Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- http://www.darknet.org.uk/2010/05/metasploit-3-4-0-hacking-framework-released-over-100-new-exploits-added/
- http://www.techwatch.co.uk/2008/01/29/update-for-metasploit-exploit-tool/
- http://www.darknet.org.uk/2009/11/metasploit-3-3-released-exploitation-framework/
- http://www.vulnerabilityassessment.co.uk/wmap_meta.htm
- http://www.darknet.org.uk/2006/11/metasploit-27-released-automated-hacking/
- http://www.darknet.org.uk/2006/12/metasploit-30-beta-3-released/
- http://wiki.mccune.org.uk/index.php/Metasploit
- http://www.theregister.co.uk/2007/04/02/metasploit_3/
- http://www.itjobswatch.co.uk/jobs/uk/metasploit.do
- http://www.bookdepository.co.uk/Metasploit-Penetration-Testers-Guide-David-Kennedy/9781593272883
- http://www.mccune.org.uk/blog/metasploit/
- http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training
- http://www.darknet.org.uk/2007/03/metasploit-exploit-framework-version-30-released/
- http://www.metasploit.com/modules/
- http://twitter.com/metasploit
- http://www.mccune.org.uk/blog/2009/07/oracle-mixin-hi.html
- http://www.irongeek.com/i.php?page=videos/metasploit1
- http://www.ethicalhacker.net/content/view/29/24/
- http://decloak.net/
- http://www.pentestit.com/tag/metasploit/
- http://www.theregister.co.uk/2008/09/08/scada_exploit_released/
- https://community.rapid7.com/community/metasploit/blog
- http://blog.metasploit.com/2007/09/root-shell-in-my-pocket-and-maybe-yours.html
- http://www.metasploit.com/learn-more/
- http://dev.metasploit.com/redmine/projects/framework
- http://www.rapid7.com/products/metasploit-pro.jsp
- http://blog.metasploit.com/2006/07/month-of-browser-bugs.html
- http://www.youtube.com/watch?v=Pn5oDRFrqmQ
- http://www.metasploit.com/learn-more/how-do-i-use-it/documentation.jsp
- http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html
- http://www.symantec.com/connect/articles/metasploit-framework-part-1
- http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html
- http://www.youtube.com/watch?v=RuZk4AMoPhc
- http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html
- http://dev.metasploit.com/redmine/projects/framework/wiki/
- http://blog.metasploit.com/2009/12/exploiting-microsoft-iis-with.html
- http://www.fastandeasyhacking.com/
- http://www.rapid7.com/products/metasploit-framework.jsp
- http://blog.metasploit.com/2008/11/ms08-067-metasploit-and-smb-relay.html
- http://dev.metasploit.com/redmine/projects/framework/wiki/WMAP
- http://blog.metasploit.com/2010/04/persistent-meterpreter-over-reverse.html
- http://dev.metasploit.com/redmine/projects/framework/wiki/Karmetasploit
- http://blog.metasploit.com/2006/09/metasploit-30-automated-exploitation.html
- http://en.wikibooks.org/wiki/Metasploit
- http://blog.metasploit.com/2009/11/metasploit-framework-33-released.html
- http://blog.metasploit.com/2008/07/on-dns-attacks-in-wild-and-journalistic.html
- http://www.rapid7.com/downloads/metasploit-express.jsp
- http://blog.metasploit.com/2010/08/better-faster-stronger.html
- http://www.symantec.com/connect/articles/metasploit-framework-part-3
- http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html
- http://www.rapid7.com/metasploit-announcement.jsp
- http://blog.metasploit.com/2010/05/metasploit-framework-340-released.html
- http://www.securitytube.net/video/1175
- http://blog.metasploit.com/2011/04/happy-april-fools-day.html
- http://blog.metasploit.com/2010/05/introducing-metasploitable.html
- http://www.symantec.com/connect/articles/metasploit-framework-part-2
- http://blog.metasploit.com/2009/09/metasploit-33-development-updates.html
- http://www.csoonline.com/article/591768/rapid7-launches-metasploit-express
- http://blog.metasploit.com/2010/03/automating-metasploit-console.html
- http://www.irongeek.com/i.php?page=videos/metasploit-class
- http://blog.metasploit.com/2009/10/metasploit-rising.html
- http://www.internetnews.com/security/article.php/3932941/Metasploit 37 Accelerates Security Testing.htm
- http://blog.metasploit.com/2008/01/metasploit-framework-v31-released.html
- http://blog.metasploit.com/2011/05/metasploit-framework-370-released.html
- http://www.rapid7.com/products/metasploit/compare-and-buy.jsp
- http://blog.metasploit.com/2007/04/exploiting-ani-vulnerability-on-vista.html
- http://www.rapid7.com/downloads/metasploit-pro.jsp
- http://blog.metasploit.com/2011/02/metasploit-framework-352-released.html
- http://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X
- http://www.zdnet.com/blog/security/metasploit-and-scada-exploits-dawn-of-a-new-era/7672
- http://blog.metasploit.com/2010/03/locate-and-exploit-energizer-trojan.html
- http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/smb/ms08_067_netapi.rb
- http://www.networkworld.com/community/blog/metasploit-35-release-brings-62-more-exploits
- http://blog.metasploit.com/2011/03/metasploit-framework-360-released.html
- http://www.securityfocus.com/columnists/439
- http://blog.metasploit.com/2008/07/evilgrade-will-destroy-us-all.html
- http://blog.metasploit.com/2010/02/postgres-fingerprinting.html
- http://www.metasploit.com/learn-more/how-do-i-use-it/trainings.jsp
- http://blogs.mcafee.com/mcafee-labs/conficker-worm-using-metasploit-payload-to-spread
- http://threatpost.com/en_us/blogs/metasploit-launches-reward-program-exploits-061411
- http://blog.metasploit.com/2009/10/smb2-351-packets-from-trampoline.html
- http://dev.metasploit.com/redmine/projects/framework/wiki/Release_Notes_33
- http://blog.metasploit.com/2010/04/java-web-start-argument-injection.html
- http://blog.metasploit.com/2010/03/latest-adobe-exploit-and-session.html
- http://www.metasploit.com/get-involved/
- http://www.offensive-security.com/metasploit-unleashed/Introduction
- http://blog.metasploit.com/2007/10/cracking-iphone-part-1.html
- http://www.youtube.com/watch?v=8TqMDzBiM9Q
- http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
- http://www.offensive-security.com/backtrack/metasploit-with-mysql-in-backtrack-4-r2/
- http://www.offensive-security.com/metasploit-unleashed/SET
- http://blog.metasploit.com/2010/12/metasploit-framework-351-released.html
- http://www.howtoforge.com/installing-metasploit-3.0-on-ubuntu-7.10
- http://blog.metasploit.com/2008/07/bailiwicked.html
- http://www.offensive-security.com/offsec/metasploit-3-4-and-set-on-iphone-4/
- http://blog.metasploit.com/2007/10/cracking-iphone-part-21.html
- http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie
- http://blog.metasploit.com/2007/10/cracking-iphone-part-2.html
- http://www.blackhat.com/presentations/bh-usa-09/TRAMMELL/BHUSA09-TrammellDruid-MetasploitTele-PAPER.pdf
- http://blog.metasploit.com/2009/12/metasploit-framework-333-exploit.html
- http://blog.metasploit.com/2009/02/best-defense-is-information.html
- http://threatpost.com/en_us/blogs/metasploit-holding-siemens-exploits-052311
- http://www.rapid7.com/
- http://spool.metasploit.com/
- http://blog.metasploit.com/2010/10/one-year-later-metasploit-framework-350.html
- https://community.rapid7.com/community/metasploit/blog/2011/06/14/metasploit-exploit-bounty-30-exploits-500000-in-5-weeks
- http://www.metasploit.com/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh
- http://www.linux.com/archive/feature/61609
- http://www.metasploit.com/learn-more/what-is-it/
- http://blog.metasploit.com/2007/10/cracking-iphone-part-3.html
- http://www.net-security.org/secworld.php?id=10982
- http://www.esecurityplanet.com/news/article.php/3932861/Metasploit-37-Takes-Aim-at-Apple-iOS.htm
- http://pauldotcom.com/2010/07/metasploit-new-gui.html
- http://secmaniac.blogspot.com/2008/07/metasploit-3-on-iphone.html
- http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv
- http://news.softpedia.com/news/Metasploit-Offers-Bounties-for-Exploits-206615.shtml
- http://nostarch.com/metasploit.htm
- http://blog.metasploit.com/2006/07/internet-drive-by-shootings.html
- http://www.offensive-security.com/metasploit-unleashed-training/msfu-update/
- http://www.metasploit.com/modules/exploit/
- http://dev.metasploit.com/redmine/attachments/download/95
- http://docs.google.com/viewer?a=v&q=cache:L2ft-eLThDgJ:dev.metasploit.com/redmine/attachments/download/95 Metasploit&hl=en&pid=bl&srcid=ADGEESi-Hdye4bwnasNUSTTEx4JgGFgfMROKK4du_byCpxr1L2JpGK1OA6-bA0wHXCaw9FfnebML7qHk8C18-wQLfahe2D3-HtHNIf_yVFGJP9baUmm38lFM4KukS5jDGkef3wVszJ_y&sig=AHIEtbRr63BFZ_W8a85omRH9TTgBQFWFwQ" onmousedown="return rwt(this,'','','','145','AFQjCNFCs45Qk1v8zFS0Tjft83wBk0Az4g','','0CBsQxQEwBDiMAQ')">Quick View</a><br>Advisory to Exploit Using <em>Metasploit</em>. Timbuktu Pro PlughNTCommand Named Pipe Buffer Overflow bannedit [email protected]. (12/16/2009) <b>...</b><br><span class=a>dev.<b>metasploit</b>.com/redmine/attachments/download/95</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://blog.metasploit.com/2011/01/mobile-device-security-and-android-file.html
- http://www.rec-sec.com/2010/03/10/internet-explorer-iepeers-use-after-free-exploit/
- http://blog.metasploit.com/2010/04/penetration-testing-learn-assembly.html
- http://blog.metasploit.com/2006/03/browser-fuzzing-for-fun-and-profit.html
- http://blog.metasploit.com/2010/11/win32-respin.html
- http://www.ethicalhack3r.co.uk/security/metaspoits-meterpreter/
- http://www.digininja.org/metasploit/dns_dhcp.php
- http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
- http://www.metasploit.com/modules/exploit/windows/browser/awingsoft_winds3d_sceneurl
- http://www.freshports.org/security/metasploit/
- http://www.net-security.org/secworld.php?id=10706
- http://www.internetnews.com/security/article.php/3927501/New Metasploit 36 Targets Security Compliance.htm
- http://www.rapid7.com/news-events/press-releases/2009/2009-rapid7-acquire-metasploit.jsp
- http://www.osnews.com/story/23937/Past_Present_and_Future_of_Metasploit
- http://www.internetnews.com/security/article.php/3917721/Metasploit-351-Targets-Cisco-Networking-Gear.htm
