Halloween Costume ideas 2015

Software, Film dan Artikel Terbaru dan Terpopuler - Menyediakan Software terbaru dan juga pastinya Full Version, Film terbaru yang pasti HD, dan Artikel yang bermanfaat.

November 2015

 [Handbook of Applied Cryptography (A.J. Menezes, P.C. van Oorschot, S.A. Vanstone)]  
Hallo Family Ti.Sniper :) 
saya ingin membagikan Ebook Cryptography format pdf  

Chapter 1 - Overview of Cryptography pdf

Chapter 2 - Mathematics Background pdf

Chapter 3 - Number-Theoretic Reference Problems pdf

Chapter 4 - Public-Key Parameters pdf

Chapter 5 - Pseudorandom Bits and Sequences pdf

Chapter 6 - Stream Ciphers pdf

Chapter 7 - Block Ciphers pdf

Chapter 8 - Public-Key Encryption pdf

Chapter 9 - Hash Functions and Data Integrity pdf

Chapter 10 - Identification and Entity Authentication pdf

Chapter 11 - Digital Signatures pdf

Chapter 12 - Key Establishment Protocols pdf

Chapter 13 - Key Management Techniques pdf

Chapter 14 - Efficient Implementation pdf

Chapter 15 - Patents and Standards pdf

Appendix - Bibliography of Papers from Selected Cryptographic Forums pdf






RSA Securitys Official Guide to Cryptography….. Download 
Users Guide to Cryptography and Standards….. Download
Modern Cryptography Theory and Practice….. Download
Introduction to Cryptography….. Download
Handbook of Applied Cryptography….. Download
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY…… Download
Cryptography in C and C++….. Download
Cryptography for Developers….. Download
Cryptography and Network Security Principles and Practices Fourth Edition….. Download
Cambridge.University.Press.Complexity.and.Cryptography.An.Introduction.Jan.2006.eBook-DDU….. Download
Artech.House.Contemporary.Cryptography.May.2005….. Download
A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK….. Download
Cryptography For Dummies….. Download



Greeting Family 75n1

      Berikut ini kita berbagi peralatan atau tools yang biasanya dipakai oleh pentester, hacker, cracker, phiser dan bahkan Anonymous. Detail informasi petunjuk bisa langsung mengunjungi websitenya.

Hacking Tools 2014 – 2015, Cracking Tools 2014 – 2015. Download Hacking Tools 2014 – 2015, Phising Tools 2014 – 2015, Anonymous Hacking Tools 2014 – 2015, Tools Hacking 2014 – 2015, Cracking Tools 2014 – 2015, Tools Cracking 2014 – 2015, Tool Hack 2014 – 2015, Tool Crack 2014 – 2015, Tool Hacking 2014 – 2015, Tool Cracking 2014 – 2015, Tool Hacker 2014 – 2015, Tool Cracker 2014 – 2015, Scanner tools 2014 – 2015, Tools Hacker 2014 – 2015, Tools Cracker 2014 – 2015 yang mungkin bisa bermanfaat untuk bisa anda pakai di 2014 – 2015



       Ayo Download Hacking Tools 2014 – 2015 – Hacker Tools 2014 – 2015 – Hack Tool 2014 – 2015 – Hacker Tool 2014 – 2015 – Hacking Tool 2014 – 2015 – Hack Tool 2014 – 2015 – Cracking Tools 2014 – 2015 – Cracker Tools 2014 – 2015 – Cracking Tool 2014 – 2015 – Cracker Tool 2014 – 2015 – Crack Tools 2014 – 2015 – Crack Tool 2014 – 2015. Security tools 2014 – 2015, Scanner tools 2014 – 2015, Vulnerbaility tools 2014 – 2015, Pentester tools 2014 – 2015, Exploit tools 2014 – 2015, Sniffing tools 2014 – 2015, Intrusion tools 2014 – 2015, Ebooks hacking 2014 – 2015, E-book cracking 2014 – 2015, Book blackhat 2014 – 2015, Whitehat tools 2014 – 2015, Blackhat tools 2014 – 2015, Internet tools 2014 – 2015, Network tools 2014 – 2015, Infrastructure tools 2014 – 2015, Firewall tools 2014 – 2015



Penetration Testing

§ Metasploit Unleashed – Free Offensive Security metasploit course

§ PTES – Penetration Testing Execution Standard

§ OWASP – Open Web Application Security Project

Shellcode

§ Shellcode Tutorials – Tutorials on how to write shellcode

§ Shellcode Examples – Shellcodes database

Social Engineering

§ Social Engineering Framework – An information resource for social engineers

Lock Picking
§ Schuyler Towne channel – Lockpicking videos and security talks

§ /r/lockpicking – Resources for learning lockpicking, equipment recommendations.


