Advertisement
87aCk_X

links for tools

Sep 29th, 2013
3,037
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 77.78 KB | None | 0 0
  1. http://www.darknet.org.uk/2010/05/metasploit-3-4-0-hacking-framework-released-over-100-new-exploits-added/
  2. http://www.techwatch.co.uk/2008/01/29/update-for-metasploit-exploit-tool/
  3. http://www.darknet.org.uk/2009/11/metasploit-3-3-released-exploitation-framework/
  4. http://www.vulnerabilityassessment.co.uk/wmap_meta.htm
  5. http://www.darknet.org.uk/2006/11/metasploit-27-released-automated-hacking/
  6. http://www.darknet.org.uk/2006/12/metasploit-30-beta-3-released/
  7. http://wiki.mccune.org.uk/index.php/Metasploit
  8. http://www.theregister.co.uk/2007/04/02/metasploit_3/
  9. http://www.itjobswatch.co.uk/jobs/uk/metasploit.do
  10. http://www.bookdepository.co.uk/Metasploit-Penetration-Testers-Guide-David-Kennedy/9781593272883
  11. http://www.mccune.org.uk/blog/metasploit/
  12. http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
  13. http://www.darknet.org.uk/2007/03/metasploit-exploit-framework-version-30-released/
  14. http://www.metasploit.com/modules/
  15. http://twitter.com/metasploit
  16. http://www.mccune.org.uk/blog/2009/07/oracle-mixin-hi.html
  17. http://www.irongeek.com/i.php?page=videos/metasploit1
  18. http://www.ethicalhacker.net/content/view/29/24/
  19. http://decloak.net/
  20. http://www.pentestit.com/tag/metasploit/
  21. http://www.theregister.co.uk/2008/09/08/scada_exploit_released/
  22. https://community.rapid7.com/community/metasploit/blog
  23. http://blog.metasploit.com/2007/09/root-shell-in-my-pocket-and-maybe-yours.html
  24. http://www.metasploit.com/learn-more/
  25. http://dev.metasploit.com/redmine/projects/framework
  26. http://www.rapid7.com/products/metasploit-pro.jsp
  27. http://blog.metasploit.com/2006/07/month-of-browser-bugs.html
  28. http://www.youtube.com/watch?v=Pn5oDRFrqmQ
  29. http://www.metasploit.com/learn-more/how-do-i-use-it/documentation.jsp
  30. http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html
  31. http://www.symantec.com/connect/articles/metasploit-framework-part-1
  32. http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html
  33. http://www.youtube.com/watch?v=RuZk4AMoPhc
  34. http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html
  35. http://dev.metasploit.com/redmine/projects/framework/wiki/
  36. http://blog.metasploit.com/2009/12/exploiting-microsoft-iis-with.html
  37. http://www.fastandeasyhacking.com/
  38. http://www.rapid7.com/products/metasploit-framework.jsp
  39. http://blog.metasploit.com/2008/11/ms08-067-metasploit-and-smb-relay.html
  40. http://dev.metasploit.com/redmine/projects/framework/wiki/WMAP
  41. http://blog.metasploit.com/2010/04/persistent-meterpreter-over-reverse.html
  42. http://dev.metasploit.com/redmine/projects/framework/wiki/Karmetasploit
  43. http://blog.metasploit.com/2006/09/metasploit-30-automated-exploitation.html
  44. http://en.wikibooks.org/wiki/Metasploit
  45. http://blog.metasploit.com/2009/11/metasploit-framework-33-released.html
  46. http://blog.metasploit.com/2008/07/on-dns-attacks-in-wild-and-journalistic.html
  47. http://www.rapid7.com/downloads/metasploit-express.jsp
  48. http://blog.metasploit.com/2010/08/better-faster-stronger.html
  49. http://www.symantec.com/connect/articles/metasploit-framework-part-3
  50. http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html
  51. http://www.rapid7.com/metasploit-announcement.jsp
  52. http://blog.metasploit.com/2010/05/metasploit-framework-340-released.html
  53. http://www.securitytube.net/video/1175
  54. http://blog.metasploit.com/2011/04/happy-april-fools-day.html
  55. http://blog.metasploit.com/2010/05/introducing-metasploitable.html
  56. http://www.symantec.com/connect/articles/metasploit-framework-part-2
  57. http://blog.metasploit.com/2009/09/metasploit-33-development-updates.html
  58. http://www.csoonline.com/article/591768/rapid7-launches-metasploit-express
  59. http://blog.metasploit.com/2010/03/automating-metasploit-console.html
  60. http://www.irongeek.com/i.php?page=videos/metasploit-class
  61. http://blog.metasploit.com/2009/10/metasploit-rising.html
  62. http://www.internetnews.com/security/article.php/3932941/Metasploit 37 Accelerates Security Testing.htm
  63. http://blog.metasploit.com/2008/01/metasploit-framework-v31-released.html
  64. http://blog.metasploit.com/2011/05/metasploit-framework-370-released.html
  65. http://www.rapid7.com/products/metasploit/compare-and-buy.jsp
  66. http://blog.metasploit.com/2007/04/exploiting-ani-vulnerability-on-vista.html
  67. http://www.rapid7.com/downloads/metasploit-pro.jsp
  68. http://blog.metasploit.com/2011/02/metasploit-framework-352-released.html
  69. http://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X
  70. http://www.zdnet.com/blog/security/metasploit-and-scada-exploits-dawn-of-a-new-era/7672
  71. http://blog.metasploit.com/2010/03/locate-and-exploit-energizer-trojan.html
  72. http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/smb/ms08_067_netapi.rb
  73. http://www.networkworld.com/community/blog/metasploit-35-release-brings-62-more-exploits
  74. http://blog.metasploit.com/2011/03/metasploit-framework-360-released.html
  75. http://www.securityfocus.com/columnists/439
  76. http://blog.metasploit.com/2008/07/evilgrade-will-destroy-us-all.html
  77. http://blog.metasploit.com/2010/02/postgres-fingerprinting.html
  78. http://www.metasploit.com/learn-more/how-do-i-use-it/trainings.jsp
  79. http://blogs.mcafee.com/mcafee-labs/conficker-worm-using-metasploit-payload-to-spread
  80. http://threatpost.com/en_us/blogs/metasploit-launches-reward-program-exploits-061411
  81. http://blog.metasploit.com/2009/10/smb2-351-packets-from-trampoline.html
  82. http://dev.metasploit.com/redmine/projects/framework/wiki/Release_Notes_33
  83. http://blog.metasploit.com/2010/04/java-web-start-argument-injection.html
  84. http://blog.metasploit.com/2010/03/latest-adobe-exploit-and-session.html
  85. http://www.metasploit.com/get-involved/
  86. http://www.offensive-security.com/metasploit-unleashed/Introduction
  87. http://blog.metasploit.com/2007/10/cracking-iphone-part-1.html
  88. http://www.youtube.com/watch?v=8TqMDzBiM9Q
  89. http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
  90. http://www.offensive-security.com/backtrack/metasploit-with-mysql-in-backtrack-4-r2/
  91. http://www.offensive-security.com/metasploit-unleashed/SET
  92. http://blog.metasploit.com/2010/12/metasploit-framework-351-released.html
  93. http://www.howtoforge.com/installing-metasploit-3.0-on-ubuntu-7.10
  94. http://blog.metasploit.com/2008/07/bailiwicked.html
  95. http://www.offensive-security.com/offsec/metasploit-3-4-and-set-on-iphone-4/
  96. http://blog.metasploit.com/2007/10/cracking-iphone-part-21.html
  97. http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie
  98. http://blog.metasploit.com/2007/10/cracking-iphone-part-2.html
  99. http://www.blackhat.com/presentations/bh-usa-09/TRAMMELL/BHUSA09-TrammellDruid-MetasploitTele-PAPER.pdf
  100. http://blog.metasploit.com/2009/12/metasploit-framework-333-exploit.html
  101. http://blog.metasploit.com/2009/02/best-defense-is-information.html
  102. http://threatpost.com/en_us/blogs/metasploit-holding-siemens-exploits-052311
  103. http://www.rapid7.com/
  104. http://spool.metasploit.com/
  105. http://blog.metasploit.com/2010/10/one-year-later-metasploit-framework-350.html
  106. https://community.rapid7.com/community/metasploit/blog/2011/06/14/metasploit-exploit-bounty-30-exploits-500000-in-5-weeks
  107. http://www.metasploit.com/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh
  108. http://www.linux.com/archive/feature/61609
  109. http://www.metasploit.com/learn-more/what-is-it/
  110. http://blog.metasploit.com/2007/10/cracking-iphone-part-3.html
  111. http://www.net-security.org/secworld.php?id=10982
  112. http://www.esecurityplanet.com/news/article.php/3932861/Metasploit-37-Takes-Aim-at-Apple-iOS.htm
  113. http://pauldotcom.com/2010/07/metasploit-new-gui.html
  114. http://secmaniac.blogspot.com/2008/07/metasploit-3-on-iphone.html
  115. http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv
  116. http://news.softpedia.com/news/Metasploit-Offers-Bounties-for-Exploits-206615.shtml
  117. http://nostarch.com/metasploit.htm
  118. http://blog.metasploit.com/2006/07/internet-drive-by-shootings.html
  119. http://www.offensive-security.com/metasploit-unleashed-training/msfu-update/
  120. http://www.metasploit.com/modules/exploit/
  121. http://dev.metasploit.com/redmine/attachments/download/95
  122. http://docs.google.com/viewer?a=v&q=cache:L2ft-eLThDgJ:dev.metasploit.com/redmine/attachments/download/95 Metasploit&hl=en&pid=bl&srcid=ADGEESi-Hdye4bwnasNUSTTEx4JgGFgfMROKK4du_byCpxr1L2JpGK1OA6-bA0wHXCaw9FfnebML7qHk8C18-wQLfahe2D3-HtHNIf_yVFGJP9baUmm38lFM4KukS5jDGkef3wVszJ_y&sig=AHIEtbRr63BFZ_W8a85omRH9TTgBQFWFwQ" onmousedown="return rwt(this,'','','','145','AFQjCNFCs45Qk1v8zFS0Tjft83wBk0Az4g','','0CBsQxQEwBDiMAQ')">Quick View</a><br>Advisory to Exploit Using <em>Metasploit</em>. Timbuktu Pro PlughNTCommand Named Pipe  Buffer Overflow bannedit bannedit0@gmail.com. (12/16/2009) <b>...</b><br><span class=a>dev.<b>metasploit</b>.com/redmine/attachments/download/95</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://blog.metasploit.com/2011/01/mobile-device-security-and-android-file.html
  123. http://www.rec-sec.com/2010/03/10/internet-explorer-iepeers-use-after-free-exploit/
  124. http://blog.metasploit.com/2010/04/penetration-testing-learn-assembly.html
  125. http://blog.metasploit.com/2006/03/browser-fuzzing-for-fun-and-profit.html
  126. http://blog.metasploit.com/2010/11/win32-respin.html
  127. http://www.ethicalhack3r.co.uk/security/metaspoits-meterpreter/
  128. http://www.digininja.org/metasploit/dns_dhcp.php
  129. http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
  130. http://www.metasploit.com/modules/exploit/windows/browser/awingsoft_winds3d_sceneurl
  131. http://www.freshports.org/security/metasploit/
  132. http://www.net-security.org/secworld.php?id=10706
  133. http://www.internetnews.com/security/article.php/3927501/New Metasploit 36 Targets Security Compliance.htm
  134. http://www.rapid7.com/news-events/press-releases/2009/2009-rapid7-acquire-metasploit.jsp
  135. http://www.osnews.com/story/23937/Past_Present_and_Future_of_Metasploit
  136. http://www.internetnews.com/security/article.php/3917721/Metasploit-351-Targets-Cisco-Networking-Gear.htm
  137. http://dev.metasploit.com/redmine/projects/framework/wiki/Release_Notes_34