- http://dev.metasploit.com/redmine/projects/framework/wiki/Release_Notes_34
- http://blog.metasploit.com/2009/02/pathetic-ddos-vs-security-sites.html
- http://dev.metasploit.com/users/opcode/disabled.html
- http://www.securitytube.net/video/1176
- http://oreilly.com/catalog/9781593272883
- http://blog.metasploit.com/2008/02/rise-security-vs-asus-eee-pc.html
- http://www.penetrationtests.com/Frameworks/Free-frameworks/Metasploit-Tutorials/
- http://www.metasploit.com/modules/exploit/windows/http/amlibweb_webquerydll_app
- http://www.securityhunk.com/2010/11/metasploit-guide-for-beginners-and.html
- http://blog.metasploit.com/2007/01/update-on-status-of-30.html
- http://blog.metasploit.com/2011/03/adobe-flash-cve-2011-0609.html
- http://revision3.com/hak5/ipv6-mubix-metasploit
- http://www.skullsecurity.org/blog/2010/weaponizing-dnscat-with-shellcode-and-metasploit
- http://volatile-minds.blogspot.com/2010/09/rvm-and-metasploit.html
- https://community.rapid7.com/community/metasploit/blog/2011/06/21/metasploit-framework-372-released
- http://blog.teusink.net/2010/07/hacking-wireless-presenters-with.html
- http://blog.metasploit.com/2009/12/metasploit-331-nexpose-community.html
- http://www.fastandeasyhacking.com/manual
- http://www.youtube.com/watch?v=DV5wOQQ72_0
- http://www.youtube.com/watch?v=TfZt70TYujg
- http://asert.arbornetworks.com/2009/02/metasploit-and-other-sites-ddosed/
- http://www.metasploit.com/modules/exploit/windows/fileformat/moxa_mediadbplayback
- http://www.internetnews.com/security/print.php/3932941
- http://carnal0wnage.attackresearch.com/node/417
- http://blog.metasploit.com/2009/09/nss-labs-endpoint-protection-test.html
- http://www.metasploit.com/modules/auxiliary/
- http://exploit.co.il/hacking/metasploit-java-meterpreter-payload/
- http://blog.metasploit.com/2009/05/mastering-metasploit-framework.html
- http://www.learnsecurityonline.com/security-dashboard/good-blogs/93-metasploit
- http://blog.metasploit.com/2010/07/metasploit-framework-341-released.html
- http://www.esecurityplanet.com/news/article.php/3896811/Whats-Next-for-Metasploit.htm
- http://searchnetworkingchannel.techtarget.com/tip/Traffic-Talk-Testing-Snort-with-Metasploit
- http://www.rapid7.com/news-events/press-releases/2010/2010-introduces-metasploit-pro.jsp
- http://blog.metasploit.com/2010/12/capturing-windows-logons-with.html
- https://community.rapid7.com/community/metasploit
- http://searchsecurity.techtarget.com/tip/Using-Metasploit-for-real-world-security-tests
- http://dualcoremusic.com/nerdcore/858/metasploit-song/
- http://www.jeffcross.me/2009/04/28/installing-metasploit-on-mac-os-x/
- http://www.exploit-id.com/author/metasploit
- http://it.slashdot.org/story/11/06/14/1714205/Metasploit-Launches-Exploit-Bounty-Program
- http://www.metasploit.com/modules/exploit/windows/browser/ms10_018_ie_behaviors
- http://dev.metasploit.com/redmine/projects/pro/wiki/Updates_341
- http://www.sans.org/security-training/metasploit-kung-fu-enterprise-pen-testing-1472-mid
- http://blogs.securiteam.com/index.php/archives/1371
- http://www.theregister.co.uk/security/
- http://www.mi5.gov.uk/
- http://en.wikipedia.org/wiki/Security
- http://www.reliancesecurity.co.uk/
- http://www.kingdomsecurity.co.uk/
- http://www.cl.cam.ac.uk/~rja14/book.html
- http://www.nsi.org.uk/
- http://certification.comptia.org/getCertified/certifications/security.aspx
- http://www.compoundsecurity.co.uk/
- http://www.tandf.co.uk/journals/titles/09636412.asp
- https://cybersecuritychallenge.org.uk/
- http://skillsforsecurity.org.uk/
- http://www.cl.cam.ac.uk/research/security/
- http://www.v3.co.uk/blog/security-watchdog-blog
- http://www.bsia.co.uk/
- http://www.isg.rhul.ac.uk/
- http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy
- http://www.thecst.org.uk/
- http://www.guardian.co.uk/world/2011/mar/17/un-security-council-resolution
- http://www.thecst.org.uk/
- http://www.dft.gov.uk/pgr/security/
- http://www.cl.cam.ac.uk/~rja14/econsec.html
- http://scholar.google.com/scholar?hl=en&lr=&cites=12387169498425705417&um=1&ie=UTF-8&ei=xAMITryBDImDtgfXqo3fDQ&sa=X&oi=science_links&ct=sl-citedby&resnum=5&ved=0CB4QzgIwBDgU">Cited by 15</a> - <a class=fl href="http://scholar.google.com/scholar?hl=en&lr=&q=related:ycM3XgcR6KsJ:scholar.google.com/&um=1&ie=UTF-8&ei=xAMITryBDImDtgfXqo3fDQ&sa=X&oi=science_links&ct=sl-related&resnum=5&ved=0CB8QzwIwBDgU">Related articles</a><br>The economics of <em>security</em> is a hot and rapidly growing field of research. More and more people are coming to realise that <em>security</em> failures are often due to <b>...</b><br><span class=a>www.cl.cam.ac.uk/~rja14/econsec.html</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.adt.co.uk/
- http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191634.pdf?CID=PDF&PLA=furl&CRE=sdsr
- http://www.coopersecurity.co.uk/
- http://www.nactso.gov.uk/
- http://www.bbc.co.uk/2/hi/technology/7784908.stm
- http://www.coopersecurity.co.uk/
- http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191634.pdf?CID=PDF&PLA=furl&CRE=sdsr
- http://www.nactso.gov.uk/
- http://www.bbc.co.uk/2/hi/technology/7784908.stm
- http://www.direct.gov.uk/en/TravelAndTransport/Foreigntravel/AirTravel/index.htm
- http://www.pcadvisor.co.uk/advisor/security/
- http://en.wikipedia.org/wiki/Computer_security
- http://www.guardian.co.uk/world/2011/mar/17/libya-united-nations-air-strikes-live
- http://www.get-licensed.co.uk/security-licence/
- http://www.hmrc.gov.uk/security/index.htm
- http://www.tsa.gov/
- http://www.kingsltd.co.uk/
- http://www.allsafesecurityservices.co.uk/
- http://www.adsgroup.org.uk/
- http://www.arrowsecurityshutters.co.uk/
- http://www.bbc.co.uk/news/technology-12819330
- http://www.fsa.gov.uk/pubs/other/data_security.pdf
- http://docs.google.com/viewer?a=v&q=cache:iYJObe-wosAJ:www.fsa.gov.uk/pubs/other/data_security.pdf Security&hl=en&pid=bl&srcid=ADGEESgozn_Hiem1Qzxd96l-aApm8GtaLSi7pQnichMfM2xyFTM8oirTaBjG2jGoF0FY9kgwsuTvZD0OSZmgRILdmqIZmdZorsa4dacHIbHkSYuExQco3qjljOPbYb6Yl8ZLm62wruOz&sig=AHIEtbTZfPJlw0QF_JkSHutWq3Z-lzo1Mg" onmousedown="return rwt(this,'','','','49','AFQjCNFbx_tBlOKhZ9NUb8x1glomcKucAg','','0CDIQxQEwCDgo')">Quick View</a><br><em>security</em> factsheets that we will make available to them on our website and <b>...</b> proportionate, risk-based approach to data <em>security</em>, taking into account <b>...</b><br><span class=a>www.fsa.gov.uk/pubs/other/data_<b>security</b>.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.bbc.co.uk/news/world-middle-east-12751234
- http://www.bbc.co.uk/news/world-us-canada-11923766
- http://www.dsdni.gov.uk/
- http://www.bbc.co.uk/news/technology-10865288
- http://www.guardian.co.uk/global-development/food-security
- http://www.bbc.co.uk/news/technology-13453497
- http://www.telegraph.co.uk/news/worldnews/asia/pakistan/8488236/WikiLeaks-Osama-bin-Laden-protected-by-Pakistani-security.html
- http://www.bbc.co.uk/news/technology-10761210
- http://www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf
- http://docs.google.com/viewer?a=v&q=cache:Wq7d9Y2i8TQJ:www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf Security&hl=en&pid=bl&srcid=ADGEESh1pWFXGzvUYuRaLZ4S8YIFtv_DAgXxtfqlWZrN0_koV_QXZvHmPwu6oLLiCtAszG49_Brk6n-G1s0-pWH6S5RtLg9WzWK8h5C2GT6kGeahiaqmtf7GuCDInhmsilSY_yYNqj8Z&sig=AHIEtbTA0UltF_kF3hZ-kasgMqUvWDcVDA" onmousedown="return rwt(this,'','','','59','AFQjCNEdCbY3klfcEB3EFPsz3NVniCgBww','','0CDIQxQEwCDgy')">Quick View</a><br><span dir=ltr>10 Aug 2007</span> – Chapter 2: Overview: the Internet and personal <em>security</em> <b>...</b> Maintaining <em>security</em><wbr>—patching and <em>security</em> software <b>...</b><br><span class=a>www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/.../165i.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.bbc.co.uk/news/technology-13560137
- http://www.bbc.co.uk/news/uk-politics-13338508
- http://www.cl.cam.ac.uk/~rja14/psysec.html
- http://www.bbc.co.uk/news/technology-13712377
- http://www.bitdefender.co.uk/
- http://www.bbc.co.uk/news/uk-england-manchester-12594245
- http://www.guardian.co.uk/technology/2011/feb/07/anonymous-attacks-us-security-company-hbgary
- http://www.bbc.co.uk/news/business-11793436
- http://www.theregister.co.uk/2011/05/27/honda_data_breach/
- http://www.bbc.co.uk/news/technology-12380987
- http://www.bbc.co.uk/news/technology-13615091
- http://www.hmrc.gov.uk/security/examples.htm
- http://www.bbc.co.uk/news/technology-10912376
- http://www.theregister.co.uk/2011/05/13/veracode_playstation_hack_analysis/
- http://www.bbc.co.uk/2/hi/technology/8544413.stm
- http://www.telegraph.co.uk/travel/travelnews/8300223/Mice-trained-for-airport-security.html
- http://www.bbc.co.uk/news/world-south-asia-10999753
- http://www.bluetack.co.uk/
- http://www.bbc.co.uk/news/business-11632944
- http://www.bbc.co.uk/news/science-environment-13389320
- http://www.bbc.co.uk/news/world-middle-east-13327815
- http://www.bbc.co.uk/news/technology-13454201
- http://www.bbc.co.uk/news/world-us-canada-13290274
- http://www.bbc.co.uk/news/technology-12759922
- http://www.bbc.co.uk/news/business-13011918
- http://www.guardian.co.uk/global-development/poverty-matters/2011/jun/20/bolivia-food-security-prices-agriculture
- http://www.bbc.co.uk/news/world-13815399
- http://www.theregister.co.uk/2010/12/18/gawker_hack_aftermath/
- http://www.theregister.co.uk/2011/04/26/ms_third_party_bug_advisories/
- http://www.bbc.co.uk/news/world-africa-12589434
- http://www.bbc.co.uk/news/technology-10731612
- http://www.bbc.co.uk/news/10829951
- http://www.bbc.co.uk/news/uk-11571766
- http://www.bbc.co.uk/news/world-us-canada-13740591
- http://www.bbc.co.uk/news/business-13276490
- http://www.bbc.co.uk/news/world-europe-13417958
- http://www.axis-security.co.uk/
- http://www.theregister.co.uk/2010/12/16/social_media_threats/
