Sans SEC660 Advanced Penetration Testing – Exploits and Ethical Hacking (2014 PDFs)

Sans SEC660 Advanced Penetration Testing – Exploits and Ethical Hacking (2014 PDFs)
English | Size: 217.2 MB
Category: Programming | HACKING | Security

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), Windows exploit-writing, and much more! [Read more…]

O’Reilly – Introduction to Web Application Security Testing with Kali Linux

O’Reilly – Introduction to Web Application Security Testing with Kali Linux
English | Size: 2.74 GB
Category: Tutorial

Video Description
Most businesses today use web applications to interact with their customers. These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. This video, designed for entry to intermediate-level security engineers, describes the vulnerabilities often found in web apps, shows you the techniques hackers typically use to exploit those vulnerabilities, and explains the processes and toolsets you can use to test for and remediate against those vulnerabilities. Participants should have access to Kali Linux before starting the course. [Read more…]

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)
English | Size: 625.90 MB
Category: Tutorial

Welcome to my wifi cracking course, in this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks. At the end of the course you will learn how to configure wireless networks to protect it from these attacks. [Read more…]

Packtpub – Data Driven Testing in Selenium

Packtpub – Data Driven Testing in Selenium
English | Size: 438.98 MB
Category: Tutorial

Selenium is one of the most popular engines for UI test automation. It is available for many different programming languages. At the same time, the data-driven approach is one of the most popular approaches for optimizing tests, making them compact, and easily extensible just by adding some new data.
[Read more…]

O’Reilly – Security Testing and Ethical Hacking with Kali Linux

O’Reilly – Security Testing and Ethical Hacking with Kali Linux
English | Size: 3.17 GB
Category: Tutorial

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you’ll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you’ll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you’ll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you’ll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course. [Read more…]

O’Reilly – Security Testing and Ethical Hacking with Kali Linux

O’Reilly – Security Testing and Ethical Hacking with Kali Linux
English | Size: 3.03 GB
Category: Linux | Security

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you’ll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you’ll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you’ll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you’ll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course. [Read more…]

Packt – Data-Driven Testing in Selenium

Packt – Data-Driven Testing in Selenium
English | Size: 430.34 MB
Category: Programming | E-learning

Selenium is one of the most popular engines for UI test automation. It is available for many different programming languages. At the same time, the data-driven approach is one of the most popular approaches for optimizing tests, making them compact, and easily extensible just by adding some new data.

In this course, you’ll practice the data-driven approach using Selenium, Java, and TestNG/JUnit. We’ll start with basic samples and then go through the major steps to abstract application pages using a page object model. After that, we’ll exercise different ways to make our tests data-driven. [Read more…]

Offensive-Security-PWK-Penetration Testing with Kali tar gz

Offensive-Security-PWK-Penetration Testing with Kali tar gz
English | Size: 657.89 MB
Category: Tutorial

Security Trainning – PTK 2014
360 Pages + videos

0. $!Penetration!Testing:!What!You!Should!Know
1. $!Getting!Comfortable!with!Kali!Linux!.
2. $!The!Essential!Tools!
3. $!Passive!Information!Gathering!
4. $!Active!Information!Gathering!
5. $!Vulnerability!Scanning
6. $!Buffer!Overflows!…
7. $!Win32!Buffer!Overflow!Exploitation! [Read more…]

Learning Python Web Penetration Testing [Packt]

Learning Python Web Penetration Testing [Packt]
English | Size: 388.45 MB
Category: Tutorial

With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app in order to assess its vulnerabilities to external threats. While there are an increasing number of sophisticated ready-made tools to scan systems for vulnerabilities, the use of Python allows testers to write system-specific scripts, or alter and extend existing testing tools to find, exploit, and record as many security weaknesses as possible. [Read more…]

API Testing PackagePostman(Functional)- Jmeter(Performance)

API Testing PackagePostman(Functional)- Jmeter(Performance)
English | Size: 622.15 MB
Category: CBTs

What is an API?
API stands for Application Programming Interface, which specifies how one component should interact with the other. It consists of a set of routines, protocols and tools for building the software applications.
What is an API Testing?
The API Testing is performed for the system, which has a collection of API that ought to be tested. During Testing, a test of following things is looked at.
Exploring boundary conditions and ensuring that the test harness varies parameters of the API calls in ways that verify functionality and expose failures. [Read more…]