Tools

Penetration Testing Distributions

§ Kali – A Linux distribution designed for digital forensics and penetration testing

§ BlackArch – Arch Linux-based distribution for penetration testers and security researchers

§ NST – Network Security Toolkit distribution

§ Pentoo – Security-focused livecd based on Gentoo

§ BackBox – Ubuntu-based distribution for penetration tests and security assessments

Basic Penetration Testing

§ Metasploit Framework – World’s most used penetration testing software

§ Burp Suite – An integrated platform for performing security testing of web applications

§ ExploitPack – Graphical tool for penetration testing with a bunch of exploits

Vulnerability Scanners

§ Netsparker – Web Application Security Scanner

§ Nexpose – Vulnerability Management & Risk Management Software

§ Nessus – Vulnerability, configuration, and compliance assessment

§ Nikto – Web application vulnerability scanner

§ OpenVAS – Open Source vulnerability scanner and manager

§ OWASP Zed Attack Proxy – Penetration testing tool for web applications

§ Secapps – Integrated web application security testing environment

§ w3af – Web application attack and audit framework

§ Wapiti – Web application vulnerability scanner

§ WebReaver – Web application vulnerability scanner for Mac OS X

§ Droopescan – Scanner to identify issues with several CMSs, mainly Drupal & Silverstripe

§ Discover – Custom bash scripts used to automate various pentesting tasks

Network Tools

§ nmap – Free Security Scanner For Network Exploration & Security Audits

§ tcpdump/libpcap – A common packet analyzer that runs under the command line

§ Wireshark – A network protocol analyzer for Unix and Windows

§ Network Tools – Different network tools: ping, lookup, whois, etc

§ netsniff-ng – A Swiss army knife for for network sniffing

§ Intercepter-NG – a multifunctional network toolkit

§ SPARTA – Network Infrastructure Penetration Testing Tool

§ Sn1per – Automated Pentest Recon ScannerSn1per – Automated Pentest Recon Scanner

§

Wireless Network Tools

§ Aircrack-ng – a set of tools for auditing wireless network

§ Kismet – Wireless network detector, sniffer, and IDS

§ Reaver – Brute force attack against Wifi Protected Setup

SSL Analysis Tools

§ SSLyze – SSL configuration scanner

§ sslstrip – a demonstration of the HTTPS stripping attacks

Hex Editors

§ HexEdit.js – Browser-based hex editing

Crackers

§ John the Ripper – Fast password cracker

§ Online MD5 cracker – Online MD5 hash Cracker

Windows Utils

§ Sysinternals Suite – The Sysinternals Troubleshooting Utilities

§ Windows Credentials Editor – security tool to list logon sessions and add, change, list and delete associated credentials

§ mimikatz – Credentials extraction tool for Windows OS

DDoS Tools

§ LOIC – An open source network stress tool for Windows

§ JS LOIC – JavaScript in-browser version of LOIC

Social Engineering Tools

§ SET – The Social-Engineer Toolkit from TrustedSec

OSInt Tools

§ Maltego – Proprietary software for open source intelligence and forensics, from Paterva.

Anonimity Tools

§ Tor – The free software for enabling onion routing online anonymity

§ I2P – The Invisible Internet Project

Reverse Engineering Tools

§ IDA Pro – A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger

§ IDA Free – The freeware version of IDA v5.0

§ WDK/WinDbg – Windows Driver Kit and WinDbg

§ OllyDbg – An x86 debugger that emphasizes binary code analysis

§ Radare2 – Opensource, crossplatform reverse engineering framework.

§ x64_dbg – An open-source x64/x32 debugger for windows.

§ Pyew – A Python tool for static malware analysis.

§ Bokken – GUI for Pyew Radare2.

§ Immunity Debugger – A powerful new way to write exploits and analyze malware

§ Evan’s Debugger – OllyDbg-like debugger for Linux


Books
Penetration Testing Books

§ The Art of Exploitation by Jon Erickson, 2008

§ Metasploit: The Penetration Tester’s Guide by David Kennedy and others, 2011

§ Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014

§ Rtfm: Red Team Field Manual by Ben Clark, 2014

§ The Hacker Playbook by Peter Kim, 2014

§ The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013

§ Professional Penetration Testing by Thomas Wilhelm, 2013

§ Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012

§ Violent Python by TJ O’Connor, 2012

§ Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, Pedram Amini, 2007

§ Black Hat Python: Python Programming for Hackers and Pentesters, 2014

§ Penetration Testing: Procedures & Methodologies (EC-Council Press),2010

Hackers Handbook Series

§ The Shellcoders Handbook by Chris Anley and others, 2007

§ The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011

§ iOS Hackers Handbook by Charlie Miller and others, 2012

§ Android Hackers Handbook by Joshua J. Drake and others, 2014

§ The Browser Hackers Handbook by Wade Alcorn and others, 2014

§ The Mobile Application Hackers Handbook by Dominic Chell and others, 2015

Network Analysis Books

§ Nmap Network Scanning by Gordon Fyodor Lyon, 2009

§ Practical Packet Analysis by Chris Sanders, 2011

§ Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012

Reverse Engineering Books

§ Reverse Engineering for Beginners by Dennis Yurichev (free!)

§ The IDA Pro Book by Chris Eagle, 2011

§ Practical Reverse Engineering by Bruce Dang and others, 2014

§ Reverse Engineering for Beginners

Malware Analysis Books

§ Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012

§ The Art of Memory Forensics by Michael Hale Ligh and others, 2014

§ Malware Analyst’s Cookbook and DVD by Michael Hale Ligh and others, 2010

Windows Books

§ Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu

Social Engineering Books
§ The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002

§ The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005

§ Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011

§ No Tech Hacking by Johnny Long, Jack Wiles, 2008

§ Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010

§ Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014

§ Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014

Lock Picking Books

§ Practical Lock Picking by Deviant Ollam, 2012

§ Keys to the Kingdom by Deviant Ollam, 2012

§ CIA Lock Picking Field Operative Training Manual

§ Lock Picking: Detail Overkill by Solomon

§ Eddie the Wire books


Vulnerability Databases

§ NVD – US National Vulnerability Database

§ CERT – US Computer Emergency Readiness Team

§ OSVDB – Open Sourced Vulnerability Database

§ Bugtraq – Symantec SecurityFocus

§ Exploit-DB – Offensive Security Exploit Database

§ Fulldisclosure – Full Disclosure Mailing List

§ MS Bulletin – Microsoft Security Bulletin

§ MS Advisory – Microsoft Security Advisories

§ Inj3ct0r – Inj3ct0r Exploit Database

§ Packet Storm – Packet Storm Global Security Resource

§ SecuriTeam – Securiteam Vulnerability Information

§ CXSecurity – CSSecurity Bugtraq List

§ Vulnerability Laboratory – Vulnerability Research Laboratory

§ ZDI – Zero Day Initiative

Security Courses
§ Offensive Security Training – Training from BackTrack/Kali developers

§ SANS Security Training – Computer Security Training & Certification

§ Open Security Training – Training material for computer security classes

§ CTF Field Guide – everything you need to win your next CTF competition

§ Cybrary – online IT and Cyber Security training platform

Information Security Conferences

§ DEF CON – An annual hacker convention in Las Vegas

§ Black Hat – An annual security conference in Las Vegas

§ BSides – A framework for organising and holding security conferences

§ CCC – An annual meeting of the international hacker scene in Germany

§ DerbyCon – An annual hacker conference based in Louisville

§ PhreakNIC – A technology conference held annually in middle Tennessee

§ ShmooCon – An annual US east coast hacker convention

§ CarolinaCon – An infosec conference, held annually in North Carolina

§ HOPE – A conference series sponsored by the hacker magazine 2600

§ SummerCon – One of the oldest hacker conventions, held during Summer

§ Hack.lu – An annual conference held in Luxembourg

§ HITB – Deep-knowledge security conference held in Malaysia and The Netherlands

§ Troopers – Annual international IT Security event with workshops held in Heidelberg, Germany

§ Hack3rCon – An annual US hacker conference

§ ThotCon – An annual US hacker conference held in Chicago

§ LayerOne – An annual US security conerence held every spring in Los Angeles

§ DeepSec – Security Conference in Vienna, Austria

§ SkyDogCon – A technology conference in Nashville

§ SECUINSIDE – Security Conference in Seoul

§ DefCamp – Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania

Information Security Magazines

§ 2600: The Hacker Quarterly – An American publication about technology and computer “underground”

§ Phrack Magazine – By far the longest running hacker zine

Awesome Lists
§ SecTools – Top 125 Network Security Tools

§ C/C++ Programming – One of the main language for open source security tools

§ .NET Programming – A software framework for Microsoft Windows platform development

§ Shell Scripting – Command-line frameworks, toolkits, guides and gizmos

§ Ruby Programming by @dreikanter – The de-facto language for writing exploits

§ Ruby Programming by @markets – The de-facto language for writing exploits

§ Ruby Programming by @Sdogruyol – The de-facto language for writing exploits

§ JavaScript Programming – In-browser development and scripting

§ Node.js Programming by @sindresorhus – JavaScript in command-line

§ Node.js Programming by @vndmtrx – JavaScript in command-line

§ Python tools for penetration testers – Lots of pentesting tools are written in Python

§ Python Programming by @svaksha – General Python programming

§ Python Programming by @vinta – General Python programming

§ Android Security – A collection of android security related resources

§ Awesome Awesomness – The List of the Lists


Credit: Enaqx.GitHub





Pengertian Slackware 


     Slackware adalah merupakan sistem operasi yang dibuat oleh Patrick Volkerding dari Slackware Linux, Inc. Slackware merupakan salah satu distro Linux awal, dan merupakan yang tertua yang masih dikelola. Tujuan utama Slackware adalah stabilitas dan kemudahan desain, serta menjadi distribusi Linux yang paling mirip Unix.