- http://www.techwatch.co.uk/
- http://www.bbc.co.uk/news/world-middle-east-12125143
- http://www.bbc.co.uk/news/10116606
- http://www.theregister.co.uk/2010/09/13/hp_buys_arcsight/
- http://www.theregister.co.uk/2011/03/15/intel_mcafee_deal/
- http://www.bbc.co.uk/news/world-europe-12273145
- http://www.babysecurity.co.uk/
- http://www.alertsystems.co.uk/
- http://www.symbiosec.co.uk/
- http://www.theregister.co.uk/2011/02/02/ryanair_booking_system_security/
- http://www.cellsecurity.co.uk/
- http://www.guardian.co.uk/world/2010/nov/16/guantanamo-uk-kenneth-clarke
- http://www.theregister.co.uk/2010/04/15/emergency_java_patch/
- http://www.networkworld.com/topics/security.html
- http://www.guardian.co.uk/world/us-national-security
- http://www.securityfocus.com/
- http://www.ssa.gov/
- http://www.computerworld.com/s/topic/17/Security
- http://www.bbc.co.uk/2/hi/programmes/newsnight/9505747.stm
- http://www.adt.com/
- http://cordis.europa.eu/fp7/security/home_en.html
- http://www.dhs.gov/
- http://www.g4s.com/
- http://www.investorwords.com/4446/security.html
- http://www.pandasecurity.com/
- http://www.bbc.co.uk/news/uk-12374262
- http://www.facebook.com/security
- http://en.wikipedia.org/wiki/Information_security
- http://www.openbsd.org/security.html
- http://www.w3.org/Security/
- http://en.wikipedia.org/wiki/National_security
- http://www.debian.org/security/
- http://support.apple.com/kb/HT1222
- http://www.mcafee.com/
- http://www.un.org/Docs/sc/
- http://www.whitehouse.gov/issues/homeland-security
- http://en.wikipedia.org/wiki/Network_security
- http://php.net/manual/en/security.php
- http://www.cisco.com/en/US/products/hw/vpndevc/index.html
- http://csrc.nist.gov/
- https://cms.paypal.com/cgi-bin/marketingweb?cmd=_render-content&content_ID=security/online_security_center
- http://www.microsoft.com/en-us/security_essentials/geo/
- http://www.chubb.com.au/
- http://www.rsa.com/
- http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/index.html
- http://arstechnica.com/security/
- http://www.opera.com/security/
- http://www.usenix.org/event/bytopic/security.html
- http://www.mozilla.org/security/known-vulnerabilities/
- http://www.securityoncampus.org/
- http://msdn.microsoft.com/en-us/security/aa570330
- http://xkcd.com/538/
- http://www.net-security.org/
- http://www.webopedia.com/TERM/S/security.html
- http://cit.nih.gov/Security/
- http://digitalenterprise.org/security/security.html
- http://www.ssa.gov/disability/
- http://www.tsa.gov/travelers
- http://news.cnet.com/security/
- http://www.cloudsecurityalliance.org/
- https://www.pcisecuritystandards.org/
- http://www.dmoz.org/Computers/Security/
- http://www.whitehouse.gov/administration/eop/nsc/
- http://www.google.com/apps/intl/en/business/infrastructure_security.html
- http://dictionary.reference.com/browse/security
- http://www.oracle.com/technetwork/java/javase/tech/index-jsp-136007.html
- http://voices.washingtonpost.com/securityfix/
- http://www.us-cert.gov/cas/tips/
- http://en.blog.wordpress.com/2011/04/13/security/
- http://ope.ed.gov/security/
- http://download.oracle.com/javase/1.4.2/docs/guide/security/
- http://www.cert.org/homeusers/HomeComputerSecurity/
- http://static.springsource.org/spring-security/site/
- http://www.google.com/about/corporate/company/security.html
- http://www.nsa.gov/
- http://security.symantec.com/
- http://www.gwu.edu/~nsarchiv/
- http://www.facebook.com/help/?page=420
- http://www.cisco.com/web/learning/le3/ccie/security/
- http://www.ca.com/us/replace-hardware-tokens.aspx
- http://www.microsoft.com/technet/security/current.aspx
- http://www.flickr.com/photos/carbonnyc/2294144289/
- http://oreilly.com/pub/topic/security
- https://www.ssfcu.org/
- http://security.ittoolbox.com/
- http://en.wikipedia.org/wiki/Security_guard
- http://www.redhat.com/security/
- http://www.security.org/
- http://messenger.yahoo.com/security/
- http://www.asial.com.au/
- http://www.dslreports.com/forum/security
- http://www.securityexpo.com.au/
- http://www.ibm.com/developerworks/security/
- http://www.skype.com/intl/en-us/security/
- http://code.google.com/speed/public-dns/docs/security.html
- http://www.homesecuritystore.com/
- http://aws.amazon.com/security/
- http://www.ibm.com/security/
- http://www.iwar.org.uk/hackers/resources/digital rebels/articles/unixhck.txt
- http://www.d3scene.com/forum/development/3676-tutorial-how-hack-someone-knowing-his-ip.html
- http://www.hackingalert.com/hacking-articles/hotmail-hacking-guide.php
- http://www.puremango.co.uk/2009/05/hacking-facebook/
- http://www.cashloopholes.co.uk/free-computer-internet-loopholes-secrets/15224-tutorial-4-hacking-websites.html
- http://sethioz.co.uk/forum/viewtopic.php?f=49&t=80&start=80
- http://www.se-satio.co.uk/viewtopic.php?f=15&t=2657&start=20
- http://sethioz.co.uk/forum/viewtopic.php?f=49&t=80&start=40
- http://www.darknet.org.uk/2007/07/learn-to-use-metasploit-tutorials-docs-videos/
- http://www.breakthesecurity.com/
- http://www.hacktronics.co.uk/tutorial-hack-3-55-firmware-ps3-jaibreak-no-mod-chip/
- http://www.hackforums.net/forumdisplay.php?fid=47
- http://themostboringblogintheworld.wordpress.com/2006/08/29/huge-collection-of-hack-tutorial-videos-download/
- http://www.kwintessential.co.uk/KwintBlog/blog/culture/multicultural/techmantrasethical-hacking-tutorialspenetration-testinghacking-toolsexploits-144/
- http://www.darknet.org.uk/2006/09/web-based-e-mail-hotmail-yahoo-gmail-hackhacking-with-javascript/
- http://www.youtube.com/watch?v=igub7ZF5p40
- http://www.cashloopholes.co.uk/wifi-hacks-secrets/2493-hacking-cracking-wep-using-backtrack-beginners-guide.html
- http://www.dailymail.co.uk/sciencetech/article-1391297/How-takes-just-15-minutes-web-tuition-hack-email.html
- http://www.businesscomputingworld.co.uk/novices-learn-how-to-hack-in-15-minutes/
- http://www.hacktronics.co.uk/ps3-hacked-file-manager-challenge-lobby-tutorial/
- http://sharereactor.com/release/14646-1000-hacking-tutorials.htm
- http://www.hackingalert.com/hacking-articles/hacking-tutorials.php
- http://www.theageofmammals.com/top8/styleindex.html
- http://a.com.pk/1000-hacking-tutorials-tips-tricks/
- http://kyrionhackingtutorials.com/
- http://www.insidehighered.com/blogs/university_diaries/hacking_tutorial
- http://www.metawing.com/
- http://www.youtube.com/watch?v=lBGN5OGCPgI
- http://ethical-hacking-tutor.blogspot.com/
- http://thepiratebay.org/torrent/4880442/1000_Hacking_Tutorials_(The_Best_of_2008)_[RH]
- http://www.youtube.com/watch?v=zBCYAEudCM8
- http://windows-x.tripod.com/id15.html
- http://www.youtube.com/watch?v=axPB_2uynN4
- http://www.gametrailers.com/video/mind-hacking-mindjack/702790
- http://www.youtube.com/watch?v=qqG-w4vBdCs
- http://www.tutorialsdownload.com/Ethical-Hacking.php
- http://lib.ru/SECURITY/hackalot.txt
- http://www.youtube.com/watch?v=O-LBEa1NYqA
- http://rhg.rubyforge.org/
- http://www.youtube.com/watch?v=_jvspXzM2eY
- http://drivl.com/ethical-hacking-tutorial.html
- http://www.youtube.com/watch?v=szrFPqoTKG0
- http://www.infosyssec.com/infosyssec/hackhow1.htm
- http://www.youtube.com/watch?v=FGFHUOnngmU
- http://themostboringblogintheworld.wordpress.com/2007/05/09/hacking-tutorial-info-sec/
- http://www.youtube.com/watch?v=k8OdgyMzySg
- http://hiroshimamovies.altervista.org/blog/2011/06/03/1000-hacking-tutorials/
- http://www.youtube.com/watch?v=zzUeG0yzc6g
- http://www.ladyada.net/learn/electroknit/
- http://www.youtube.com/watch?v=1EtWA4vc2V0
- http://cs.wellesley.edu/~cs342/fall06/hacking-notes.pdf
- http://docs.google.com/viewer?a=v&q=cache:YMfLeGA4QeoJ:cs.wellesley.edu/~cs342/fall06/hacking-notes.pdf Hacking+Tutorial&hl=en&pid=bl&srcid=ADGEESiLzHaZi-FCQ-kin90pojq5XsQVmv4t-Njenk0IHQeBWui8JyEnbVlRs5p38zcd6Kdsse3ygnFP-6qDOheZIaslNjDYI_rve5ev4ww3Jy4Dmha_8nOTXY-iGVQ8IWNEXb57ey4o&sig=AHIEtbQhSuwC7aAyyUqZbpDDNABFfc-8bA" onmousedown="return rwt(this,'','','','57','AFQjCNHr9ZiHp42G1b8dFeai5PF2YMFndQ','','0CCkQxQEwBjgy')">Quick View</a><br><span dir=ltr>14 Nov 2006</span> – <em>Hacking Tutorial</em> Notes. These are some notes about the material covered in the Fri. Nov. 10 and Sun. Nov. 12 hacking tutorials. <b>...</b><br><span class=a>cs.wellesley.edu/~cs342/fall06/<b>hacking</b>-notes.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.youtube.com/watch?v=5S83valMh0Q
- http://apex.vtc.com/ethical-hacking.php
- http://www.youtube.com/watch?v=yOuULqeFYD4
- http://www.youtube.com/watch?v=q3lqDj1lOMc
- http://www.hacktronics.co.uk/
- http://www.youtube.com/watch?v=kGsI-rEFEXY
- http://daimonsoft.blogspot.com/2010/04/1000-hacking-tutorials.html
- http://www.youtube.com/watch?v=03taqew9-UE
- http://www.techwatch.co.uk/forums/26035-dreambox-500s-and-all-sky-channels.html
- http://www.youtube.com/watch?v=UAK9GVj-oJw
- http://hackingalert.blogspot.com/2011/03/ultimate-hacking-tutorial-and-e-books.html
- http://www.youtube.com/watch?v=nV5uooHPx3Q
- http://www.youtube.com/watch?v=JRHmwzDgbHI
- http://www.hackingalert.com/hacking-articles/google-hacks.php
- http://www.youtube.com/watch?v=9P-HbQoOFhw
- http://www.techmantras.com/content/1000-great-hacking-tutorials-2010-newbies
- http://www.youtube.com/watch?v=0xwDTV6w_rU
- http://www.sharetermpapers.com/computer-sc-it/(tuts)-easy-hacking-tutorial-(-a-must-for-any-computer-sc-it-proffessional)/
- http://www.youtube.com/watch?v=7X_wGuJwXGs
- http://www.hackforums.net/
- http://forums.devshed.com/security-and-cryptography-17/looking-for-a-technical-hacking-tutorial-266058.html
- http://www.textfiles.com/hacking/UNIX/
- http://nintendo-ds.dcemu.co.uk/
- http://seclists.org/pen-test/2008/Jan/95
- http://www.youtube.com/watch?v=i2pFl7qDvtI
- http://www.hackinghome.com/category/hacking-tutorial-videos
- http://www.youtube.com/watch?v=BaQ7kt0ov1M
- http://www.ps3hax.net/
- http://www.youtube.com/watch?v=dtFuFTKS4SA
- http://themostboringblogintheworld.wordpress.com/2006/09/08/hacking-tutorial-for-beginners-windows-xp-security/
