Pengkodam

Would you like to react to this message? Create an account in a few clicks or log in to continue.

Kumpulan Pengkodam Malaysia

Latest topics

» Woodworking Dvds 1-10 The Complete Workshop Essentials Torrent
Security Whitepapers - hacking tutorials Icon_minitime1Mon Feb 09, 2015 6:26 pm by KPMUser

» Security Whitepapers - hacking tutorials
Security Whitepapers - hacking tutorials Icon_minitime1Thu Jan 19, 2012 4:15 am by meonmelon

» Dapatkan 200 hack tutorial
Security Whitepapers - hacking tutorials Icon_minitime1Sun Oct 23, 2011 8:40 am by Myvia

» video Belajar PHP Asas
Security Whitepapers - hacking tutorials Icon_minitime1Sat Jun 18, 2011 9:12 pm by king_kong

» mencari kamera security
Security Whitepapers - hacking tutorials Icon_minitime1Thu Mar 31, 2011 1:22 pm by Admin

» sy budak baru
Security Whitepapers - hacking tutorials Icon_minitime1Fri Nov 26, 2010 4:52 am by abeyoh

» boleh x nak hack password account myspace/friendster ?
Security Whitepapers - hacking tutorials Icon_minitime1Mon Nov 15, 2010 5:04 am by haqi1611

» 200 hacking tutorials
Security Whitepapers - hacking tutorials Icon_minitime1Tue Oct 12, 2010 5:20 am by funtikar

» Mencari kelemah dengan Nessus
Security Whitepapers - hacking tutorials Icon_minitime1Wed Sep 08, 2010 9:35 pm by Pidot

Ruang Iklan

Free Domain Name - www.YOU.co.nr!

4 posters

    Security Whitepapers - hacking tutorials

    avatar
    hAxer
    Budak Script
    Budak Script


    Posts : 46
    Join date : 12/02/2009

    Security Whitepapers - hacking tutorials Empty Security Whitepapers - hacking tutorials

    Post by hAxer Wed Mar 04, 2009 12:47 am

    A Buffer Overflow Study - Attacks and Defenses (2002)

    Advanced Buffer Overflow Methods

    Altering ARP Tables v1.00

    Analysis of the WinZip Encryption Method

    Attacking and Repairing the WinZip Encryption Scheme

    Anti-honeypot technology

    ARP Spoofing in switched LANs

    Attacking WiFi with traffic injection - Cedric Blancher

    Beyond stack smashing

    Binary Protection Schemes - Andrew Griffiths

    Blocking Skype Using Squid and OpenBSD

    Buffer Overflow - hackaholic

    Bypassing Windows Hardware-enforced DEP

    Bypassing Windows heap protections

    Concepts for the Stealth Windows Rootkit

    Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning

    DNS Amplification Attacks

    eEye Whitepaper_Generic Anti Exploitation Technology for Windows

    egghunt shellcode

    Exploiting Windows Device Drivers Whitepaper

    Exploiting Freelist[0] on Microsoft Windows XP SP2

    Exploring Microsoft Windows CE shellcode

    Google Hacking for Penetration Tester (Syngress-2005)

    Google Hacking BH_EU_05 - Johnny Long

    Host Fingerprinting

    HTTP Request Smuggling

    ICMP attacks against TCP

    IE file downloading security warnings bypass

    Intro to shellcoding

    Introduction to Reverse Engineering Win32 Applications

    Kimmo Kasslin VB2005 proceedings

    kmalloc exploitation

    Lotus passwords disclosures

    Lynn Cisco

    Malicious SMTP-based Mass-Mailing Activity

    Man In The Middle - MITM attacks

    MetaSploit Beyond EIP BlacHat 2005

    Moving towards the Artificial Hacker - Ashley Fox

    Microsoft Bug Paper

    NetCat Swiss Army Knife

    Post-exploitation on Windows using ActiveX Controls

    Real Server Exploit Analysis

    remote library injection

    ret onto vsyscall

    Return to libc

    Savant Buffer Overflow tutorial

    Shellcode advances

    SIP Security

    Smack The Stack

    SMS analysis

    Spyware Survival ToolKit

    stack overflow win XP sp2

    Stack Based Overflows Windows Part1

    Stack Based Overflows Windows Part2

    Stealing passwords via browser refresh

    The Voyage To 0-Day Using the Metasploit Framework

    The Basics of Shellcoding

    unicode BoF

    vmware machines detection

    WarDriving and detecting wardrivers

    whitepaper HTTP response

    whitepaper shellcode

    win32 shellcode

    win32 simple shellcoding

    Windows Access Control Demystified

    Windows XP Security Guide

    worm propagation

    Writing Stack Based Overflows On Windows Examples

    Writing Small Shellcode

    x86-64 Buffer Overflow Exploits and the borrowed code chunks exploitation technique

