A collection of security books and tutorials.

Discussion in 'Forum for discussion of ANTICHAT' started by NeMiNeM, 9 Apr 2006.

  1. NeMiNeM

    NeMiNeM Elder - Старейшина

    Joined:
    22 Aug 2005
    Messages:
    480
    Likes Received:
    310
    Reputations:
    201
    A Buffer Overflow Study - Attacks and Defenses (2002)
    Amazon Hacks - (O'reilly-August 2003)
    Computer Vulnerability(March 9 2000)
    *****proof Your Software(No Starch-2002)
    Credit Card Visa Hack(Cambridge Lab-2003)
    Ethical Hacking and Countermeasures EC Council Exam 312 50 (OSB- 2004)
    Google Hacking for Penetration Tester (Syngress-2005)
    Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001)
    Hack IT Security Through Penetration Testing (Addison Wesley-2002)
    Hack Proofing Your Identity in the Information Age (Syngress-2002)
    Hack Proofing Your Network - Internet Tradecraft (Syngress-2000)
    Hacker Disassembling Uncovered (A List- 2003)
    Hacker's Desk Reference
    Hackers Beware (NewRiders -2002)
    Hackers Delight( Addison Wesley- 2003 )
    Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001)
    Hacking Exposed- Web Applications (MCGraw-Hill-2002)
    Hacking Exposed- Windows 2003 Chapter 5
    Hacking for Dummies (John Wiley-2004)
    Hacking for Dummies-Access to Other Peoples Systems Made Simple
    Hacking Guide v3.1[www.netz.ru]
    Hacking-The Art of Exploitation(No Starch-2003)
    How Thieves Targeted eBay Users but Got Stopped Instead(Interhack-June 2003)
    Maximum Security, 3rd Edition(Sams-April 2001)
    Maximum Security_-A Hackers Guide to Protect Your Internet
    Network Security Tools (OReilly- Apr 2005)
    PC Hacks(Oct 2004)
    PDF Hack(Aug 2004)
    Practical Study Remote Access (Cisco-December 22, 2003)
    Reversing Secrets of Reverse Engineering (Apr 2005)
    Spidering Hacks(O'Reilly- October 2003)
    Steal This Computer Book 3 What They Won't Tell You About the Internet(No Starch Press c 2003 )
    Stealing the Network; How to Own the Box ( Syngress-2003)
    The Art of Deception by Kevin Mitnick
    The Art of Intrusion-The Real Stories Behind the Exploits of Hackers Intruders and Deceivers (Wiley- Feb 2005)
    The Complete History of Hacking
    The Extreme Searchers Internet Handbook A Guide for the Serious Searcher (Feb 2004)
    Tricks of the Internet Gurus (April 1999)
    Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001)
    Web Hacking- Attacks and Defence (Pearson Education-August 08, 2002)
    Windows Server Hack(O'Reilly - March 2004)
    Windows XP Hacks (O'reilly- Auguest 2003

    DOWNLOAD:
    1.http://rapidshare.de/files/8426509/Books.part1.rar (Size, mb: 46.000)
    2.http://rapidshare.de/files/8427811/Books.part2.rar (Size, mb: 46.000)
    3.http://rapidshare.de/files/8429676/Books.part3.rar (Size, mb: 46.000)
    4.http://rapidshare.de/files/8430208/Books.part4.rar (Size, mb: 17.714)

    Password: L33T
    -----------------------------------------------------
    Java How To Program 6th Edition
    This special edition of Java How to Program is up-to-date with the Java 2 Platform Standard Edition 1.5. It covers fundamental programming topics and provides several extra chapters so readers can include or omit material as needed. KEY TOPICS: Includes Recursion and Searching and Sorting chapters. Provides extensive complete programming exercises plus "What does this program do?", "What's wrong with this program?", "Complete the program" and "Modify the program" exercises. Covers text-file processing. Features coverage of special topics, such as pre- and postconditions, invariants, testing and debugging, ethics and software engineering. Includes a CD-ROM with every copy of the book that contains: (subject to change) Java™ 2 Platform, Standard Edition 1.5; Netbeans; JCreator LE; jEdit; jGRASP; BlueJ; Source code for all the book's examples; Hyperlinks to valuable Java™ demos and Internet resources. MARKET: A useful brief reference for programmers or anyone who wants to learn more about the Java programming language.