- http://www.hackanonymous.com/
- http://www.youtube.com/watch?v=mQ2Y23zzHEY
- http://www.wireless-warrior.org/detail/1464/spoonfed-hacking-how-to-crack-wep-local-hacking-tutorial.html
- http://ebookee.org/1000-Best-ever-Great-hacking-tutorials-2009_410170.html
- http://securityh4x.blogspot.com/2010/01/500-hacking-tutorials.html
- http://hetland.org/writing/instant-hacking.html
- http://www.youtube.com/watch?v=EI3mpVqoTsI
- http://www.stillhq.com/diary/lca2005/000030.html
- http://www.youtube.com/watch?v=EhgzQUWm3HQ
- http://www.youtube.com/watch?v=sFzuPZZ1nrU
- http://ebookee.org/23-Best-Hacking-Tutorial-Videos_781797.html
- http://www.youtube.com/watch?v=usgoVJtf-a8
- http://vinasupport.com/2009/hacking-tutorial-2009/
- http://www.computer-training-software.com/ethical-hacking.htm
- http://www.youtube.com/watch?v=jWOfDVRU38o
- http://www.youtube.com/watch?v=LSYLckoYs-c
- http://hackiteasy.blogspot.com/2011/01/wireless-hacking-tutorial-using.html
- http://www.youtube.com/watch?v=TXKxG0RMFMU
- http://www.youtube.com/watch?v=omhMibrhgCE
- http://hacknmod.com/hack/how-to-hack-a-wep-wireless-network/
- http://www.metacafe.com/watch/4344239/gunz_hacking_tutorial_part_1_4_cocaine_dll/
- http://tech.royans.net/2003/02/notes-from-hacking-tutorial.html
- http://www.facebook.com/pages/Hacking-Tutorial/107584109259994
- http://www.youtube.com/watch?v=fe6DfeqJFb8
- http://www.youtube.com/watch?v=Y2Kng-ikyp8
- http://www.kongregate.com/games/Xzer/anti-hacking-tutorial
- http://www.youtube.com/watch?v=ofR8J51un3o
- http://secureslash.com/learn-hacking/windows-admin-access-hacking/
- http://www.mappingwireless.com/wardriving/hacking-tutorial-videos-collection
- http://ebookee.org/Video-FULL-Collection-Hacking-Tutorials-KL_902690.html
- http://www.youtube.com/watch?v=uWxGHSIz-Eg
- http://www.youtube.com/watch?v=sjM5VikA-yw
- http://www.youtube.com/watch?v=x_mXo2BFAWU
- http://www.youtube.com/watch?v=K7wfa-4hNl4
- http://www.youtube.com/watch?v=IAdbjCZt21w
- http://torrentz.eu/7a9c6c36c231e8cf4173e4d9ed3342976a524db3
- http://ebookee.org/Video-Hacking-Tutorials-FULL-Collection_828595.html
- http://leetupload.com/tutorials/hackingspoonfed/part1/
- http://www.youtube.com/watch?v=hxH4UsQPPQg
- http://www.youtube.com/watch?v=Ia8NtCmZc4A
- http://www.youtube.com/watch?v=GHgeewdXb9w
- http://crack0hack.wetpaint.com/page/Website hacking complete tutorial
- http://www.youtube.com/watch?v=wT-iMzK5GQo
- http://digg.com/news/technology/facebook_profile_picture_hack_tutorial
- http://www.facebook.com/pages/Hacking-Tutorial-Tips-And-Trick/183056785051995
- http://www.metacafe.com/watch/2381965/adventure_quest_hacking_tutorial_1_hit_kill/
- http://www.youtube.com/watch?v=vAI4HdPA0pc
- http://www.youtube.com/watch?v=_S5fSRgITjw
- http://ebookee.org/Hacking-Tutorial-Videos-Collection_546886.html
- http://lib.misto.kiev.ua/SECURITY/hackalot.txt
- http://ronikrich.blogspot.com/2011/03/complete-hacking-tutorials.html
- http://www.youtube.com/watch?v=7-PDl8Koy9k
- http://www.youtube.com/watch?v=6z9niwQHJuM
- http://www.youtube.com/watch?v=avu0r3gt7m0
- http://leetupload.com/tutorials/hackingspoonfed/part1/
- http://www.youtube.com/watch?v=hxH4UsQPPQg
- http://www.facebook.com/pages/Hacking-Tutorial-Tips-And-Trick/183056785051995
- http://www.youtube.com/watch?v=Ia8NtCmZc4A
- http://www.youtube.com/watch?v=GHgeewdXb9w
- http://crack0hack.wetpaint.com/page/Website hacking complete tutorial
- http://www.youtube.com/watch?v=OTSMhGnw0N0
- http://www.onlinefreeebooks.net/free-ebooks-computer-programming-technology/hacking-related/
- http://www.youtube.com/watch?v=wT-iMzK5GQo
- http://www.qj.net/search/psp-hacking-tutorial.html
- http://thecyndicate.com/Communication/content.php?139-PS3-IDA-Hacking-Tutorial
- http://www.youtube.com/watch?v=j6Bb_8Zc_As
- http://www.docstoc.com/docs/13543302/Hacking-Tutorial
- http://ohsoninja.wordpress.com/2008/04/20/the-ultimate-hacking-tutorial-the-gibson/
- http://www.youtube.com/watch?v=fndmBzuyoGM
- http://www.softwaretrainingtutorials.com/hack-pen-test.php
- http://5530xpressmusic.com/nokia-5530-hacking-tutorial/
- http://www.youtube.com/watch?v=xrDUE2xCsVM
- http://www.dl4all.com/u1q/tag/Slick Hacking Pro Hacking Tutorial.html
- http://www.youtube.com/watch?v=W70z8vqkg6M
- http://ebookee.org/-MULTI-Hacking-Tutorials-Video-Collection_761326.html
- http://www.nokiasymbianthemes.com/explore/the-ultimate-symbian-hacking-guide-tools-issues-software-firmware
- http://www.youtube.com/watch?v=38w-CaRnOqY
- http://hackingalert.blogspot.com/2011/03/advanced-hacking-tutorials-for-those.html
- http://www.reference.com/motif/Computers/wireless-network-hacking-tutorial
- http://www.youtube.com/watch?v=rl9oLblOQJk
- http://www.youtube.com/watch?v=jR7ut-q3JJA
- http://www.iphoneworld.ca/iphone-hacking-guide/
- http://www.btscene.eu/details/2215073/1000 Windows tips and Hacking Tutorials AiO OCTOBER 2010 best.html
- http://ebookee.org/1000-bestever-great-hacking-tutorials-2010_663554.html
- http://www.youtube.com/watch?v=zuzNIHDqVX4
- http://www.techmantras.com/
- http://www.youtube.com/watch?v=73EHfC66k_8
- http://vishnuvalentino.com/
- http://oussamedia.com/portail/hacking-tutorial-videos-collection-english-subtitle-english-built-in-aprox-3-hours-1024-x-768-680-x-460-swf-avi-mp3-128kbps-663-mb/
- http://www.google-al.de.tl/500-hacking-tutorials.htm
- http://www.docstoc.com/docs/34909163/Index-of-Ebook---Hacker---Ita-Cracking-Hacking-Tutorial-1000-
- http://ebookee.org/1000-Hacking-Tutorials-The-Best-of-2008-_444803.html
- http://www.youtube.com/watch?v=V5PT5RMD2lg
- http://www.hacking-tutorial.co.cc/
- http://www.youtube.com/watch?v=gYJynHkrcdI
- http://www.youtube.com/watch?v=nqoO6NVvvoM
- http://www.youtube.com/watch?v=lzngbfJQLJM
- http://www.encyclopedia.com/video/lBGN5OGCPgI-kismac-hacking-tutorial-how-to.aspx
- http://www.youtube.com/watch?v=JGM5Wp5KH60
- http://www.hackforums.net/showthread.php?tid=33596
- http://blog.spywareguide.com/2008/01/bank-hacking-tutorial-is-ardam.html
- http://www.docstoc.com/docs/74529481/hacking-tutorial
- http://forums.penhacks.net/Thread-how-to-hack-your-wii-via-banner-bomb
- http://www.youtube.com/watch?v=K79nPCJ5Nro
- http://www.youtube.com/watch?v=VwmAA8tAi68
- http://allthehackingtoolsyouneed.blogspot.com/2010/02/1000-hacking-tutorials-must-have.html
- http://themostboringblogintheworld.wordpress.com/2006/09/09/more-hacking-tutorial-videos-video-download/
- http://freebooksdownload.blogspot.com/2010/11/1000-hacking-tutorials-free-download.html
- http://www.darknet.org.uk/2007/11/inguma-005-released-for-download-penetration-testing-toolkit/
- http://sourceforge.net/projects/inguma/develop
- http://www.darknet.org.uk/2007/12/inguma-006-released-for-download-free-pen-testing-framework/
- http://www.ehacking.net/2011/03/inguma-free-penetration-testing-toolkit.html
- http://www.inguma-framework.org/projects/inguma/wiki/ConsoleQuickStart
- http://packages.ubuntu.com/lucid/all/inguma/filelist
- http://www.youtube.com/watch?v=RHgB2ia9jLc
- http://www.aldeid.com/index.php/Inguma/CLI/Modules:Exploits/Exploitdb
- http://ohsoninja.wordpress.com/page/2/
- http://www.inguma-framework.org/projects/inguma/wiki/GettingStarted
- http://www.securityhunk.com/2011/01/new-inguma-free-penetration-and.html
- http://www.macshadows.com/forums/lofiversion/index.php?t9210.html
- http://blog.red-database-security.com/2007/10/20/inguma-free-oracle-penetration-toolkit-from-joxean-koret/
- http://www.brothersoft.com/inguma-241841.html
- http://www.darknet.org.uk/category/database-hacking/
- http://blog.red-database-security.com/2007/10/22/running-inguma-plsql-fuzzer-against-10203-with-october-2007-cpu/
- http://www.pentestit.com/tag/inguma/
- http://johncrackernet.blogspot.com/2011/02/inguma-penetration-testing-toolkit.html
- http://www.macshadows.com/forums/index.php?showtopic=9210
- http://www.pentestit.com/2011/01/19/inguma-penetration-testing-vulnerability-research-toolkit/
- http://www.macshadows.com/forums/index.php?showtopic=9182
- http://tools.securitytube.net/index.php?title=Inguma
- http://www.garage4hackers.com/showthread.php?1008-Inguma-v.0.3-Released
- http://sickness.tor.hu/?cat=7
- http://nukeit.org/tag/matriux/
- http://sickness.tor.hu/?p=259
- http://nukeit.org/tag/linux/
- http://nukeit.org/protech-live-ubuntu-based-linux-pentest-distro/
- http://www.pentestit.com/tag/vulnerability-scanner/
- http://sickness.tor.hu/?tag=metasploit
- http://www.pentestit.com/2009/06/12/sapyto-sap-penetration-testing-framework/
- http://sickness.tor.hu/?tag=hacking
- http://www.pentestit.com/tag/system-security/
- http://sickness.tor.hu/?tag=backtrack
- http://www.pentestit.com/2011/01/10/collection-python-tools-penetration-testers/
- http://forums.pentoo.ch/viewtopic.php?f=7&t=1008
- http://www.coresec.org/tag/testing/
- http://www.pentestit.com/2010/04/18/ubuntu-pentest-edition-live-dvd/
- http://www.coresec.org/tag/penetration/
- http://www.pentestit.com/2011/04/06/retina-community-vulnerability-assessment-scanner-released/
- http://nukeit.org/matriux-0-9-4-beta1-security-distro/
- http://www.pentestit.com/2010/11/21/update-secmic-v404/
- http://www.backtrack-linux.org/forums/backtrack-videos/32489-owning-windows-xp-shared-folder.html
- http://www.pentestit.com/2010/02/14/owaspbwa-owasp-broken-web-applications-project-tool/
- http://www.securityhunk.com/
- http://www.pentestit.com/2011/06/14/packetfu-midlevel-packet-manipulation-library-ruby/
- http://www.linuxac.org/forum/archive/index.php/t-12111.html" dir=rtl class=l onmousedown="return rwt(this,'','','','53','AFQjCNEDzs5zxZDluk77xPAeRT4OGpNyBw','','0CA4QFjACODI')">Ø´Ø±Ø <em>Inguma</em> Penetration Testing & Vulnerability Research Toolkit <b>...</b></a></h2><table border=0 cellpadding=0 cellspacing=0><tr><td class="j"><div class=std><div class="f">11 posts - 8 authors - Last post: 29 Oct 2010</div><span dir=rtl>http://br4v3-h34r7.com/wp-content/uploads/2008/06/<em>inguma</em>-about.png ØªØØªÙˆÙŠ Ù…Ø¬Ù…ÙˆØ¹Ø© <em>Inguma</em> على <b>...</b> http://ingumadocs.angelfire.com/<em>tutorial</em>.html <b>...</b></span><br><span class=a>www.linuxac.org/forum/archive/index.php/t-12111.html</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.pentestit.com/2010/08/18/update-nmapsi4-02-beta3/
- http://www.pentestit.com/2010/11/16/update-owaspbwa-v092rc2/
- http://www.pentestit.com/2011/02/07/sharepoint-googlediggity-dictionary-file/
- http://www.pentestit.com/2011/04/14/update-cvechecker-v31/
- http://www.pentestit.com/2010/10/06/secmic-penetration-testing-distribution/
- http://www.pentestit.com/2011/06/20/pastebin-scraper/
- http://www.pentestit.com/2011/03/29/update-weaknet-v5/
- http://www.pentestit.com/2011/04/16/mcafee-sharescan/
- http://www.pentestit.com/2010/07/07/tcpsniffer-raw-winsocket-based-sniffer-implementation/
- http://www.pentestit.com/2011/04/24/update-nmapsi4-v021-2/
- http://www.pentestit.com/2009/12/19/hostmap-tool-enumerate-operating-system-hostnames-virtual-hosts/
- http://www.pentestit.com/2010/03/11/plecost-tool-wordpress-finger-printer/
- http://www.mundodoshackers.com.br/ferramenta-para-pentests-inguma
- http://www.pentestit.com/2011/01/22/update-nmapsi4-v021/
- http://www.darknet.org.uk/2010/07/fxcop-net-framework-security-analysis-tool/
- http://www.pentestit.com/2011/06/06/update-pastenum-v2/
- http://www.pentestit.com/2011/06/06/update-pastenum-v2/
- http://trac.pentoo.ch/wiki/Tools_List
- http://www.pentestit.com/2010/11/11/update-puzlbox-v1022/
- http://airodump.net/wep-crack-video-tutorial-beginner/
- http://www.pentestit.com/2009/12/30/update-hostmap-021/
- http://esploit.blogspot.com/p/pentestoolz.html
- http://www.pentestit.com/2010/05/11/update-iscanner-05/
- http://sickness.tor.hu/?p=42
- http://www.pentestit.com/2010/04/01/hackers-automated-seo-poisoning-attacks-distribute-malware/
- http://www.pentestit.com/2010/10/24/update-secmic-v4-beta-2/
- http://www.red-database-security.com/exploits/oracle_sql_injection_oracle_lt_findricset2.html
- http://www.pentestit.com/2010/11/09/update-plecost-v0229beta/
- http://airodump.net/category/video/
- http://www.pentestit.com/2011/01/17/puck-live-cd-top-penetration-testing-tools/
- http://sickness.tor.hu/?p=273
- http://www.pentestit.com/2010/07/19/pentestit-post-day-blackbox-web-vulnerability-scanners/
- http://apps.facebook.com/blognetworks/blog/subhashdasyam
- http://www.pentestit.com/2009/10/10/nat-probe-test-hosts-nat-local-area-network/
- http://www.pentestit.com/2010/12/21/update-secunia-personal-software-inspector-v20/
- http://www.linuxac.org/forum/showthread.php?12111-Inguma-Penetration-Testing-amp-Vulnerability-Research-Toolkit" dir=rtl class=l onmousedown="return rwt(this,'','','','93','AFQjCNHcHBZTpEcJZ9krBEVBUIJctkr5Sg','','0CA4QFjACOFo')">Ø´Ø±Ø <em>Inguma</em> Penetration Testing & Vulnerability Research Toolkit</a></h2><table border=0 cellpadding=0 cellspacing=0><tr><td class="j"><div class=std><div class="f">11 posts - 5 authors - Last post: 29 Oct 2010</div><span dir=rtl>http://br4v3-h34r7.com/wp-content/uploads/2008/06/<em>inguma</em>-about.png ØªØØªÙˆÙŠ Ù…Ø¬Ù…ÙˆØ¹Ø© <em>Inguma</em> على <b>...</b> http://ingumadocs.angelfire.com/<em>tutorial</em>.html <b>...</b></span><br><span class=a>www.linuxac.org/forum/showthread.php?12111-<b>Inguma</b>-Penetration...</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.pentestit.com/tag/penetration-testing/
- http://airodump.net/airdropng-video-presentation-security-conference-shmoocon-2010/
- http://airodump.net/cracking-wpa-psk-wifi-security/
- http://www.pentestit.com/2010/01/17/karmetasploit-tool-build-wireless-hotspot-sniffer/
- http://www.secuobs.com/revue/news/310812.shtml
- http://www.pentestit.com/2009/03/10/list-business-fuzzers/
- http://sickness.tor.hu/?p=19
- http://www.glopeda.com/detail/1576/ncircle-ip360-vulnerability-management.html
- http://blog.red-database-security.com/2008/12/
- http://www.pentestit.com/2011/04/29/update-live-hacking-dvd-v13-beta/
- http://www.pentestit.com/2009/09/18/update-nessus-version/
- http://www.pentestit.com/2010/12/29/update-blackbuntu-community-edition-01/
- http://www.youtube.com/watch?v=nJLsJt-Q-Eg
- http://airodump.net/category/security/
- http://nukeit.org/author/admin/page/8/
- http://www.pentestit.com/2011/03/04/update-scapy-v220/
- http://www.ehacking.net/2011/05/sql-power-injector-tutorial.html
- http://www.pentestit.com/2009/09/16/scanex-scanning-vulnerable-iframe-script-injections/
- http://www.dihitt.com.br/n/humor/2011/06/11/cone-ing-uma-nova-forma-de-tomar-sorvete
- http://www.ehacking.net/2011/03/footprinting-information-gathering.html
- http://www.ehacking.net/2011/04/darkjumper-automatic-tool-tutorial.html
- http://www.pentestit.com/2010/07/11/create-bootable-windows-7-usb-drive-sbb-tool/
- http://www.pentestit.com/tag/yersinia/
- http://www.pentestit.com/2010/10/17/sdl-regex-fuzzer-test-regular-expressions-potential-denial-service-vulnerabilities/
- http://airodump.net/packet-injection-wifi-intel-4965/
- http://www.ehacking.net/2011/06/how-to-install-backtrack-5-dual-boot.html
- http://www.ehacking.net/2011/04/nikto-vulnerability-scanner-tutorial.html
- http://www.ehacking.net/2011/06/integrate-nmap-with-nessus-tutorial.html
- http://www.ehacking.net/2011/04/infondlinux-script-for-security-tools.html
- http://www.ehacking.net/2011/06/integrate-nessus-with-metasploit.html
- http://www.ehacking.net/2011/06/how-to-use-armitage-in-backtrack-5.html
- http://www.ehacking.net/2011/05/web-application-attack-and-audit.html
- http://www.ehacking.net/2011/03/maltego-information-gathering-tool.html
- http://sickness.tor.hu/?p=14
- http://sickness.tor.hu/?p=97
- http://www.subhashdasyam.com/
- http://sickness.tor.hu/?p=281
- http://sickness.tor.hu/?p=269
- http://gretongerzdesain.wordpress.com/category/tentang-hacker-and-craker/
- http://www.pentestit.com/2010/11/04/hardening-windows-7-windows-server-2008-steps/
- http://www.pentestit.com/2011/03/11/ianalizer-integrity-analyzer-sap/
- http://www.pentestit.com/2011/04/13/cvechecker-tool-report-vulnerabilities-system/
- http://www.pentestit.com/2011/03/23/pastenum-tool-pastebin-pastie-enumeration/
- http://www.pentestit.com/2011/02/11/openscap-security-content-automation-protocol-tool/
- http://www.darknet.org.uk/darknet-archives/
- http://www.pentestit.com/2011/02/25/open-source-penetration-testing-bookmarks-collection/
- http://www.pentestit.com/2011/02/03/upadte-blackbuntu-ce-v02/
- http://www.pentestit.com/2009/07/10/bind-audit-cache-poisoning-scanner/
- http://www.pentestit.com/2010/06/17/update-lens-v1200/
- http://sickness.tor.hu/?author=1&paged=2
- http://www.pentestit.com/2010/11/02/update-katana-v20-aka-y0jmb0-released/
- http://airodump.net/category/wifislax/
- http://www.pentestit.com/2010/08/31/dllhijackauditor-audit-dll-hijacking-vulnerability/
- http://sickness.tor.hu/?p=17
- http://www.pentestit.com/2010/12/24/wackopicko-website-vulnerabilities/
- http://www.pentestit.com/2011/05/23/puzzlemall-vulnerable-web-application-practicing-session-puzzling/
- http://www.pentestit.com/2010/08/08/ikat-interactive-kiosk-attack-tool/
- http://www.pentestit.com/2010/05/18/lens-ethical-hacking-aspnet/
- http://www.hackingtricks.in/2011/03/how-to-crash-small-websites-using-rdos.html
- http://www.pentestit.com/2011/04/04/update-nexpose-v4111/
- http://sickness.tor.hu/?p=232
- http://www.garage4hackers.com/forumdisplay.php?10-Network-Vulnerabiltity-Assessment-amp-Penetration-Testing
- http://www.dgodam.com/2011/03/ssh-tunneling-to-bypass-internet.html
- http://www.thesparteens.com/eu/component/content/article/129-kafe-antzoki-bilbo
- http://www.horseb.net/html/7731/7731.html
- http://airodump.net/windows-vista-hacking/
- http://www.pentestit.com/2011/03/27/update-oat-v304/
- http://www.hackingtricks.in/2011/03/firewall-bypassing-using-httptunnel.html
- http://www.pentestit.com/2010/06/18/integrate-nmap-nse-vulnerability-scanner/
- http://airodump.net/category/firewall/
- http://sickness.tor.hu/?p=152
- http://www.secuobs.com/revue/news/296427.shtml
- http://sickness.tor.hu/?p=197
- http://sickness.tor.hu/?p=207
- http://sickness.tor.hu/?p=283
- http://www.ehacking.net/2011/06/crack-ssl-using-sslstrip-with.html
- http://4li3n.posterous.com/
- http://sickness.tor.hu/?p=82
- http://sickness.tor.hu/?p=239
- http://www.pentestit.com/tag/web-debugging-proxy/
- http://airodump.net/aircrack-ng-optimalization-cpu-sse2/
- http://www.subhashdasyam.com/2011_06_01_archive.html
- http://johncrackernet.blogspot.com/
- http://airodump.net/fixing-slap-get-in-backtrack-3/
- http://www.governmentsecurity.org/forum/index.php?showtopic=31376
- http://dc406.com/index.php?start=48
- http://www.dgodam.com/2011/01/russix-wireless-penetration-testing.html
- http://www.pentestit.com/2011/01/03/list-portable-hardware-devices-penetration-testing/
- http://www.ehacking.net/2011/06/how-to-install-backtrack5.html
- http://www.ehacking.net/2011/05/kismet-wireless-sniffer.html
- http://esploit.blogspot.com/2011/02/pwnie-pwnplug.html
- http://www.ehacking.net/2011/06/deft-linux-computer-forensic-live-cd.html
- http://www.hackingtricks.in/2011_03_01_archive.html
- http://blog.csdn.net/cnbird2008/archive/2011/01/06/6119469.aspx
- http://www.pentestit.com/tag/fuzz-javascript/
- http://www.ehacking.net/p/table-of-contents.html
- http://www.ehacking.net/p/contact-us.html
- http://www.pentestit.com/tag/dreamplug/
- http://eikonal.wordpress.com/2010/01/
- http://www.ehacking.net/2011/04/scanning-and-enumeration-second-step-of.html
- http://www.darknet.org.uk/2007/07/fg-injector-sql-injection-proxy-tool/
- http://www.ehacking.net/2011/05/tamper-data-firefox-extension.html
- http://www.ehacking.net/2011/05/paros-proxy-web-application-security.html
- http://www.linux.com/archive/feature/138325
- http://www.ehacking.net/2011/03/bluejacking-bluetooth-hacks.html
- http://www.ehacking.net/2011/06/deft-linux-computer-forensic-live-cd.html
- http://archangelamael.blogspot.com/2009/11/up-and-running-with-openvas-in-bt4.html
- http://wikisecure.net/security/how-to-install-openvas-ubuntu9
- http://www.youtube.com/watch?v=3NYhF4pwnlQ
- http://www.linux-tutorial.info/modules.php?name=News&file=article&sid=7277
- http://seclists.org/openvas/2011/q2/378
- http://www.mediafire.com/?9z4vgi9xwp88x5e
- http://www.backtrack-linux.org/wiki/index.php/OpenVas
- http://www.securitytube.net/video/703
- http://flexi-learn.blogspot.com/2010/12/openvas-client-server-connection.html
- http://www.pentestit.com/tag/openvas/
- http://www.youtube.com/watch?v=Qt2130BibbI
- http://www.vivaolinux.com.br/dica/Scanner-de-seguranca-OpenVAS
- http://www.youtube.com/watch?v=cZ1f9BnlMS0
- http://searchenterpriselinux.techtarget.com/tip/Getting-started-with-OpenVAS
- http://www.pentestit.com/2009/12/24/update-openvas-300/
- http://www.backtrack-linux.org/forums/beginners-forum/36710-backtrack-4-r2-missing-openvas-server.html
- http://www.youtube.com/watch?v=V5l2wvdUOpA
- http://foro.elhacker.net/tutoriales_documentacion/tutorial_practico_openvas_analisis_vulnerabilidades_en_espanol-t324275.0.html
- http://librenix.com/?inode=13570
- http://www.youtube.com/watch?v=gP5EoaxhPsQ
- http://www.dragonjar.org/open-vas-la-evolucion-del-nessus.xhtml
- http://archangelamael.blogspot.com/2009/11/up-and-running-with-openvas-in-back.html
- http://www.pentestit.com/tag/ike-scan/
- http://www.youtube.com/watch?v=KQgoBaJLRuI
- http://librenix.com/?inode=13037
- http://www.youtube.com/watch?v=YsOKpiXB9M0
- http://www.pentestit.com/2011/03/18/update-openvas-4/
- http://www.pentestit.com/2010/10/22/video-tutorial-integrate-hydra-nessus/
- http://www.youtube.com/watch?v=wpVSdXfmAYU
- http://www.pentestit.com/tag/gnessus/
- https://www.alienvault.com/forum/index.php?t=msg&goto=8239&S=f243439fd7a401d77e6da6d5e71672d2
- http://www.pentestit.com/tag/snmpwalk/
- https://www.alienvault.com/forum/index.php?t=msg&goto=8557&S=a2ccf9b27789e4f3176e14111a6951e5
- http://board.blackbuntu.com/archive/index.php/thread-545.html
- http://seclists.org/openvas/2011/q2/383
- http://www.pentestit.com/2009/12/03/update-nessus-42/
- http://webcache.googleusercontent.com/custom?q=cache:cTRLrqJchaIJ:uccsc2009.ucdavis.edu/preso/NomuraUCCSC09.ppt Tutorial Openvas&cd=41&hl=en&ct=clnk&client=pub-8993703457585266&source=www.google.com" onmousedown="return rwt(this,'','','','41','AFQjCNEKcwtalRoMYlKPgQoevJj-bXzm7w','','0CAYQITAAOCg')">View as HTML</a><br><span dir=ltr>14 Jun 2009</span> – Data Mining 1A; Web 2.0; Kismet; <em>OpenVAS</em>; Metasploit <b>...</b> Help to refine search; Operator:search term; <em>Tutorial</em> to advanced operators <b>...</b><br><span class=a>uccsc2009.ucdavis.edu/preso/NomuraUCCSC09.ppt</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.pentestit.com/tag/trapwatch/
- http://marc.info/?l=openvas-discuss&m=121751582411765
- http://www.pentestit.com/tag/ldapsearch-from-openldap-utilities/
- http://www.youtube.com/watch?v=PKiz0vOCCjQ
- http://www.pentestit.com/tag/chkrootkit/
- http://www.ehacking.net/2011/04/openvas-vulnerability-assessment-system.html
- http://www.pentestit.com/2009/09/07/update-autonessus/
- https://www.alienvault.com/forum/index.php?t=msg&goto=7947&S=746b88978b4bf00fb41e04f618a238c5
- http://www.pentestit.com/tag/clamav/
- http://www.backtrack-linux.org/forums/anf\E4nger-ecke/37969-scannen-nach-sicherheitsl\FCcken-mit-openvas-windowssysteme.html
- http://www.pentestit.com/tag/trapwatch/
- http://pypi.python.org/pypi/openvas.omplib/
- http://www.pentestit.com/tag/lm-sensors/
- http://ubuntuforums.org/archive/index.php/t-1728640.html
- http://www.pentestit.com/2011/01/10/update-networkscanviewer-v105/
- http://newtipsandtricks.webnode.com/news/hack-nessus-using-metasploit-/
- http://www.pentestit.com/tag/nessus/
- http://wald.intevation.org/
- http://pypi.python.org/pypi/openvas.oaplib
- http://www.pentestit.com/tag/security-scanner/
- http://www.secuobs.com/revue/news/295012.shtml
- http://www.pentestit.com/2010/12/10/droidmap-nmap-android-phones/
- http://board.blackbuntu.com/showthread.php?tid=499
- http://www.pentestit.com/2009/04/09/wapiti-web-application-auditior-vulnerability-scanner/
- http://www.clshack.it/tutorial-tool-for-vulnerability-identification-level-server.html
- http://www.pentestit.com/2010/12/19/update-networkscanviewer-v104/
- http://www.backtrack-linux.org/forums/experts-forum/35327-openvas-3-0-1-bt4-r2.html
- http://www.backtrack-linux.org/forums/old-bt4-videos/23604-video-up-running-openvas-back-track-4-pt-1-a.html
- http://www.pentestit.com/2011/02/06/nmap-550-android/
- http://www.youtube.com/watch?v=8M0YE_y4zGg
- http://www.pentestit.com/2010/04/15/update-nessus-422/
- http://volatile-minds.blogspot.com/2011/02/openvas-4-has-landed-in-unstable-in-obs.html
- http://www.pentestit.com/2011/04/21/update-dradis-v270/
- http://volatile-minds.blogspot.com/2010/07/automating-openvas-3.html
- http://www.pentestit.com/2009/04/19/nikto-203-bugfix-release/
- http://security.stackexchange.com/questions/3034/command-line-nessus-openvas-or-nse-to-find-specific-vulns
- http://www.alienvault.com/wiki/doku.php?id=installation
- http://www.pentestit.com/tag/blind-sql-hacker/
- http://securityxploded.com/forum/viewtopic.php?f=15&t=1368
- http://www.pentestit.com/2011/03/01/update-nessus-441/
- http://www.pentestit.com/2011/05/25/update-dradis-v271/
- http://www.pentestit.com/tag/john-the-ripper/
- http://www.pentestit.com/2011/05/02/update-backbox-linux-105/
- http://hackertarget.com/openvas-scan/
- http://www.hackerstorm.com/
- http://www.hackerstorm.com/
- http://www.pentestit.com/2010/08/02/update-seccubus-v15/
- http://www.geo-geek.com/2009/07/openvas.html
- http://www.pentestit.com/2010/10/15/oracleenumerator-tool-perform-enumeration-oracle-database-server/
- https://www.os3.nl/2009-2010/students/vic_ding/assignment_2
- http://www.pentestit.com/tag/autonessus/
- http://www.pentestit.com/tag/network-security-scanner/
- http://www.pentestit.com/tag/lynis/
- http://hackertarget.com/2009/06/guide-to-openvas-on-ubuntu-904/
- http://www.pentestit.com/2011/02/16/free-web-application-security-dummies/
- http://www.pentestit.com/2011/02/11/openscap-security-content-automation-protocol-tool/
- http://www.pentestit.com/tag/nikto-pl/
- http://www.pentestit.com/tag/medusa/
- http://www.pentestit.com/2010/02/23/update-nessus-421/
- https://www.alienvault.com/forum/index.php?t=msg&goto=6204&S=7fb5c0ca183e1122ce18e959d23b2769
- http://www.pentestit.com/tag/sqlmap/
- http://www.backtrack-linux.org/forums/backtrack-howtos/35208-upgrading-backtrack-4-final-r1-backtrack-r2-2.html
- http://volatileminds.net/opendiagnostics/index.php/BuildAutoAssessmentServer
- http://www.pentestit.com/2010/11/14/update-nessus-440/
- http://www.askapache.com/security/vulnerability-scanners-review.html
- https://sites.google.com/a/dc716.com/dc716-com/resources
- http://www.pentestit.com/tag/livecd-for-penetration-testing/
- http://ubuntuforums.org/archive/index.php/t-1477662.html
- http://www.pentestit.com/tag/w3af/
- http://www.pentestit.com/tag/burp-scanner/
- http://wald.intevation.org/news/
- http://www.pentestit.com/tag/sqlinject-finder-tutorial/
- http://www.pentestit.com/2009/03/25/fiddler-web-debugger/
- http://yans008.wordpress.com/
- http://searchsecurity.techtarget.com/Screencasts-On-screen-demonstrations-of-security-tools
- http://www.pentestit.com/2011/01/03/list-portable-hardware-devices-penetration-testing/
- http://www.pentestit.com/tag/apacheconf/
- http://www.pentestit.com/tag/banner-grabbing/
- http://www.healthdump.com/myxl-radio-installation-tutorial-antenna-99049.php
- http://www.pentestit.com/2011/02/10/update-seccubus-v154/
- http://www.pentestit.com/tag/dradis/
- http://www.pentestit.com/tag/information-security-tool/
- http://volatile-minds.blogspot.com/2010/07/od-autoassessment-server-tutorial-w.html
- http://www.pentestit.com/tag/burp-suite/
- http://www.pentestit.com/2010/09/12/arachni-tool-penetration-testing-web-applications/
- http://airodump.net/essential-tools-nessus-rootkit-scanner/
- http://www.pentestit.com/tag/smtp-banner-grabbing/
- http://www.pentestit.com/tag/pdf-parser/
- http://www.pentestit.com/tag/ff3hr/
- http://jfherrera.wordpress.com/author/jfherrera/
- http://www.pentestit.com/tag/directory-transversal-tutorial/
- http://www.pentestit.com/tag/firefox/
- http://www.pentestit.com/2009/03/22/iodine-ipoverdns-tunnel/
- http://www.pentestit.com/2009/07/05/raptor-forensics-live-cd/
- http://www.pentestit.com/2010/04/23/tutorial-vlan-hopping-yersinia/
- http://www.pentestit.com/tag/how-to-steganography/
- http://www.pentestit.com/tag/tutorials/
- http://www.youtube.com/watch?v=BIkG8Bu-wic
- http://www.pentestit.com/2010/05/20/metasploitable-vulnerable-server/
- http://www.pentestit.com/tag/amap/
- http://www.volatileminds.net/projects/clamav/
- http://www.pentestit.com/tag/praeda/
- http://www.pentestit.com/tag/latest-tool-for-web-application-security/
- http://www.pentestit.com/2009/10/04/tutorial-analyze-pdf-files/
- http://www.pentestit.com/tag/nessus-4/
- http://www.pentestit.com/2009/06/16/video-tutorial-simple-steganography-vsl/
- http://librenix.com/?inode=695
- http://www.pentestit.com/2010/06/30/pentestit-post-day-tutorial-sql-injection/
- http://www.pentestit.com/tag/vicnum/
- http://www.pentestit.com/tag/mantra-security-framework/
- http://www.pentestit.com/2009/12/30/xen-carry-virtual-environment-cd-usb/
- https://www.alienvault.com/forum/index.php?t=msg&goto=9002&S=ed4c3fd99d8aeb039c74e9bc20b43e54
- http://www.pentestit.com/2009/04/12/tutorial-send-email-anonymously/
- http://www.pentestit.com/tag/burp-intruder/
- https://www.corelan.be/index.php/my-free-tools/downloads/?dl_page=2
- http://www.pentestit.com/2010/05/02/tutorial-upload-shells-burp-suite/