  138. http://blog.metasploit.com/2009/02/pathetic-ddos-vs-security-sites.html
  139. http://dev.metasploit.com/users/opcode/disabled.html
  140. http://www.securitytube.net/video/1176
  141. http://oreilly.com/catalog/9781593272883
  142. http://blog.metasploit.com/2008/02/rise-security-vs-asus-eee-pc.html
  143. http://www.penetrationtests.com/Frameworks/Free-frameworks/Metasploit-Tutorials/
  144. http://www.metasploit.com/modules/exploit/windows/http/amlibweb_webquerydll_app
  145. http://www.securityhunk.com/2010/11/metasploit-guide-for-beginners-and.html
  146. http://blog.metasploit.com/2007/01/update-on-status-of-30.html
  147. http://blog.metasploit.com/2011/03/adobe-flash-cve-2011-0609.html
  148. http://revision3.com/hak5/ipv6-mubix-metasploit
  149. http://www.skullsecurity.org/blog/2010/weaponizing-dnscat-with-shellcode-and-metasploit
  150. http://volatile-minds.blogspot.com/2010/09/rvm-and-metasploit.html
  151. https://community.rapid7.com/community/metasploit/blog/2011/06/21/metasploit-framework-372-released
  152. http://blog.teusink.net/2010/07/hacking-wireless-presenters-with.html
  153. http://blog.metasploit.com/2009/12/metasploit-331-nexpose-community.html
  154. http://www.fastandeasyhacking.com/manual
  155. http://www.youtube.com/watch?v=DV5wOQQ72_0
  156. http://www.youtube.com/watch?v=TfZt70TYujg
  157. http://asert.arbornetworks.com/2009/02/metasploit-and-other-sites-ddosed/
  158. http://www.metasploit.com/modules/exploit/windows/fileformat/moxa_mediadbplayback
  159. http://www.internetnews.com/security/print.php/3932941
  160. http://carnal0wnage.attackresearch.com/node/417
  161. http://blog.metasploit.com/2009/09/nss-labs-endpoint-protection-test.html
  162. http://www.metasploit.com/modules/auxiliary/
  163. http://exploit.co.il/hacking/metasploit-java-meterpreter-payload/
  164. http://blog.metasploit.com/2009/05/mastering-metasploit-framework.html
  165. http://www.learnsecurityonline.com/security-dashboard/good-blogs/93-metasploit
  166. http://blog.metasploit.com/2010/07/metasploit-framework-341-released.html
  167. http://www.esecurityplanet.com/news/article.php/3896811/Whats-Next-for-Metasploit.htm
  168. http://searchnetworkingchannel.techtarget.com/tip/Traffic-Talk-Testing-Snort-with-Metasploit
  169. http://www.rapid7.com/news-events/press-releases/2010/2010-introduces-metasploit-pro.jsp
  170. http://blog.metasploit.com/2010/12/capturing-windows-logons-with.html
  171. https://community.rapid7.com/community/metasploit
  172. http://searchsecurity.techtarget.com/tip/Using-Metasploit-for-real-world-security-tests
  173. http://dualcoremusic.com/nerdcore/858/metasploit-song/
  174. http://www.jeffcross.me/2009/04/28/installing-metasploit-on-mac-os-x/
  175. http://www.exploit-id.com/author/metasploit
  176. http://it.slashdot.org/story/11/06/14/1714205/Metasploit-Launches-Exploit-Bounty-Program
  177. http://www.metasploit.com/modules/exploit/windows/browser/ms10_018_ie_behaviors
  178. http://dev.metasploit.com/redmine/projects/pro/wiki/Updates_341
  179. http://www.sans.org/security-training/metasploit-kung-fu-enterprise-pen-testing-1472-mid
  180. http://blogs.securiteam.com/index.php/archives/1371
  181. http://www.theregister.co.uk/security/
  182. http://www.mi5.gov.uk/
  183. http://en.wikipedia.org/wiki/Security
  184. http://www.reliancesecurity.co.uk/
  185. http://www.kingdomsecurity.co.uk/
  186. http://www.cl.cam.ac.uk/~rja14/book.html
  187. http://www.nsi.org.uk/
  188. http://certification.comptia.org/getCertified/certifications/security.aspx
  189. http://www.compoundsecurity.co.uk/
  190. http://www.tandf.co.uk/journals/titles/09636412.asp
  191. https://cybersecuritychallenge.org.uk/
  192. http://skillsforsecurity.org.uk/
  193. http://www.cl.cam.ac.uk/research/security/
  194. http://www.v3.co.uk/blog/security-watchdog-blog
  195. http://www.bsia.co.uk/
  196. http://www.isg.rhul.ac.uk/
  197. http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf?CID=PDF&amp;PLA=furl&amp;CRE=nationalsecuritystrategy
  198. http://www.thecst.org.uk/
  199. http://www.guardian.co.uk/world/2011/mar/17/un-security-council-resolution
  200. http://www.thecst.org.uk/
  201. http://www.dft.gov.uk/pgr/security/
  202. http://www.cl.cam.ac.uk/~rja14/econsec.html
  203. http://scholar.google.com/scholar?hl=en&amp;lr=&amp;cites=12387169498425705417&amp;um=1&amp;ie=UTF-8&amp;ei=xAMITryBDImDtgfXqo3fDQ&amp;sa=X&amp;oi=science_links&amp;ct=sl-citedby&amp;resnum=5&amp;ved=0CB4QzgIwBDgU">Cited by 15</a> - <a class=fl href="http://scholar.google.com/scholar?hl=en&amp;lr=&amp;q=related:ycM3XgcR6KsJ:scholar.google.com/&amp;um=1&amp;ie=UTF-8&amp;ei=xAMITryBDImDtgfXqo3fDQ&amp;sa=X&amp;oi=science_links&amp;ct=sl-related&amp;resnum=5&amp;ved=0CB8QzwIwBDgU">Related articles</a><br>The economics of <em>security</em> is a hot and rapidly growing field of research. More and more people are coming to realise that <em>security</em> failures are often due to <b>...</b><br><span class=a>www.cl.cam.ac.uk/~rja14/econsec.html</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.adt.co.uk/
  204. http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191634.pdf?CID=PDF&amp;PLA=furl&amp;CRE=sdsr
  205. http://www.coopersecurity.co.uk/
  206. http://www.nactso.gov.uk/
  207. http://www.bbc.co.uk/2/hi/technology/7784908.stm
  208. http://www.coopersecurity.co.uk/
  209. http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191634.pdf?CID=PDF&amp;PLA=furl&amp;CRE=sdsr
  210. http://www.nactso.gov.uk/
  211. http://www.bbc.co.uk/2/hi/technology/7784908.stm
  212. http://www.direct.gov.uk/en/TravelAndTransport/Foreigntravel/AirTravel/index.htm
  213. http://www.pcadvisor.co.uk/advisor/security/
  214. http://en.wikipedia.org/wiki/Computer_security
  215. http://www.guardian.co.uk/world/2011/mar/17/libya-united-nations-air-strikes-live
  216. http://www.get-licensed.co.uk/security-licence/
  217. http://www.hmrc.gov.uk/security/index.htm
  218. http://www.tsa.gov/
  219. http://www.kingsltd.co.uk/
  220. http://www.allsafesecurityservices.co.uk/
  221. http://www.adsgroup.org.uk/
  222. http://www.arrowsecurityshutters.co.uk/
  223. http://www.bbc.co.uk/news/technology-12819330
  224. http://www.fsa.gov.uk/pubs/other/data_security.pdf
  225. http://docs.google.com/viewer?a=v&q=cache:iYJObe-wosAJ:www.fsa.gov.uk/pubs/other/data_security.pdf Security&hl=en&pid=bl&srcid=ADGEESgozn_Hiem1Qzxd96l-aApm8GtaLSi7pQnichMfM2xyFTM8oirTaBjG2jGoF0FY9kgwsuTvZD0OSZmgRILdmqIZmdZorsa4dacHIbHkSYuExQco3qjljOPbYb6Yl8ZLm62wruOz&sig=AHIEtbTZfPJlw0QF_JkSHutWq3Z-lzo1Mg" onmousedown="return rwt(this,'','','','49','AFQjCNFbx_tBlOKhZ9NUb8x1glomcKucAg','','0CDIQxQEwCDgo')">Quick View</a><br><em>security</em> factsheets that we will make available to them on our website and <b>...</b> proportionate, risk-based approach to data <em>security</em>, taking into account <b>...</b><br><span class=a>www.fsa.gov.uk/pubs/other/data_<b>security</b>.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.bbc.co.uk/news/world-middle-east-12751234
  226. http://www.bbc.co.uk/news/world-us-canada-11923766
  227. http://www.dsdni.gov.uk/
  228. http://www.bbc.co.uk/news/technology-10865288
  229. http://www.guardian.co.uk/global-development/food-security
  230. http://www.bbc.co.uk/news/technology-13453497
  231. http://www.telegraph.co.uk/news/worldnews/asia/pakistan/8488236/WikiLeaks-Osama-bin-Laden-protected-by-Pakistani-security.html
  232. http://www.bbc.co.uk/news/technology-10761210
  233. http://www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf
  234. http://docs.google.com/viewer?a=v&q=cache:Wq7d9Y2i8TQJ:www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf Security&hl=en&pid=bl&srcid=ADGEESh1pWFXGzvUYuRaLZ4S8YIFtv_DAgXxtfqlWZrN0_koV_QXZvHmPwu6oLLiCtAszG49_Brk6n-G1s0-pWH6S5RtLg9WzWK8h5C2GT6kGeahiaqmtf7GuCDInhmsilSY_yYNqj8Z&sig=AHIEtbTA0UltF_kF3hZ-kasgMqUvWDcVDA" onmousedown="return rwt(this,'','','','59','AFQjCNEdCbY3klfcEB3EFPsz3NVniCgBww','','0CDIQxQEwCDgy')">Quick View</a><br><span dir=ltr>10 Aug 2007</span> &ndash; Chapter 2: Overview: the Internet and  personal <em>security</em> <b>...</b> Maintaining <em>security</em><wbr>—patching and <em>security</em> software <b>...</b><br><span class=a>www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/.../165i.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.bbc.co.uk/news/technology-13560137
  235. http://www.bbc.co.uk/news/uk-politics-13338508
  236. http://www.cl.cam.ac.uk/~rja14/psysec.html
  237. http://www.bbc.co.uk/news/technology-13712377
  238. http://www.bitdefender.co.uk/
  239. http://www.bbc.co.uk/news/uk-england-manchester-12594245
  240. http://www.guardian.co.uk/technology/2011/feb/07/anonymous-attacks-us-security-company-hbgary
  241. http://www.bbc.co.uk/news/business-11793436
  242. http://www.theregister.co.uk/2011/05/27/honda_data_breach/
  243. http://www.bbc.co.uk/news/technology-12380987
  244. http://www.bbc.co.uk/news/technology-13615091
  245. http://www.hmrc.gov.uk/security/examples.htm
  246. http://www.bbc.co.uk/news/technology-10912376
  247. http://www.theregister.co.uk/2011/05/13/veracode_playstation_hack_analysis/
  248. http://www.bbc.co.uk/2/hi/technology/8544413.stm
  249. http://www.telegraph.co.uk/travel/travelnews/8300223/Mice-trained-for-airport-security.html
  250. http://www.bbc.co.uk/news/world-south-asia-10999753
  251. http://www.bluetack.co.uk/
  252. http://www.bbc.co.uk/news/business-11632944
  253. http://www.bbc.co.uk/news/science-environment-13389320
  254. http://www.bbc.co.uk/news/world-middle-east-13327815
  255. http://www.bbc.co.uk/news/technology-13454201
  256. http://www.bbc.co.uk/news/world-us-canada-13290274
  257. http://www.bbc.co.uk/news/technology-12759922
  258. http://www.bbc.co.uk/news/business-13011918
  259. http://www.guardian.co.uk/global-development/poverty-matters/2011/jun/20/bolivia-food-security-prices-agriculture
  260. http://www.bbc.co.uk/news/world-13815399
  261. http://www.theregister.co.uk/2010/12/18/gawker_hack_aftermath/
  262. http://www.theregister.co.uk/2011/04/26/ms_third_party_bug_advisories/
  263. http://www.bbc.co.uk/news/world-africa-12589434
  264. http://www.bbc.co.uk/news/technology-10731612
  265. http://www.bbc.co.uk/news/10829951
  266. http://www.bbc.co.uk/news/uk-11571766
  267. http://www.bbc.co.uk/news/world-us-canada-13740591
  268. http://www.bbc.co.uk/news/business-13276490
  269. http://www.bbc.co.uk/news/world-europe-13417958
  270. http://www.axis-security.co.uk/
  271. http://www.theregister.co.uk/2010/12/16/social_media_threats/
  272. http://www.techwatch.co.uk/
