Want more features on Pastebin? Sign Up, it's FREE!
Guest

Anonymous Handbook on Hacking

By: anontangodown on Jul 20th, 2011  |  syntax: None  |  size: 5.89 KB  |  views: 5,076  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. +forujoin#Anonymous
  2.  
  3.  < For security reasons, please use full links instead of redirections if possible - resolve all redirectors!!! >
  4.  
  5. Current IRC Channel
  6. -------------------
  7. IRC: 194.8.74.43
  8. Port:
  9. ANONYMITY / PRIVACY
  10. -------------------
  11. Basic Anonymity Tutorial:
  12.    http://pastebin.com/view/b055zenonrmb02zenon.html who feel the drabness of the cyber community is a burden  on what matters: fun. Considering fun is now restricted to Friday,  where we look forward to the weekend, weekend, we have now taken it upon
  13.    
  14. Tor on Linux:
  15.    http://bit.ly/ik50kW
  16.    
  17. I2P - anonymous irc and internet:
  18.    http://www.i2p2.de/download.html
  19.    
  20. Something about Ethical Hacking
  21.    http://goo.gl/BHQIk
  22.    
  23. Web based proxies (bypass youtube gema-censorship and other things)
  24.    http://www.hidemyass.com
  25.    
  26. Anonymous / trash emails valid for x hours/days with auto-delete
  27.    http://www.email-wegwerf.de/wegwerfemail-liste.html  
  28.    http://www.yopmail.com  
  29.  
  30.  
  31.  Some Books from Anarchist:
  32.  --------------------------
  33.    Hacking exposed 2011
  34.    
  35. http://www.filesonic.com/file/r000216945/280608411/Mc.Graw.Hill.-.Hacking.Exposed.3rd.Edition.2011.RETAiL.eBOOk-rebOOk.rar
  36.    
  37.    Hacking Exposed Web Applications.pdf
  38.    http://tinyurl.com/5shry2p
  39.    
  40.    hackers_Underground_Handbook.pdf
  41.    http://tinyurl.com/6zr6yvw
  42.    
  43.    Hacking.Exposed.Linux.Third.Edition.pdf
  44.    http://tinyurl.com/6hkj7jh
  45.    
  46.    Hacking The Art of Exploitation 2nd Edition.chm
  47.    http://tinyurl.com/6dle9es
  48.    
  49.    2002-Hacking Exposed Web Applications
  50.    http://tinyurl.com/5wul386
  51.    
  52.    2005 Hacking Exposed 5th Edition.chm
  53.    http://tinyurl.com/62cumxy virus!!!
  54.    
  55.    2006 Hacking Exposed Web 2.0.pdf
  56.    http://tinyurl.com/6cotaox
  57.    
  58.    2006 Hacking Exposed-Cisco Networks.chm
  59.    http://tinyurl.com/6g7nro2
  60.    
  61.    50-1337 Magazine 2010 .:: Hacking / Sècuritè Fun And Freedom
  62.    http://tinyurl.com/43nlyen
  63. EXPLOITS/ROOTKITS
  64. -----------------
  65. How to exploit a site with XML bug
  66.     http://pastebin.com/ZUBbmn2V
  67.    
  68. Javascript trojan installer
  69.     You just need to edit the source code for your website, and .exe for your trojan
  70.     http://pastebin.com/4G6mpr1n
  71.      
  72. Sqli defacement
  73.     http://pastebin.com/R2adXwSe
  74.  
  75. Slow Posting with Pyloris
  76.     http://pastebin.com/MTyHYXJe
  77.  
  78. Google Hacking For Penetration Testers Johnny Long:
  79.     http://bit.ly/ebf6q3  Volume 1
  80.     http://bit.ly/ljyySd  Volume 2
  81.  
  82. The Hackers Underground Handbook:
  83.     http://bit.ly/lbx1Dc
  84.    
  85. Wanna A book? Just Search On google the name of the book and filetype:pdf
  86. Exemple:
  87. Hackers lol lol filetype:pdf    
  88.  
  89. Hacking For Beginners-A begginners guide to ethical hacking:
  90. -- please fix this url -- (fixed?)
  91.     http://bit.ly/kztAI9 http://bit.ly/lbx1Dc
  92.  
  93. SQL injection Attacks And Defense
  94.     http://www.filesonic.com/file/59304893/SQL_Injection_Attacks_and_Defense.rar
  95.  
  96. Collection of hacking ebooks:                                  
  97.     http://bit.ly/lpzGZZ <-- 404
  98.  
  99. A huge list Of cool Hacking Websites For French And English:
  100.     http://www.anonpad.org/Xp31TFa2B3
  101.    
  102. Targeted attacks via non-persistant xss
  103.     http://pastebin.com/vtjAkPsf
  104. HAXX & SEC Links:
  105.     http://pastebin.com/HTUh3vGy
  106.    
  107. Security Assessment and Pentest tools  Cheat Sheets
  108.     http://punter-infosec.com/cheat-sheets-for-pentesters
  109. SYSTEM ADMINISTRATION / TECH
  110. -----------------------------
  111. Load a mysqldump on ur localhost: -- please fix this url --
  112.     http://bit.ly/26dhttp://www.ndig.com.br/nucleus/xmlrpc/server.php
  113.  
  114. SQL teaching and tutorials
  115.     http://sqlzoo.net/
  116.    
  117. Zillions of Bash-Scripts
  118.     http://www.cyberciti.biz/tips/linux-security.html
  119. PROFESSIONAL DATA ENCRYPTION THAT REALLY WORKS
  120. ----------------------------------------------
  121.    
  122. Truecrypt:steps
  123.     http://www.anonpad.org/truecrypt
  124.    
  125. OpenSSL data/files encryption for the expert
  126.      http://www.anonpad.org/openssl    
  127. Intersting Tools; Windows
  128. -------------------------
  129. Fiddler - decrypt / intercept SSL and capture web-traffic
  130.      http://www.fiddler2.com/fiddler2/
  131. http(s) inspection proxies like fiddler and others
  132. https://www.hacking-lab.com/misc/downloads/Web_Security_Testing_Tools.pdf
  133. Download a "complete" webpage (static)
  134. http://www.httrack.com/
  135. Nmap
  136. http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf
  137. Nessus
  138. http://www.secguru.com/link/nessus_nmap_scanning_cheatsheet
  139. Backtrack 4
  140. http://www.corelan.be:8800/index.php/2009/07/04/backtrack-4-cheat-sheet/
  141. misc tools
  142. http://www.sans.org/resources/sec560/misc_tools_sheet_v1.pdf
  143. Metasploit Meterpreter
  144. http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
  145. http://www.rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html
  146. Oracle Security
  147. http://www.red-database-security.com/wp/oracle_cheat.pdf
  148. XSS
  149. http://ha.ckers.org/xss.html
  150. http://openmya.hacker.jp/hasegawa/security/utf7cs.html
  151. http://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
  152. SQl Injection
  153. http://ha.ckers.org/sqlinjection/
  154. http://www.youtube.com/watch?v=vhexfGLEOKg&feature=channel_video_title
  155. http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/
  156. http://ferruh.mavituna.com/oracle-sql-injection-cheat-sheet-oku/
  157. http://www.irongeek.com/xss-sql-injection-fuzzing-barcode-generator.php
  158. Microsoft SQL,Sybase,MySQL,Oracle,PostgreSQL,DB2,IngresBypass SQL Injection Filters
  159. http://michaeldaw.org/sql-injection-cheat-sheet
  160. http://pentestmonkey.net/cheat-sheets/
  161. Packetlife Cheatsheets
  162. http://packetlife.net/cheatsheets/
  163. Ed Skoudis’ Pentest Cheatsheets
  164. Windows commandline tools
  165. http://www.sans.org/resources/sec560/windows_command_line_sheet_v1.pdf
  166. Netcat Cheat Sheet
  167. http://www.sans.org/resources/sec560/netcat_cheat_sheet_v1.pdf
  168. Useful Attack Tools, Metasploit commands, HPing, FGDump
  169. http://www.sans.org/resources/sec560/misc_tools_sheet_v1.pdf
  170. Reverse Engineering Malware Cheat Sheet
  171. http://zeltser.com/reverse-malware/reverse-malware-cheat-sheet.html
clone this paste RAW Paste Data