Saturday, 19 July 2014

Rootkits Training from Offensive Security


A rootkit is a type of malicious software that is activated each time your system boots up. Rootkits are difficult to detect because they are activated before your system's Operating System has completely booted up. A rootkit often allows the installation of hidden files, processes, hidden user accounts, and more in the systems OS. Rootkits are able to intercept data from terminals, network connections, and the keyboard.

Download : Rootkits Training from Offensive Security [Torrent Link][720p]

Files :

Day 1 Part 1_ Rootkits_ What they are, and how to find them[720p]

Day 1 Part 2_ Rootkits_ What they are, and how to find them[720p]

Day 1 Part 3_ Rootkits_ What they are, and how to find them[720p]

Day 1 Part 4_ Rootkits_ What they are, and how to find them[720p]

Day 2 Part 5_ Rootkits_ What they are, and how to find them[720p]

Day 1 Part 5_ Rootkits_ What they are, and how to find them[720p]

Day 1 Part 6_ Rootkits_ What they are, and how to find them[720p]

Day 2 Part 1_ Rootkits_ What they are, and how to find them[720p]

Day 2 Part 2_ Rootkits_ What they are, and how to find them[720p]

Day 2 Part 3_ Rootkits_ What they are, and how to find them[720p]

Day 2 Part 4_ Rootkits_ What they are, and how to find them[720p]



















Download : Rootkits Training from Offensive Security [Torrent Link]

Wednesday, 16 July 2014

Investigating Internet Crimes


BOOK DESCRIPTION

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.

Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today’s online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec’s 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.

Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.


  • Provides step-by-step instructions on how to investigate crimes online
  • Covers how new software tools can assist in online investigations
  • Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations
  • Details guidelines for collecting and documenting online evidence that can be presented in court

ImmediateCrypt v 1.0 : Encryption and Decryption with AES 256


ImmediateCrypt is a free and open-source application that allows you to encrypt and decrypt plain text messages.

Download : ImmediateCrypt v 1.0