  273. http://www.bbc.co.uk/news/world-middle-east-12125143
  274. http://www.bbc.co.uk/news/10116606
  275. http://www.theregister.co.uk/2010/09/13/hp_buys_arcsight/
  276. http://www.theregister.co.uk/2011/03/15/intel_mcafee_deal/
  277. http://www.bbc.co.uk/news/world-europe-12273145
  278. http://www.babysecurity.co.uk/
  279. http://www.alertsystems.co.uk/
  280. http://www.symbiosec.co.uk/
  281. http://www.theregister.co.uk/2011/02/02/ryanair_booking_system_security/
  282. http://www.cellsecurity.co.uk/
  283. http://www.guardian.co.uk/world/2010/nov/16/guantanamo-uk-kenneth-clarke
  284. http://www.theregister.co.uk/2010/04/15/emergency_java_patch/
  285. http://www.networkworld.com/topics/security.html
  286. http://www.guardian.co.uk/world/us-national-security
  287. http://www.securityfocus.com/
  288. http://www.ssa.gov/
  289. http://www.computerworld.com/s/topic/17/Security
  290. http://www.bbc.co.uk/2/hi/programmes/newsnight/9505747.stm
  291. http://www.adt.com/
  292. http://cordis.europa.eu/fp7/security/home_en.html
  293. http://www.dhs.gov/
  294. http://www.g4s.com/
  295. http://www.investorwords.com/4446/security.html
  296. http://www.pandasecurity.com/
  297. http://www.bbc.co.uk/news/uk-12374262
  298. http://www.facebook.com/security
  299. http://en.wikipedia.org/wiki/Information_security
  300. http://www.openbsd.org/security.html
  301. http://www.w3.org/Security/
  302. http://en.wikipedia.org/wiki/National_security
  303. http://www.debian.org/security/
  304. http://support.apple.com/kb/HT1222
  305. http://www.mcafee.com/
  306. http://www.un.org/Docs/sc/
  307. http://www.whitehouse.gov/issues/homeland-security
  308. http://en.wikipedia.org/wiki/Network_security
  309. http://php.net/manual/en/security.php
  310. http://www.cisco.com/en/US/products/hw/vpndevc/index.html
  311. http://csrc.nist.gov/
  312. https://cms.paypal.com/cgi-bin/marketingweb?cmd=_render-content&amp;content_ID=security/online_security_center
  313. http://www.microsoft.com/en-us/security_essentials/geo/
  314. http://www.chubb.com.au/
  315. http://www.rsa.com/
  316. http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/index.html
  317. http://arstechnica.com/security/
  318. http://www.opera.com/security/
  319. http://www.usenix.org/event/bytopic/security.html
  320. http://www.mozilla.org/security/known-vulnerabilities/
  321. http://www.securityoncampus.org/
  322. http://msdn.microsoft.com/en-us/security/aa570330
  323. http://xkcd.com/538/
  324. http://www.net-security.org/
  325. http://www.webopedia.com/TERM/S/security.html
  326. http://cit.nih.gov/Security/
  327. http://digitalenterprise.org/security/security.html
  328. http://www.ssa.gov/disability/
  329. http://www.tsa.gov/travelers
  330. http://news.cnet.com/security/
  331. http://www.cloudsecurityalliance.org/
  332. https://www.pcisecuritystandards.org/
  333. http://www.dmoz.org/Computers/Security/
  334. http://www.whitehouse.gov/administration/eop/nsc/
  335. http://www.google.com/apps/intl/en/business/infrastructure_security.html
  336. http://dictionary.reference.com/browse/security
  337. http://www.oracle.com/technetwork/java/javase/tech/index-jsp-136007.html
  338. http://voices.washingtonpost.com/securityfix/
  339. http://www.us-cert.gov/cas/tips/
  340. http://en.blog.wordpress.com/2011/04/13/security/
  341. http://ope.ed.gov/security/
  342. http://download.oracle.com/javase/1.4.2/docs/guide/security/
  343. http://www.cert.org/homeusers/HomeComputerSecurity/
  344. http://static.springsource.org/spring-security/site/
  345. http://www.google.com/about/corporate/company/security.html
  346. http://www.nsa.gov/
  347. http://security.symantec.com/
  348. http://www.gwu.edu/~nsarchiv/
  349. http://www.facebook.com/help/?page=420
  350. http://www.cisco.com/web/learning/le3/ccie/security/
  351. http://www.ca.com/us/replace-hardware-tokens.aspx
  352. http://www.microsoft.com/technet/security/current.aspx
  353. http://www.flickr.com/photos/carbonnyc/2294144289/
  354. http://oreilly.com/pub/topic/security
  355. https://www.ssfcu.org/
  356. http://security.ittoolbox.com/
  357. http://en.wikipedia.org/wiki/Security_guard
  358. http://www.redhat.com/security/
  359. http://www.security.org/
  360. http://messenger.yahoo.com/security/
  361. http://www.asial.com.au/
  362. http://www.dslreports.com/forum/security
  363. http://www.securityexpo.com.au/
  364. http://www.ibm.com/developerworks/security/
  365. http://www.skype.com/intl/en-us/security/
  366. http://code.google.com/speed/public-dns/docs/security.html
  367. http://www.homesecuritystore.com/
  368. http://aws.amazon.com/security/
  369. http://www.ibm.com/security/
  370. http://www.iwar.org.uk/hackers/resources/digital rebels/articles/unixhck.txt
  371. http://www.d3scene.com/forum/development/3676-tutorial-how-hack-someone-knowing-his-ip.html
  372. http://www.hackingalert.com/hacking-articles/hotmail-hacking-guide.php
  373. http://www.puremango.co.uk/2009/05/hacking-facebook/
  374. http://www.cashloopholes.co.uk/free-computer-internet-loopholes-secrets/15224-tutorial-4-hacking-websites.html
  375. http://sethioz.co.uk/forum/viewtopic.php?f=49&amp;t=80&amp;start=80
  376. http://www.se-satio.co.uk/viewtopic.php?f=15&amp;t=2657&amp;start=20
  377. http://sethioz.co.uk/forum/viewtopic.php?f=49&amp;t=80&amp;start=40
  378. http://www.darknet.org.uk/2007/07/learn-to-use-metasploit-tutorials-docs-videos/
  379. http://www.breakthesecurity.com/
  380. http://www.hacktronics.co.uk/tutorial-hack-3-55-firmware-ps3-jaibreak-no-mod-chip/
  381. http://www.hackforums.net/forumdisplay.php?fid=47
  382. http://themostboringblogintheworld.wordpress.com/2006/08/29/huge-collection-of-hack-tutorial-videos-download/
  383. http://www.kwintessential.co.uk/KwintBlog/blog/culture/multicultural/techmantrasethical-hacking-tutorialspenetration-testinghacking-toolsexploits-144/
  384. http://www.darknet.org.uk/2006/09/web-based-e-mail-hotmail-yahoo-gmail-hackhacking-with-javascript/
  385. http://www.youtube.com/watch?v=igub7ZF5p40
  386. http://www.cashloopholes.co.uk/wifi-hacks-secrets/2493-hacking-cracking-wep-using-backtrack-beginners-guide.html
  387. http://www.dailymail.co.uk/sciencetech/article-1391297/How-takes-just-15-minutes-web-tuition-hack-email.html
  388. http://www.businesscomputingworld.co.uk/novices-learn-how-to-hack-in-15-minutes/
  389. http://www.hacktronics.co.uk/ps3-hacked-file-manager-challenge-lobby-tutorial/
  390. http://sharereactor.com/release/14646-1000-hacking-tutorials.htm
  391. http://www.hackingalert.com/hacking-articles/hacking-tutorials.php
  392. http://www.theageofmammals.com/top8/styleindex.html
  393. http://a.com.pk/1000-hacking-tutorials-tips-tricks/
  394. http://kyrionhackingtutorials.com/
  395. http://www.insidehighered.com/blogs/university_diaries/hacking_tutorial
  396. http://www.metawing.com/
  397. http://www.youtube.com/watch?v=lBGN5OGCPgI
  398. http://ethical-hacking-tutor.blogspot.com/
  399. http://thepiratebay.org/torrent/4880442/1000_Hacking_Tutorials_(The_Best_of_2008)_[RH]
  400. http://www.youtube.com/watch?v=zBCYAEudCM8
  401. http://windows-x.tripod.com/id15.html
  402. http://www.youtube.com/watch?v=axPB_2uynN4
  403. http://www.gametrailers.com/video/mind-hacking-mindjack/702790
  404. http://www.youtube.com/watch?v=qqG-w4vBdCs
  405. http://www.tutorialsdownload.com/Ethical-Hacking.php
  406. http://lib.ru/SECURITY/hackalot.txt
  407. http://www.youtube.com/watch?v=O-LBEa1NYqA
  408. http://rhg.rubyforge.org/
  409. http://www.youtube.com/watch?v=_jvspXzM2eY
  410. http://drivl.com/ethical-hacking-tutorial.html
  411. http://www.youtube.com/watch?v=szrFPqoTKG0
  412. http://www.infosyssec.com/infosyssec/hackhow1.htm
  413. http://www.youtube.com/watch?v=FGFHUOnngmU
  414. http://themostboringblogintheworld.wordpress.com/2007/05/09/hacking-tutorial-info-sec/
  415. http://www.youtube.com/watch?v=k8OdgyMzySg
  416. http://hiroshimamovies.altervista.org/blog/2011/06/03/1000-hacking-tutorials/
  417. http://www.youtube.com/watch?v=zzUeG0yzc6g
  418. http://www.ladyada.net/learn/electroknit/
  419. http://www.youtube.com/watch?v=1EtWA4vc2V0
  420. http://cs.wellesley.edu/~cs342/fall06/hacking-notes.pdf
  421. http://docs.google.com/viewer?a=v&q=cache:YMfLeGA4QeoJ:cs.wellesley.edu/~cs342/fall06/hacking-notes.pdf Hacking+Tutorial&hl=en&pid=bl&srcid=ADGEESiLzHaZi-FCQ-kin90pojq5XsQVmv4t-Njenk0IHQeBWui8JyEnbVlRs5p38zcd6Kdsse3ygnFP-6qDOheZIaslNjDYI_rve5ev4ww3Jy4Dmha_8nOTXY-iGVQ8IWNEXb57ey4o&sig=AHIEtbQhSuwC7aAyyUqZbpDDNABFfc-8bA" onmousedown="return rwt(this,'','','','57','AFQjCNHr9ZiHp42G1b8dFeai5PF2YMFndQ','','0CCkQxQEwBjgy')">Quick View</a><br><span dir=ltr>14 Nov 2006</span> &ndash; <em>Hacking Tutorial</em> Notes. These are some notes about the material covered in the Fri. Nov. 10 and Sun. Nov. 12 hacking tutorials. <b>...</b><br><span class=a>cs.wellesley.edu/~cs342/fall06/<b>hacking</b>-notes.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.youtube.com/watch?v=5S83valMh0Q
  422. http://apex.vtc.com/ethical-hacking.php
  423. http://www.youtube.com/watch?v=yOuULqeFYD4
  424. http://www.youtube.com/watch?v=q3lqDj1lOMc
  425. http://www.hacktronics.co.uk/
  426. http://www.youtube.com/watch?v=kGsI-rEFEXY
  427. http://daimonsoft.blogspot.com/2010/04/1000-hacking-tutorials.html
  428. http://www.youtube.com/watch?v=03taqew9-UE
  429. http://www.techwatch.co.uk/forums/26035-dreambox-500s-and-all-sky-channels.html
  430. http://www.youtube.com/watch?v=UAK9GVj-oJw
  431. http://hackingalert.blogspot.com/2011/03/ultimate-hacking-tutorial-and-e-books.html
  432. http://www.youtube.com/watch?v=nV5uooHPx3Q
  433. http://www.youtube.com/watch?v=JRHmwzDgbHI
  434. http://www.hackingalert.com/hacking-articles/google-hacks.php
  435. http://www.youtube.com/watch?v=9P-HbQoOFhw
  436. http://www.techmantras.com/content/1000-great-hacking-tutorials-2010-newbies
  437. http://www.youtube.com/watch?v=0xwDTV6w_rU
  438. http://www.sharetermpapers.com/computer-sc-it/(tuts)-easy-hacking-tutorial-(-a-must-for-any-computer-sc-it-proffessional)/
  439. http://www.youtube.com/watch?v=7X_wGuJwXGs
  440. http://www.hackforums.net/
  441. http://forums.devshed.com/security-and-cryptography-17/looking-for-a-technical-hacking-tutorial-266058.html
  442. http://www.textfiles.com/hacking/UNIX/
  443. http://nintendo-ds.dcemu.co.uk/
  444. http://seclists.org/pen-test/2008/Jan/95
  445. http://www.youtube.com/watch?v=i2pFl7qDvtI
  446. http://www.hackinghome.com/category/hacking-tutorial-videos
  447. http://www.youtube.com/watch?v=BaQ7kt0ov1M
  448. http://www.ps3hax.net/
  449. http://www.youtube.com/watch?v=dtFuFTKS4SA
