Book Hacking on Demand | The Guide to BackTrack

Discussion in 'eBooks, PDFs, Videos & MP3s' started by nervien, 16 Aug 2012.

  1. nervien

    nervien Well-Known Member

    Joined:
    24 Jul 2012
    Messages:
    6
    Likes Received:
    6
    Trophy Points:
    65
    Well written and simple to understand guide to BackTrack along with real world examples and tutorials you can apply to in real life. Enjoy.

    Vol 1 No. 3 March 2012
    Hacking on Demand.png

    Contents
    Android Exploitation with Metasploit
    by Aditya Gupta
    In this article, we will be looking into the practical usage of Backtrack, and its tools. The article is divided into three sections

    Android Exploitation through Metasploit
    by Nikto Vulnerability Scanner and w3af
    The reader is expected to have basic knowledge of Backtrack and familiar with common web application vulnerabilities.

    Use Metasploit in Backtrack 5
    by Johan Loos
    Metasploit comes in several flavors: Metasploit framework, Metasploit community edition, Metasploit pro. In Backtrack 5, Metasploit framework is installed by default. Metasploit framework provides you with information on security vulnerabilities which can be used to exploit a system. Penetration testers can also use this tool to launch manual or automated scans.

    BackTrack 5 Toolkit Tutorial
    by Vikas Kumar
    BackTrack is an operating system based on the Ubuntu GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm. The current version is BackTrack 5, code name “Revolution.”

    Defending Layer 2 Attacks
    by Nayan Sanchania
    Security has been a major concern in today’s computer networks. There has been various exploits of attacks
    against companies, many of the attacks cost companies their reputation and cost them millions of pounds. Many attacks are implemented using inside knowledge from previous and even current employees.

    The Ultimate Security Toolkit
    by Steve Myers
    In the security world today, a security professional relies heavily on knowing the right tools for the job, and knowing how to use these tools. There are hundreds of tools available and the list of tools is constantly changing and growing. For security assessments and penetration testing, there are very few toolkits as actively supported and all-encompassing as BackTrack 5.

    Practical Applications And Use Cases
    by Nicholas Popovich
    This article breaks down what Backtrack Linux is, with a brief description and history. Then, we’ll explore a
    sampling of some of the many tools that are packaged within Backtrack Linux and provide use cases along with step-by-step tutorials to demonstrate some of the more common tasks that Backtrack is used to perform. Finally, we’ll see how most of the tools and techniques that Backtrack is designed to facilitate can be used by the many different roles in the IT security field.

    How Exposed To Hackers Is the WordPress Website You Built?
    by Alex Kah
    WordPress is likely the most popular website framework used on the web today. With over 65 million downloads and a very active community you can accomplish many goals with ease using WordPress.

    Become Quieter with a Little Help from BT
    by Dusko Pijetlovic
    When you are faced with a task of testing your production environment and strengthening your defenses, your choice of the tool is easy. Instead of concentrating on collecting penetration (pen) testing tools, just head to
    BackTrack website and download an image of one of the most popular white hat penetration testing and security auditing platforms. It’s #7 on the sectools.org Top 125 Security Tools list.

    BackTracking in Wifi Country
    by Dennis King
    The BackTrack 5 distribution continues to be the “go to” tool in a security professional’s arsenal. With the latest release, “Revolution,” the Backtrack development team delivers a kit you can use anywhere on both light and heavy duty security tasks.

    Downloads
    MediaFire
    MirrorCreator

    How to Fix Mediafire File Blocked for Violation
    • Don't click the links, right click copy.
    • Copy the URL e.g: http://www.mediafire.com/?5x0oexn752md2ww and get rid of http://anonym.to/? part.
    • Paste / enter in your browser.
     
    • Like Like x 4
  2. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,087
    Likes Received:
    1,186
    Trophy Points:
    351
    Thanks for your contribution :) I will add more mirrors and give a description to inform people.
     
  3. tracy altos

    tracy altos Well-Known Member

    Joined:
    16 Sep 2012
    Messages:
    4
    Likes Received:
    2
    Trophy Points:
    73
    thanks for sharing
     
  4. wrk13s

    wrk13s Active Member

    Joined:
    18 Sep 2012
    Messages:
    8
    Likes Received:
    2
    Trophy Points:
    43
    thanks for this, this will come in very handy.
     
  5. vampiricbunny1800

    vampiricbunny1800 Well-Known Member
    Dev Team VIP

    Joined:
    8 Oct 2012
    Messages:
    242
    Likes Received:
    64
    Trophy Points:
    63
    cool book that will let me catch up sense i am new around here (i know its a old post but u should still say thank you)
     
  6. walus32

    walus32 Active Member

    Joined:
    10 Oct 2012
    Messages:
    17
    Likes Received:
    1
    Trophy Points:
    43
    This is rly good book. Thx.
     
  7. 小 [-]红[-] 猫

    小 [-]红[-] 猫 Active Member

    Joined:
    2 Oct 2012
    Messages:
    23
    Likes Received:
    0
    Trophy Points:
    41
  8. nikulay

    nikulay Member

    Joined:
    7 Nov 2012
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    6
  9. Tigerzero

    Tigerzero Member

    Joined:
    9 Nov 2012
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    6
    thx very much for sharing your file
     
  10. Binaryman011

    Binaryman011 Diffrnt not always bettr, but bettr always diffrnt
    VIP

    Joined:
    24 Jan 2013
    Messages:
    7
    Likes Received:
    3
    Trophy Points:
    88
    DESIGNING BSD ROOTKITS
    introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself.
     

    Attached Files:

    • Like Like x 2
  11. nervien

    nervien Well-Known Member

    Joined:
    24 Jul 2012
    Messages:
    6
    Likes Received:
    6
    Trophy Points:
    65
  12. Alek5

    Alek5 Member

    Joined:
    1 Sep 2013
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    6
    thanks for sharing ;)
     
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K