- http://wn.com/skletenblack
- http://www.pentestit.com/2009/04/12/tutorial-send-email-anonymously/
- http://www.pentestit.com/tag/0trace/
- https://www.corelan.be/index.php/my-free-tools/downloads/?dl_page=2
- http://www.pentestit.com/2010/05/02/tutorial-upload-shells-burp-suite/
- http://www.pentestit.com/tag/network-capture/
- http://wn.com/skletenblack
- http://vistamenu.com/flash-collapsible-menu-tutorial.html
- http://archangelamael.blogspot.com/2010/07/converting-metasploitable-for.html
- https://www.alienvault.com/forum/index.php?t=msg&goto=8299&S=cbde802fd0b270595c98b97f47859bf5
- http://www.secuobs.com/revue/news/292501.shtml
- http://hackertarget.com/2011/02/wireshark-tutorial-and-cheat-sheet/
- http://www.secuobs.com/videos/news/16425.shtml
- http://www.youtube.com/watch?v=Bqmk1f-PIo0
- https://www.os3.nl/2010-2011/students/sebastian_carlier/ot/lab4
- http://www.amarjit.info/2010/04/how-to-hack-website-how-to-hack-web.html
- http://stayinformed.forumotion.com/t203-backtrack-5-released
- http://tech4everybody.wordpress.com/category/security/
- http://www.darknet.org.uk/2006/11/installing-nessus-on-debian-based-oss-like-ubuntu/
- https://www.alienvault.com/forum/index.php?t=thread&frm_id=15&S=e394efe7aa528b8ae7d4620a0bb27517
- http://www.youtube.com/watch?v=x-Pi-rg_Qg0
- http://www.corelan.be/index.php/2010/07/23/watobo-the-unofficial-manual/
- http://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
- https://www.alienvault.com/forum/index.php?t=msg&goto=8186&S=6902f19ff15d4931b1e4fdab077d09fd
- https://www.alienvault.com/forum/index.php?t=msg&goto=6749&S=a1298c7fbd2c1b1a1dd97e4623025b1f
- http://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
- https://www.alienvault.com/forum/index.php?t=tree&th=1743&S=7f23365d7d55a3306ba5149d74c06663
- http://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
- http://www.corelan.be/index.php/2009/02/24/cheatsheet-cracking-wpa2-psk-with-backtrack-4-aircrack-ng-and-john-the-ripper/
- https://www.corelan.be/index.php/forum/exploit-writing-general-questions/first-exploit-tutorial-need-help-with-perls-pack-function/
- https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
- http://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
- http://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
- http://volatile-minds.blogspot.com/2010/11/new-appliances-for-network-auto.html
- http://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
- http://archangelamael.blogspot.com/2009/06/bt4-pre-final-public-release.html
- https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
- http://www.howtoforge.com/intrusion_detection_base_snort
- http://www.homepages.dsu.edu/malladis/teach/754/Slides/Snort.ppt
- http://docs.google.com/viewer?a=v&q=cache:c5bxYiI6oqsJ:www.homepages.dsu.edu/malladis/teach/754/Slides/Snort.ppt Tutorial Snort&hl=en&pid=bl&srcid=ADGEEShdHuwoH4BcXl_AOj8dA0zy89PIuv8SEQ529Z-dj6XQfZoqnz7Z5V649uREUqc2B2K44nIDkYse3IiNB2WYdT4si8nqp8v1qccNVJf9aAmfsfsFLAVOyWABqikWE99x8xBv0n0I&sig=AHIEtbQTYdyaEakHsLWSAlJfhPMUYBORXA" onmousedown="return rwt(this,'','','','3','AFQjCNFE-omwpbGeDd9JaUZkJxFuKX7pzA','','0CBYQxQEwAg')">Quick View</a><br><em>SNORT Tutorial</em>. Sreekanth Malladi. (modifying original by N. Youngworth). Installation. Install the WinPcap File. This allows you to capture and examine <b>...</b><br><span class=a>www.homepages.dsu.edu/malladis/teach/754/Slides/<b>Snort</b>.ppt</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://openmaniak.com/snort.php
- http://tutorials.papamike.ca/pub/snort.html
- http://searchsecuritychannel.techtarget.com/tutorial/Snort-Tutorial-How-to-use-Snort-intrusion-detection-resources
- http://www.thegeekstuff.com/2010/08/snort-tutorial/
- http://www.youtube.com/watch?v=nAWN989WA0A
- http://infond.blogspot.com/2010/04/basics-7-tutorial-ids-snort.html
- http://librenix.com/?inode=3063
- http://searchsecurity.techtarget.com/tutorial/Snort-Intrusion-Detection-and-Prevention-Guide
- http://vimeo.com/10465331
- http://layer8problem.blogspot.com/2008/11/howto-great-and-mighty-tutorial-about.html
- http://daenu.net/joomla/index2.php?option=com_content&do_pdf=1&id=15
- http://docs.google.com/viewer?a=v&q=cache:f3HxjQg000MJ:daenu.net/joomla/index2.php?option=com_content&do_pdf=1&id=15 Tutorial Snort&hl=en&pid=bl&srcid=ADGEESiIiHLtkh6tnd35zi_uO-eJLX8bFbcz_LX-Ox0f04XN9VhUTEBk8_ti4NzgddOkmmbDg_tSkPQq7_G5gNNYmFB1KZgBz_Jjj8Bbc0x1jqLKte-0nsFcA5ss7iaHqru10Sybi73X&sig=AHIEtbSQYB9ilEomH0Apw-FCvaGA4nL9Lg" onmousedown="return rwt(this,'','','','15','AFQjCNFNTLK9RHpRUtbmbYqpM1QSKioD-Q','','0CBwQxQEwBDgK')">Quick View</a><br><em>Tutorial Snort</em> Wireless. Monday, 01 November 2004. #--- [ <em>Tutorial Snort</em> Wireless ] ---#. (c) 2004 by d.walther ([email protected]) <b>...</b><br><span class=a>daenu.net/joomla/index2.php?option=com_content&do_pdf=1...</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.securitydocs.com/library/391/
- http://www.howtoforge.com/intrusion_detection_snort_base_postgresql_ubuntu6.06
- http://www.mcabee.org/lists/snort-users/Apr-03/msg01161.html
- http://www.securitydocs.com/library/379/
- http://www.forum-intrusion.com/snort/FreeBSD44Stable-Snort-MySQLVer1-1.pdf
- http://www.macports.info/Snort
- http://www.howtoforge.com/intrusion-detection-with-snort-mysql-apache2-on-ubuntu-7.10-updated
- https://www.alienvault.com/forum/index.php?t=msg&goto=7947&S=746b88978b4bf00fb41e04f618a238c5
- http://ubuntuforums.org/showthread.php?t=145641
- https://www.alienvault.com/forum/index.php?t=msg&goto=1700&S=ecffa061540d9bbeced113f9259c411b
- http://seclists.org/snort/2009/q1/349
- http://www.security-forums.com/viewtopic.php?t=7010
- http://forum.pfsense.org/index.php?topic=16847.0
- http://buchananweb.co.uk/design_tips245.htm
- http://buchananweb.co.uk/security00.aspx
- http://www.linux-tutorial.info/modules.php?name=News&file=article&sid=1502
- http://linuxbasement.com/content/snort-its-not-just-druggies-anymore
- http://www.linux-tutorial.info/modules.php?name=News&file=article&sid=10048
- http://networking.frenzyness.com/2010/03/09/scapy-tutorial-how-to-use-scapy-to-test-snort-rules/
- http://www.securitydistro.com/security-tutorials/BackTrack-v2.0-and-Snort-for-the-Rapid-Deployment-of-Network-Intrusion-Dete
- http://www.linuxhowtos.org/System/snort_guide.htm
- http://www.linux-tutorial.info/modules.php?name=News&file=article&sid=2240
- http://www.pentestit.com/2010/05/10/snorby-snort-front/
- http://www.vivaolinux.com.br/artigo/Snort-avancado-Projetando-um-perimetro-seguro
- http://searchsecurity.techtarget.com/tip/Scapy-tutorial-How-to-use-Scapy-to-test-Snort-rules
- http://ubuntuforums.org/archive/index.php/t-1407829.html
- http://s10.zetaboards.com/ihcccnc/topic/7080800/1/
- http://swik.net/snort Tutorial
- http://searchsecuritychannel.techtarget.com/tutorial/Snort-hardware-and-network-requirements-for-Red-Hat-Enterprise-Linux-5
- http://www.linux-tutorial.info/modules.php?name=News&file=article&sid=4888
- http://ubuntuforums.org/archive/index.php/t-1214575.html
- http://br-linux.org/2010/snort-tutorial-mao-na-massa-em-sp/
- http://searchsecuritychannel.techtarget.com/tutorial/Snorts-installation-prerequisites-for-Red-Hat-Enterprise-Linux-5
- http://www.youtube.com/watch?v=TZ0Hj0t5b5k
- http://www.howtoforge.com/writing-snort-rules-on-engarde
- http://ubuntuforums.org/showthread.php?t=1439587
- http://www.howtoforge.com/forums/archive/index.php/t-21756.html
- http://openmaniak.com/snort_screen.php
- http://www.howtoforge.com/intrusion-detection-with-snort-mysql-apache2-on-ubuntu-7.10
- http://ubuntuforums.org/archive/index.php/t-1477696.html
- http://www.securabit.com/
- http://www.howtoforge.com/forums/showthread.php?t=29026
- http://seclists.org/snort/2009/q2/
- http://groups.google.com/group/snortusers/browse_thread/thread/e061b7616c5d293f
- http://openmaniak.com/fr/snort.php
- http://www.youtube.com/watch?v=y66ZeNNlI9E
- http://searchsecuritychannel.techtarget.com/tutorial/Editing-the-snortconf-file-for-Red-Hat-Enterprise-Linux-5
- https://forums.snort.org/forums/snort-newbies/topics/snort-so-rules-help-solaris-10
- http://searchsecuritychannel.techtarget.com/tutorial/Compiling-Snort-and-configuration-with-MySQL-for-Red-Hat-Enterprise-Linux-5
- http://openmaniak.com/snort_bleeding.php
- http://openmaniak.com/snort_other.php
- http://www.zeekzack.com/?p=26
- http://www.bsdcan.org/2008/schedule/attachments/66_pfSenseTutorial.pdf
- http://docs.google.com/viewer?a=v&q=cache:ahX1Ozgs_aoJ:www.bsdcan.org/2008/schedule/attachments/66_pfSenseTutorial.pdf Tutorial Snort&hl=en&pid=bl&srcid=ADGEESjr98eDaRt7ulH8Tk1hYS4qKRAfDWL3IvvjTpXw4eNuIUcTQ8Hsxp0M-UQWZI0Kqh7JOh1ZJmHDi9Yi2EWaMrW_KfYrTTr_ULuo5IevgFxvxzyJ1ZLZQ0UGvW448zPluOHphCWV&sig=AHIEtbQGEC6wvfdZv_-qp9W6fJXD4E8XVA" onmousedown="return rwt(this,'','','','74','AFQjCNGDRvwQ_X9ceIk7fWhinhpy64AhPA','','0CBUQxQEwAzhG')">Quick View</a><br>pfSense <em>Tutorial</em>. BSDCan 2008. From zero to hero with pfSense. May 13, 2008. Chris Buechler <[email protected]> <b>...</b> <em>Snort</em>. Disk I/O <b>...</b><br><span class=a>www.bsdcan.org/2008/schedule/attachments/66_pfSense<b>Tutorial</b>.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><span class="b w xsm">[PDF]</span> <h2 class=r><a href="http://acme-labs.org.uk/galleries/42/0000/2163/practical.pdf
- http://docs.google.com/viewer?a=v&q=cache:basKB7pIqMoJ:acme-labs.org.uk/galleries/42/0000/2163/practical.pdf Tutorial Snort&hl=en&pid=bl&srcid=ADGEESjN-UlC_jVG-jHllZPePKLtRhxA0JAZmtnW2N5YLMyO4GNv_SlOlXfsR0r8jaXiV2vheQV441c6kNwAm1OeKFTcQ6elFKM5ZZqAy178A-c1YjkPy8Y7sCdvXcK_yjSJ3mfJjZy-&sig=AHIEtbT41gp7ikS7VpnBlSexCoy7DsWfEg" onmousedown="return rwt(this,'','','','75','AFQjCNGt_Wkmc-8vrCRFfZoSZlkdWDjExQ','','0CBsQxQEwBDhG')">Quick View</a><br>might find it useful to modify the Simplistic ARP Monitor code2 in the scapy <em>tutorial</em> in order to do this. 3. You are tasked with the job of testing a <em>snort</em> <b>...</b><br><span class=a>acme-labs.org.uk/galleries/42/0000/2163/practical.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://seclists.org/snort/2011/q2/486