  450. http://themostboringblogintheworld.wordpress.com/2006/09/08/hacking-tutorial-for-beginners-windows-xp-security/
  451. http://www.hackanonymous.com/
  452. http://www.youtube.com/watch?v=mQ2Y23zzHEY
  453. http://www.wireless-warrior.org/detail/1464/spoonfed-hacking-how-to-crack-wep-local-hacking-tutorial.html
  454. http://ebookee.org/1000-Best-ever-Great-hacking-tutorials-2009_410170.html
  455. http://securityh4x.blogspot.com/2010/01/500-hacking-tutorials.html
  456. http://hetland.org/writing/instant-hacking.html
  457. http://www.youtube.com/watch?v=EI3mpVqoTsI
  458. http://www.stillhq.com/diary/lca2005/000030.html
  459. http://www.youtube.com/watch?v=EhgzQUWm3HQ
  460. http://www.youtube.com/watch?v=sFzuPZZ1nrU
  461. http://ebookee.org/23-Best-Hacking-Tutorial-Videos_781797.html
  462. http://www.youtube.com/watch?v=usgoVJtf-a8
  463. http://vinasupport.com/2009/hacking-tutorial-2009/
  464. http://www.computer-training-software.com/ethical-hacking.htm
  465. http://www.youtube.com/watch?v=jWOfDVRU38o
  466. http://www.youtube.com/watch?v=LSYLckoYs-c
  467. http://hackiteasy.blogspot.com/2011/01/wireless-hacking-tutorial-using.html
  468. http://www.youtube.com/watch?v=TXKxG0RMFMU
  469. http://www.youtube.com/watch?v=omhMibrhgCE
  470. http://hacknmod.com/hack/how-to-hack-a-wep-wireless-network/
  471. http://www.metacafe.com/watch/4344239/gunz_hacking_tutorial_part_1_4_cocaine_dll/
  472. http://tech.royans.net/2003/02/notes-from-hacking-tutorial.html
  473. http://www.facebook.com/pages/Hacking-Tutorial/107584109259994
  474. http://www.youtube.com/watch?v=fe6DfeqJFb8
  475. http://www.youtube.com/watch?v=Y2Kng-ikyp8
  476. http://www.kongregate.com/games/Xzer/anti-hacking-tutorial
  477. http://www.youtube.com/watch?v=ofR8J51un3o
  478. http://secureslash.com/learn-hacking/windows-admin-access-hacking/
  479. http://www.mappingwireless.com/wardriving/hacking-tutorial-videos-collection
  480. http://ebookee.org/Video-FULL-Collection-Hacking-Tutorials-KL_902690.html
  481. http://www.youtube.com/watch?v=uWxGHSIz-Eg
  482. http://www.youtube.com/watch?v=sjM5VikA-yw
  483. http://www.youtube.com/watch?v=x_mXo2BFAWU
  484. http://www.youtube.com/watch?v=K7wfa-4hNl4
  485. http://www.youtube.com/watch?v=IAdbjCZt21w
  486. http://torrentz.eu/7a9c6c36c231e8cf4173e4d9ed3342976a524db3
  487. http://ebookee.org/Video-Hacking-Tutorials-FULL-Collection_828595.html
  488. http://leetupload.com/tutorials/hackingspoonfed/part1/
  489. http://www.youtube.com/watch?v=hxH4UsQPPQg
  490. http://www.youtube.com/watch?v=Ia8NtCmZc4A
  491. http://www.youtube.com/watch?v=GHgeewdXb9w
  492. http://crack0hack.wetpaint.com/page/Website hacking complete tutorial
  493. http://www.youtube.com/watch?v=wT-iMzK5GQo
  494. http://digg.com/news/technology/facebook_profile_picture_hack_tutorial
  495. http://www.facebook.com/pages/Hacking-Tutorial-Tips-And-Trick/183056785051995
  496. http://www.metacafe.com/watch/2381965/adventure_quest_hacking_tutorial_1_hit_kill/
  497. http://www.youtube.com/watch?v=vAI4HdPA0pc
  498. http://www.youtube.com/watch?v=_S5fSRgITjw
  499. http://ebookee.org/Hacking-Tutorial-Videos-Collection_546886.html
  500. http://lib.misto.kiev.ua/SECURITY/hackalot.txt
  501. http://ronikrich.blogspot.com/2011/03/complete-hacking-tutorials.html
  502. http://www.youtube.com/watch?v=7-PDl8Koy9k
  503. http://www.youtube.com/watch?v=6z9niwQHJuM
  504. http://www.youtube.com/watch?v=avu0r3gt7m0
  505. http://leetupload.com/tutorials/hackingspoonfed/part1/
  506. http://www.youtube.com/watch?v=hxH4UsQPPQg
  507. http://www.facebook.com/pages/Hacking-Tutorial-Tips-And-Trick/183056785051995
  508. http://www.youtube.com/watch?v=Ia8NtCmZc4A
  509. http://www.youtube.com/watch?v=GHgeewdXb9w
  510. http://crack0hack.wetpaint.com/page/Website hacking complete tutorial
  511. http://www.youtube.com/watch?v=OTSMhGnw0N0
  512. http://www.onlinefreeebooks.net/free-ebooks-computer-programming-technology/hacking-related/
  513. http://www.youtube.com/watch?v=wT-iMzK5GQo
  514. http://www.qj.net/search/psp-hacking-tutorial.html
  515. http://thecyndicate.com/Communication/content.php?139-PS3-IDA-Hacking-Tutorial
  516. http://www.youtube.com/watch?v=j6Bb_8Zc_As
  517. http://www.docstoc.com/docs/13543302/Hacking-Tutorial
  518. http://ohsoninja.wordpress.com/2008/04/20/the-ultimate-hacking-tutorial-the-gibson/
  519. http://www.youtube.com/watch?v=fndmBzuyoGM
  520. http://www.softwaretrainingtutorials.com/hack-pen-test.php
  521. http://5530xpressmusic.com/nokia-5530-hacking-tutorial/
  522. http://www.youtube.com/watch?v=xrDUE2xCsVM
  523. http://www.dl4all.com/u1q/tag/Slick Hacking Pro Hacking Tutorial.html
  524. http://www.youtube.com/watch?v=W70z8vqkg6M
  525. http://ebookee.org/-MULTI-Hacking-Tutorials-Video-Collection_761326.html
  526. http://www.nokiasymbianthemes.com/explore/the-ultimate-symbian-hacking-guide-tools-issues-software-firmware
  527. http://www.youtube.com/watch?v=38w-CaRnOqY
  528. http://hackingalert.blogspot.com/2011/03/advanced-hacking-tutorials-for-those.html
  529. http://www.reference.com/motif/Computers/wireless-network-hacking-tutorial
  530. http://www.youtube.com/watch?v=rl9oLblOQJk
  531. http://www.youtube.com/watch?v=jR7ut-q3JJA
  532. http://www.iphoneworld.ca/iphone-hacking-guide/
  533. http://www.btscene.eu/details/2215073/1000 Windows tips and Hacking Tutorials AiO OCTOBER 2010 best.html
  534. http://ebookee.org/1000-bestever-great-hacking-tutorials-2010_663554.html
  535. http://www.youtube.com/watch?v=zuzNIHDqVX4
  536. http://www.techmantras.com/
  537. http://www.youtube.com/watch?v=73EHfC66k_8
  538. http://vishnuvalentino.com/
  539. http://oussamedia.com/portail/hacking-tutorial-videos-collection-english-subtitle-english-built-in-aprox-3-hours-1024-x-768-680-x-460-swf-avi-mp3-128kbps-663-mb/
  540. http://www.google-al.de.tl/500-hacking-tutorials.htm
  541. http://www.docstoc.com/docs/34909163/Index-of-Ebook---Hacker---Ita-Cracking-Hacking-Tutorial-1000-
  542. http://ebookee.org/1000-Hacking-Tutorials-The-Best-of-2008-_444803.html
  543. http://www.youtube.com/watch?v=V5PT5RMD2lg
  544. http://www.hacking-tutorial.co.cc/
  545. http://www.youtube.com/watch?v=gYJynHkrcdI
  546. http://www.youtube.com/watch?v=nqoO6NVvvoM
  547. http://www.youtube.com/watch?v=lzngbfJQLJM
  548. http://www.encyclopedia.com/video/lBGN5OGCPgI-kismac-hacking-tutorial-how-to.aspx
  549. http://www.youtube.com/watch?v=JGM5Wp5KH60
  550. http://www.hackforums.net/showthread.php?tid=33596
  551. http://blog.spywareguide.com/2008/01/bank-hacking-tutorial-is-ardam.html
  552. http://www.docstoc.com/docs/74529481/hacking-tutorial
  553. http://forums.penhacks.net/Thread-how-to-hack-your-wii-via-banner-bomb
  554. http://www.youtube.com/watch?v=K79nPCJ5Nro
  555. http://www.youtube.com/watch?v=VwmAA8tAi68
  556. http://allthehackingtoolsyouneed.blogspot.com/2010/02/1000-hacking-tutorials-must-have.html
  557. http://themostboringblogintheworld.wordpress.com/2006/09/09/more-hacking-tutorial-videos-video-download/
  558. http://freebooksdownload.blogspot.com/2010/11/1000-hacking-tutorials-free-download.html
  559. http://www.darknet.org.uk/2007/11/inguma-005-released-for-download-penetration-testing-toolkit/
  560. http://sourceforge.net/projects/inguma/develop
  561. http://www.darknet.org.uk/2007/12/inguma-006-released-for-download-free-pen-testing-framework/
  562. http://www.ehacking.net/2011/03/inguma-free-penetration-testing-toolkit.html
  563. http://www.inguma-framework.org/projects/inguma/wiki/ConsoleQuickStart
  564. http://packages.ubuntu.com/lucid/all/inguma/filelist
  565. http://www.youtube.com/watch?v=RHgB2ia9jLc
  566. http://www.aldeid.com/index.php/Inguma/CLI/Modules:Exploits/Exploitdb
  567. http://ohsoninja.wordpress.com/page/2/
  568. http://www.inguma-framework.org/projects/inguma/wiki/GettingStarted
  569. http://www.securityhunk.com/2011/01/new-inguma-free-penetration-and.html
  570. http://www.macshadows.com/forums/lofiversion/index.php?t9210.html
  571. http://blog.red-database-security.com/2007/10/20/inguma-free-oracle-penetration-toolkit-from-joxean-koret/
  572. http://www.brothersoft.com/inguma-241841.html
  573. http://www.darknet.org.uk/category/database-hacking/
  574. http://blog.red-database-security.com/2007/10/22/running-inguma-plsql-fuzzer-against-10203-with-october-2007-cpu/
  575. http://www.pentestit.com/tag/inguma/
  576. http://johncrackernet.blogspot.com/2011/02/inguma-penetration-testing-toolkit.html
  577. http://www.macshadows.com/forums/index.php?showtopic=9210
  578. http://www.pentestit.com/2011/01/19/inguma-penetration-testing-vulnerability-research-toolkit/
  579. http://www.macshadows.com/forums/index.php?showtopic=9182
  580. http://tools.securitytube.net/index.php?title=Inguma
  581. http://www.garage4hackers.com/showthread.php?1008-Inguma-v.0.3-Released
  582. http://sickness.tor.hu/?cat=7
  583. http://nukeit.org/tag/matriux/
  584. http://sickness.tor.hu/?p=259
  585. http://nukeit.org/tag/linux/
  586. http://nukeit.org/protech-live-ubuntu-based-linux-pentest-distro/
  587. http://www.pentestit.com/tag/vulnerability-scanner/
  588. http://sickness.tor.hu/?tag=metasploit
  589. http://www.pentestit.com/2009/06/12/sapyto-sap-penetration-testing-framework/
  590. http://sickness.tor.hu/?tag=hacking
  591. http://www.pentestit.com/tag/system-security/
  592. http://sickness.tor.hu/?tag=backtrack
  593. http://www.pentestit.com/2011/01/10/collection-python-tools-penetration-testers/
  594. http://forums.pentoo.ch/viewtopic.php?f=7&amp;t=1008
  595. http://www.coresec.org/tag/testing/
  596. http://www.pentestit.com/2010/04/18/ubuntu-pentest-edition-live-dvd/
  597. http://www.coresec.org/tag/penetration/
  598. http://www.pentestit.com/2011/04/06/retina-community-vulnerability-assessment-scanner-released/
  599. http://nukeit.org/matriux-0-9-4-beta1-security-distro/
  600. http://www.pentestit.com/2010/11/21/update-secmic-v404/
  601. http://www.backtrack-linux.org/forums/backtrack-videos/32489-owning-windows-xp-shared-folder.html
  602. http://www.pentestit.com/2010/02/14/owaspbwa-owasp-broken-web-applications-project-tool/
  603. http://www.securityhunk.com/
  604. http://www.pentestit.com/2011/06/14/packetfu-midlevel-packet-manipulation-library-ruby/