    XSS attacks

    XSS Attack FAQ
    bluezink
    bluezink
    Budak Baru
    Budak Baru


    Posts : 14
    Join date : 15/02/2009

    Security Whitepapers - hacking tutorials Empty Re: Security Whitepapers - hacking tutorials

    Post by bluezink Sat Mar 07, 2009 10:56 am

    hAxer wrote:A Buffer Overflow Study - Attacks and Defenses (2002)

    Advanced Buffer Overflow Methods

    Altering ARP Tables v1.00

    Analysis of the WinZip Encryption Method

    Attacking and Repairing the WinZip Encryption Scheme

    Anti-honeypot technology

    ARP Spoofing in switched LANs

    Attacking WiFi with traffic injection - Cedric Blancher

    Beyond stack smashing

    Binary Protection Schemes - Andrew Griffiths

    Blocking Skype Using Squid and OpenBSD

    Buffer Overflow - hackaholic

    Bypassing Windows Hardware-enforced DEP

    Bypassing Windows heap protections

    Concepts for the Stealth Windows Rootkit

    Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning

    DNS Amplification Attacks

    eEye Whitepaper_Generic Anti Exploitation Technology for Windows

    egghunt shellcode

    Exploiting Windows Device Drivers Whitepaper

    Exploiting Freelist[0] on Microsoft Windows XP SP2

    Exploring Microsoft Windows CE shellcode

    Google Hacking for Penetration Tester (Syngress-2005)

    Google Hacking BH_EU_05 - Johnny Long

    Host Fingerprinting

    HTTP Request Smuggling

    ICMP attacks against TCP

    IE file downloading security warnings bypass

    Intro to shellcoding

    Introduction to Reverse Engineering Win32 Applications

    Kimmo Kasslin VB2005 proceedings

    kmalloc exploitation

    Lotus passwords disclosures

    Lynn Cisco

    Malicious SMTP-based Mass-Mailing Activity

    Man In The Middle - MITM attacks

    MetaSploit Beyond EIP BlacHat 2005

    Moving towards the Artificial Hacker - Ashley Fox

    Microsoft Bug Paper

    NetCat Swiss Army Knife

    Post-exploitation on Windows using ActiveX Controls

    Real Server Exploit Analysis

    remote library injection

    ret onto vsyscall

    Return to libc

    Savant Buffer Overflow tutorial

    Shellcode advances

    SIP Security

    Smack The Stack

    SMS analysis

    Spyware Survival ToolKit

    stack overflow win XP sp2

    Stack Based Overflows Windows Part1

    Stack Based Overflows Windows Part2

    Stealing passwords via browser refresh

    The Voyage To 0-Day Using the Metasploit Framework

    The Basics of Shellcoding

    unicode BoF

    vmware machines detection

    WarDriving and detecting wardrivers

    whitepaper HTTP response

    whitepaper shellcode

    win32 shellcode

    win32 simple shellcoding

    Windows Access Control Demystified

    Windows XP Security Guide

    worm propagation

    Writing Stack Based Overflows On Windows Examples

    Writing Small Shellcode

    x86-64 Buffer Overflow Exploits and the borrowed code chunks exploitation technique

    XSS attacks

    XSS Attack FAQ
    ..sori bro..ape ke bendalah nie...kasi info ckit..erk!!..apesal foru m snyap je!!
    avatar
    hAxer
    Budak Script
    Budak Script


    Posts : 46
    Join date : 12/02/2009

    Security Whitepapers - hacking tutorials Empty Re: Security Whitepapers - hacking tutorials

    Post by hAxer Sat Mar 07, 2009 1:03 pm

    [/quote]..sori bro..ape ke bendalah nie...kasi info ckit..erk!!..apesal foru m snyap je!![/quote]

    tu aa ...senyap aje ..

    yg nie whitepaper ...ala mcm laporan la . Dari sini kita boleh belajar ttg sesuatu tektik ..cth , mcm mana nak buat spoffing dll...
    avatar
    pokok
    Budak Baru
    Budak Baru


    Posts : 1
    Join date : 08/03/2009

    Security Whitepapers - hacking tutorials Empty Re: Security Whitepapers - hacking tutorials

    Post by pokok Sun Mar 08, 2009 2:51 am

    Security Whitepapers - hacking tutorials

    dew sesetgh tutorial tak blh bkk..
    or broken...
    avatar
    meonmelon
    Budak Baru
    Budak Baru


    Posts : 1
    Join date : 19/01/2012

    Security Whitepapers - hacking tutorials Empty Re: Security Whitepapers - hacking tutorials

    Post by meonmelon Thu Jan 19, 2012 4:15 am

    bro tutorial dari diri sendiri lah...boleh kongsi..kalau paste camneh..baik search ka google ja..

    Sponsored content


    Security Whitepapers - hacking tutorials Empty Re: Security Whitepapers - hacking tutorials

    Post by Sponsored content


      Current date/time is Mon Apr 29, 2024 11:55 am