Distro ini merupakan distro buatan Patrick Volkerding dari Slackware Linux, Inc. yang terkenal pertama kali setelah SLS. Slackware merupakan salah satu distro awal, dan merupakan yang tertua yang masih dikelola Tujuan utama Slackware adalah stabilitas dan kemudahan desain, serta menjadi distribusi Linux yang paling mirip Unix,sederhana, stabil, mudah dikustom, dan didesain untuk komputer 386/486 atau lebih tinggi.
  Ok,sekilas tentang pengertian Slackware tadi kali ini saya akan Memberikan ulasan
cara installasi linux Slackware 

 Cara installasi linux slackware 
    1.) Langkah pertama masukkan DVD Slackwarenya, Lalu arahkan bootable ke DVD-ROM 



    2.)Nah, ini dah masuk bootable Slackwarenya terus kita Enter saja

                                     


    3.)Ini pemilihan keyboard map, Karena kita masih menggunakan US Keyboard, Tekan Enter





    4.) Kemudian kita login dengan ” root ” . Ketik saja root ..kemudian Enter



    5.)Setelah kita login dengan root, kita akan mempartisi hardisk untuk instalasi Slackware.ketik     "cfdisk",kemudian enter


    6.)Setelah itu muncul seperti itu Untuk mempartisi harddisk, kita kita

    pilih new > pilih primary –>masukkan space harddisk yg akan anda pakai, kemudian enter.Ulanglah langkah di atas untuk membuat swapnya.

7.)Setelah selesai, kita rubah tipe sda2 menjadi linux swap. Cara nya, pilih Type –> ketikan 82 –> Enter. Seperti gambar di bawah.
 8.)  Kemudian, kita pilih (sda1) sebagai Bootable. Setelah itu, kita pilih write –> kemudian kita ketikan yes , lalu enter.Kemudian pilih Yes untuk keluar
9.)Nah, kita ketikan setup kemudian enter
10.)Pilih Addswap untuk menambahkan Partisi yg di swap
11.). Partisi Hardisk untuk file systemnya. Tekan Enter saja.
12.) Pilih Ok ,Untuk Memformat Hardisk
13.)  pilih versi ext4 untuk versi terbaru.Kemudian enter.
14.)Tunggu Proses format Hingga Selesai
16.)karena kita menginstal lewat DVD, kita pilih aja no 1. kemudian enter
17.)Pilih Ok untuk Scanning DVD Slackware
18.) Kita pilih full saja –> untuk 
menginstal semua paket yang ada di CD.
19.) Proses instalasi sedang berjalan
20.) Skip saja. Karena kita tidak ingin membuat USB Linux boot stick.
21.) ini adalah proses instalasi lilo( Semacam boot Loader). Sebenarnya lebih mudah menggunakan simple. Tapi kali ini kita akan coba menggunakan expert.


22.) Pilih Begin


23.) Pilih OK
24.) Pilih No
25.)Pilih Sesuai Kebutuhan,untuk mengatur Resolusi Layar
26.) Pilih Master Boot Record dan Tekan OK

27.) pilih OK
28.) pilih lilo time outnya,kemudian OK
29.) pilih OK.
30.) kemudian pilih Linux , untuk menambahkan List Slackware kita kedalam lilo.
Pilih Linux –> Kemudian OK
31.) isikan lokasi Slackwarenya.. Kemudian Ok
32.) kemudian isikan nama yang akan muncul saat booting.. Misalkan : Slackware
33.)Kemudian pilih INSTALL untuk menginstal lilo yang telah kita setting tadi
34.) Pilih ps2 , kemudian pilih OK
35.) Pilih Yes 
36.) Untuk konfigurasi network, kita pilih Yes
37.)masukkan nama host nya Contoh : adam

38.) Masukkan juga dns nya
39.) Kita pilih DHCP saja untuk membuat ip nya secara otomatis 
40.) kosongkan saja DHCP hostname nya
41.) Pilih Yes Untuk Mengkorfimasi Settingan anda
42.) Pilih Ok
43.) Pilih No
44.)Pilih Ok
45.)Pilih Asia/Jakarta. Kemudian Pilih OK
46.) Pilih Yes untuk isi password
 47.) Masukkan passwordnya
 48.) Pilih Ok

 49.)Pilih Exit


50.) Tahap terakir tinggal tekan ctrl -alt-delete untuk reboot

 

MKRdezign

Formulir Kontak

Nama

Email *

Pesan *

Diberdayakan oleh Blogger.
Javascript DisablePlease Enable Javascript To See All Widget