  605. http://www.linuxac.org/forum/archive/index.php/t-12111.html" dir=rtl class=l onmousedown="return rwt(this,'','','','53','AFQjCNEDzs5zxZDluk77xPAeRT4OGpNyBw','','0CA4QFjACODI')">شرح <em>Inguma</em> Penetration Testing &amp; Vulnerability Research Toolkit <b>...</b></a></h2><table border=0 cellpadding=0 cellspacing=0><tr><td class="j"><div class=std><div class="f">11 posts&nbsp;-&nbsp;8 authors&nbsp;-&nbsp;Last post:&nbsp;29 Oct 2010</div><span dir=rtl>http://br4v3-h34r7.com/wp-content/uploads/2008/06/<em>inguma</em>-about.png تحتوي مجموعة <em>Inguma</em> على <b>...</b> http://ingumadocs.angelfire.com/<em>tutorial</em>.html <b>...</b></span><br><span class=a>www.linuxac.org/forum/archive/index.php/t-12111.html</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.pentestit.com/2010/08/18/update-nmapsi4-02-beta3/
  606. http://www.pentestit.com/2010/11/16/update-owaspbwa-v092rc2/
  607. http://www.pentestit.com/2011/02/07/sharepoint-googlediggity-dictionary-file/
  608. http://www.pentestit.com/2011/04/14/update-cvechecker-v31/
  609. http://www.pentestit.com/2010/10/06/secmic-penetration-testing-distribution/
  610. http://www.pentestit.com/2011/06/20/pastebin-scraper/
  611. http://www.pentestit.com/2011/03/29/update-weaknet-v5/
  612. http://www.pentestit.com/2011/04/16/mcafee-sharescan/
  613. http://www.pentestit.com/2010/07/07/tcpsniffer-raw-winsocket-based-sniffer-implementation/
  614. http://www.pentestit.com/2011/04/24/update-nmapsi4-v021-2/
  615. http://www.pentestit.com/2009/12/19/hostmap-tool-enumerate-operating-system-hostnames-virtual-hosts/
  616. http://www.pentestit.com/2010/03/11/plecost-tool-wordpress-finger-printer/
  617. http://www.mundodoshackers.com.br/ferramenta-para-pentests-inguma
  618. http://www.pentestit.com/2011/01/22/update-nmapsi4-v021/
  619. http://www.darknet.org.uk/2010/07/fxcop-net-framework-security-analysis-tool/
  620. http://www.pentestit.com/2011/06/06/update-pastenum-v2/
  621. http://www.pentestit.com/2011/06/06/update-pastenum-v2/
  622. http://trac.pentoo.ch/wiki/Tools_List
  623. http://www.pentestit.com/2010/11/11/update-puzlbox-v1022/
  624. http://airodump.net/wep-crack-video-tutorial-beginner/
  625. http://www.pentestit.com/2009/12/30/update-hostmap-021/
  626. http://esploit.blogspot.com/p/pentestoolz.html
  627. http://www.pentestit.com/2010/05/11/update-iscanner-05/
  628. http://sickness.tor.hu/?p=42
  629. http://www.pentestit.com/2010/04/01/hackers-automated-seo-poisoning-attacks-distribute-malware/
  630. http://www.pentestit.com/2010/10/24/update-secmic-v4-beta-2/
  631. http://www.red-database-security.com/exploits/oracle_sql_injection_oracle_lt_findricset2.html
  632. http://www.pentestit.com/2010/11/09/update-plecost-v0229beta/
  633. http://airodump.net/category/video/
  634. http://www.pentestit.com/2011/01/17/puck-live-cd-top-penetration-testing-tools/
  635. http://sickness.tor.hu/?p=273
  636. http://www.pentestit.com/2010/07/19/pentestit-post-day-blackbox-web-vulnerability-scanners/
  637. http://apps.facebook.com/blognetworks/blog/subhashdasyam
  638. http://www.pentestit.com/2009/10/10/nat-probe-test-hosts-nat-local-area-network/
  639. http://www.pentestit.com/2010/12/21/update-secunia-personal-software-inspector-v20/
  640. http://www.linuxac.org/forum/showthread.php?12111-Inguma-Penetration-Testing-amp-Vulnerability-Research-Toolkit" dir=rtl class=l onmousedown="return rwt(this,'','','','93','AFQjCNHcHBZTpEcJZ9krBEVBUIJctkr5Sg','','0CA4QFjACOFo')">شرح <em>Inguma</em> Penetration Testing &amp; Vulnerability Research Toolkit</a></h2><table border=0 cellpadding=0 cellspacing=0><tr><td class="j"><div class=std><div class="f">11 posts&nbsp;-&nbsp;5 authors&nbsp;-&nbsp;Last post:&nbsp;29 Oct 2010</div><span dir=rtl>http://br4v3-h34r7.com/wp-content/uploads/2008/06/<em>inguma</em>-about.png تحتوي مجموعة <em>Inguma</em> على <b>...</b> http://ingumadocs.angelfire.com/<em>tutorial</em>.html <b>...</b></span><br><span class=a>www.linuxac.org/forum/showthread.php?12111-<b>Inguma</b>-Penetration...</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.pentestit.com/tag/penetration-testing/
  641. http://airodump.net/airdropng-video-presentation-security-conference-shmoocon-2010/
  642. http://airodump.net/cracking-wpa-psk-wifi-security/
  643. http://www.pentestit.com/2010/01/17/karmetasploit-tool-build-wireless-hotspot-sniffer/
  644. http://www.secuobs.com/revue/news/310812.shtml
  645. http://www.pentestit.com/2009/03/10/list-business-fuzzers/
  646. http://sickness.tor.hu/?p=19
  647. http://www.glopeda.com/detail/1576/ncircle-ip360-vulnerability-management.html
  648. http://blog.red-database-security.com/2008/12/
  649. http://www.pentestit.com/2011/04/29/update-live-hacking-dvd-v13-beta/
  650. http://www.pentestit.com/2009/09/18/update-nessus-version/
  651. http://www.pentestit.com/2010/12/29/update-blackbuntu-community-edition-01/
  652. http://www.youtube.com/watch?v=nJLsJt-Q-Eg
  653. http://airodump.net/category/security/
  654. http://nukeit.org/author/admin/page/8/
  655. http://www.pentestit.com/2011/03/04/update-scapy-v220/
  656. http://www.ehacking.net/2011/05/sql-power-injector-tutorial.html
  657. http://www.pentestit.com/2009/09/16/scanex-scanning-vulnerable-iframe-script-injections/
  658. http://www.dihitt.com.br/n/humor/2011/06/11/cone-ing-uma-nova-forma-de-tomar-sorvete
  659. http://www.ehacking.net/2011/03/footprinting-information-gathering.html
  660. http://www.ehacking.net/2011/04/darkjumper-automatic-tool-tutorial.html
  661. http://www.pentestit.com/2010/07/11/create-bootable-windows-7-usb-drive-sbb-tool/
  662. http://www.pentestit.com/tag/yersinia/
  663. http://www.pentestit.com/2010/10/17/sdl-regex-fuzzer-test-regular-expressions-potential-denial-service-vulnerabilities/
  664. http://airodump.net/packet-injection-wifi-intel-4965/
  665. http://www.ehacking.net/2011/06/how-to-install-backtrack-5-dual-boot.html
  666. http://www.ehacking.net/2011/04/nikto-vulnerability-scanner-tutorial.html
  667. http://www.ehacking.net/2011/06/integrate-nmap-with-nessus-tutorial.html
  668. http://www.ehacking.net/2011/04/infondlinux-script-for-security-tools.html
  669. http://www.ehacking.net/2011/06/integrate-nessus-with-metasploit.html
  670. http://www.ehacking.net/2011/06/how-to-use-armitage-in-backtrack-5.html
  671. http://www.ehacking.net/2011/05/web-application-attack-and-audit.html
  672. http://www.ehacking.net/2011/03/maltego-information-gathering-tool.html
  673. http://sickness.tor.hu/?p=14
  674. http://sickness.tor.hu/?p=97
  675. http://www.subhashdasyam.com/
  676. http://sickness.tor.hu/?p=281
  677. http://sickness.tor.hu/?p=269
  678. http://gretongerzdesain.wordpress.com/category/tentang-hacker-and-craker/
  679. http://www.pentestit.com/2010/11/04/hardening-windows-7-windows-server-2008-steps/
  680. http://www.pentestit.com/2011/03/11/ianalizer-integrity-analyzer-sap/
  681. http://www.pentestit.com/2011/04/13/cvechecker-tool-report-vulnerabilities-system/
  682. http://www.pentestit.com/2011/03/23/pastenum-tool-pastebin-pastie-enumeration/
  683. http://www.pentestit.com/2011/02/11/openscap-security-content-automation-protocol-tool/
  684. http://www.darknet.org.uk/darknet-archives/
  685. http://www.pentestit.com/2011/02/25/open-source-penetration-testing-bookmarks-collection/
  686. http://www.pentestit.com/2011/02/03/upadte-blackbuntu-ce-v02/
  687. http://www.pentestit.com/2009/07/10/bind-audit-cache-poisoning-scanner/
  688. http://www.pentestit.com/2010/06/17/update-lens-v1200/
  689. http://sickness.tor.hu/?author=1&amp;paged=2
  690. http://www.pentestit.com/2010/11/02/update-katana-v20-aka-y0jmb0-released/
  691. http://airodump.net/category/wifislax/
  692. http://www.pentestit.com/2010/08/31/dllhijackauditor-audit-dll-hijacking-vulnerability/
  693. http://sickness.tor.hu/?p=17
  694. http://www.pentestit.com/2010/12/24/wackopicko-website-vulnerabilities/
  695. http://www.pentestit.com/2011/05/23/puzzlemall-vulnerable-web-application-practicing-session-puzzling/
  696. http://www.pentestit.com/2010/08/08/ikat-interactive-kiosk-attack-tool/
  697. http://www.pentestit.com/2010/05/18/lens-ethical-hacking-aspnet/
  698. http://www.hackingtricks.in/2011/03/how-to-crash-small-websites-using-rdos.html
  699. http://www.pentestit.com/2011/04/04/update-nexpose-v4111/
  700. http://sickness.tor.hu/?p=232
  701. http://www.garage4hackers.com/forumdisplay.php?10-Network-Vulnerabiltity-Assessment-amp-Penetration-Testing
  702. http://www.dgodam.com/2011/03/ssh-tunneling-to-bypass-internet.html
  703. http://www.thesparteens.com/eu/component/content/article/129-kafe-antzoki-bilbo
  704. http://www.horseb.net/html/7731/7731.html
  705. http://airodump.net/windows-vista-hacking/
  706. http://www.pentestit.com/2011/03/27/update-oat-v304/
  707. http://www.hackingtricks.in/2011/03/firewall-bypassing-using-httptunnel.html
  708. http://www.pentestit.com/2010/06/18/integrate-nmap-nse-vulnerability-scanner/
  709. http://airodump.net/category/firewall/
  710. http://sickness.tor.hu/?p=152
  711. http://www.secuobs.com/revue/news/296427.shtml
  712. http://sickness.tor.hu/?p=197
  713. http://sickness.tor.hu/?p=207
  714. http://sickness.tor.hu/?p=283
  715. http://www.ehacking.net/2011/06/crack-ssl-using-sslstrip-with.html
  716. http://4li3n.posterous.com/
  717. http://sickness.tor.hu/?p=82
  718. http://sickness.tor.hu/?p=239
  719. http://www.pentestit.com/tag/web-debugging-proxy/
  720. http://airodump.net/aircrack-ng-optimalization-cpu-sse2/
  721. http://www.subhashdasyam.com/2011_06_01_archive.html
  722. http://johncrackernet.blogspot.com/
  723. http://airodump.net/fixing-slap-get-in-backtrack-3/
  724. http://www.governmentsecurity.org/forum/index.php?showtopic=31376
  725. http://dc406.com/index.php?start=48
  726. http://www.dgodam.com/2011/01/russix-wireless-penetration-testing.html
  727. http://www.pentestit.com/2011/01/03/list-portable-hardware-devices-penetration-testing/
  728. http://www.ehacking.net/2011/06/how-to-install-backtrack5.html
  729. http://www.ehacking.net/2011/05/kismet-wireless-sniffer.html
  730. http://esploit.blogspot.com/2011/02/pwnie-pwnplug.html
  731. http://www.ehacking.net/2011/06/deft-linux-computer-forensic-live-cd.html
  732. http://www.hackingtricks.in/2011_03_01_archive.html
  733. http://blog.csdn.net/cnbird2008/archive/2011/01/06/6119469.aspx
  734. http://www.pentestit.com/tag/fuzz-javascript/
  735. http://www.ehacking.net/p/table-of-contents.html
  736. http://www.ehacking.net/p/contact-us.html
  737. http://www.pentestit.com/tag/dreamplug/
  738. http://eikonal.wordpress.com/2010/01/
  739. http://www.ehacking.net/2011/04/scanning-and-enumeration-second-step-of.html
  740. http://www.darknet.org.uk/2007/07/fg-injector-sql-injection-proxy-tool/
  741. http://www.ehacking.net/2011/05/tamper-data-firefox-extension.html
  742. http://www.ehacking.net/2011/05/paros-proxy-web-application-security.html
