You are on page 1of 5

E-BOOK NAME[The Secret of Hacking]

CONTENTS OF THIS BOOK:-(TOTAL PAGES - 163)


1. INTRODUCTION TO REAL HACKING
2. ADVANCED MALWARE RESEARCH
3. WINDOWS HACKING
4. PASSWORD HACKING
5. EMAIL HACKING
6. WEB APPLICATION HACKING
7. WEBSITE DEFACEMENT &DOMAIN HACKING
8. MISCELLANEOUS HACKING
9. MOBILE &COMPUTER FORENSIC
10. VOIP&WIRELESS HACKING
11. VULNERABILITY DISCOVERY &PENETRATION TESTING
12. ADVANCE HACKING WITH METASPLOIT
13. FIREWALL, IDS & HONEY POT HACKING.
14. SECURING SYSTEM & NETWORKS
LINKS
FEEDBACK

E-BOOK NAME[Hacking Gmail]


CONTENTS OF THIS BOOK:-(TOTAL PAGES - 310)
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . xvii
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . xix
Part I: Starting to Use Gmail . . . . . . . . . . . . . . . . . . . . . . . . .
. 1
Chapter 1: Desktop Integration . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . 3
Chapter 2: Integrating Your Existing Mail. . . . . . . . . . . . . . . . . . . .
. . . . . . 11
Chapter 3: Gmail Power Tips . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 15
Part II: Getting Inside Gmail . . . . . . . . . . . . . . . . . . . . . . . . .
27
Chapter 4: Skinning Gmail . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 29
Chapter 5: How Gmail Works . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 53
Chapter 6: Gmail and Greasemonkey . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 91
Chapter 7: Gmail Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 117
Chapter 8: Checking for Mail . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 137
Chapter 9: Reading Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 151
Chapter 10: Sending Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 161
Part III: Conquering Gmail . . . . . . . . . . . . . . . . . . . . . . . . . 167

Chapter 11: Dealing with Labels . . . . . . . . . . . . . . . . . . . . . . . .


. . . . . . 169
Chapter 12: Addressing Addresses . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 177
Chapter 13: Building an API from the HTML-Only Version of Gmail. . . . . . . . .
. 183
Chapter 14: Exporting Your Mail. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 197
Chapter 15: Using Gmail to . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 203
Chapter 16: Using GmailFS . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 213
Appendix: Long Code Listings . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 223
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . 275

E-BOOK NAME[The Hacker's Underground Handbook]


CONTENTS OF THIS BOOK:-(TOTAL PAGES - 116)
A. Introduction.................................................................
.............................5
1. How can I use this eBook?
2. What is a hacker
3. Hacker Hierarchy
4. What does it take to become a hacker?
5. Disclaimer
B. Programming..................................................................
..........................9
1. Do I really need it?
2. Where should I start?
3. Best way to learn
C. Linux........................................................................
...............................12
1. What is it?
2. Choosing a distribution
3. Running Linux
4. Learning Linux
D. Passwords....................................................................
...........................33
1. Password Cracking
2. Phishing
3. Countermeasures
4. More Programs
E. Network Hacking..............................................................
.......................48
1. Foot printing
2. Port Scanning
3. Banner Grabbing
4. Searching for Vulnerabilities
5. Penetrating
6. Countermeasures

F. Wireless Hacking.............................................................
........................70
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4. Countermeasures
G. Windows Hacking..............................................................
.....................79
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures
H. Malware......................................................................
...........................93
1. Definitions
2. ProRat
3. Countermeasures
I. Web Hacking..................................................................
.......................104
1. Cross Site Scripting
2. Remote File Inclusion
3. Local File Inclusion
J. Conclusion...................................................................
.........................114
1. Congratulations
2. Keep Learning

E-BOOK NAME[Hacking Secrets Revealed]


CONTENTS OF THIS BOOK:-(TOTAL PAGES - 77)
Disclaimer
Introduction i
C H A P T E R 1
System Intrusion in 15 Seconds 1
C H A P T E R 2
The Trojan Horse 1
The Hack 15
NewsGroups 18
Grapevine 18
Email 19
Un-Safe Websites 19
IRC 19
ChatSites 19
C H A P T E R 3
Acceptable Files 20
Readme & Text Files 20
Chapter 4
Who are Hackers 24

Anarchist Hackers 24
Hackers 25
Crackers 26
Chapter 5
Tools of the Trade 27
Portscanners 28
Trojans 29
Joiners 34
ICQ 34
Chapter 6
Access Granted 36
Bank Account Information 37
Email 39
Pictures 39
Resume 39
Survellance Via Internet Connection 40
C H A P T E R 7
How To protect Yourself 42
Firewalls 43
Antivirus Software 44
Tips & Tricks 45
Protecting Shared Resources 49
Disabling File and Printer Sharing 55
Oh No My system's Infected 59
Chapter 8
Every Systems Greatest Flaw 60
Chapter 9
How to Report Hackers 65
Chapter 10
Final Words 74

E-BOOK NAME[Hacking - The Art of Exploitation]


CONTENTS OF THIS BOOK:Chapter
Chapter
Section
Section
Section
Section
Section
Section
Section
Section
Chapter
Section

0x100.
0x200.
0x210.
0x220.
0x230.
0x240.
0x250.
0x260.
0x270.
0x280.
0x300.
0x310.

INTRODUCTION
PROGRAMMING
What Is Programming?
Pseudo-code
Control Structures
More Fundamental Programming Concepts
Getting Your Hands Dirty
Back to Basics
Memory Segmentation
Building on Basics
EXPLOITATION
Generalized Exploit Techniques

Section 0x320.
Section 0x330.
Section 0x340.
Section 0x350.
Chapter 0x400.
Section 0x410.
Section 0x420.
Section 0x430.
Section 0x440.
Section 0x450.
Section 0x460.
Section 0x470.
Section 0x480.
Chapter 0x500.
Section 0x510.
Section 0x520.
Section 0x530.
Section 0x540.
Section 0x550.
Chapter 0x600.
Section 0x610.
Section 0x620.
Section 0x630.
Section 0x640.
Section 0x650.
Section 0x660.
Section 0x670.
Section 0x680.
Section 0x690.
Section 0x6a0.
Section 0x6b0.
Section 0x6c0.
Chapter 0x700.
Section 0x710.
Section 0x720.
Section 0x730.
Section 0x740.
Section 0x750.
Section 0x760.
Section 0x770.
Section 0x780.
Chapter 0x800.
Section 0x810.
Section 0x820.
COLOPHON
Index

Buffer Overflows
Experimenting with BASH
Overflows in Other Segments
Format Strings
NETWORKING
OSI Model
Sockets
Peeling Back the Lower Layers
Network Sniffing
Denial of Service
TCP/IP Hijacking
Port Scanning
Reach Out and Hack Someone
SHELLCODE
Assembly vs. C
The Path to Shellcode
Shell-Spawning Shellcode
Port-Binding Shellcode
Connect-Back Shellcode
COUNTERMEASURES
Countermeasures That Detect
System Daemons
Tools of the Trade
Log Files
Overlooking the Obvious
Advanced Camouflage
The Whole Infrastructure
Payload Smuggling
Buffer Restrictions
Hardening Countermeasures
Nonexecutable Stack
Randomized Stack Space
CRYPTOLOGY
Information Theory
Algorithmic Run Time
Symmetric Encryption
Asymmetric Encryption
Hybrid Ciphers
Password Cracking
Wireless 802.11b Encryption
WEP Attacks
CONCLUSION
References
Sources

You might also like