hxxp://avaxhome.ws/software/software_type/security/EHC-CEHv6.html
QuoteThis class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Obviously if you're interested in that sort of thing.
Interesting, but not interesting enough to download 100+ individual files.
The company paid for me to take this class... it was terrible. The information was ancient and the examples were poor.
Which courses would you recommend then? Say for someone with no computer experience beyond basic or competent knowledge of Windows?
Quote from: Cain on December 07, 2009, 05:59:07 PM
Which courses would you recommend then? Say for someone with no computer experience beyond basic or competent knowledge of Windows?
Hrmmmm, thats a good question.
Well, I'll try to rephrase my first thoughts...
The class teaches you what you need to do in order to pass a CEH test. The value of CEH is questionable in the industry. If you want to learn "how to hack" this material provides you with some basics... most of which are examples that have been fixed for years. If you're entirely new to the whole topic, there might be some value for you there.
I'd say the value would be similar to a class that uses WWI and WWII tactics to train our next gang of soldiers headed to Afghanistan.
Generally, I'd look for any of the SANS classes... they're usually entry level classes, but they're up to date and taught by active professionals. If you find any pirated PDF's from SANS they'll probably provide far more value to you.
Well I'm mostly looking at personal computer security...though I'd be lying if I said the offensive potential didn't interest me.
OK, cheers, I'll see if I can find anything.
What about something more intermediate, but without assuming a huge amount of knowledge on security?
Quote from: Cain on December 07, 2009, 06:13:02 PM
Well I'm mostly looking at personal computer security...though I'd be lying if I said the offensive potential didn't interest me.
OK, cheers, I'll see if I can find anything.
AH! Hrmmm, I'll poke around and see if I can find something useful from a personal perspective.
Quote from: Requia ☣ on December 07, 2009, 06:14:28 PM
What about something more intermediate, but without assuming a huge amount of knowledge on security?
SANS would fit there... it's basically for people that are in IT and are newish to InfoSec.
Will keep an eye out for it then.
Quote from: Requia ☣ on December 07, 2009, 05:39:27 PM
Interesting, but not interesting enough to download 100+ individual files.
Yeah I wondered about that .. these are like 120 files hosted on these "wait XX seconds" filesharing hosts, how do you download those without spending ages at those sites?
Rapidshare was "out of free user slots", and Easy-Share gave me the first file with 20 seconds waiting time, but the second time it made me wait 500 seconds! I could probably fix that by clearing the cookie or hacking the javascript, but even then ...
The point is to convince you to get the premium service. The uploaders get kickbacks for any referrals they get that way.
Frankly, even if I had the premium service it would too much work.
Browser plugins like SkipScreen help with some of that, as do download managers. But it still sucks.
BitTorrent, IMO
Quote from: Requia ☣ on December 07, 2009, 06:47:15 PM
The point is to convince you to get the premium service.
Yeah I get that much, but ... as long as I'm pirating I'm not gonna pay for things, that stands to reason.
And Brotep, thanks I was wondering about that. I suppose that's a Firefox extension?
000, yup...skipscreen.com
to get past the time lag, try getting to the site through a proxy. You can either go through another web page or your browser (you may know how to do this, but someone earlier said with basic knowledge of windows or something. I dont think setting up proxies are THAT basic, but not hard either. Usually when it comes to rapidshare, I dont use it. I get anywhere from at least 300kB-1MB data transfer. Cable modem, and the pole is in my backyard. Im about 100 feet from the main box in the alley. Super fast. I can get a 700mb dvdrip in about 10-15 minutes... But, yeah, my suggestion would be torrents. For faster transfers and for ebooks on how to hack. Also, do you want to do like, wardriving and stuff, breaking into peoples interwebs and routers, or do you actually want to hack IPs? If its the latter I think you may want to start learning unix. There are ALOT of little programs in UNIX that automate the hacking process nowadays..
Im no expert by any means. Just wanted to be a hacker when I was a kid, but I could never be bothered to learn how to program. LIke learning Latin and Algebra at the same time. Not fun..
Quote from: Hangshai on December 11, 2009, 04:58:47 PM
Also, do you want to do like, wardriving and stuff, breaking into peoples interwebs and routers, or do you actually want to hack IPs? If its the latter I think you may want to start learning unix. There are ALOT of little programs in UNIX that automate the hacking process nowadays..
:lulz: :horrormirth:
Hacking is a mindset, a behavior pattern based on knowledge. There is not a tool that will automate 'the hacking process'. There are tools that can be used by hackers... there are assessment tools that can tell you where a vulnerability might be... but hacking is really about understanding the principles and architecture of protocols, daemons, services, etc etc etc. Figuring out how to make the computer go beyond its design parameters (through manipulation of vulnerabilities, if you're talking about Cracking specifically).
"Want to hack IP's" is a nonsensical statement. :argh!:
:lulz:
I dont know what the fuck Im talking about ask someone else. I just meant that if you were to hack a personal computer, you would use their ip as an address to get to their computer from your computer. To me, it seems easier to just say hack an ip. Ive never done it, just read about it, and thats how i visualized it in my mind. Although I may very well be getting it wrong, as Ive never known a REAL hacker, i wont deny that I dont know what Im talking about. Just read about it when I was kid. You know, kevin mitnik and whatever... Sorry, wasnt trying to be an asshole, just sarcastic. But I guess thats could be misread as the same thing very easily, ill tone it down a bit.
Quote from: Hangshai on December 11, 2009, 05:41:53 PM
Ok, let me rephrase. Sorry to all you 'REAL' hackers out there.. Im sorry if I offended you with my pedestrian definition of the whole thing. What I meant was, if you were to actually try to hack someones computer, ie try to get at them through their ip, whether it be a network or a personal home computer or whatever, you should probably use unix, and there ARE programs that you can use to automate the process. I already said Im not l337 or anything. Damn, just go buy a copy of 2600 and masturbate to the international phone booth pics...
How do you hack an IP?
I still have a box of old 2600s in my basement. And that other one. I wasn't a "hacker" though. :lulz:
Hangshai, thanks for your thoughts. I already know quite a bit about computer security (and so does Rat, it's his job, even), I guess I could "hack" certain things, yeah. But "Hacking" (capital H!) is a littlebit like stage magic, once you know how something is really done, it's no longer "magic", but just a trick. For example, simply guessing someone's password and getting lucky is a real simple form of hacking. If you use some technical or social know-how to get a correct guess faster, it's all just tricks.
The mindset Rat talks about is the way to find those tricks. It basically amounts to tinkering, playing and poking at things that act in unexpected ways when you poke them, then figuring out how to use this unexpected behaviour to make a system do something that was not previously thought possible.
Anyway, you are probably right I would have better luck trying to find this book via torrent, I hadn't looked yet, TBH.
Also, you speak of proxies. Yes I do know how they work and how to use them. What I am curious about is, most proxylists I find consist of 90% "dead" proxies, where do you get yours?
Or were you speaking about the web-based proxies, where you surf through another webpage (instead of a HTTP proxy, which you have to config in your browser), like various "anonymising" services?