Saltar al contenido
Nuevos Rangos en EyBooks Leer más... ×
Foros dividido por Rangos Leer más... ×
EyBooks - Never stop learning.

Goes

Β Beta
  • Contenido

    110
  • Registrado

  • Última Visita

  • Veces Destacado

    3
  • Calificación iTrader

    N/A

Reputación en la Comunidad

150 Excellent

6 Seguidores

Sobre Goes

  • Cumpleaños 06/12/1995

Visitantes recientes en el perfil

376 visitas al perfil
  1. Goes

    Reglas de las conjuntas en EyBooks

    Pienso lo mismo carlos andres. Estoy como miembro en conjunta Udemy pack 10 cursos, yo no tengo ningun problema por compartir los cursos de aquí, con otros Clubs o como curso libres, siempre y cuando los demas miembros estén de acuerdo. Yo tambien hace poco queria entrar a Club Platzi Conjunta, claro pagando por entrar al Club. porque queria unos cursos y al parecer no podria... (Nuevos integrantes), Lo recaudado por los nuevos del Club podria ir para otra Suscripcion como dice [carlos andres] y los antigunos se verian beneficiados sin perder nada. Tambien queria hacer algo similar en Club udemy pack 10, comprando mas cursos por los mismo miembros y que mas gente se una para comprar más. Esto deberia manejarse de distinta manera, porque esta dejando de lado a los nuevos que quieren aportar, y esto como que los deja sin opcion de poder ser miembro de algun club o adquirir un curso. y si quedaria asi deberia haber una razón. Solo es mi opinión.Saludos!
  2. Goes

    Acceder sin password a Windows 7/8/10

    Indagando por ahi debiado a una curiosidad que tenia de buscar la manera poder acceder a un windows sin clave de administrador, me encontre con algunas posibles soluciones pero luego vi este video que muestra la forma de cambiar la clave de administrador con solo una iso del SO en USB/CD y hacer el cambio de password. Pues eso es todo yo no tenia el dato por eso se los comparto Video https://mega.nz/#F!2qhT1CRD!9TIZZIruyUGk-KD_QIc2FQ
  3. Metasploit Penetration Testing Cookbook by Monika Agarwal Synopsis Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. This book is an update from version 4.0 to version 4.5. It covers the detailed penetration testing techniques for different specializations like wireless networks, VOIP systems, and the cloud.Metasploit Penetration Testing Cookbook, Second Edition covers a number of topics which were not part of the first edition. You will learn how to penetrate an operating system (Windows 8 penetration testing) to the penetration of a wireless network, VoIP network, and then to cloud.The book starts with the basics, such as gathering information about your target, and then develops to cover advanced topics like building your own framework scripts and modules. The book goes deep into operating-systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post-exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to the framework, and penetration testing, while dealing with VOIP, wireless networks, and cloud computing.This book will help readers to think from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level. Biografía del autor Monika Agarwal is a young information security researcher from India. She has presented many research papers at both national and international conferences. She is a member of IAENG (International Association of Engineers). Her main areas of interest are ethical hacking and ad-hoc networking. Abhinav Singh is a young Information Security Specialist from India. He has a keen interest in the fi eld of Hacking and Network Security. He actively works as a freelancer with several security companies, and provides them consultancy. Currently, he is employed as a Systems Engineer at Tata Consultancy Services, India. He is an active contributor of the SecurityXploded community. He is well recognized for his blog (http://hackingalert. blogspot.com), where he shares his encounters with hacking and network security. Abhinav's works have been quoted in several technology magazines and portals. Detalles: Author: Monika Agarwal Number Of Pages: 320 pages Edition Description: Second Edition Publication Date: 2013-10-01 Language: English Descarga: [Hidden Content]
  4. Metasploit - The Penetration Tester’s Guide By David Kennedy, Jim O’gorman, Devon Kearns and Mati Aharoni About Metasploit: The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you’ve built your foundation for penetration testing, you’ll learn the Framework’s conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. Learn how to: – Find and exploit unmaintained, misconfigured, and unpatched systems – Perform reconnaissance and find valuable information about your target – Bypass anti-virus technologies and circumvent security controls – Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery – Use the Meterpreter shell to launch further attacks from inside the network – Harness standalone Metasploit utilities, third-party tools, and plug-ins – Learn how to write your own Meterpreter post exploitation modules and scripts Detalles: Autor: David Kennedy, Jim O’gorman, Devon Kearns and Mati Aharoni Paginas: 328 Fecha: 2011 Tamaño: 4.5MB Idiom: Ingles Table Of Contents Chapter 1: The Absolute Basics of Penetration Testing Chapter 2: Metasploit Basics Chapter 3: Intelligence Gathering Chapter 4: Vulnerability Scanning Chapter 5: The Joy of Exploitation Chapter 6: Meterpreter Chapter 7: Avoiding Detection Chapter 8: Exploitation Using Client-side Attacks Chapter 9: Metasploit Auxiliary Modules Chapter 10: The Social-Engineer Toolkit Chapter 11: Fast-Track Chapter 13: Building Your Own Module Chapter 14: Creating Your Own Exploits Chapter 15: Porting Exploits to the Metasploit Framework Chapter 16: Meterpreter Scripting Chapter 17: Simulated Penetration Test se agracede votos positivos para más contenido similar Descarga: [Hidden Content]
  5. Goes

    Scrum en ingeniería de software

    buen aporte scrum
  6. Gracias, estoy interesado en Machine learning

Contenido en EyBooks

EyBooks no almacena ni reproduce contenido protegido por derechos de autor.

Siguenos

×