP Edition
English | MOV | H264 800×600 @ 1527Kbps 25fps | AAC @ 48KHz | 9 hr | 643 MB
Genre: eLearning

LinuxCBT SFTP Edition encompasses: 1. Secure File Transfer Protocol (SFTP) Security.
LinuxCBT SFTP Edition focuses on the implementation of SFTP via SSHv2 on Linux | Solaris | MacOSX | FreeBSD | Win32 platforms.
SFTP is rapidly supplanting FTP as the de facto means of moving information securely across the Internet between collaborating entities. SFTP offers encryption and confidentiality services via Secure Shell (SSH). It strengthens your organization\’s security posture and qualifies for compliancy points with auditors in various realms, including but not limited to: SAS70, PCI, et cetera.

If you are/will be responsible for handling data transmissions for your organization, you will invariably need to master the principles of SFTP to engage your vendors and clients, as it is the basis for many commercial and open source SSH-based file transfer solutions.

Let LinuxCBT SFTP Edition cost-effectively strengthen your Secure File Transfer Protocol skills!

 

LinuxCBT SFTP Edition

Читать далее LinuxCBT SFTP Edition

Metasploit Unleashed at Reverse Space Week 1-6

Metasploit Unleashed at Reverse Space Week 1-6
Metasploit Unleashed at Reverse Space Week 1-6
English | Mp4 + PDF | h264 1280×720 29.97fps | aac, 44100 Hz, stereo | 6.3GB
Genre: Video Training

Metasploit Unleashed Class at Reverse Space Week 1
One day I got it in my head that since graduating from my Masters program I’ve come to miss teaching. Still on the fence about getting myself committed to a PhD program, I decided to teach some hacking classes at Reverse Space the hackerspace where a hold a cool title (Director of Cyberwarface). The first class I am teaching is Metasploit Unleashed. This past week was our first session. We covered the module Metasploit Fundamentals.
Metasploit Unleashed Class at Reverse Space Week 1
One day I got it in my head that since graduating from my Masters program I’ve come to miss teaching. Still on the fence about getting myself committed to a PhD program, I decided to teach some hacking classes at Reverse Space the hackerspace where a hold a cool title (Director of Cyberwarface). The first class I am teaching is Metasploit Unleashed. This past week was our first session. We covered the module Metasploit Fundamentals.

The class meets each week until we finish in April with a capture the flag game. There are two available class times Thursday 8pm and Saturday 3pm. I teach the same thing each time, so you need only attend one each week. If you are local and would like to join send me an email. If you can’t make it in to Reverse Space, we do a GoToMeeting for people to call in and see my screen.

In the meantime here are the materials from the first class. The screencast is from Thursday’s class and the video is from Saturday’s class, so the class is slightly different as these things are.

Metasploit Unleashed at Reverse Space Week 2
Another week of Metasploit Unleashed classes at Reverse Space. This week we covered Information Gathering and Vulnerability Scanning.

Metasploit Unleashed at Reverse Space Week 3
Metasploit Unleashed Week 3 The module covered was fuzzing. The class worked through fuzzing the 3com TFTP Service in Python and with Metasploit. The python file is tftpfuzzer below and the Metasploit file is available at the course website.

http://www.offensive-security.com/metasplo…A_Simple_Fuzzer Course Site.

http://www.exploit-db.com/application/2865/ 3comTFTP

Guys thats all No have any video:(

Metasploit Unleashed at Reverse Space Week 4
This week for Week 4 we covered exploit development. There is plenty in the course module that was not covered. This lecture is suitable for beginning exploit development. We exploited the 3com TFTP service we fuzzed last week. Porting the exploit to Metasploit was left for an exercise. In Week 5 in addition to client side exploitation we will go over porting the 3com TFTP exploit into Metasploit as well as some additional Metasploit exploit development features

Metasploit Unleashed at Reverse Space Week 5
One of the Metasploit Unleashed students, Nicholas B. volunteered to teach the client sides lecture this past week. I’ll be back in the spotlight this Thursday and Saturday with Metasploit post exploitation.

The guest speaker this week was Rob Fuller (mubix). He presented Metasploit Magic and even showed us a little something new.

Metasploit Unleashed at Reverse Space Week 6
This week we covered some post exploitation and meterpreter scripting. See you all next week for the final class.

 

Metasploit Unleashed at Reverse Space Week 1-6

Читать далее Metasploit Unleashed at Reverse Space Week 1-6

LinuxCBT Deb6x Edition

LinuxCBT Deb6x Edition
LinuxCBT Deb6x Edition
English | Format: MOV | h264 1280×720, 5.00 fps | aac, 44100 Hz, mono | 3.66 GB
Genre: Video Training

LinuxCBT Deb6x Edition focuses primarily on the open-source Debian Linux 6 operating system.

LinuxCBT Deb6x Edition prepares you or your organization for successfully deploying and managing business-critical Debian GNU/Linux-based server solutions. Let LinuxCBT Deb6x Edition teach you what traditional training outlets and other CBTs do not; solid Debian GNU/Linux skills!

Recommended Prerequisites:

* Open mind & determination to master Linux and related open-source applications
* Basic Computing Skills
* Basic understanding of networking concepts
* Access to Linux to perform all of the installations and exercises
More info_http://www.linuxcbt.com/products_linuxcbt_deb6x_edition.php

 

LinuxCBT Deb6x Edition

Читать далее LinuxCBT Deb6x Edition

Complete Megapack Hacking Conference 2011 Tutorial

Complete Megapack Hacking Conference 2011 Tutorial
Complete Megapack Hacking Conference 2011 Tutorial | 16.24 GB
Single Extraction — InterChangable — No Password

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit.

Main article :DEF CON 18 was a resounding success! With more contests, events, attendance and talks, this year\’s show was a fitting end to our years at the Riviera! We\’d like to thank the Riv for working with and hosting us for 5 awesome years! We\’d also like to thank all the folks who sacrificed time, effort, and resources to contribute to the hacking community, as well as a huge thank you to all the attendees for showing up and learning, growing and participating in all this con has to offer!

mORE iNFO: _www.defcon.org/html/defcon-18/dc-18-speakers.html

And includes :

A Penetration Attack Reconstructed.A Quick and Dirty Intro to Nessus using the Auditor Boot CD!Adding Modules to a Slax or Backtrack Live CD from Windows. Airplay replay attack no wireless client required
Anonym.OS LiveCD with build in Tor Onion routing and Privoxy
BackTrack LiveCD to HD Installation Instruction Video
Basic Nmap Usage!
Basic Tools for Wardriving!
Bluesnarfer attack tool demonstration
Bluesnarfing a Nokia 6310i hand set
Breaking WEP in 10 minutes
Cain to ARP poison and sniff passwords!
Complete Hacking Video using Metasploit Meterpreter
Cracking a 128 bit WEP key (Auditor)
Cracking a 128 Bit Wep key + entering the cridentials
Cracking Syskey and the SAM on Windows Using Samdump2 and John!
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!
Cracking WPA Networks (Auditor)
DoS attack against Windows FTP Server DoS
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!
Exploiting some bugs of tools used in Windows
Exploiting weaknesses of PPTP VPN (Auditor)
Finding Rogue SMB File Shares On Your Network!
Fun with Ettercap Filters!
How to crack the local windows passwords in the SAM database
How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor)
How to sniff around switches using Arpspoof and Ngrep!
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res)
John The Ripper 1.7 password cracker Installation Instruction Video
Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!
MAC Bridging with Windows XP and Sniffing!
Mass De-Authentication using void11 (Auditor)
Metasploit Flash Tutorial!
MITM Hijacking
Nmap Video Tutorial 2 Port Scan Boogaloo!
Sniffing logins and passwords
Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res)
Sniffing VoIP Using Cain!
Snort Instruction video howto install into backtrack
SSH Dynamic Port Forwarding!
Start a session and get interactive commandline access to a remote Windows box!
Telnet Bruteforce
Tunneling Exploits through SSH
Use Brutus to crack a box running telnet!
Using NetworkActiv to sniff webpages on a Wi-Fi network!
WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)
WMF File Code Execution Vulnerability With Metasploit!
WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0) Читать далее Complete Megapack Hacking Conference 2011 Tutorial

LinuxCBT BPF Edition

LinuxCBT BPF Edition
LinuxCBT BPF Edition
English | MOV | H264 800×600 @ 1606Kbps 25fps | AAC @ 48KHz | 8 hours | 679 MB
Genre: eLearning

LinuxCBT BPF Edition encompasses: 1. Berkeley Packet Filters (BPF) Security.
LinuxCBT BPF Edition focuses on the implementation of Berkeley Packet Filters with common network analysis tools: TCPDump, Snort, and WireShark.
The ability to efficiently filter network traffic on today\’s high-throughput networks is key to proper recording and analysis. Various network intersections move disparate traffic, depending on perspective. Consequently, it can be superfluous to filter inappropriately, resulting in mounds of unparseable data.
If you are/will be responsible for handling packet logging and analysis for your organization, you will invariably search for inherent efficiencies that Berkeley Packet Filters (BPF) provide.
Let LinuxCBT BPF Edition cost-effectively strengthen your ability to parse network traffic!

 

LinuxCBT BPF Edition

Читать далее LinuxCBT BPF Edition