[You must be registered and logged in to see this image.]Backtrack Hacking DVD Tutorials-P2P
XviD | MP3 VBR | 6.3GB
Here is a P2P release of a set of tutorials on how to use the famous linux distro Backtrack for hacking! Interesting stuff! For the tutorial list check the NFO. You probably want to get to know linux before you try these out. Covers a wide range of topics, from WEP to MySQL injection.
Backtrack Hacking DVD Tutorials (Full DVD) Bonus Hacking video | 24 Episode | Size: 6.32 GB
Include:
Installing Backtrack 3
Episode 1 Network Hacking Arp Poisoning
Episode 2 Wireless Hacking Cracking WEP
Episode 3 Wireless Hacking DeAuth
Episode 5 Lock Picking Bump Key
Episode 6 Phone Phreaking Beige Box
Episode 7 Phone Phreaking/Network Hacking Sniffing VOIP
Episode 8 Lock Picking DIY Padlock Shims
Episode 9 Lock Picking Mult-Disc Combo Locks
Episode 10 Hacking Basics MD5
Episode 11 Website Hacking Sql Injection
Episode 12 Hacking Basics Backtrack
Episode 13 Website Hacking XSS
Episode 14 Staying Secure SSH Tunnel
Episode 15 Modding Xbox Softmod
Episode 16 Wireless Hacking Cracking WPA
Episode 17 Triple Boot Windows, Backtrack, & Ubuntu
Episode 18 Local Password Cracking
Episode 19 Lock Picking Basics
Episode 20 Ettercap
Episode 21 XSS Tunnel
Episode 22 Playstation 2 Softmod
Episode 23 Cracking WEP Update
Episode 24 Bypass Hotspotв s Access Controls
Underground Install Backtrack 3 on USB
Underground CSRF(Cross Site Request Forgery)
Underground Alternate Data Streams
Underground Local File Inclusion
Underground Windows Privilege Escalation
Underground Bluetooth Hacking
Underground VMWare
Underground Fix Google Mail Enumerator
Underground Home Made Lock Picks
Underground Downfalls of Anti-Virus Software Part 2
Underground Downfalls of Anti-Virus Software
Underground Evilgrade
Underground Trojan Basics
Underground Manipulating Windows User Accounts
Underground Combine Files
Underground Password Phishing
Underground Windows SMB Relay Exploit
Underground Application Patching
Underground Metasploit Autopwn
Underground Email Spoofing
Underground Introduction
Extracting Database Information from Information_Schema
FPGA MD5 Cracker
Arduino ARP Cop
Email Injection
Ping of Death
DNS Spoofing with Virtual Hosts
Bypass Cisco Clean Access & Cisco NAC Appliance
Dual Boot Windows & Backtrack
Sql Injection Challenge How-to
How to use Intel Pro/Wireless 3945ABG in Backtrack 2
Local Privilege Escalation Vulnerability in Cisco VPN Client
Lesson Outline (78 lessons)
Download Links
Filesonic[You must be registered and logged in to see this link.]Fileserve[You must be registered and logged in to see this link.]Uploading[You must be registered and logged in to see this link.]