    Download:http://download.hadown.com/uploadfile/2006/3/30/18172461219.zip
     
    #1 NeMiNeM, 9 Apr 2006
    Last edited: 9 Apr 2006
    10 people like this.
  2. NeMiNeM

    NeMiNeM Elder - Старейшина

    Joined:
    22 Aug 2005
    Messages:
    480
    Likes Received:
    310
    Reputations:
    201
  3. NeMiNeM

    NeMiNeM Elder - Старейшина

    Joined:
    22 Aug 2005
    Messages:
    480
    Likes Received:
    310
    Reputations:
    201
    The Art Of Sql
    Book review:
    For all the buzz about trendy IT techniques, data processing is still at the core of our systems, especially now that enterprises all over the world are confronted with exploding volumes of data. Database performance has become a major headache, and most IT departments believe that developers should provide simple SQL code to solve immediate problems and let DBAs tune any "bad SQL" later.

    In The Art of SQL, author and SQL expert Stephane Faroult argues that this "safe approach" only leads to disaster. His insightful book, named after Art of War by Sun Tzu, contends that writing quick inefficient code is sweeping the dirt under the rug. SQL code may run for 5 to 10 years, surviving several major releases of the database management system and on several generations of hardware. The code must be fast and sound from the start, and that requires a firm understanding of SQL and relational theory.

    The Art of SQL offers best practices that teach experienced SQL users to focus on strategy rather than specifics. Faroult's approach takes a page from Sun Tzu's classic treatise by viewing database design as a military campaign. You need knowledge, skills, and talent. Talent can't be taught, but every strategist from Sun Tzu to modern-day generals believed that it can be nurtured through the experience of others. They passed on their experience acquired in the field through basic principles that served as guiding stars amid the sound and fury of battle. This is what Faroult does with SQL.

    Like a successful battle plan, good architectural choices are based on contingencies. What if the volume of this or that table increases unexpectedly? What if, following a merger, the number of users doubles? What if you want to keep several years of data online? Faroult's way of looking at SQL performance may be unconventional and unique, but he's deadly serious about writing good SQL and using SQL well. The Art of SQL is not a cookbook, listing problems and giving recipes. The aim is to get you-and your manager-to raise good questions.

    Download link: http://rapidshare.de/files/16830744/The.Art.of.SQL.rar (1.7mb)
    Password: www.AvaxHome.ru

    ------
    Ten hacker tricks to exploit SQL Server systems

    SQL Server runs databases for financial, bank, biotech, Ecommerce, data warehousing, scientific applications, etc. which often require huge data processing with complex formulas or algorithms.
    Most of this work is done with TSQL stored procedures and .NET procedures (in SQL Server 2005), however neither one of them can achieve the performance and flexibility of external procedures which are natively compiled code.
    http://searchsqlserver.techtarget.c...gci1165052_tax301336,00.html?Offer=SQLwnha217
     
  4. 1251soldier

    1251soldier Elder - Старейшина

    Joined:
    13 Oct 2005
    Messages:
    37
    Likes Received:
    14
    Reputations:
    -2
  5. Deem3n®

    Deem3n® RTFMSDN

    Joined:
    19 Sep 2005
    Messages:
    378
    Likes Received:
    153
    Reputations:
    164
    _http://www.l0t3k.net/biblio/
    Big collection of security docs (about a 400 MB)
     
    2 people like this.
  6. 01hero

    01hero New Member

    Joined:
    23 Jan 2007
    Messages:
    4
    Likes Received:
    1
    Reputations:
    0
    gr8 ebooks 2 download

    www.vistaserver.com
    www.btebook.com
    www.oebook.com
    www.wiretapped.net
    www.giuciao.com :rolleyes: ;) :rolleyes: ;) :cool:
     
  7. Dracula4ever

    Dracula4ever Elder - Старейшина

    Joined:
    8 May 2006
    Messages:
    418
    Likes Received:
    183
    Reputations:
    26
    XSS Book

    I guess you all know Cross-Site Scripting attacks are becoming more and more dangerous every day. In the Web 2.0 era, stealing a user cookie\session or hijacking a user browser is almost equal to compromising his box by exploiting a remote code execution vulnerability.