  743. http://www.linux.com/archive/feature/138325
  744. http://www.ehacking.net/2011/03/bluejacking-bluetooth-hacks.html
  745. http://www.ehacking.net/2011/06/deft-linux-computer-forensic-live-cd.html
  746. http://archangelamael.blogspot.com/2009/11/up-and-running-with-openvas-in-bt4.html
  747. http://wikisecure.net/security/how-to-install-openvas-ubuntu9
  748. http://www.youtube.com/watch?v=3NYhF4pwnlQ
  749. http://www.linux-tutorial.info/modules.php?name=News&amp;file=article&amp;sid=7277
  750. http://seclists.org/openvas/2011/q2/378
  751. http://www.mediafire.com/?9z4vgi9xwp88x5e
  752. http://www.backtrack-linux.org/wiki/index.php/OpenVas
  753. http://www.securitytube.net/video/703
  754. http://flexi-learn.blogspot.com/2010/12/openvas-client-server-connection.html
  755. http://www.pentestit.com/tag/openvas/
  756. http://www.youtube.com/watch?v=Qt2130BibbI
  757. http://www.vivaolinux.com.br/dica/Scanner-de-seguranca-OpenVAS
  758. http://www.youtube.com/watch?v=cZ1f9BnlMS0
  759. http://searchenterpriselinux.techtarget.com/tip/Getting-started-with-OpenVAS
  760. http://www.pentestit.com/2009/12/24/update-openvas-300/
  761. http://www.backtrack-linux.org/forums/beginners-forum/36710-backtrack-4-r2-missing-openvas-server.html
  762. http://www.youtube.com/watch?v=V5l2wvdUOpA
  763. http://foro.elhacker.net/tutoriales_documentacion/tutorial_practico_openvas_analisis_vulnerabilidades_en_espanol-t324275.0.html
  764. http://librenix.com/?inode=13570
  765. http://www.youtube.com/watch?v=gP5EoaxhPsQ
  766. http://www.dragonjar.org/open-vas-la-evolucion-del-nessus.xhtml
  767. http://archangelamael.blogspot.com/2009/11/up-and-running-with-openvas-in-back.html
  768. http://www.pentestit.com/tag/ike-scan/
  769. http://www.youtube.com/watch?v=KQgoBaJLRuI
  770. http://librenix.com/?inode=13037
  771. http://www.youtube.com/watch?v=YsOKpiXB9M0
  772. http://www.pentestit.com/2011/03/18/update-openvas-4/
  773. http://www.pentestit.com/2010/10/22/video-tutorial-integrate-hydra-nessus/
  774. http://www.youtube.com/watch?v=wpVSdXfmAYU
  775. http://www.pentestit.com/tag/gnessus/
  776. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=8239&amp;S=f243439fd7a401d77e6da6d5e71672d2
  777. http://www.pentestit.com/tag/snmpwalk/
  778. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=8557&amp;S=a2ccf9b27789e4f3176e14111a6951e5
  779. http://board.blackbuntu.com/archive/index.php/thread-545.html
  780. http://seclists.org/openvas/2011/q2/383
  781. http://www.pentestit.com/2009/12/03/update-nessus-42/
  782. http://webcache.googleusercontent.com/custom?q=cache:cTRLrqJchaIJ:uccsc2009.ucdavis.edu/preso/NomuraUCCSC09.ppt Tutorial Openvas&cd=41&hl=en&ct=clnk&client=pub-8993703457585266&source=www.google.com" onmousedown="return rwt(this,'','','','41','AFQjCNEKcwtalRoMYlKPgQoevJj-bXzm7w','','0CAYQITAAOCg')">View as HTML</a><br><span dir=ltr>14 Jun 2009</span> &ndash; Data Mining 1A; Web 2.0; Kismet; <em>OpenVAS</em>; Metasploit <b>...</b> Help to refine search; Operator:search term; <em>Tutorial</em> to advanced operators <b>...</b><br><span class=a>uccsc2009.ucdavis.edu/preso/NomuraUCCSC09.ppt</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.pentestit.com/tag/trapwatch/
  783. http://marc.info/?l=openvas-discuss&amp;m=121751582411765
  784. http://www.pentestit.com/tag/ldapsearch-from-openldap-utilities/
  785. http://www.youtube.com/watch?v=PKiz0vOCCjQ
  786. http://www.pentestit.com/tag/chkrootkit/
  787. http://www.ehacking.net/2011/04/openvas-vulnerability-assessment-system.html
  788. http://www.pentestit.com/2009/09/07/update-autonessus/
  789. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=7947&amp;S=746b88978b4bf00fb41e04f618a238c5
  790. http://www.pentestit.com/tag/clamav/
  791. http://www.backtrack-linux.org/forums/anf\E4nger-ecke/37969-scannen-nach-sicherheitsl\FCcken-mit-openvas-windowssysteme.html
  792. http://www.pentestit.com/tag/trapwatch/
  793. http://pypi.python.org/pypi/openvas.omplib/
  794. http://www.pentestit.com/tag/lm-sensors/
  795. http://ubuntuforums.org/archive/index.php/t-1728640.html
  796. http://www.pentestit.com/2011/01/10/update-networkscanviewer-v105/
  797. http://newtipsandtricks.webnode.com/news/hack-nessus-using-metasploit-/
  798. http://www.pentestit.com/tag/nessus/
  799. http://wald.intevation.org/
  800. http://pypi.python.org/pypi/openvas.oaplib
  801. http://www.pentestit.com/tag/security-scanner/
  802. http://www.secuobs.com/revue/news/295012.shtml
  803. http://www.pentestit.com/2010/12/10/droidmap-nmap-android-phones/
  804. http://board.blackbuntu.com/showthread.php?tid=499
  805. http://www.pentestit.com/2009/04/09/wapiti-web-application-auditior-vulnerability-scanner/
  806. http://www.clshack.it/tutorial-tool-for-vulnerability-identification-level-server.html
  807. http://www.pentestit.com/2010/12/19/update-networkscanviewer-v104/
  808. http://www.backtrack-linux.org/forums/experts-forum/35327-openvas-3-0-1-bt4-r2.html
  809. http://www.backtrack-linux.org/forums/old-bt4-videos/23604-video-up-running-openvas-back-track-4-pt-1-a.html
  810. http://www.pentestit.com/2011/02/06/nmap-550-android/
  811. http://www.youtube.com/watch?v=8M0YE_y4zGg
  812. http://www.pentestit.com/2010/04/15/update-nessus-422/
  813. http://volatile-minds.blogspot.com/2011/02/openvas-4-has-landed-in-unstable-in-obs.html
  814. http://www.pentestit.com/2011/04/21/update-dradis-v270/
  815. http://volatile-minds.blogspot.com/2010/07/automating-openvas-3.html
  816. http://www.pentestit.com/2009/04/19/nikto-203-bugfix-release/
  817. http://security.stackexchange.com/questions/3034/command-line-nessus-openvas-or-nse-to-find-specific-vulns
  818. http://www.alienvault.com/wiki/doku.php?id=installation
  819. http://www.pentestit.com/tag/blind-sql-hacker/
  820. http://securityxploded.com/forum/viewtopic.php?f=15&amp;t=1368
  821. http://www.pentestit.com/2011/03/01/update-nessus-441/
  822. http://www.pentestit.com/2011/05/25/update-dradis-v271/
  823. http://www.pentestit.com/tag/john-the-ripper/
  824. http://www.pentestit.com/2011/05/02/update-backbox-linux-105/
  825. http://hackertarget.com/openvas-scan/
  826. http://www.hackerstorm.com/
  827. http://www.hackerstorm.com/
  828. http://www.pentestit.com/2010/08/02/update-seccubus-v15/
  829. http://www.geo-geek.com/2009/07/openvas.html
  830. http://www.pentestit.com/2010/10/15/oracleenumerator-tool-perform-enumeration-oracle-database-server/
  831. https://www.os3.nl/2009-2010/students/vic_ding/assignment_2
  832. http://www.pentestit.com/tag/autonessus/
  833. http://www.pentestit.com/tag/network-security-scanner/
  834. http://www.pentestit.com/tag/lynis/
  835. http://hackertarget.com/2009/06/guide-to-openvas-on-ubuntu-904/
  836. http://www.pentestit.com/2011/02/16/free-web-application-security-dummies/
  837. http://www.pentestit.com/2011/02/11/openscap-security-content-automation-protocol-tool/
  838. http://www.pentestit.com/tag/nikto-pl/
  839. http://www.pentestit.com/tag/medusa/
  840. http://www.pentestit.com/2010/02/23/update-nessus-421/
  841. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=6204&amp;S=7fb5c0ca183e1122ce18e959d23b2769
  842. http://www.pentestit.com/tag/sqlmap/
  843. http://www.backtrack-linux.org/forums/backtrack-howtos/35208-upgrading-backtrack-4-final-r1-backtrack-r2-2.html
  844. http://volatileminds.net/opendiagnostics/index.php/BuildAutoAssessmentServer
  845. http://www.pentestit.com/2010/11/14/update-nessus-440/
  846. http://www.askapache.com/security/vulnerability-scanners-review.html
  847. https://sites.google.com/a/dc716.com/dc716-com/resources
  848. http://www.pentestit.com/tag/livecd-for-penetration-testing/
  849. http://ubuntuforums.org/archive/index.php/t-1477662.html
  850. http://www.pentestit.com/tag/w3af/
  851. http://www.pentestit.com/tag/burp-scanner/
  852. http://wald.intevation.org/news/
  853. http://www.pentestit.com/tag/sqlinject-finder-tutorial/
  854. http://www.pentestit.com/2009/03/25/fiddler-web-debugger/
  855. http://yans008.wordpress.com/
  856. http://searchsecurity.techtarget.com/Screencasts-On-screen-demonstrations-of-security-tools
  857. http://www.pentestit.com/2011/01/03/list-portable-hardware-devices-penetration-testing/
  858. http://www.pentestit.com/tag/apacheconf/
  859. http://www.pentestit.com/tag/banner-grabbing/
  860. http://www.healthdump.com/myxl-radio-installation-tutorial-antenna-99049.php
  861. http://www.pentestit.com/2011/02/10/update-seccubus-v154/
  862. http://www.pentestit.com/tag/dradis/
  863. http://www.pentestit.com/tag/information-security-tool/
  864. http://volatile-minds.blogspot.com/2010/07/od-autoassessment-server-tutorial-w.html
  865. http://www.pentestit.com/tag/burp-suite/
  866. http://www.pentestit.com/2010/09/12/arachni-tool-penetration-testing-web-applications/
  867. http://airodump.net/essential-tools-nessus-rootkit-scanner/
  868. http://www.pentestit.com/tag/smtp-banner-grabbing/
  869. http://www.pentestit.com/tag/pdf-parser/
  870. http://www.pentestit.com/tag/ff3hr/
  871. http://jfherrera.wordpress.com/author/jfherrera/
  872. http://www.pentestit.com/tag/directory-transversal-tutorial/
  873. http://www.pentestit.com/tag/firefox/
  874. http://www.pentestit.com/2009/03/22/iodine-ipoverdns-tunnel/
  875. http://www.pentestit.com/2009/07/05/raptor-forensics-live-cd/
  876. http://www.pentestit.com/2010/04/23/tutorial-vlan-hopping-yersinia/
  877. http://www.pentestit.com/tag/how-to-steganography/
  878. http://www.pentestit.com/tag/tutorials/
  879. http://www.youtube.com/watch?v=BIkG8Bu-wic
  880. http://www.pentestit.com/2010/05/20/metasploitable-vulnerable-server/
  881. http://www.pentestit.com/tag/amap/
  882. http://www.volatileminds.net/projects/clamav/
  883. http://www.pentestit.com/tag/praeda/
  884. http://www.pentestit.com/tag/latest-tool-for-web-application-security/
  885. http://www.pentestit.com/2009/10/04/tutorial-analyze-pdf-files/
  886. http://www.pentestit.com/tag/nessus-4/
  887. http://www.pentestit.com/2009/06/16/video-tutorial-simple-steganography-vsl/
  888. http://librenix.com/?inode=695
  889. http://www.pentestit.com/2010/06/30/pentestit-post-day-tutorial-sql-injection/
  890. http://www.pentestit.com/tag/vicnum/
  891. http://www.pentestit.com/tag/mantra-security-framework/
  892. http://www.pentestit.com/2009/12/30/xen-carry-virtual-environment-cd-usb/
  893. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=9002&amp;S=ed4c3fd99d8aeb039c74e9bc20b43e54
  894. http://www.pentestit.com/2009/04/12/tutorial-send-email-anonymously/
  895. http://www.pentestit.com/tag/burp-intruder/
