Details
Some Tutorials in Computer Networking Hacking
12,99 € |
|
Verlag: | Dr. Hidaia Mahmood Alassouli |
Format: | EPUB |
Veröffentl.: | 19.06.2020 |
ISBN/EAN: | 9783969178836 |
Sprache: | englisch |
Anzahl Seiten: | 76 |
Dieses eBook enthält ein Wasserzeichen.
Beschreibungen
<p>The objective of this work is to provide some quick tutorials in computer networking hacking.</p>
<p><br></p>
<p>The work includes the following tutorials:</p>
<p><br></p>
<ul>
<li>Tutorial 1: Setting Up Penetrating Tutorial in Linux.</li>
<li>Tutorial 2: Setting Up Penetrating Tutorial in Windows.</li>
<li>Tutorial 3: OS Command Injection: </li>
<li>Tutorial 4: Basic SQL Injection Commands. </li>
<li>Tutorial 5: Manual SQL injection using order by and union select technique.</li>
<li>Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.</li>
<li>Tutorial 7: Uploading Shell in the Site having LFI.</li>
<li>Tutorial 8: Advanced Way for Uploading Shell</li>
<li>Tutorial 9: Uploading shell Using Sqli Command.</li>
<li>Tutorial 10: Uploading Shell Using SQLmap</li>
<li>Tutorial 11: Post Based SQL Injection</li>
<li>Tutorial 12: Cracking the Hashes Using Hashcat. </li>
<li>Tutorial 13: Hacking windows 7 and 8 through Metasploite </li>
<li>Tutorial 14: Tutorial on Cross Site Scripting </li>
<li>Tutorial 15: Hacking Android Mobile Using Metasploit</li>
<li>Tutorial 16: Man of the middle attack:</li>
<li>Tutorial 17: Using SQLmap for SQL injection</li>
<li>Tutorial 18: Hide Your Ip</li>
<li>Tutorial 19: Uploading Shell and Payloads Using SQLmap </li>
<li>Tutorial 20: Using Sql Shell in SQLmap</li>
<li>Tutorial 21: Blind SQL Injection</li>
<li>Tutorial 22: Jack Hridoy SQL Injection Solution</li>
<li>Tutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit. </li>
<li>Tutorial 25: How to root the server using back connect </li>
<li>Tutorial 25: How to root the server using back connect</li>
<li>Tutorial 26: HTML Injection</li>
<li>Tutorial 27: Tutuorial in manual SQl Injection</li>
<li>Tutorial 28: Venom psh-cmd-exe payload </li>
<li>Tutorial 29: Cross site Request Forgery (CSRF)</li>
<li>Tutorial 30: Disable Victim Computer</li>
<li>Tutorial 31: Exploit any firefox by xpi_bootstrapped addon</li>
<li>Tutorial 32: Hack android mobile with metasploit</li>
<li>Tutorial 33: PHP Code Injection to Meterpreter Session</li>
<li>Tutorial 34: Basic google operators</li>
<li>Tutorial 35: Hacking Credit Cards with google</li>
<li>Tutorial 36: Finding Vulnerable Websites in Google</li>
<li>Tutorial 37: Using the httrack to download website</li>
<li>Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper</li>
<li>Tutorial 39: Using burp suite to brute force password</li>
</ul>
<p><br></p>
<p>The work includes the following tutorials:</p>
<p><br></p>
<ul>
<li>Tutorial 1: Setting Up Penetrating Tutorial in Linux.</li>
<li>Tutorial 2: Setting Up Penetrating Tutorial in Windows.</li>
<li>Tutorial 3: OS Command Injection: </li>
<li>Tutorial 4: Basic SQL Injection Commands. </li>
<li>Tutorial 5: Manual SQL injection using order by and union select technique.</li>
<li>Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.</li>
<li>Tutorial 7: Uploading Shell in the Site having LFI.</li>
<li>Tutorial 8: Advanced Way for Uploading Shell</li>
<li>Tutorial 9: Uploading shell Using Sqli Command.</li>
<li>Tutorial 10: Uploading Shell Using SQLmap</li>
<li>Tutorial 11: Post Based SQL Injection</li>
<li>Tutorial 12: Cracking the Hashes Using Hashcat. </li>
<li>Tutorial 13: Hacking windows 7 and 8 through Metasploite </li>
<li>Tutorial 14: Tutorial on Cross Site Scripting </li>
<li>Tutorial 15: Hacking Android Mobile Using Metasploit</li>
<li>Tutorial 16: Man of the middle attack:</li>
<li>Tutorial 17: Using SQLmap for SQL injection</li>
<li>Tutorial 18: Hide Your Ip</li>
<li>Tutorial 19: Uploading Shell and Payloads Using SQLmap </li>
<li>Tutorial 20: Using Sql Shell in SQLmap</li>
<li>Tutorial 21: Blind SQL Injection</li>
<li>Tutorial 22: Jack Hridoy SQL Injection Solution</li>
<li>Tutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit. </li>
<li>Tutorial 25: How to root the server using back connect </li>
<li>Tutorial 25: How to root the server using back connect</li>
<li>Tutorial 26: HTML Injection</li>
<li>Tutorial 27: Tutuorial in manual SQl Injection</li>
<li>Tutorial 28: Venom psh-cmd-exe payload </li>
<li>Tutorial 29: Cross site Request Forgery (CSRF)</li>
<li>Tutorial 30: Disable Victim Computer</li>
<li>Tutorial 31: Exploit any firefox by xpi_bootstrapped addon</li>
<li>Tutorial 32: Hack android mobile with metasploit</li>
<li>Tutorial 33: PHP Code Injection to Meterpreter Session</li>
<li>Tutorial 34: Basic google operators</li>
<li>Tutorial 35: Hacking Credit Cards with google</li>
<li>Tutorial 36: Finding Vulnerable Websites in Google</li>
<li>Tutorial 37: Using the httrack to download website</li>
<li>Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper</li>
<li>Tutorial 39: Using burp suite to brute force password</li>
</ul>