    Computer experts say that in the not so far future, operating systems will be no more then just a web browser, all the applications a user need will be online (take Office Online for example).
    Therefor the phrase “XSS is the New Buffer Overflow, JavaScript Malware is the New Shell Code” is true, no wonder XSS made it the number one attack vector of 2006.

    So it’s about time someone will publish an XSS book :)

    XSS Attacks - Cross Site Scripting Attacks Exploits and Defense written by Jeremiah Grossman, Robert Hansen (RSnake), Petko D. Petkov (pdp), Anton Rager and Seth Fogie, is the first book ever made that is dedicated entirely to Cross-Site Scripting.

    From what we can see in the preview (Chapter 5 and the Table of Contents), this book is packed with a lot of attack techniques, covers the simplest attack to the most advanced, universal cross-site scripting attacks, XSS exploitation frameworks and a lot more :cool:

    For further information check out the book announcements in Jeremiah’s and RSnake’s blogs.



    Good luck ;)
     
    2 people like this.
  8. Dracula4ever

    Dracula4ever Elder - Старейшина

    Joined:
    8 May 2006
    Messages:
    418
    Likes Received:
    183
    Reputations:
    26
    (IN)SECURE Magazine11

    (IN)SECURE Magazine11


    Issue 11 of (IN)SECURE Magazine released.
    In this issue:

    • Review: GFI LANguard Network Security Scanner 8
    • Critical steps to secure your virtualized environment
    • Interview with Howard Schmidt, President and CEO R & H Security Consulting
    • Quantitative look at penetration testing
    • Integrating ISO 17799 into your Software Development Lifecycle
    • Public Key Infrastructure (PKI): dead or alive?
    • Interview with Christen Krogh, Opera Software’s Vice President of Engineering
    • Super ninja privacy techniques for web application developers
    • Security economics
    • iptables - an introduction to a robust firewall
    • Black Hat Briefings & Training Europe 2007
    • Enforcing the network security policy with digital certificates


    Very interesting stuff! Download (IN)SECURE issue 11.
     
  9. _-Ramos-_

    _-Ramos-_ Banned

    Joined:
    4 Jan 2007
    Messages:
    174
    Likes Received:
    215
    Reputations:
    8
    Hacking and security - 70 books

    Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
    Wiley.The Database Hacker's Handbook- Defending Database Servers.chm
    John Wiley & Sons.Hacking GMail (ExtremeTech).pdf
    Hacking.Guide.V3.1.pdf
    A-List Publishing.Hacker Linux Uncovered.chm
    Hacker'S.Delight.chm
    Hacker.Bibel.[278.kB_www.netz.ru].pdf
    HackerHighSchool.pdf
    Hacker's Desk Reference.pdf
    Hackers Beware Defending Your Network From The Wiley Hacker.pdf
    Addison Wesley - Hackers Delight 2002.pdf
    addison wesley - web hacking - attacks and defense.chm
    Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm
    Anti-Hacker ToolKit - McGraw Hill 2E 2004.chm
    Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.2003.eBook-DDU.pdf
    ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf
    ebook.oreilly.-.windows.xp.hacks.sharereactor.chm
    For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf
    For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
    Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
    hacker-disassembling-uncovered.9781931769228.20035.chm
    Hacking Cisco Routers.pdf
    Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm
    John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf
    John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf
    Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm
    Linux-Server.Hacks-OReilly.pdf
    McGraw Hill - Web Applications (Hacking Exposed).pdf
    McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf
    McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf
    McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
    McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
    OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm
    Oreilly Access Hacks Apr 2005.chm
    OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm
    oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm
    Oreilly.Amazon.Hacks.eBook.LiB.chm
    oreilly.firefox.hacks.ebook-lib.chm
    OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm
    OReilly.Google.Maps.Hacks.Jan.2006.chm
    Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm
    OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm
    OReilly.Network.Security.Hacks.chm
    OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm
    OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm
    OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm
    OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm
    OReilly.Statistics.Hacks.May.2006.chm
    OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm
    OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm
    oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm
    OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm
    prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm
    Que - UNIX Hints Hacks.chm
    Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm
    Syngress - Hack Proofing Linux (2001).pdf
    Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf
    Syngress -- Hack Proofing Your Wireless Network.pdf
    Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
    the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm
    Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf
    Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf
    Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf
    Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf
    Wiley.Lifehacker.Dec.2006.pdf