  896. https://www.corelan.be/index.php/my-free-tools/downloads/?dl_page=2
  897. http://www.pentestit.com/2010/05/02/tutorial-upload-shells-burp-suite/
  898. http://wn.com/skletenblack
  899. http://www.pentestit.com/2009/04/12/tutorial-send-email-anonymously/
  900. http://www.pentestit.com/tag/0trace/
  901. https://www.corelan.be/index.php/my-free-tools/downloads/?dl_page=2
  902. http://www.pentestit.com/2010/05/02/tutorial-upload-shells-burp-suite/
  903. http://www.pentestit.com/tag/network-capture/
  904. http://wn.com/skletenblack
  905. http://vistamenu.com/flash-collapsible-menu-tutorial.html
  906. http://archangelamael.blogspot.com/2010/07/converting-metasploitable-for.html
  907. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=8299&amp;S=cbde802fd0b270595c98b97f47859bf5
  908. http://www.secuobs.com/revue/news/292501.shtml
  909. http://hackertarget.com/2011/02/wireshark-tutorial-and-cheat-sheet/
  910. http://www.secuobs.com/videos/news/16425.shtml
  911. http://www.youtube.com/watch?v=Bqmk1f-PIo0
  912. https://www.os3.nl/2010-2011/students/sebastian_carlier/ot/lab4
  913. http://www.amarjit.info/2010/04/how-to-hack-website-how-to-hack-web.html
  914. http://stayinformed.forumotion.com/t203-backtrack-5-released
  915. http://tech4everybody.wordpress.com/category/security/
  916. http://www.darknet.org.uk/2006/11/installing-nessus-on-debian-based-oss-like-ubuntu/
  917. https://www.alienvault.com/forum/index.php?t=thread&amp;frm_id=15&amp;S=e394efe7aa528b8ae7d4620a0bb27517
  918. http://www.youtube.com/watch?v=x-Pi-rg_Qg0
  919. http://www.corelan.be/index.php/2010/07/23/watobo-the-unofficial-manual/
  920. http://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
  921. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=8186&amp;S=6902f19ff15d4931b1e4fdab077d09fd
  922. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=6749&amp;S=a1298c7fbd2c1b1a1dd97e4623025b1f
  923. http://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
  924. https://www.alienvault.com/forum/index.php?t=tree&amp;th=1743&amp;S=7f23365d7d55a3306ba5149d74c06663
  925. http://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
  926. http://www.corelan.be/index.php/2009/02/24/cheatsheet-cracking-wpa2-psk-with-backtrack-4-aircrack-ng-and-john-the-ripper/
  927. https://www.corelan.be/index.php/forum/exploit-writing-general-questions/first-exploit-tutorial-need-help-with-perls-pack-function/
  928. https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
  929. http://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
  930. http://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
  931. http://volatile-minds.blogspot.com/2010/11/new-appliances-for-network-auto.html
  932. http://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
  933. http://archangelamael.blogspot.com/2009/06/bt4-pre-final-public-release.html
  934. https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
  935. http://www.howtoforge.com/intrusion_detection_base_snort
  936. http://www.homepages.dsu.edu/malladis/teach/754/Slides/Snort.ppt
  937. http://docs.google.com/viewer?a=v&q=cache:c5bxYiI6oqsJ:www.homepages.dsu.edu/malladis/teach/754/Slides/Snort.ppt Tutorial Snort&hl=en&pid=bl&srcid=ADGEEShdHuwoH4BcXl_AOj8dA0zy89PIuv8SEQ529Z-dj6XQfZoqnz7Z5V649uREUqc2B2K44nIDkYse3IiNB2WYdT4si8nqp8v1qccNVJf9aAmfsfsFLAVOyWABqikWE99x8xBv0n0I&sig=AHIEtbQTYdyaEakHsLWSAlJfhPMUYBORXA" onmousedown="return rwt(this,'','','','3','AFQjCNFE-omwpbGeDd9JaUZkJxFuKX7pzA','','0CBYQxQEwAg')">Quick View</a><br><em>SNORT Tutorial</em>. Sreekanth Malladi. (modifying original by N. Youngworth). Installation. Install the WinPcap File. This allows you to capture and examine <b>...</b><br><span class=a>www.homepages.dsu.edu/malladis/teach/754/Slides/<b>Snort</b>.ppt</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://openmaniak.com/snort.php
  938. http://tutorials.papamike.ca/pub/snort.html
  939. http://searchsecuritychannel.techtarget.com/tutorial/Snort-Tutorial-How-to-use-Snort-intrusion-detection-resources
  940. http://www.thegeekstuff.com/2010/08/snort-tutorial/
  941. http://www.youtube.com/watch?v=nAWN989WA0A
  942. http://infond.blogspot.com/2010/04/basics-7-tutorial-ids-snort.html
  943. http://librenix.com/?inode=3063
  944. http://searchsecurity.techtarget.com/tutorial/Snort-Intrusion-Detection-and-Prevention-Guide
  945. http://vimeo.com/10465331
  946. http://layer8problem.blogspot.com/2008/11/howto-great-and-mighty-tutorial-about.html
  947. http://daenu.net/joomla/index2.php?option=com_content&amp;do_pdf=1&amp;id=15
  948. http://docs.google.com/viewer?a=v&q=cache:f3HxjQg000MJ:daenu.net/joomla/index2.php?option=com_content&do_pdf=1&id=15 Tutorial Snort&hl=en&pid=bl&srcid=ADGEESiIiHLtkh6tnd35zi_uO-eJLX8bFbcz_LX-Ox0f04XN9VhUTEBk8_ti4NzgddOkmmbDg_tSkPQq7_G5gNNYmFB1KZgBz_Jjj8Bbc0x1jqLKte-0nsFcA5ss7iaHqru10Sybi73X&sig=AHIEtbSQYB9ilEomH0Apw-FCvaGA4nL9Lg" onmousedown="return rwt(this,'','','','15','AFQjCNFNTLK9RHpRUtbmbYqpM1QSKioD-Q','','0CBwQxQEwBDgK')">Quick View</a><br><em>Tutorial Snort</em> Wireless. Monday, 01 November 2004. #--- [ <em>Tutorial Snort</em> Wireless ] ---#. (c) 2004 by d.walther (d.walther@wireless-bern.ch) <b>...</b><br><span class=a>daenu.net/joomla/index2.php?option=com_content&amp;do_pdf=1...</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.securitydocs.com/library/391/
  949. http://www.howtoforge.com/intrusion_detection_snort_base_postgresql_ubuntu6.06
  950. http://www.mcabee.org/lists/snort-users/Apr-03/msg01161.html
  951. http://www.securitydocs.com/library/379/
  952. http://www.forum-intrusion.com/snort/FreeBSD44Stable-Snort-MySQLVer1-1.pdf
  953. http://www.macports.info/Snort
  954. http://www.howtoforge.com/intrusion-detection-with-snort-mysql-apache2-on-ubuntu-7.10-updated
  955. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=7947&amp;S=746b88978b4bf00fb41e04f618a238c5
  956. http://ubuntuforums.org/showthread.php?t=145641
  957. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=1700&amp;S=ecffa061540d9bbeced113f9259c411b
  958. http://seclists.org/snort/2009/q1/349
  959. http://www.security-forums.com/viewtopic.php?t=7010
  960. http://forum.pfsense.org/index.php?topic=16847.0
  961. http://buchananweb.co.uk/design_tips245.htm
  962. http://buchananweb.co.uk/security00.aspx
  963. http://www.linux-tutorial.info/modules.php?name=News&amp;file=article&amp;sid=1502
  964. http://linuxbasement.com/content/snort-its-not-just-druggies-anymore
  965. http://www.linux-tutorial.info/modules.php?name=News&amp;file=article&amp;sid=10048
  966. http://networking.frenzyness.com/2010/03/09/scapy-tutorial-how-to-use-scapy-to-test-snort-rules/
  967. http://www.securitydistro.com/security-tutorials/BackTrack-v2.0-and-Snort-for-the-Rapid-Deployment-of-Network-Intrusion-Dete
  968. http://www.linuxhowtos.org/System/snort_guide.htm
  969. http://www.linux-tutorial.info/modules.php?name=News&amp;file=article&amp;sid=2240
  970. http://www.pentestit.com/2010/05/10/snorby-snort-front/
  971. http://www.vivaolinux.com.br/artigo/Snort-avancado-Projetando-um-perimetro-seguro
  972. http://searchsecurity.techtarget.com/tip/Scapy-tutorial-How-to-use-Scapy-to-test-Snort-rules
  973. http://ubuntuforums.org/archive/index.php/t-1407829.html
  974. http://s10.zetaboards.com/ihcccnc/topic/7080800/1/
  975. http://swik.net/snort Tutorial
  976. http://searchsecuritychannel.techtarget.com/tutorial/Snort-hardware-and-network-requirements-for-Red-Hat-Enterprise-Linux-5
  977. http://www.linux-tutorial.info/modules.php?name=News&amp;file=article&amp;sid=4888
  978. http://ubuntuforums.org/archive/index.php/t-1214575.html
  979. http://br-linux.org/2010/snort-tutorial-mao-na-massa-em-sp/
  980. http://searchsecuritychannel.techtarget.com/tutorial/Snorts-installation-prerequisites-for-Red-Hat-Enterprise-Linux-5
  981. http://www.youtube.com/watch?v=TZ0Hj0t5b5k
  982. http://www.howtoforge.com/writing-snort-rules-on-engarde
  983. http://ubuntuforums.org/showthread.php?t=1439587
  984. http://www.howtoforge.com/forums/archive/index.php/t-21756.html
  985. http://openmaniak.com/snort_screen.php
  986. http://www.howtoforge.com/intrusion-detection-with-snort-mysql-apache2-on-ubuntu-7.10
  987. http://ubuntuforums.org/archive/index.php/t-1477696.html
  988. http://www.securabit.com/
  989. http://www.howtoforge.com/forums/showthread.php?t=29026
  990. http://seclists.org/snort/2009/q2/
  991. http://groups.google.com/group/snortusers/browse_thread/thread/e061b7616c5d293f
  992. http://openmaniak.com/fr/snort.php
  993. http://www.youtube.com/watch?v=y66ZeNNlI9E
  994. http://searchsecuritychannel.techtarget.com/tutorial/Editing-the-snortconf-file-for-Red-Hat-Enterprise-Linux-5
  995. https://forums.snort.org/forums/snort-newbies/topics/snort-so-rules-help-solaris-10
  996. http://searchsecuritychannel.techtarget.com/tutorial/Compiling-Snort-and-configuration-with-MySQL-for-Red-Hat-Enterprise-Linux-5
  997. http://openmaniak.com/snort_bleeding.php
  998. http://openmaniak.com/snort_other.php
  999. http://www.zeekzack.com/?p=26
  1000. http://www.bsdcan.org/2008/schedule/attachments/66_pfSenseTutorial.pdf
  1001. http://docs.google.com/viewer?a=v&q=cache:ahX1Ozgs_aoJ:www.bsdcan.org/2008/schedule/attachments/66_pfSenseTutorial.pdf Tutorial Snort&hl=en&pid=bl&srcid=ADGEESjr98eDaRt7ulH8Tk1hYS4qKRAfDWL3IvvjTpXw4eNuIUcTQ8Hsxp0M-UQWZI0Kqh7JOh1ZJmHDi9Yi2EWaMrW_KfYrTTr_ULuo5IevgFxvxzyJ1ZLZQ0UGvW448zPluOHphCWV&sig=AHIEtbQGEC6wvfdZv_-qp9W6fJXD4E8XVA" onmousedown="return rwt(this,'','','','74','AFQjCNGDRvwQ_X9ceIk7fWhinhpy64AhPA','','0CBUQxQEwAzhG')">Quick View</a><br>pfSense <em>Tutorial</em>. BSDCan 2008. From zero to hero with pfSense. May 13, 2008. Chris Buechler &lt;cmb@bsdperimeter.com&gt; <b>...</b> <em>Snort</em>. Disk I/O <b>...</b><br><span class=a>www.bsdcan.org/2008/schedule/attachments/66_pfSense<b>Tutorial</b>.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><span class="b w xsm">[PDF]</span> <h2 class=r><a href="http://acme-labs.org.uk/galleries/42/0000/2163/practical.pdf
  1002. http://docs.google.com/viewer?a=v&q=cache:basKB7pIqMoJ:acme-labs.org.uk/galleries/42/0000/2163/practical.pdf Tutorial Snort&hl=en&pid=bl&srcid=ADGEESjN-UlC_jVG-jHllZPePKLtRhxA0JAZmtnW2N5YLMyO4GNv_SlOlXfsR0r8jaXiV2vheQV441c6kNwAm1OeKFTcQ6elFKM5ZZqAy178A-c1YjkPy8Y7sCdvXcK_yjSJ3mfJjZy-&sig=AHIEtbT41gp7ikS7VpnBlSexCoy7DsWfEg" onmousedown="return rwt(this,'','','','75','AFQjCNGt_Wkmc-8vrCRFfZoSZlkdWDjExQ','','0CBsQxQEwBDhG')">Quick View</a><br>might find it useful to modify the Simplistic ARP Monitor code2 in the scapy <em>tutorial</em> in order to do this. 3. You are tasked with the job of testing a <em>snort</em> <b>...</b><br><span class=a>acme-labs.org.uk/galleries/42/0000/2163/practical.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://seclists.org/snort/2011/q2/486
