welcome to the official weblog c0d334rl

hacking with backtrack

BackTrack ditujukan untuk semua pemirsa dari profesional keamanan yang paling cerdas untuk pendatang baru dini untuk bidang keamanan informasi.

BackTrack mempromosikan cara cepat dan mudah untuk menemukan dan update database terbesar koleksi alat keamanan to-date.

Komunitas kami pengguna berkisar dari penguji penetrasi terampil di bidang keamanan informasi, pemerintah entitas, teknologi informasi, penggemar keamanan, dan individu baru untuk komunitas keamanan. Umpan balik dari semua industri dan tingkat keterampilan memungkinkan kita untuk benar-benar mengembangkan solusi yang disesuaikan terhadap semua orang dan jauh melebihi apa yang pernah dikembangkan baik secara komersial dan tersedia secara bebas.

Apakah Anda nirkabel hacking, mengeksploitasi server, melakukan penilaian aplikasi web, belajar, atau sosial-rekayasa clien.

Diantaranya : 

  • Episode 1 Network Hacking Arp Poisoning
  • Episode 2 Wireless Hacking Cracking WEP
  • Episode 3 Wireless Hacking DeAuth
  • Episode 5 Lock Picking Bump Key
  • Episode 6 Phone Phreaking Beige Box
  • Episode 7 Phone Phreaking/Network Hacking Sniffing VOIP
  • Episode 8 Lock Picking DIY Padlock Shims
  • Episode 9 Lock Picking Mult-Disc Combo Locks
  • Episode 10 Hacking Basics MD5
  • Episode 11 Website Hacking Sql Injection
  • Episode 12 Hacking Basics Backtrack
  • Episode 13 Website Hacking XSS
  • Episode 14 Staying Secure SSH Tunnel
  • Episode 15 Modding Xbox Softmod
  • Episode 16 Wireless Hacking Cracking WPA
  • Episode 17 Triple Boot Windows, Backtrack, & Ubuntu
  • Episode 18 Local Password Cracking
  • Episode 19 Lock Picking Basics
  • Episode 20 Ettercap
  • Episode 21 XSS Tunnel
  • Episode 22 Playstation 2 Softmod
  • Episode 23 Cracking WEP Update
  • Episode 24 Bypass Hotspots Access Controls


Underground Install Backtrack on USB

  • Underground CSRF(Cross Site Request Forgery)
  • Underground Alternate Data Streams
  • Underground Local File Inclusion
  • Underground Windows Privilege Escalation
  • Underground Bluetooth Hacking
  • Underground VMWare
  • Underground Fix Google Mail Enumerator
  • Underground Home Made Lock Picks
  • Underground Downfalls of Anti-Virus Software Part 2
  • Underground Downfalls of Anti-Virus Software
  • Underground Evilgrade
  • Underground Trojan Basics
  • Underground Manipulating Windows User Accounts
  • Underground Combine Files
  • Underground Password Phishing
  • Underground Windows SMB Relay Exploit
  • Underground Application Patching
  • Underground Metasploit Autopwn
  • Underground Email Spoofing
  • Underground Introduction


Extracting Database Information from Information Schema

  • FPGA MD5 Cracker
  • Arduino ARP Cop
  • Email Injection
  • Ping of Death
  • DNS Spoofing with Virtual Hosts
  • Bypass Cisco Clean Access & Cisco NAC Appliance
  • Dual Boot Windows & Backtrack
  • Sql Injection Challenge How-to
  • How to use Intel Pro/Wireless 3945ABG in Backtrack 2
  • Local Privilege Escalation Vulnerability in Cisco VPN Client
Download on here [ Mirror Download ]


#/////////////////////////////////////////////////////////////////
#// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
#// Regards       : c0d334rl | Qye
#// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
#// GENERATED ON  : 2012-12-01 | 00:04 PM
#/////////////////////////////////////////////////////////////////
[ home ] [ archive ] [ faq ] [ request ] [ friend's ] [ download list ]
#///////////////////////////////////////////////////////////////////////////////////////////////////////////////#
#//     --= [C] [0] [D] [3] [3] [4] [R] [L] =--  Copyright © 2013  --= [C] [0] [D] [3] [3] [4] [R] [L] =---     //#
#///////////////////////////////////////////////////////////////////////////////////////////////////////////////#