    Code:
    http://hackingandsecurity.com/hacks/
     
  10. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
    Malicious Web Servers

    Behind the Scenes of Malicious Web Servers


    Code:
    http://www.honeynet.org/papers/wek/KYE-Behind_the_Scenes_of_Malicious_Web_Servers.pdf
    OR:

    Code:
    http://www.honeynet.org/papers/wek/KYE-Behind_the_Scenes_of_Malicious_Web_Servers.htm
     
  11. ЛифчиС5СВ

    ЛифчиС5СВ Elder - Старейшина

    Joined:
    9 Mar 2007
    Messages:
    164
    Likes Received:
    141
    Reputations:
    12
    Mark D. Spivey, CISSP - Practical hacking techniques and countermeasures

    [​IMG]


    Released: 2007
    By: Mark D. Spivey, CISSP
    Genre: Hacking/Defence
    Published by: Auerbach Publications
    Format: PDF
    Quality: eBook (initially PC-quality)
    Quantity of pages: 752
    Language: English

    Description: Recommended for network administrators.
    Contents:
    Preparation
    Banner Identification
    Target Enumeration
    Scanning
    Sniffng Traffc
    Spoofing
    Brute Force
    Vulnerability Scanning
    Wireless
    Redirection
    Denial-of-Service (DoS)
    Appendix A: References
    Appendix B: Tool Syntax
    Index
    --------------------------
    Size: 72 МБ


    Download:
    http://v3n.0x7.net/books/ENG/hacking/practical_hacking_techniques_and_countermeasures.rar

    or from Deposit
    http://depositfiles.com/files/2270756
     
    #11 ЛифчиС5СВ, 23 Nov 2007
    Last edited by a moderator: 23 Nov 2007
  12. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
    Attacking the Windows Kernel

    Download:

    http://rapidshare.com/files/75646723/Attacking_the__Windows_Kernel.pdf.html
     
  13. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
    Advanced JavaScript, 3rd Edition

    [​IMG]

    Download:

    http://rapidshare.com/files/76375488/Advanced_JavaScript.rar.html
     
  14. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
    Hacker's Black Book


    - Trick of the internet gurus.
    - Hackers survival guide
    - Hacking for dummies 2
    - Hacking into computer systems
    - Maximum security - A hacker's guide



    [​IMG]


    Download:

    http://rapidshare.com/files/76376155/Hackers_Black_Book.rar.html
     
    1 person likes this.
  15. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
  16. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
    A Low-cost Attack on a Microsoft CAPTCHA

    A Low-cost Attack on a Microsoft CAPTCHA


    And this one can be found here:


    http://homepages.cs.ncl.ac.uk/jeff.yan/msn_draft.pdf
     
  17. DaemonAkaDevil

    DaemonAkaDevil New Member

    Joined:
    2 Aug 2007
    Messages:
    4
    Likes Received:
    0
    Reputations:
    0
    Here are also a good source of ebooks called :

    h__p://w*w.b213.net/index.php?num=0
    h__p://flazx.com
    h__p://freebooksource.com/
     
  18. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
    Extended HTML Form Attack

    Extended HTML Form Attack

    Summary of the attack

    A new Cross Site Scripting attack which effects (at least) major browsers Internet Explorer and Opera. This one makes use of forms targeted at non-HTTP services. This paper covers the following points:

    - A short description of the original HTML Form Attack paper
    - An introduction to Cross site scripting
    - Displaying HTML content from non-HTML supporting services (echo, smtp etc)
    - How attackers can exploit this issue - finding vulnerable servers
    - Solutions to the problem described.

    Download Paper:

    http://eyeonsecurity.org/papers/extendedform.pdf
     
  19. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
  20. Fugitif

    Fugitif Elder - Старейшина

    Joined:
    23 Sep 2007
    Messages:
    407
    Likes Received:
    227
    Reputations:
    42
    Lateral SQL Injection

    Lateral SQL Injection:A New Class of Vulnerability in Oracle



    The paper can be found here:

    http://www.databasesecurity.com/dbsec/lateral-sql-injection.pdf
     
    1 person likes this.