  1003. http://librenix.com/?inode=1620
  1004. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=9323&amp;S=edd697edec912eefd2d91cf224fe5f62
  1005. http://librenix.com/?inode=10458
  1006. https://forums.snort.org/forums/windows/topics/snort-cannot-logon-to-mssql-2005-net-lib-error-1326
  1007. http://ubuntuforums.org/showthread.php?t=1040886
  1008. http://www.theacademypro.com/security-videos/information-security-video-tutorial-snort-install-config-and-basic-usage-I.php
  1009. http://daenu.net/joomla/index.php?option=com_content&amp;task=blogsection&amp;id=0&amp;Itemid=9
  1010. http://swik.net/IDS Debian
  1011. http://swik.net/snort Hacking
  1012. http://www.saintcorporation.com/cgi-bin/demo_tut.pl?tutorial_name=Snort_vulnerabilities.html&amp;fact_color=doc&amp;tag=
  1013. http://osdir.com/ml/security.ids.snort.sigs/2004-03/msg00100.html
  1014. http://www.howtoforge.com/forums/showthread.php?t=34052
  1015. http://openmaniak.com/inline_bleeding.php
  1016. https://www.alienvault.com/forum/index.php?t=thread&amp;frm_id=15&amp;S=e394efe7aa528b8ae7d4620a0bb27517
  1017. http://www.howtoforge.com/forums/showthread.php?t=15585
  1018. http://www.techienuggets.com/Comments?tx=108575
  1019. http://swik.net/snort rules
  1020. http://ubuntuforums.org/archive/index.php/t-483488.html
  1021. http://www.howtoforge.com/installation-and-configuration-of-intrusion-detection-with-snort-acidbase-mysql-and-apache2-on-ubuntu-9.04-using-spm
  1022. http://www.training-classes.com/learn/_k/s/n/o/snort/_t/ilt/
  1023. http://www.howtoforge.com/forums/archive/index.php/t-5591.html
  1024. http://www.antionline.com/archive/index.php/t-247561.html
  1025. http://swik.net/snort Mac
  1026. http://openmaniak.com/fr/snort_tutorial_snort.php
  1027. http://groups.google.com/group/snortusers/browse_thread/thread/9b4de0fb15eb0975/a4b58e88f501138f
  1028. http://swik.net/snort wireless
  1029. http://openmaniak.com/inline_tutorial.php
  1030. http://www.inguardians.com/research/docs/snortguis.pdf
  1031. http://docs.google.com/viewer?a=v&q=cache:40h64ybkDf0J:www.inguardians.com/research/docs/snortguis.pdf Tutorial Snort&hl=en&pid=bl&srcid=ADGEESjvNY1surjoz-9P5UroBO5h5aiu35DCCOqL_HMwDLZ52REr5UCfN5jeeDIlOI_OayCATm61Qd2XYw54fX9R57ft88ss3P3mM06lJW1q2_9bxfi9wdoGyT01Mo6jsO5Vebaza6Lf&sig=AHIEtbRDHYulraNAcStZw09ZvInGODD1PA" onmousedown="return rwt(this,'','','','107','AFQjCNEOd3V02n2H_y3UviFDJQQ5fztWrA','','0CCgQxQEwBjhk')">Quick View</a><br><em>snort</em>. For the purpose of this presentation, we will concentrate only on <b>.....</b> For additional reading, I would recommend  the PHP <em>tutorial</em> at: <b>...</b><br><span class=a>www.inguardians.com/research/docs/<b>snort</b>guis.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://freeonlinebookstore.org/B-405.html
  1032. http://www.shellsec.net/articulo/guia-snort/
  1033. http://www.linux-tutorial.info/modules.php?name=Howto&amp;pagename=Snort-Statistics-HOWTO/configuration.html
  1034. http://openmaniak.com/inline_final.php
  1035. http://www.hyperteach.com/products/linuxsecurity-video-cd.htm
  1036. http://forum.innobuzz.in/showthread.php?tid=478
  1037. http://craftapalooza.typepad.com/crafted/2006/09/lifting_the_ton.html
  1038. http://seclists.org/snort/2004/q2/212
  1039. http://www.experts-exchange.com/Security/IDS/Q_23881140.html
  1040. http://www.howtoforge.com/forums/archive/index.php/t-18134.html
  1041. http://www.tinews.com.br/news/2010/04/27/snort-tutorial-mao-na-massa-realizar-analise-de-trafego-em-tempo-real-e-controle-sobre-a-seguranca-das-redes/
  1042. http://under-linux.org/blogs/andersonop/snort-tutorial-mao-na-massa-realizar-analise-de-trafego-em-tempo-real-e-controle-1986/
  1043. http://www.temporealeventos.com.br/?area=87
  1044. http://securityonion.blogspot.com/2009/01/installing-snortsp-beta-on-ubuntu.html
  1045. http://www.istf.com.br/showthread.php/12172-Tutorial-de-SNORT-APACHE2-MYSQL-ACIDLAB-no-Debian-Sarge
  1046. http://h4des.org/blog/index.php?/archives/166-Neues-Tutorial-ueber-snort-online.html
  1047. http://softwarelivre.org/andersonop/snort-tutorial-mao-na-massa-realizar-analise-de-trafego-em-tempo-real-e-controle-sobre-a-seguranca-das-redes
  1048. http://www.pdfwindows.com/pdf/tutorial-database-mysql/
  1049. http://www.experts-exchange.com/Security/IDS/Q_26044310.html
  1050. http://openmaniak.com/about.php
  1051. http://lists.centos.org/pipermail/centos-pt-br/2008-November/000486.html
  1052. http://seclists.org/snort/2011/q2/470
  1053. http://www.howtoforge.com/intrusion_detection_base_snort_p4
  1054. http://openmaniak.com/fr/snort_tutorial_base.php
  1055. http://cs.uccs.edu/~cs591/ids/ids.ppt
  1056. http://docs.google.com/viewer?a=v&q=cache:Ub-khSBY1CQJ:cs.uccs.edu/~cs591/ids/ids.ppt Tutorial Snort&hl=en&pid=bl&srcid=ADGEESh_GJmKrhw43Cy-3n7e4dkq7WAK4MkJS6EYmpFkeabzH5SrUjfVE_q4F3ZSvGels3kCp0nB27RlP8DDcig8WpF-M83pIBohFtaj_FOb9ms-SXmN8xku5grF7xbsm14hATLkNiuo&sig=AHIEtbQpbXvm8o4-Msjxnfb1ZA_KwC5QNQ" onmousedown="return rwt(this,'','','','135','AFQjCNG2J35lI9Z7SrBHI6XnF5pDrZYg_g','','0CBsQxQEwBDiCAQ')">Quick View</a><br><span dir=ltr>16 Apr 2003</span> &ndash; <em>Snort</em>-based IDS Setup Example  (from Steven Scott&#39;s <em>tutorial</em>). cs591. chow. Basic <em>Snort</em> Usage. <em>Snort</em> has three main modes: <b>...</b><br></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.mcabee.org/lists/snort-users/Mar-04/msg00184.html
  1057. http://www.linuxajuda.net/linux-em-geral/snort-tutorial-mao-na-massa-em-sp-2/
  1058. http://searchsecuritychannel.techtarget.com/tip/The-power-of-Snort-30
  1059. http://openmaniak.com/snort_tutorial_update.php
  1060. http://www.underground-systems.org/forums/showthread.php?5709-snort-IDS-(intrusion-detection-system)
  1061. http://librenix.com/?page=Snort
  1062. http://osdir.com/ml/snort-security-network/2011-05/msg00147.html
  1063. http://www.freesoftwaremagazine.com/articles/configure_professional_firewall_using_pfsense?page=0,2
  1064. http://ubuntuforums.org/archive/index.php/t-1109898.html
  1065. http://www.manntechcomputersinc.com/How_to....html
  1066. http://searchsecuritychannel.techtarget.com/tip/Justifying-Snort
  1067. http://ubuntuforums.org/showthread.php?t=1109898
  1068. http://wwwx.cs.unc.edu/~hays/archives/2010/03/entry_23.php
  1069. http://openmaniak.com/inline_oink.php
  1070. http://searchsecuritychannel.techtarget.com/tip/Justifying-Snort
  1071. http://searchsecuritychannel.techtarget.com/tip/Snort-280-new-features-IPv6-and-port-lists
  1072. http://ubuntuforums.org/showthread.php?t=1109898
  1073. http://wwwx.cs.unc.edu/~hays/archives/2010/03/entry_23.php
  1074. http://openmaniak.com/inline_oink.php
  1075. http://ubuntuforums.org/archive/index.php/t-919472.html
  1076. https://forums.snort.org/forums/bsd/topics/os-x-no-suitable-device-found-error
  1077. http://searchsecuritychannel.techtarget.com/tip/Snort-limitations
  1078. http://www.linuxcompatible.org/news/story/perfect_setup_of_snort_base_postgresql_on_ubuntu_606_lts.html
  1079. http://osdir.com/ml/snort-security-network/2011-05/msg00122.html
  1080. http://osdir.com/ml/security.ids.snort.sigs/2002-10/msg00101.html
  1081. http://openmaniak.com/fr/snort_other.php
  1082. http://marc.info/?l=snort-devel&amp;m=102244456713914&amp;w=3
  1083. https://forums.snort.org/forums/linux/topics/looking-for-installation-advice
  1084. http://osdir.com/ml/security.ids.snort.cvs/2004-04/msg00003.html
  1085. http://groups.google.com/group/snortusers/browse_thread/thread/d074d0f2a67f5850
  1086. http://searchsecuritychannel.techtarget.com/tip/Snort-frequently-asked-questions
  1087. http://www.javaguicodexample.com/snortiisphpbaseperladodb.html
  1088. http://ubuntuforums.org/showthread.php?t=919472
  1089. http://h4des.org/blog/index.php?/archives/127-Neues-Tutorial-snort-mit-swatch.html
  1090. http://searchsecuritychannel.techtarget.com/tip/Working-with-Snorts-unified-output
  1091. http://www.mare-system.de/?p=arbeiten-mit-snort
  1092. http://swik.net/snort HOWTO
  1093. https://lswiki.byu.edu/index.php/Snort,_Barnyard2,_and_Snorby
  1094. http://searchsecuritychannel.techtarget.com/tip/Snorts-Stream5-and-TCP-overlapping-fragments
  1095. http://osdir.com/ml/snort-security-network/2011-05/msg00178.html
  1096. https://forums.snort.org/forums/windows/topics/building-snort-with-visual-studio-2008
  1097. http://groups.google.com/group/snortusers/msg/967cafca2a85e530
  1098. http://www.opensourcenetworks.org/2006/07/intrusion-detection-with-base-and.html
  1099. http://searchsecuritychannel.techtarget.com/tip/How-to-find-new-features-in-Snort-282
  1100. http://archives.neohapsis.com/archives/snort/2004-03/0486.html
  1101. http://www.youtube.com/user/michacl916
  1102. http://www.mare-system.de/arbeiten-mit-snort.html
  1103. http://ubuntuforums.org/showthread.php?t=1407829
  1104. http://www.securitydocs.com/index.php?todo=orderlinks&amp;action=displaycat&amp;catid=41&amp;orderlinks=id&amp;ascdesc=asc&amp;perpage=15
  1105. http://www.wikilearning.com/tutorial/taller_de_sistemas_de_deteccion_de_intrusiones_snort/4735
  1106. http://www.howtoforge.com/snort-ossec-prelude-on-ubuntu-gutsy-gibbon
  1107. http://searchsecuritychannel.techtarget.com/tutorial/Configuring-Snort-for-Red-Hat-Enteprise-Linux-5
  1108. http://openmaniak.com/snort_tutorial_base.php
  1109. http://seclists.org/snort/2004/q2/157
  1110. http://layer8problem.blogspot.com/
  1111. http://foro.elhacker.net/hacking_linuxunix/movido_tutorial_back_track_para_usar_snort-t260474.0.html
  1112. http://openmaniak.com/fr/snort_tutorial_update.php
  1113. https://www.alienvault.com/forum/index.php?t=msg&amp;goto=925&amp;S=1fc4841f9151effd96198413c30dde72
  1114. http://ubuntuforums.org/showpost.php?p=9265786&amp;postcount=4
  1115. http://www.brazilfw.com.br/forum/viewtopic.php?f=7&amp;t=58056
  1116. http://hackingalert.blogspot.com/2011/02/snort-best-intrusion-detection.html
  1117. http://ebookee.org/Snort-2-1-Intrusion-Detection-Second-Edition-Repost-_693979.html
  1118. http://www.wonderhowto.com/how-to-detect-network-intrusions-with-wireshark-and-snort-263020/
  1119. http://www.securitydocs.com/library/384/
  1120. http://ebookee.org/Snort-2-1-Intrusion-Detection-Second-Edition_61559.html
  1121. https://forums.snort.org/forums/windows/topics/gui-for-snort
  1122. http://marc.info/?l=focus-ids&amp;m=107223613830129&amp;w=2
  1123. http://www.securabit.com/tag/snort/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement