v

您的位置:VeryCD教育计算机


《VTC.道德黑客与渗透测试》(VTC Ethical Hacking & Penetration Testing)[ISO]

  • 状态: 精华资源
  • 摘要:
    发行日期2006年10月06日
  • 时间: 2007/12/01 14:47:44 发布 | 2007/12/02 06:11:03 更新
  • 分类: 教育  计算机 

tomclarence

精华资源: 48

全部资源: 51

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名VTC.道德黑客与渗透测试
英文名VTC Ethical Hacking & Penetration Testing
资源格式光盘镜像
发行日期2006年10月06日
简介

IPB Image


内部为mov格式视频教程
道德黑客(Ethical Hacking), 也称为伦理黑客或正派黑客, 与黑客同意, 就是不破坏, 只研究技术的一类.



另外的解释:
Ethical hacking(正面的黑客形动)
正面的黑客行动也叫做渗透测试,侵入测试或红色防线。是由正面的黑客所展开的寻找系统中可能存在问题的行动。


电脑黑客已不再是电脑天才的黑色艺术. 任何一个会使用浏览器的人, 利用脚本和黑客技术,都可以从一个电脑黑客的角度来观察并保护自己的网络安全. 了解哪些攻击可能被用来攻击你的系统已经成为一项基本的安全常识。VTC 的作者 Brad Causey 和 Bobby Rogers 通过黑客和渗透测试来展示给你电脑安全方面的问题, 以保护你的网络.

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing.

Title: Ethical Hacking & Penetration Testing
Author: Brad Causey & Bobby Rogers
SKU: 33718
ISBN: 1-933736-46-1
Release Date: 2006-10-06
Duration: 7 hrs / 82 lessons
Compatibility: Win Vista, XP, 2000, Mac OS X, Linux

官方网站(有前两章的预览, 可以先看看, 不错的话再下载):
http://www.vtc.com/products/Ethical-Hackin...ials.htm


Introduction
Course Overview (04:54)
Ethical Hacking & Penetration Testing
What is Ethical Hacking? (04:58)
Types of Ethical Hacking (05:31)
Responsibilities of the Ethical Hacker (03:12)
Customer Expectations (04:04)
Skills of the Hacker (04:16)
Relevant Laws (04:54)
Preparation (04:46)
Types of Attacks (02:12)
Methodology Overview
Your Goals (02:34)
Reconnaissance [passive, active] (05:11)
Scanning (03:42)
Service Enumeration (03:05)
Vulnerability Assessment (03:35)
Vulnerability Exploitation (02:52)
Penetration & Access (03:24)
Privilege Escalation & Owning the Box (02:40)
Evading Defenses & Erasing Tracks (04:01)
Maintaining & Expanding Access (03:22)
Reconnaissance (Footprinting)
Passive Reconnaissance (05:03)
Using WHOIS & Other Tools (03:03)
Active Reconnaissance (04:10)
Active Reconnaissance Tools & Methods (04:55)
Putting It All Together (03:09)
Reconnaissance Demo (07:04)
Scanning
Scanning For Hosts (02:20)
TCP Connection Basics (04:14)
TCP Scan Types (07:18)
UDP & ICMP Scanning (03:44)
Scanning Demonstration using NMAP (05:19)
Port & Service Enumeration
Identifying Ports & Services (03:06)
OS Fingerprinting (02:57)
Popular Scanners (01:54)
Demonstration (05:15)
Data Enumeration
Data Enumeration (05:12)
SNMP Enumeration (07:14)
DNS Zone Transfers (06:36)
Windows Null Sessions (05:03)
NetBIOS Enumeration (06:44)
Active Directory Extraction (03:02)
Vulnerability Assessment
Vulnerabilities & Exploits (06:07)
OS Vulnerabilities (05:59)
Web Server Vulnerabilities (06:54)
Database Vulnerabilities (05:25)
TCP Stack Vulnerabilities (04:13)
Application Vulnerabilities (03:05)
Vulnerability Assesment (07:21)
Penetration/Access/Compromise Pt.1
Penetrating the System Pt.1 (05:28)
Penetrating the System Pt.2 (03:11)
Bypassing Access Controls (06:34)
Password Cracking Pt.1 (04:58)
Password Cracking Pt.2 (03:52)
Social Engineering (06:28)
Penetration/Access/Compromise Pt.2
Session Hijacking Pt.1 (05:46)
Session Hijacking Pt.2 (04:01)
Privilege Escalation (04:45)
Maintaining & Expanding Access (07:01)
System Compromise (04:40)
Evading Defenses & Erasing Tracks
Where Your Actions Recorded Pt.1 (02:04)
Where Your Actions Recorded Pt.2 (06:50)
Deleting Log Files & Other Evidence Pt.1 (03:16)
Deleting Log Files & Other Evidence Pt.2 (04:26)
Rootkits (05:21)
Steganography (06:58)
Evading IDS & Firewalls (04:29)
Introduction to Hacking Techniques Pt.1
Encryption (06:07)
Sniffers (04:15)
Wireless hacking (06:29)
SQL Injection (04:18)
Introduction to Hacking Techniques Pt.2
Buffer Overflows (05:19)
Rootkits (03:52)
Spoofing (04:33)
Denial of Service Attacks (03:59)
Web Hacking (07:00)
Popular Tools
nmap Pt.1 (06:38)
nmap Pt.2 (02:14)
SuperScan (04:30)
Nessus (06:27)
Penetration Test Demo
Penetration Test Demo Pt.1 (01:41)
Penetration Test Demo Pt.2 (00:59)
Penetration Test Demo Pt.3 (01:05)
Credits
About the Authors (01:37)


杀毒情况:
安全检测软件软件:NOD32 2.7
版本号:Virus and Spyware Definition Version 1.20.2826.4
Firewall Policy Version 1.2.23.91
常驻:
荷兰 Razorback3.0

正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有45网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。