- http://librenix.com/?inode=1620
- https://www.alienvault.com/forum/index.php?t=msg&goto=9323&S=edd697edec912eefd2d91cf224fe5f62
- http://librenix.com/?inode=10458
- https://forums.snort.org/forums/windows/topics/snort-cannot-logon-to-mssql-2005-net-lib-error-1326
- http://ubuntuforums.org/showthread.php?t=1040886
- http://www.theacademypro.com/security-videos/information-security-video-tutorial-snort-install-config-and-basic-usage-I.php
- http://daenu.net/joomla/index.php?option=com_content&task=blogsection&id=0&Itemid=9
- http://swik.net/IDS Debian
- http://swik.net/snort Hacking
- http://www.saintcorporation.com/cgi-bin/demo_tut.pl?tutorial_name=Snort_vulnerabilities.html&fact_color=doc&tag=
- http://osdir.com/ml/security.ids.snort.sigs/2004-03/msg00100.html
- http://www.howtoforge.com/forums/showthread.php?t=34052
- http://openmaniak.com/inline_bleeding.php
- https://www.alienvault.com/forum/index.php?t=thread&frm_id=15&S=e394efe7aa528b8ae7d4620a0bb27517
- http://www.howtoforge.com/forums/showthread.php?t=15585
- http://www.techienuggets.com/Comments?tx=108575
- http://swik.net/snort rules
- http://ubuntuforums.org/archive/index.php/t-483488.html
- http://www.howtoforge.com/installation-and-configuration-of-intrusion-detection-with-snort-acidbase-mysql-and-apache2-on-ubuntu-9.04-using-spm
- http://www.training-classes.com/learn/_k/s/n/o/snort/_t/ilt/
- http://www.howtoforge.com/forums/archive/index.php/t-5591.html
- http://www.antionline.com/archive/index.php/t-247561.html
- http://swik.net/snort Mac
- http://openmaniak.com/fr/snort_tutorial_snort.php
- http://groups.google.com/group/snortusers/browse_thread/thread/9b4de0fb15eb0975/a4b58e88f501138f
- http://swik.net/snort wireless
- http://openmaniak.com/inline_tutorial.php
- http://www.inguardians.com/research/docs/snortguis.pdf
- http://docs.google.com/viewer?a=v&q=cache:40h64ybkDf0J:www.inguardians.com/research/docs/snortguis.pdf Tutorial Snort&hl=en&pid=bl&srcid=ADGEESjvNY1surjoz-9P5UroBO5h5aiu35DCCOqL_HMwDLZ52REr5UCfN5jeeDIlOI_OayCATm61Qd2XYw54fX9R57ft88ss3P3mM06lJW1q2_9bxfi9wdoGyT01Mo6jsO5Vebaza6Lf&sig=AHIEtbRDHYulraNAcStZw09ZvInGODD1PA" onmousedown="return rwt(this,'','','','107','AFQjCNEOd3V02n2H_y3UviFDJQQ5fztWrA','','0CCgQxQEwBjhk')">Quick View</a><br><em>snort</em>. For the purpose of this presentation, we will concentrate only on <b>.....</b> For additional reading, I would recommend the PHP <em>tutorial</em> at: <b>...</b><br><span class=a>www.inguardians.com/research/docs/<b>snort</b>guis.pdf</span><nobr></nobr></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://freeonlinebookstore.org/B-405.html
- http://www.shellsec.net/articulo/guia-snort/
- http://www.linux-tutorial.info/modules.php?name=Howto&pagename=Snort-Statistics-HOWTO/configuration.html
- http://openmaniak.com/inline_final.php
- http://www.hyperteach.com/products/linuxsecurity-video-cd.htm
- http://forum.innobuzz.in/showthread.php?tid=478
- http://craftapalooza.typepad.com/crafted/2006/09/lifting_the_ton.html
- http://seclists.org/snort/2004/q2/212
- http://www.experts-exchange.com/Security/IDS/Q_23881140.html
- http://www.howtoforge.com/forums/archive/index.php/t-18134.html
- http://www.tinews.com.br/news/2010/04/27/snort-tutorial-mao-na-massa-realizar-analise-de-trafego-em-tempo-real-e-controle-sobre-a-seguranca-das-redes/
- http://under-linux.org/blogs/andersonop/snort-tutorial-mao-na-massa-realizar-analise-de-trafego-em-tempo-real-e-controle-1986/
- http://www.temporealeventos.com.br/?area=87
- http://securityonion.blogspot.com/2009/01/installing-snortsp-beta-on-ubuntu.html
- http://www.istf.com.br/showthread.php/12172-Tutorial-de-SNORT-APACHE2-MYSQL-ACIDLAB-no-Debian-Sarge
- http://h4des.org/blog/index.php?/archives/166-Neues-Tutorial-ueber-snort-online.html
- http://softwarelivre.org/andersonop/snort-tutorial-mao-na-massa-realizar-analise-de-trafego-em-tempo-real-e-controle-sobre-a-seguranca-das-redes
- http://www.pdfwindows.com/pdf/tutorial-database-mysql/
- http://www.experts-exchange.com/Security/IDS/Q_26044310.html
- http://openmaniak.com/about.php
- http://lists.centos.org/pipermail/centos-pt-br/2008-November/000486.html
- http://seclists.org/snort/2011/q2/470
- http://www.howtoforge.com/intrusion_detection_base_snort_p4
- http://openmaniak.com/fr/snort_tutorial_base.php
- http://cs.uccs.edu/~cs591/ids/ids.ppt
- http://docs.google.com/viewer?a=v&q=cache:Ub-khSBY1CQJ:cs.uccs.edu/~cs591/ids/ids.ppt Tutorial Snort&hl=en&pid=bl&srcid=ADGEESh_GJmKrhw43Cy-3n7e4dkq7WAK4MkJS6EYmpFkeabzH5SrUjfVE_q4F3ZSvGels3kCp0nB27RlP8DDcig8WpF-M83pIBohFtaj_FOb9ms-SXmN8xku5grF7xbsm14hATLkNiuo&sig=AHIEtbQpbXvm8o4-Msjxnfb1ZA_KwC5QNQ" onmousedown="return rwt(this,'','','','135','AFQjCNG2J35lI9Z7SrBHI6XnF5pDrZYg_g','','0CBsQxQEwBDiCAQ')">Quick View</a><br><span dir=ltr>16 Apr 2003</span> – <em>Snort</em>-based IDS Setup Example (from Steven Scott's <em>tutorial</em>). cs591. chow. Basic <em>Snort</em> Usage. <em>Snort</em> has three main modes: <b>...</b><br></div></td></tr></table></div><li><div class=g><h2 class=r><a href="http://www.mcabee.org/lists/snort-users/Mar-04/msg00184.html
- http://www.linuxajuda.net/linux-em-geral/snort-tutorial-mao-na-massa-em-sp-2/
- http://searchsecuritychannel.techtarget.com/tip/The-power-of-Snort-30
- http://openmaniak.com/snort_tutorial_update.php
- http://www.underground-systems.org/forums/showthread.php?5709-snort-IDS-(intrusion-detection-system)
- http://librenix.com/?page=Snort
- http://osdir.com/ml/snort-security-network/2011-05/msg00147.html
- http://www.freesoftwaremagazine.com/articles/configure_professional_firewall_using_pfsense?page=0,2
- http://ubuntuforums.org/archive/index.php/t-1109898.html
- http://www.manntechcomputersinc.com/How_to....html
- http://searchsecuritychannel.techtarget.com/tip/Justifying-Snort
- http://ubuntuforums.org/showthread.php?t=1109898
- http://wwwx.cs.unc.edu/~hays/archives/2010/03/entry_23.php
- http://openmaniak.com/inline_oink.php
- http://searchsecuritychannel.techtarget.com/tip/Justifying-Snort
- http://searchsecuritychannel.techtarget.com/tip/Snort-280-new-features-IPv6-and-port-lists
- http://ubuntuforums.org/showthread.php?t=1109898
- http://wwwx.cs.unc.edu/~hays/archives/2010/03/entry_23.php
- http://openmaniak.com/inline_oink.php
- http://ubuntuforums.org/archive/index.php/t-919472.html
- https://forums.snort.org/forums/bsd/topics/os-x-no-suitable-device-found-error
- http://searchsecuritychannel.techtarget.com/tip/Snort-limitations
- http://www.linuxcompatible.org/news/story/perfect_setup_of_snort_base_postgresql_on_ubuntu_606_lts.html
- http://osdir.com/ml/snort-security-network/2011-05/msg00122.html
- http://osdir.com/ml/security.ids.snort.sigs/2002-10/msg00101.html
- http://openmaniak.com/fr/snort_other.php
- http://marc.info/?l=snort-devel&m=102244456713914&w=3
- https://forums.snort.org/forums/linux/topics/looking-for-installation-advice
- http://osdir.com/ml/security.ids.snort.cvs/2004-04/msg00003.html
- http://groups.google.com/group/snortusers/browse_thread/thread/d074d0f2a67f5850
- http://searchsecuritychannel.techtarget.com/tip/Snort-frequently-asked-questions
- http://www.javaguicodexample.com/snortiisphpbaseperladodb.html
- http://ubuntuforums.org/showthread.php?t=919472
- http://h4des.org/blog/index.php?/archives/127-Neues-Tutorial-snort-mit-swatch.html
- http://searchsecuritychannel.techtarget.com/tip/Working-with-Snorts-unified-output
- http://www.mare-system.de/?p=arbeiten-mit-snort
- http://swik.net/snort HOWTO
- https://lswiki.byu.edu/index.php/Snort,_Barnyard2,_and_Snorby
- http://searchsecuritychannel.techtarget.com/tip/Snorts-Stream5-and-TCP-overlapping-fragments
- http://osdir.com/ml/snort-security-network/2011-05/msg00178.html
- https://forums.snort.org/forums/windows/topics/building-snort-with-visual-studio-2008
- http://groups.google.com/group/snortusers/msg/967cafca2a85e530
- http://www.opensourcenetworks.org/2006/07/intrusion-detection-with-base-and.html
- http://searchsecuritychannel.techtarget.com/tip/How-to-find-new-features-in-Snort-282
- http://archives.neohapsis.com/archives/snort/2004-03/0486.html
- http://www.youtube.com/user/michacl916
- http://www.mare-system.de/arbeiten-mit-snort.html
- http://ubuntuforums.org/showthread.php?t=1407829
- http://www.securitydocs.com/index.php?todo=orderlinks&action=displaycat&catid=41&orderlinks=id&ascdesc=asc&perpage=15
- http://www.wikilearning.com/tutorial/taller_de_sistemas_de_deteccion_de_intrusiones_snort/4735
- http://www.howtoforge.com/snort-ossec-prelude-on-ubuntu-gutsy-gibbon
- http://searchsecuritychannel.techtarget.com/tutorial/Configuring-Snort-for-Red-Hat-Enteprise-Linux-5
- http://openmaniak.com/snort_tutorial_base.php
- http://seclists.org/snort/2004/q2/157
- http://layer8problem.blogspot.com/
- http://foro.elhacker.net/hacking_linuxunix/movido_tutorial_back_track_para_usar_snort-t260474.0.html
- http://openmaniak.com/fr/snort_tutorial_update.php
- https://www.alienvault.com/forum/index.php?t=msg&goto=925&S=1fc4841f9151effd96198413c30dde72
- http://ubuntuforums.org/showpost.php?p=9265786&postcount=4
- http://www.brazilfw.com.br/forum/viewtopic.php?f=7&t=58056
- http://hackingalert.blogspot.com/2011/02/snort-best-intrusion-detection.html
- http://ebookee.org/Snort-2-1-Intrusion-Detection-Second-Edition-Repost-_693979.html
- http://www.wonderhowto.com/how-to-detect-network-intrusions-with-wireshark-and-snort-263020/
- http://www.securitydocs.com/library/384/
- http://ebookee.org/Snort-2-1-Intrusion-Detection-Second-Edition_61559.html
- https://forums.snort.org/forums/windows/topics/gui-for-snort
- http://marc.info/?l=focus-ids&m=107223613830129&w=2
- http://www.securabit.com/tag/snort/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement