Saturday, November 14, 2009

CEH FULL ON N FORENSICS !

CEH AND FORENSICS URLS :


http://www.4shared.com/get/70390768/8d75a282/CEHv6_Module_14_Denial_of_Service.html

http://www.4shared.com/get/70393375/ff63e84c/CEHv6_Module_20_Hacking_Wireless_Networks.html

http://www.4shared.com/get/70392268/21b7a8e2/CEHv6_Module_19_SQL_Injection.html

http://www.4shared.com/account/file/70393718/d0819bab/CEHv6_Module_21_Physical_Security.html

http://www.4shared.com/account/file/70394185/e6a81854/CEHv6_Module_22_Linux_Hacking.html

http://www.4shared.com/account/file/70394521/1c239c1b/CEHv6_Module_23_Evading_IDS_Firewall_and_Honeypot.html

http://www.4shared.com/account/file/70394671/6312d607/CEHv6_Module_24_Buffer_Overflows.html

http://www.4shared.com/account/file/70395318/f2e36cab/CEHv6_Module_25_Cryptography.html

http://www.4shared.com/account/file/70395778/a3b063f1/CEHv6_Module_26_Penetration_Testing.html

http://www.4shared.com/account/file/70396008/fb0b4c5d/CEHv6_Module_28_Writing_Virus_Codes.html

http://www.4shared.com/account/file/70396141/e7795bca/CEHv6_Module_29_Assembly_Language_Tutorial.html

http://www.4shared.com/account/file/70396310/ee8d4b77/CEHv6_Module_30_Exploit_Writing.html

http://www.4shared.com/account/file/70396385/4f2504b1/CEHv6_Module_31_Exploit_Writing.html

http://www.4shared.com/account/file/70396463/3d8a9a8f/CEHv6_Module_32_Exploit_Writing.html

http://www.4shared.com/account/file/70396754/8a85e2b6/CEHv6_Module_33_Reverse_Engineering_Techniques.html

http://www.4shared.com/account/file/70396921/bf30adf4/CEHv6_Module_34_MAC_OS_X_Hacking.html

http://www.4shared.com/account/file/70397200/4ee87764/CEHv6_Module_35_Hacking_Routers_Cable_Modems_and_Firewalls.html

http://www.4shared.com/account/file/70397769/67a5aaad/CEHv6_Module_36_Hacking_Mobile_Phones_PDA_and_Handheld_Devices.html

http://www.4shared.com/account/file/70398132/d1eeeb84/CEHv6_Module_37_Bluetooth_Hacking.html

http://www.4shared.com/account/file/70398576/b5e64245/CEHv6_Module_38_VoIP_Hacking.html

http://www.4shared.com/account/file/70398931/46f4eb86/CEHv6_Module_39_RFID_Hacking.html

http://www.4shared.com/account/file/70399300/aff56a60/CEHv6_Module_40_Spamming.html

http://www.4shared.com/account/file/70400146/4c63c37c/CEHv6_Module_41_Hacking_USB_Devices.html

http://www.4shared.com/account/file/70400390/132acc6a/CEHv6_Module_42_Hacking_Database_Servers.html

http://www.4shared.com/account/file/70400656/5037e4b8/CEHv6_Module_43_Cyber_Warfare-_Hacking_Al-Qaida_and_Terrorism.html

http://www.4shared.com/account/file/70401083/29c275ad/CEHv6_Module_44_Internet_Content_Filtering_Techniques.html

http://www.4shared.com/account/file/70401689/cd9ae001/CEHv6_Module_45_Privacy_on_the_Internet.html

http://www.4shared.com/file/70401944/14c2948d/CEHv6_Module_46_Securing_Laptop_Computers.html?err=no-sess

http://www.4shared.com/account/file/70440392/8a40b86/CEHv6_Module_47_Spying_Technologies.html

http://www.4shared.com/account/file/70440914/2489a16d/CEHv6_Module_48_Corporate_Espionage_by_Insiders.html

http://www.4shared.com/account/file/70442609/e2766327/CEHv6_Module_49_Creating_Security_Policies.html

http://www.4shared.com/account/file/72522137/f82f3c4a/CEHv6_Module_50_Software_Piracy.html

http://www.4shared.com/account/file/70444150/c6f9669f/CEHv6_Module_51_Hacking_and_Cheating_Online_Games.html

http://www.4shared.com/account/file/70444820/8669cbd7/CEHv6_Module_52_Hacking_RSS_and_Atom.html

http://www.4shared.com/account/file/70447469/8076e0fd/CEHv6_Module_53_Hacking_Web_Browsers.html

http://www.4shared.com/account/file/70447933/150c6ef5/CEHv6_Module_54_Proxy_Server_Technologies.html

http://www.4shared.com/account/file/70448982/d99c97fe/CEHv6_Module_55_Preventing_Data_Loss.html

http://www.4shared.com/account/file/70449299/e3bcf7b3/CEHv6_Module_56_Hacking_Global_Positioning_System.html

http://www.4shared.com/account/file/70449686/6d1173bf/CEHv6_Module_57_Computer_Forensics_and_Incident_Handling.html

http://www.4shared.com/account/file/70558048/6c11f076/CEHv6_Module_58_Credit_Card_Frauds.html

http://www.4shared.com/account/file/70558441/12c4e00e/CEHv6_Module_59_How_to_Steal_Passwords.html

http://www.4shared.com/account/file/70559900/b1cbe1aa/CEHv6_Module_60_Firewall_Technologies.html

http://www.4shared.com/account/file/70568075/7e2da5d8/CEHv6_Module_61_Threats_and_Countermeasures.html

http://www.4shared.com/account/file/70563196/af6434da/CEHv6_Module_62_Case_Studies.html

http://www.4shared.com/account/file/70563729/d8a28c32/CEHv6_Module_63_Botnets.html

http://www.4shared.com/account/file/70564132/cf3120f0/CEHv6_Module_64_Economic_Espionage.html

http://www.4shared.com/file/70564867/cdfd1bb5/CEHv6_Module_65_Patch_Management.html?err=no-sess

http://www.4shared.com/account/file/70564937/b14885c7/CEHv6_Module_66_Security_Convergence.html

http://www.4shared.com/account/file/70565340/d5466410/CEHv6_Module_67_Identifying_the_Terrorists.html

http://www.4shared.com/account/file/71603163/f7355020/Introduction_.html

http://www.4shared.com/account/file/71603205/4a4aecca/Module_01_Computer_Forensics_in_Todays_World.html

http://www.4shared.com/account/file/71603242/b042bc6d/Module_02_Law_and_Computer_Forensics.html

http://www.4shared.com/account/file/71603264/6b177bda/Module_03_Computer_Investigation_Process.html

http://www.4shared.com/account/file/71603306/d281d747/Module_04_CSIRT.html

http://www.4shared.com/account/file/71603348/51553f44/Module_05_Computer_Forensic_Lab.html

http://www.4shared.com/account/file/71603450/43da90b2/Module_06_Understanding_File_systems_and_Hard_disks.html

http://www.4shared.com/account/file/71603568/67ee2174/Module_07_Windows_Forensics.html

http://www.4shared.com/account/file/71603644/5e28b184/Module_08_Linux_and__Macintosh_Boot_processes.html

http://www.4shared.com/account/file/71603661/1c742789/Module_09_Linux_Forensics.html

http://www.4shared.com/account/file/71603803/aebecc29/Module_10_Data_Acquisition_and_Duplication.html

http://www.4shared.com/account/file/71603903/af7ca61e/Module_11_Recovering_Deleted_Files.html

http://www.4shared.com/account/file/71604003/3d7aa528/Module_12_Image_Files_Forensics.html

http://www.4shared.com/account/file/71604127/9e36984/Module_13_Steganography.html

http://www.4shared.com/account/file/71604245/b3f11177/Module_14_Computer_Forensic_Tools.html

http://www.4shared.com/account/file/71604300/a6354acb/Module_15_Application_Password_Crackers.html

http://www.4shared.com/account/file/71604300/a6354acb/Module_15_Application_Password_Crackers.html

http://www.4shared.com/account/file/71604347/5c3d1a6c/Module_16_Investigating_Logs.html

http://www.4shared.com/account/file/71604444/c07b5d53/Module_17_Investigating_Network_Traffic.html

http://www.4shared.com/account/file/71604494/75d5231e/Module_18__Router_Forensics.html

http://www.4shared.com/account/file/71604552/31c1a310/Module_19_Investigating_Web_Attacks.html

http://www.4shared.com/account/file/71604688/66fc8a1a/Module_20_Tracking_E-mails_and_Investigating_E-mail_crimes_.html

http://www.4shared.com/account/file/71604747/5b34b2b0/Module_21_Mobile_and_PDA_Foresics.html

http://www.4shared.com/account/file/71604827/632520b/Module_22_Investigating_Trademark_and_copyright_infringement.html

http://www.4shared.com/account/file/71604878/ebfabbdf/Module_23_Investigative_Reports.html

http://www.4shared.com/account/file/71604897/e5c68bc0/Module_24_Becoming_an_Expert_Witness.html

http://www.4shared.com/account/file/71604903/32ab9ea7/Module_25_Forensics_in_Action.html

Friday, September 18, 2009

HACKING ARTICLES

HACKING ARTICLES :


http://www.ziddu.com/download/3700880/SecurityThreats.pdf.html


http://www.ziddu.com/download/3974079/HackingBluetoothenabledmobilephones.pdf.html


http://www.ziddu.com/download/3974078/HackingNetworksofTerror.pdf.html


http://www.ziddu.com/download/3974077/HackingtheInvisibleNetwork.pdf.html


http://www.ziddu.com/download/3700879/un.Lectures.Programming.DOS.Batch.File.Programming.pdf.html


http://www.ziddu.com/download/3700878/ArtificialIntelligenceSearchAlgorithms.pdf.html


http://www.ziddu.com/download/3211933/Truths--WhattheyDontteachinManuals.pdf.html


http://www.4shared.com/account/file/51236207/d8e426f/Hardware_Book.html


http://www.4shared.com/account/file/51228617/ce238571/HOW_TO_BUILD_A_FLASH_SITE.html


http://www.4shared.com/account/file/51109176/aed9424f/How_to_make_a_website_mobile__White_Paper_.html


http://www.4shared.com/account/file/107913653/ee108406/Icq_Passwort_Bruter.html


http://www.4shared.com/account/file/51109851/d5a8ee1/Installing_Troubleshooting_And_Repairing_Wireless_Network.html


http://www.4shared.com/account/file/108123388/971c697c/JohnWileyandSonsHackingWindowsXPJul2004eBook-DDU.html


http://www.4shared.com/account/file/51289590/68d45b47/Microsoft_Windows_XP_Registry_Guide_.html

http://www.4shared.com/account/file/107971055/26b760aa/Wireless_Hacks_-_100_Industrial-Strength_Tips___Tools__2003_.html


http://www.4shared.com/account/file/62162316/1c215e78/InterfacingwithCplusplus-programing_communication_with_microcontrolers.html


http://rapidshare.com/files/15685100/Gentle_Mac_Pro_3.0.2116_gentlemac_crack.zip


http://rapidshare.com/files/215367461/Wrox_PHP_and_MySQL_Create_Modify_Reuse.pdf


http://rapidshare.com/files/215367463/How_to_Do_Everything_with_PHP_and_MySQL_-_McGraw_Hill.pdf


http://www.4shared.com/account/file/108085518/e6d43a5f/Hacking_Book_Collections_-_ebooks_-_bookzone.html


http://www.4shared.com/account/file/108117340/fdb043c5/Hacking_for_Dummies_-_Wieley.html


http://www.4shared.com/account/file/108118483/95205ba0/hacking-Wiley_-_Reversing_Secrets_of_Reverse_Engineering.html


http://www.4shared.com/account/file/108086133/568c8667/hackers1blackbook_taintblogspotcom.html


http://www.4shared.com/account/file/108090165/da93a17b/Hacking_-_Firewalls_And_Networks_How_To_Hack_Into_Remote_Computers.html


http://www.4shared.com/account/file/97055450/e52840b/Hacking-The_Art_of_Exploitation.html


http://rapidshare.com/files/99131139/Learning_Perl_4th_Edition_www.softarchive.net.rar


http://uploading.com/files/9UVVV3UY/How_20Linux_20Works_20-_20What_20Every_20Super-User_20Should_20Know_20_2004_.chm.html


http://www.4shared.com/account/file/104912348/ef46d3dc/Hacking_Windows_XP_-_ExtremeTech.html


ttp://www.4shared.com/account/file/108075409/b5ac66e/Hacking_Windows_XP.html


http://www.4shared.com/account/file/104863633/f0de36a8/Hacking.html


http://www.4shared.com/account/file/109173670/7603bbae/yahoo_hacks.html


http://www.4shared.com/account/file/51110609/3400b9a6/MS_DOS.html


http://www.4shared.com/account/file/51110300/4b17c3e9/Manual_MS-DOS.html


http://www.4shared.com/account/file/51229284/395da03b/nt4_registry_reference.html


http://www.4shared.com/account/file/108118472/65bf77f9/Hacking_Into_Computer_Systems_-_Beginners.html


http://www.4shared.com/account/file/51290013/7fa72424/MS_Press_-_Microsoft_Windows_XP_Registry_Guide_Book.html


http://rapidshare.com/files/13022840/Mail_Bomber.zip


Art of hacking : http://depositfiles.com/files/4022425


http://www.4shared.com/account/file/41582827/1b32335b/Linux_Command_Directory.html


http://rapidshare.com/files/208759285/Computer_Networking.pdf



http://www.4shared.com/get/24712868/3b6e0e94/The_Giant_Black_Book_of_Computer_Viruses.html


http://www.4shared.com/account/file/51231347/f5f7d5e5/THU_THUAT_REGISTRY.html


http://www.4shared.com/account/file/51114110/deeab191/Trik_Registry.html


http://www.4shared.com/file/51231390/de3d3e0b/TUTORIAL_REGISTRY.html


http://www.4shared.com/account/file/104912400/80be886f/understanding_registry.html


http://www.4shared.com/get/104912400/80be886f/understanding_registry.html


http://www.4shared.com/account/file/51518021/5245455d/Windows_XP_-_Tips_and_Tricks.html


http://www.4shared.com/account/file/51236215/fa9b1202/Phone_Codes_for_Nokia.html


http://www.4shared.com/account/file/108125369/5bf32bb8/prog-Virus_Programming_Asm1.html


http://www.4shared.com/account/file/51230458/c1a088d5/registry_01-55.html


http://www.4shared.com/account/file/104912377/54d49d8e/registry_hacks_speed_up_xp.html


http://www.4shared.com/account/file/51230479/8491dac1/Secret_book_of_hackers.html


http://www.4shared.com/account/file/108957892/b39697e8/200_hacking_tutorials.html


http://www.4shared.com/get/104910585/93c65454/Ankit_Fadia_Hacking_Guide.html


http://www.4shared.com/account/file/104910688/ef3196b0/hacker_secret_book1.html


http://www.4shared.com/account/file/51110715/256faefb/MS-Dos_62.html


http://www.4shared.com/get/104910688/ef3196b0/hacker_secret_book1.html


http://www.4shared.com/file/108090160/aaf955f4/Hacker_Web_Exploitation_Uncovered_1931769494.html


http://www.4shared.com/account/file/51107947/1c3f0791/Computer_viruses_from_theory_to_applications_1.html


http://rapidshare.com/files/92285297/UNIX_Filesystems_www.softarchive.net.rar


http://rapidshare.com/files/215371035/Sams_-_Teach_Yourself_PHP_MySQL_And_Apache_In_24Hours.chm


http://rapidshare.com/files/5532970/Learning_C.rar


http://rs352.rapidshare.com/files/103799419/Solaris_9_Security_www.softarchive.net.rar


http://www.sharebowl.com/softwares/89-wireless-hck-toolz-2008-aio.html


http://rapidshare.com/files/94717474/Configuring_Cisco_Voice_Over_IP_www.softarchive.net.rar


http://www.4shared.com/file/56016548/ebd409a/Computer_Security_And_Cryptography.html?s=1


http://www.4shared.com/file/105898023/1e6e603f/01_Linux_Complete_Command_Reference.html?s=1


http://www.4shared.com/account/file/105898838/9eb4d94e/03_sybex_linux_network_servers.html


http://www.4shared.com/file/56366904/5ec99e6f/08_UNIX_Commands.html


http://www.4shared.com/file/64903577/818e9048/Mastering_Visual_C_6.html?s=1


http://rapidshare.com/files/95053237/TCPIP_Sockets_in_C_www.softarchive.net.rar


http://www.4shared.com/account/file/62649194/89b685eb/C_-_The_Complete_Reference_by_Herbert_Schildt.html


http://rapidshare.com/files/95062006/Scientific_and_Engineering_C___www.softarchive.net.rar


http://www.4shared.com/file/81963544/fb585a04/Solaris10TheCompleteReference.html


http://rapidshare.com/files/272108765/Windows.7.Activator.v1.2-OaH.rar


http://depositfiles.com/en/files/8ycit0tpn animation


http://www.4shared.com/file/101952944/4cdf9346/2_linux_complete_command_reference__redhat_press_.html?


http://www.4shared.com/file/60446880/1a25eb48/SQL_Server_2000_-_The_Complete_Reference.html?s=1


http://www.4shared.com/account/file/10598259/216c149/Advanced_Linux_Networking.html


http://www.4shared.com/account/file/10868008/352c55fb/Art_Of_Unix_Programming.html


http://www.4shared.com/account/file/10868437/89b7b375/C_Primer_Plus.html


http://www.4shared.com/account/file/10868494/ea510a45/C_tutorial.html


http://www.4shared.com/account/file/10870485/7c990acd/Linux_Desk_Reference.html


http://www.4shared.com/account/file/10863783/b86997ff/C-faq.html


http://www.4shared.com/account/file/10863407/759b67b7/C_Tutorial.html



http://www.4shared.com/account/file/10863396/d611faed/C_Introduction.html


http://www.4shared.com/account/file/10863357/da38577/C_Basics.html



http://www.4shared.com/account/file/10863369/c136fbb3/C_Guide.html


http://www.4shared.com/account/file/10871023/d0a088cb/Maximum_Security.html



http://www.4shared.com/account/file/10870480/cf3fe42/Jython_for_Java_Programmers.html


http://www.4shared.com/account/file/10870197/8d47984b/Java_2_Platform_Security.html


http://hotfile.com/dl/10924295/a99fd7e/HDD.Temperature.4.0.19.rar.html



http://www.4shared.com/account/file/10871320/4bef6728/MySQL__PHP.html


http://www.4shared.com/account/file/10871380/b1008fa2/MySQL_Tutorial.html



http://www.4shared.com/account/file/10872491/c8e6371e/Python_Documentation.html



http://www.4shared.com/account/file/10597225/1c820bf3/UNIX_-_Haters_Handbook.html


http://www.4shared.com/account/file/10594264/1d5c518f/XML_Programming_Bible.html


http://www.4shared.com/file/120933139/a092b688/oracle_11g_complete_reference.html?s=1


http://www.4shared.com/dir/15609444/d1bd3afe/Linux.html


http://www.4shared.com/file/68342374/370d35f7/Programming_-_Perl_-_The_Complete_Reference_2nd_Ed.html?s=1



http://www.4shared.com/dir/1503594/2876a2d1/Software_Tutorials.html


http://dc129.4shared.com/download/56366943/a4c1cec8/12_Booting_Sequence.pdf?tsid=20090829-003807-1e80f539


http://www.4shared.com/file/56366960/ffefdf0/13_Serial_Parallel_PS2_and_USB_interface.html


http://www.4shared.com/account/file/56366934/75e4cdac/11_Peripheral_Chips_of_8088.html


http://www.4shared.com/file/56366990/8866e13f/15_Processor.html


http://www.4shared.com/account/file/56366975/668f383e/14_Memory.html


http://www.4shared.com/account/file/56366916/a9dcce02/09_Getting_Familiar_with_the_PC.html


http://www.4shared.com/account/file/56366926/82f19dc1/10_8088_Microprocessor.html


http://www.4shared.com/account/file/56366835/321970d/01_Introduction_to_PC.html


http://www.4shared.com/file/56366835/321970d/01_Introduction_to_PC.html


http://www.4shared.com/account/file/56366853/bc1895be/03_Disk_Operating_System.html


http://www.4shared.com/account/file/56366846/d5695070/02_Introduction_to_Operating_System.html


http://www.4shared.com/account/file/56366862/e032f6eb/04_DOS_Commands_and_Startup_Files.html


http://www.4shared.com/file/56366862/e032f6eb/04_DOS_Commands_and_Startup_Files.html


http://www.4shared.com/account/file/56366880/90bfba49/05_Microsoft_Windows_98.html


http://www.4shared.com/account/file/56366887/edb2fea/06_Introduction_to_UNIX.html


http://www.4shared.com/account/file/56366916/a9dcce02/09_Getting_Familiar_with_the_PC.html


http://www.4shared.com/account/file/56366926/82f19dc1/10_8088_Microprocessor.html


http://www.4shared.com/get/56366926/82f19dc1/10_8088_Microprocessor.html


http://www.4shared.com/get/56366916/a9dcce02/09_Getting_Familiar_with_the_PC.html


http://www.4shared.com/account/file/56366934/75e4cdac/11_Peripheral_Chips_of_8088.html


http://www.4shared.com/account/file/56366943/a4c1cec8/12_Booting_Sequence.html


http://www.4shared.com/account/file/56366960/ffefdf0/13_Serial_Parallel_PS2_and_USB_interface.html


http://www.4shared.com/account/file/56366975/668f383e/14_Memory.html


http://www.4shared.com/account/file/56366990/8866e13f/15_Processor.html


http://www.4shared.com/account/file/75141397/c2872678/basic_of_PHP.html


http://www.4shared.com/account/file/75125682/ad1f43aa/Introduction_to_C_Programming.html


http://www.4shared.com/account/file/75059996/8b9f41c2/How_to_Program_Using_Java.html


http://www.4shared.com/account/file/82141155/9f3ff014/Mastering_Algorithms_With_C.html


http://www.4shared.com/account/file/82141154/e838c082/The_Art_of_C__.html


http://www.4shared.com/account/file/75059993/fbf5b54d/WileyFlash8ActionScriptBibleJan2006.html

http://free-ebooks-for-student.blogspot.com/search/label/Hacking


http://free-ebooks-for-student.blogspot.com/search/label/Mac%20OS


http://rapidshare.com/files/114621328/OReilly.Mac.OS.X.Leopard.Pocket.Guide.Nov.2007.eBook-BBL.rar or

http://rapidshare.com/files/114760706/LPG11.pdf

MAC OS LEOPARD

MAC OS X LEOPARD :

http://rapidshare.com/files/64923732/9_A_5_8_1_01.zip

http://rapidshare.com/files/64930505/9_A_5_8_1_02.zip

http://rapidshare.com/files/64937929/9_A_5_8_1_03.zip

http://rapidshare.com/files/64941103/9_A_5_8_1_04.zip

http://rapidshare.com/files/64948621/9_A_5_8_1_05.zip

http://rapidshare.com/files/64948473/9_A_5_8_1_06.zip

http://rapidshare.com/files/64948723/9_A_5_8_1_07.zip

http://rapidshare.com/files/64948679/9_A_5_8_1_08.zip

http://rapidshare.com/files/64948986/9_A_5_8_1_09.zip

http://rapidshare.com/files/64948860/9_A_5_8_1_10.zip

http://rapidshare.com/files/64959907/9_A_5_8_1_11.zip

http://rapidshare.com/files/64959930/9_A_5_8_1_12.zip

http://rapidshare.com/files/64959919/9_A_5_8_1_13.zip

http://rapidshare.com/files/64960017/9_A_5_8_1_14.zip

http://rapidshare.com/files/64960118/9_A_5_8_1_15.zip

http://rapidshare.com/files/64960159/9_A_5_8_1_16.zip

http://rapidshare.com/files/64960151/9_A_5_8_1_17.zip

http://rapidshare.com/files/64960210/9_A_5_8_1_18.zip

http://rapidshare.com/files/64963496/9_A_5_8_1_19.zip

http://rapidshare.com/files/64963525/9_A_5_8_1_20.zip

http://rapidshare.com/files/64963532/9_A_5_8_1_21.zip

http://rapidshare.com/files/64963674/9_A_5_8_1_22.zip

http://rapidshare.com/files/65080711/9_A_5_8_1_23.zip

http://rapidshare.com/files/65080599/9_A_5_8_1_24.zip

http://rapidshare.com/files/65080634/9_A_5_8_1_25.zip

http://rapidshare.com/files/65080450/9_A_5_8_1_26.zip

http://rapidshare.com/files/65080451/9_A_5_8_1_27.zip

http://rapidshare.com/files/65080562/9_A_5_8_1_28.zip

http://rapidshare.com/files/65080585/9_A_5_8_1_29.zip

http://rapidshare.com/files/65080543/9_A_5_8_1_30.zip

http://rapidshare.com/files/65097051/9_A_5_8_1_31.zip

http://rapidshare.com/files/65097050/9_A_5_8_1_32.zip

http://rapidshare.com/files/65103829/9_A_5_8_1_33.zip

http://rapidshare.com/files/65104021/9_A_5_8_1_34.zip

http://rapidshare.com/files/65096958/9_A_5_8_1_35.zip

http://rapidshare.com/files/65103932/9_A_5_8_1_36.zip

http://rapidshare.com/files/65096718/9_A_5_8_1_37.zip

http://rapidshare.com/files/65097020/9_A_5_8_1_38.zip

http://rapidshare.com/files/65097468/9_A_5_8_1_39.zip

http://rapidshare.com/files/65097494/9_A_5_8_1_40.zip

http://rapidshare.com/files/65103999/9_A_5_8_1_41.zip

http://rapidshare.com/files/65104119/9_A_5_8_1_42.zip

http://rapidshare.com/files/65104252/9_A_5_8_1_43.zip

http://rapidshare.com/files/65104687/9_A_5_8_1_44.zip

http://rapidshare.com/files/65190160/9_A_5_8_1_45.zip

http://rapidshare.com/files/65190174/9_A_5_8_1_46.zip

http://rapidshare.com/files/65348165/9_A_5_8_1_47.zip

http://rapidshare.com/files/65190015/9_A_5_8_1_48.zip

http://rapidshare.com/files/65190137/9_A_5_8_1_49.zip

http://rapidshare.com/files/65190032/9_A_5_8_1_50.zip

http://rapidshare.com/files/65347250/9_A_5_8_1_51.zip

http://rapidshare.com/files/65348293/9_A_5_8_1_52.zip

http://rapidshare.com/files/65349057/9_A_5_8_1_53.zip

http://rapidshare.com/files/65348450/9_A_5_8_1_54.zip

http://rapidshare.com/files/65349293/9_A_5_8_1_55.zip

http://rapidshare.com/files/65352886/9_A_5_8_1_56.zip

http://rapidshare.com/files/65357057/9_A_5_8_1_57.zip

http://rapidshare.com/files/65356982/9_A_5_8_1_58.zip

http://rapidshare.com/files/65356492/9_A_5_8_1_59.zip

http://rapidshare.com/files/65362344/9_A_5_8_1_60.zip

http://rapidshare.com/files/65356131/9_A_5_8_1_61.zip

http://rapidshare.com/files/65360298/9_A_5_8_1_62.zip

http://rapidshare.com/files/65372771/9_A_5_8_1_63.zip

http://rapidshare.com/files/65362529/9_A_5_8_1_64.zip

http://rapidshare.com/files/65362309/9_A_5_8_1_65.zip

http://rapidshare.com/files/65367157/9_A_5_8_1_66.zip

http://rapidshare.com/files/65367562/9_A_5_8_1_67.zip

http://rapidshare.com/files/65370829/9_A_5_8_1_68.zip

http://rapidshare.com/files/65368441/9_A_5_8_1_69.zip

http://rapidshare.com/files/65367205/9_A_5_8_1_70.zip

pass: www.webpunkt.ru

Sysinternal All Tools : Very Important Tools !

sysinternal all tools : very important tools !

http://technet.microsoft.com/en-us/sysinternals/bb842062.aspx Sysinternal tools :

The Suite is a bundling of the following selected Sysinternals Utilities:

AccessChk

AccessEnum

AdExplorer

AdRestore

Autologon

Autoruns

BgInfo

CacheSet

ClockRes

Contig

Coreinfo

Ctrl2Cap

DebugView

Desktops

DiskExt

DiskMon

DiskView

Disk Usage (DU)

EFSDump

FileMon

Handle

Hex2dec


Junction

LDMDump

ListDLLs

LiveKd

LoadOrder

LogonSessions

NewSid

NTFSInfo

PageDefrag

PendMoves

PipeList

PortMon

ProcDump

ProcessExplorer

Process Monitor

ProcFeatures

PsExec

PsFile

PsGetSid

PsInfo

PsKill

PsList

PsLoggedOn


PsLogList

PsPasswd

PsService

PsShutdown

PsSuspend

RegDelNull

RegJump

RegMon

RootkitRevealer

SDelete

ShareEnum

ShellRunas

SigCheck

Streams

Strings

Sync

TCPView

VMMap

VolumeID

WhoIs

WinObj

ZoomIt

http://technet.microsoft.com/en-us/sysinternals/bb795532.aspx

http://technet.microsoft.com/en-us/sysinternals/bb795533.aspx

http://technet.microsoft.com/en-us/sysinternals/bb795534.aspx

http://technet.microsoft.com/en-us/sysinternals/bb795535.aspx

http://technet.microsoft.com/en-us/sysinternals/bb842059.aspx

SOME USEFUL VIDEOS FOR ALL !

BRUTUS N HYDRA N ALL ... !


http://www.youtube.com/watch?v=PmUn6CSAcsw

http://www.youtube.com/watch?v=jkFDCKK2Scg

http://www.youtube.com/watch?v=CUMvTHRPa-Y

http://www.youtube.com/watch?v=FJHgjlaIrWY

http://www.youtube.com/watch?v=aw_ABzQLg9U

http://www.youtube.com/watch?v=dydKXZKV_cs

http://www.youtube.com/watch?v=wjAcXw7jfTw

http://www.youtube.com/watch?v=GA6E3Dur97o

http://www.youtube.com/watch?v=sB1X_NJ1P7k

http://www.youtube.com/watch?v=-JmaoOavPf8

http://www.youtube.com/watch?v=EcwY1aN6bZo

http://www.youtube.com/watch?v=Cybh3oPDYXU

http://www.irongeek.com/videos/brutus1.avi

http://www.glopeda.com/ computer n/w security




EXCHANGE SERVER 20003 VIDEOS :

http://www.youtube.com/watch?v=cdZ6T58eSTs

http://www.youtube.com/watch?v=JNARplEbQe4

http://www.youtube.com/watch?v=2u2cC7XTlUg

http://www.youtube.com/watch?v=4kAu17fOz8s

http://www.youtube.com/watch?v=vBo9HkJ2VMc

http://www.youtube.com/watch?v=J7nsTkUgVtg

http://www.youtube.com/watch?v=OD0syYdE03k

http://www.youtube.com/watch?v=OD0syYdE03k

http://www.youtube.com/watch?v=Pgv74n79R8E

http://www.youtube.com/watch?v=OTiE5CC6kIU

http://www.youtube.com/watch?v=HMVaYehBwC8

http://www.youtube.com/watch?v=0GWpWcRXvLA

http://www.youtube.com/watch?v=OD0syYdE03k

http://www.youtube.com/watch?v=mknGP-TOFu8 Wireless Hacking




Telnet and all :


http://www.youtube.com/watch?v=zOSclcEVvIU


http://www.youtube.com/watch?v=7iJVpnLqbS0

http://www.youtube.com/watch?v=wjAcXw7jfTw

http://www.youtube.com/watch?v=ihzsX52kaoE

http://www.youtube.com/watch?v=Hk_bhO8pw_Q

http://www.youtube.com/watch?v=76cvU_uOKo0

http://www.youtube.com/watch?v=LujYNM5ufew

ALL CERTIFICATIONS PICS

http://images.google.co.in/imgres?imgurl=http://71.16.131.3/jcd/MasterInstructor/Microsoft/Microsoft%2520Certified%2520Professional.jpg&imgrefurl=http://71.16.131.3/jcd/profile.html&usg=__26kvczKPg_9jYy9dZB-M7i8HDao=&h=2550&w=3509&sz=1147&hl=en&start=1&um=1&tbnid=WOyv27bxN4x3SM:&tbnh=109&tbnw=150&prev=/images%3Fq%3DMicrosoft%2Bcertified%2Bprofessional%2Bsyllabus%26imgsz%3Dl%26imgtbs%3Dz%26hl%3Den%26sa%3DG%26um%3D1

http://images.google.co.in/imgres?imgurl=http://netiko.com/images/MCP%2520-%2520Microsoft%2520Certified%2520Professional.jpg&imgrefurl=http://netiko.com/images/&usg=__cBMpPOzb1lmsbmdOU6kWGZXEYU8=&h=1239&w=1645&sz=725&hl=en&start=3&um=1&tbnid=KAUT-lrKdzYXAM:&tbnh=113&tbnw=150&prev=/images%3Fq%3DMicrosoft%2Bcertified%2Bprofessional%2Bsyllabus%26imgsz%3Dl%26imgtbs%3Dz%26hl%3Den%26sa%3DG%26um%3D1

http://images.google.co.in/imgres?imgurl=http://frombeginnertoexpert.com/images/MCITP%2520-%2520Microsoft%2520Certified%2520IT%2520Professional.jpg&imgrefurl=http://frombeginnertoexpert.com/PhotoGallery.php&usg=__q-HfN8t18w7TrCunGMBYOapWaCc=&h=1239&w=1645&sz=485&hl=en&start=40&um=1&tbnid=3TSt3DJZ7ciueM:&tbnh=113&tbnw=150&prev=/images%3Fq%3DMicrosoft%2Bcertified%2Bprofessional%2Bsyllabus%26imgsz%3Dl%26imgtbs%3Dz%26ndsp%3D18%26hl%3Den%26sa%3DN%26start%3D36%26um%3D1

HACKING ALL STUFFS ! DOWNLOAD

HACKING STUFFS AND ALL FOR MON FELLAS ! ....


http://www.officelabs.com/projects/emailprioritizer/Pages/Default.aspx email prioroty

http://www.4shared.com/account/file/41581999/c09024e/Illustrated_Windows_XP_101_Hot_Tips.html

http://www.foundstone.com/us/resources-videos.asp

http://rapidshare.com/files/168686916/Making_Windows_XP_Start_60_.rar

http://rapidshare.com/files/167155971/Windows_XP_Commands.zip on



http://www.4shared.com/file/64700107/e17960cd/NmapintheEnterpriseYourGuidetoNetworkScanningJan2008.html?s=1


http://www.4shared.com/account/file/33618979/f95c68a5/Cisco_Press_-_Cisco_Asa_All-In-One_Firewall_Ips_And_Vpn_Adaptive_Security_Appliance_Oct_2005.html


http://www.4shared.com/account/file/37207837/7197b572/Cisco_Wireless_Lan_Security.html


http://www.4shared.com/account/file/36815489/ec447133/Cisco_Router_Security_Strategies.html


http://www.4shared.com/account/file/33619744/1ee20db4/sybex_-_dictionary_of_networking.html


http://www.4shared.com/account/file/36818621/e99e1d38/ForDummiesNetworkingAll-in-OneDeskReferenceForDummies2ndEditionSep2005.html


http://www.4shared.com/account/file/41582455/b3673dd4/Information_Systems_-_The_State_of_the_Field.html


http://www.4shared.com/account/file/36913197/fa1b23e7/WileySimpleComputerSecurityDisinfectYourPCJan2007.html


http://www.4shared.com/account/file/35769120/51f42816/_ebook_-_pdf__cwna_-_certified_wireless_network_administrator_-_official_study_guide.html


http://www.4shared.com/account/file/41579924/d6a81806/GSM_and_GPRS.html


http://www.4shared.com/account/file/41577794/df1d9bf4/Cleaning_Windows_XP_For_Dummies.html


http://www.4shared.com/account/file/41580374/5910b1ce/Hack_Proofing_Linux.html


http://www.4shared.com/account/file/36903090/58ddf5c3/Guide_to_the_CISSP-ISSEP_CBK.html 30 mb

http://www.4shared.com/account/file/41581099/3d839c1/ieee_2002_vhdl_ref_manual.html


http://www.4shared.com/account/file/41577794/df1d9bf4/Cleaning_Windows_XP_For_Dummies.html 8mb

http://www.4shared.com/account/file/41580374/5910b1ce/Hack_Proofing_Linux.html 12mb

http://www.4shared.com/account/file/36818621/e99e1d38/ForDummiesNetworkingAll-in-OneDeskReferenceForDummies2ndEditionSep2005.html

20 mb

http://www.4shared.com/account/file/33618979/f95c68a5/Cisco_Press_-_Cisco_Asa_All-In-One_Firewall_Ips_And_Vpn_Adaptive_Security_Appliance_Oct_2005.html

20mb

http://www.4shared.com/account/file/33619744/1ee20db4/sybex_-_dictionary_of_networking.html 8mb

http://www.4shared.com/account/file/36815489/ec447133/Cisco_Router_Security_Strategies.html 5mb


http://www.4shared.com/account/file/37207837/7197b572/Cisco_Wireless_Lan_Security.html 5mb


http://www.4shared.com/account/file/36913197/fa1b23e7/WileySimpleComputerSecurityDisinfectYourPCJan2007.html 13mb


http://www.4shared.com/account/file/35769120/51f42816/_ebook_-_pdf__cwna_-_certified_wireless_network_administrator_-_official_study_guide.html

http://www.4shared.com/account/file/41581999/c09024e/Illustrated_Windows_XP_101_Hot_Tips.html 57mb

ttp://www.4shared.com/account/file/41582455/b3673dd4/Information_Systems_-_The_State_of_the_Field.html 3mb



http://www.4shared.com/account/file/41580844/7e680dec/Hacking_GPS.html

http://www.4shared.com/account/file/41581023/f90914/Hacking_Wireless_Networks_For_Dummies.html

http://www.4shared.com/account/file/41582717/3b4327a5/LAN.html 3mb

http://www.4shared.com/account/file/41582827/1b32335b/Linux_Command_Directory.html 10mb

http://www.4shared.com/account/file/82741660/176ea2c0/Stan_Gibilisco_-_The_Illustrated_Dictionary_of_Electronics.html

http://www.4shared.com/account/file/41582510/a6a36668/Insider_Threat_-_Protecting_The_Enterprise_From_Sabotage_Spying_And_Theft.html

http://www.4shared.com/account/file/41581079/9d5b144f/How_to_Cheat_at_Designing_a_Windows_Server_2003_Active_Directory_Infrastructure.html

http://www.4shared.com/account/file/41580655/1aea2131/Hacking_Exposed_Web_Applications.html


http://www.4shared.com/account/file/37207346/4584fcc2/network_intrusion_detection.html


http://www.4shared.com/account/file/37210041/7911c631/NetworkSecurityTechnologiesSecondEdition.html


http://www.4shared.com/account/file/41582719/dcfb0aa2/Linux_Basic_Commands.html


http://www.4shared.com/account/file/41582608/b3256142/IPv6_Network_Programming.html


http://www.4shared.com/account/file/40045472/b1a8854a/CCNA_Presentation1.html


http://www.4shared.com/account/file/56195528/b17ed096/Windows_Server_and_MS_Exchange_interview_questions.html


http://www.4shared.com/account/file/41581080/631fb024/How_to_develop_a_Network_Security_Policy.html


http://www.4shared.com/account/file/41581083/fa16e19e/ICMP_Crafting_and_other_uses.html


http://www.4shared.com/account/file/41580844/7e680dec/Hacking_GPS.html


http://www.4shared.com/account/file/41581023/f90914/Hacking_Wireless_Networks_For_Dummies.html



http://www.4shared.com/account/file/41582717/3b4327a5/LAN.html



http://www.4shared.com/account/file/82741660/176ea2c0/Stan_Gibilisco_-_The_Illustrated_Dictionary_of_Electronics.html don



http://www.4shared.com/account/file/41582616/4d867d04/ISDN_-_Integrated_Services.html


http://www.4shared.com/account/file/33622415/86758aef/TCP-IP_Unleashed_Third_Edition.html


http://www.4shared.com/account/file/36810604/6e76a3da/CiscoPressMPLSFundamentalsNov2006-1587051974.html


http://www.4shared.com/get/33619607/e245f33d/Internetworking_Troubleshooting_Handbook.html


http://www.4shared.com/get/36809877/f2c82f97/Network_Security_JumpStart.html


http://www.4shared.com/account/file/36903090/58ddf5c3/Guide_to_the_CISSP-ISSEP_CBK.html


http://www.4shared.com/account/file/41581099/3d839c1/ieee_2002_vhdl_ref_manual.html


http://www.4shared.com/account/file/41580655/1aea2131/Hacking_Exposed_Web_Applications.html


http://www.4shared.com/get/41581080/631fb024/How_to_develop_a_Network_Security_Policy.html


http://www.4shared.com/account/file/41582559/bb131bc8/IPv6_Essentials.html


http://www.4shared.com/account/file/41581082/8d11d108/How_to_write_Buffer_Overflows.html


http://www.4shared.com/file/41581080/631fb024/How_to_develop_a_Network_Security_Policy.html


ttp://www.4shared.com/get/41577055/1e0f2eb/A_Little_Bit_about_Buffer_Overflows.html


http://www.4shared.com/get/41577037/b9b43441/100_Linux_Tips_And_Tricks.html


http://www.4shared.com/account/file/41578921/1e7e8bec/_2__Designing_and_Developing_Scalable_IP_Networks.html


http://www.4shared.com/account/file/41578925/19134ff5/_2__Detection_Of_Promiscuous_Nodes_Using_ARP_Packets.html


http://www.4shared.com/account/file/41577103/9436c9ac/Advanced_SQL_Injection_In_SQL_Server_Applications.html


http://www.4shared.com/account/file/41577249/12c95bef/Analysis_of_a_Telnet_Session_Hijack_via_Spoofed_MAC_Addresses.html


http://www.4shared.com/account/file/41577763/c6e11298/CISSP_-_Certified_Information_Systems_Security_Professional_Study_Guide_Third_Edition.html


http://www.4shared.com/account/file/41578060/2c445f1/DDOS_Attack_Tools.html


http://www.4shared.com/account/file/41579891/44f45f75/Google_Secrets_-_How_To_Get_A_Top_10_Ranking.html


http://www.4shared.com/account/file/41579265/c9960275/Exploiting_Software_-_How_to_Break_Code.html


http://www.4shared.com/account/file/41579467/23151feb/Google_A_Hackers_Best_Friend.html


http://www.4shared.com/account/file/41577867/cad091bc/Cross-Site_Scripting.html


http://www.4shared.com/account/file/41580464/4544960a/Hackers_Desk_Reference.html


http://www.4shared.com/account/file/41580098/cc636e32/Guide_To_Using_Google_Discover_Googles_Buried_Treasure.html


http://www.4shared.com/account/file/41580454/6e69c5c9/Hackers_Beware.html


http://www.4shared.com/account/file/41579912/14e6eef0/Groupware__Security.html


http://www.4shared.com/account/file/41577640/6c1c4b97/Bypassing_Firewalls_Tools_and_Techniques.html





http://www.4shared.com/file/129030753/b2b23f57/Java_2_-_Complete_Reference__5th_Ed_2002_.html


http://rapidshare.com/files/99435728/Mac_OS_X_Leopard_Phrasebook_www.softarchive.net.zip


http://rapidshare.com/files/99435120/Windows_Vista_Annoyances_Tips__Secrets__and_Hacks_www.softarchive.net.rar


http://www.wingate.com/download/wingate-vpn/download.php


http://www.wingate.com/download/wingate/download.php


http://www.4shared.com/account/file/41581079/9d5b144f/How_to_Cheat_at_Designing_a_Windows_Server_2003_Active_Directory_Infrastructure.html


HIGHSCHOOL HACKER !

http://www.4shared.com/account/file/108122785/5618da78/HHS_en01_Being_a_Hacker.html


http://www.4shared.com/account/file/108122825/a7ab75cf/HHS_en02_Windows_and_Linux.html


http://www.4shared.com/account/file/108122888/23f5e1f8/HHS_en03_Ports_and_Protocols.html


http://www.4shared.com/account/file/108122941/f75e7c67/HHS_en04_Services_and_Connections.html


http://www.4shared.com/account/file/108122978/a5af9700/HHS_en05_System_Identification.html


http://www.4shared.com/account/file/108123017/d42771fd/HHS_en06_Malware.html


http://www.4shared.com/account/file/108123074/1b7487c1/HHS_en07_Attack_Analysis.html


http://www.4shared.com/account/file/108123120/60acddaa/HHS_en08_Forensics.html


http://www.4shared.com/account/file/108123175/6db1dd60/HHS_en09_Email_Security.html


http://www.4shared.com/account/file/108123248/3a6b4c47/HHS_en10_Web_Security_and_Privacy.html


http://www.4shared.com/account/file/108123283/10cdac3/HHS_en11_Passwords.html


http://www.4shared.com/account/file/108123347/ab163be1/HHS_en12_Legalities_and_Ethics.html


http://www.4shared.com/account/file/108123382/77c98062/HHS_TOC_Glossary.html

CCNA SPECIAL ALL !

THESE ARE THE LINKS FOR VARIOUS GOOD STUFFS ON CCNA :


http://www.4shared.com/file/55752185/8dbfc045/CCNA_2_M3_Configuring_a_Router.html

http://www.4shared.com/dir/2887241/da99eb43/sharing.html

http://www.4shared.com/dir/2887241/da99eb43/sharing.html

http://www.4shared.com/file/39766828/cf3de189/ip_subnating__vlsm_of_ccna.html?s=1

http://www.4shared.com/file/72619765/79ee5aee/CCNA_Router_and_Switching_Study_Guide.html


http://www.4shared.com/file/41231332/676b733/CCNA_Commands_in_Shorts.html?s=1


http://www.4shared.com/file/103674865/314e0425/learn_ccnaccnpmcsecomptianetworkicdlic3.html


http://www.4shared.com/get/51339030/287c9392/CCNA4TechnologiesWAN31FrenchScaneBooK-Label.html

http://www.4shared.com/file/20337782/6ca4486e/TuanAnhs_CCNA_Introduction.html?s=1


http://www.4shared.com/get/73940712/4a022011/CCNA_Router_commands640-607.html


http://www.4shared.com/dir/10172858/e216fafe/sharing.html


http://www.4shared.com/account/file/79414314/fb04794f/Brochure_CCNA20640-802_ver0807.html


http://www.4shared.com/file/115114549/3f294963/lab_ccna_voice.html?s=1

http://www.4shared.com/file/115114549/3f294963/lab_ccna_voice.html?s=1


http://www.4shared.com/file/32953891/1d663f8e/CCNA-study-Guide.html?s=1


http://www.4shared.com/get/34638281/c32d7e57/Learn_CCNA.html


http://www.4shared.com/file/108320428/37c19996/CCNA_P4S_Dumps_Link.html?s=1

http://www.4shared.com/file/64672014/b3dcad3f/Some_Interview_Question_CCNA__Basic_Networking.html?s=1



http://www.4shared.com/file/94246482/607a6a2/CCNA_Security_Questions_Answers.html?s=1


http://www.4shared.com/file/54718505/7e25af81/ccna_training_certificate.html?s=1


http://www.4shared.com/get/54201737/a827be89/CCNA_Cisco_Semester_1_Chap_8_Design__Documentation.html


http://www.4shared.com/account/file/79398664/d52de9a2/CCNA_CBT_NUG_640-802_640-822_640-816_Link.html

http://www.4shared.com/account/file/79414398/3a6bbf6c/CCNA_LAB_MANUAL_640-802.html

http://www.4shared.com/account/file/79414660/b5e3e97a/English_ccna_voice.html

http://www.4shared.com/get/79398664/d52de9a2/CCNA_CBT_NUG_640-802_640-822_640-816_Link.html


http://www.4shared.com/file/79398664/d52de9a2/CCNA_CBT_NUG_640-802_640-822_640-816_Link.html?s=1



http://www.4shared.com/get/91390134/4ec47fd8/ccna.html

http://www.4shared.com/get/96386688/7c65b45f/CCNA_Voice_Certification.html

http://www.4shared.com/get/7539094/5285da10/NAT_CCNA.html

http://www.4shared.com/file/9004387/65e94c51/CCNA_Presentation.html?err=no-sess

http://www.4shared.com/file/43701363/8cf489aa/CCNA_3_-_Switching_and_Wireless.html?s=1

http://www.4shared.com/account/file/78301976/ff0bd8bd/ccna_handbook.html

http://www.4shared.com/file/65981882/42aa63a5/1500_CCNA_Interview_questions_and_answers.html?s=1

http://www.4shared.com/get/72201321/7ea3b066/CCNA_Simlation_LAB_4.html




http://www.4shared.com/get/25181685/be49579b/ccna_commands_and_lab.html

http://www.4shared.com/get/10651024/e0e2f78/Torrent_ccna_website.html

http://www.4shared.com/file/54202205/797ae163/CCNA_Semester_2__Chapter_8_Router_Configuration_2.html?s=1

http://www.4shared.com/account/file/90480341/f479db42/_2__Access_VPNs_And_Tunneling_Technologies.html

http://www.4shared.com/account/file/90830565/c5bdf001/_2__exchange2003configuration.html

http://www.4shared.com/file/14258770/638d202e/Question_CCNA.html?err=no-sess

http://www.4shared.com/get/44994624/b554d65b/test_ccna_3_v4.html


http://www.4shared.com/file/91963609/2f695d7a/account.html


http://www.4shared.com/account/file/131276869/1070d459/_2__d.html

http://www.4shared.com/get/17740479/81e6aca2/Cisco_Press_-_Ccnp_642-811_-_Bcmsn_Exam_Certification_Guide_-_2004.html

http://www.4shared.com/file/56004504/f40e288e/CCNA_Study_Notes.html?s=1

http://www.4shared.com/file/41532387/9a580521/CASE_STUDY_ccna_2.html?s=1


http://www.4shared.com/file/58884795/dd53c5ce/CCNA_Ip_Routing_Fundamentals.html?s=1

http://www.4shared.com/file/81260563/2f78f208/CCNA_2_Final_with_Picture.html


http://www.4shared.com/account/file/81260475/dec20c4b/CCNA2_FINAL__new_251208_.html

http://www.4shared.com/file/55752251/3d3ac448/CCNA_2_M4_Learning_about_other_devices.html?s=1


http://www.4shared.com/file/31676178/78489a31/DHCP_CCNA.html?s=1

http://www.4shared.com/get/17740479/81e6aca2/Cisco_Press_-_Ccnp_642-811_-_Bcmsn_Exam_Certification_Guide_-_2004.html


http://www.4shared.com/file/54202261/284d82fc/CCNA_Semester_2__Chapter_12_Routing_Protocols.html?s=1

http://www.4shared.com/file/55752187/63b1a169/CCNA_2_M1_WAN_and_Routers.html?s=1

http://www.4shared.com/get/64670419/606db1d5/CCNA_orignal_questions_P4S_with_Explanation.html


http://www.4shared.com/get/67840536/8f64a5cc/CCNA-1-Modelo-OSI.html


http://www.4shared.com/file/54202233/bb341795/CCNA_Semester_2__Chapter_10_IP_Addressing.html?s=1


http://www.4shared.com/get/90187933/95bb0075/Final_CCNA_4_100-.html



http://www.4shared.com/file/65469614/b68fd583/2005_Cisco_Icons_Q106_110205.html


http://www.4shared.com/account/file/64365302/b19807a8/ccna_command.html


http://www.4shared.com/get/54202217/8e6fb10e/CCNA_Semester_2__Chapter_9_TCP_IP.html


http://www.4shared.com/file/56020178/40529e89/CCNA_1_M7_Ethernet_Technologies.html?s=1


http://www.4shared.com/file/56020168/5949afc8/CCNA_1_M5_Cabling_LANs_and_WANs.html?s=1


http://www.4shared.com/file/66275027/9021c4c0/1000_CCNA_Questions.html?s=1

http://www.4shared.com/file/56020163/ce9b7640/CCNA_1_M4_Cable_Testing.html?s=1

http://www.4shared.com/file/84834543/a96f846c/Router_Commands_for_the_CCNA_640.html?s=1


http://www.4shared.com/file/109176680/c6455753/P4S_640-802_v3122.html



http://www.4shared.com/file/44915149/103c3741/ccna_dums.html?s=1


http://www.4shared.com/file/26882208/b7aed49/CCNA_COURSE.html?s=1 1mb on

http://www.4shared.com/file/58884795/dd53c5ce/CCNA_Ip_Routing_Fundamentals.html?s=1 3mb on

http://www.4shared.com/file/109536726/ba1a940d/ccna.html?s=1

http://www.4shared.com/file/124538124/93b4981d/All_CCNA_Labs_-_Packet_Tracer_52.html?s=1

http://www.4shared.com/file/42340377/e258f4f5/ccent05_CCNA_by_REZA_.html?s=1





http://www.4shared.com/account/file/90830565/c5bdf001/_2__exchange2003configuration.html

http://www.4shared.com/account/file/90510752/b52ea2b1/access_list.html

http://www.4shared.com/account/file/90510142/a8b8ef42/Basic_NetMeeting_and_ISA_Server_H1323_Gatekeeper_Configuration.html

http://www.4shared.com/account/file/90508499/74db8b33/Basic_PIX_Firewall_Configuration.html

http://www.4shared.com/account/file/90510770/6916a11f/C_Programming_basics.html

http://www.4shared.com/account/file/90501029/ed2eb5ae/ccnp1-mod9-BGP-Part1.html

http://www.4shared.com/file/60167703/d218d271/CCNA_Prep-_IP_Subnetting_from_Networkers.html
http://www.4shared.com/file/9004387/65e94c51/CCNA_Presentation.html

http://www.4shared.com/account/file/35227147/dc585a73/CCNA_v31_StudentMigrationGuidelines.html

http://www.4shared.com/get/35227147/dc585a73/CCNA_v31_StudentMigrationGuidelines.html

http://www.4shared.com/account/file/35227622/ff271fff/CertSummary.html


http://www.4shared.com/account/file/57398507/a22dde7/FINALCCNP1v50_2_.html


http://www.4shared.com/account/file/68641976/96ecef50/OSPF.html



http://www.4shared.com/get/54248709/ec3a2907/Troubleshooting_IP_Telephony_Networks_-_Case_Studies.html


http://www.4shared.com/account/file/90501029/ed2eb5ae/ccnp1-mod9-BGP-Part1.html don

http://www.4shared.com/account/file/19861266/6fda014d/01-Basics-of-MPLS.html don

http://www.4shared.com/account/file/39849570/67bcff4e/Cisco_Detailed.html don

http://www.4shared.com/account/file/19861291/76268821/02-Basics-of-MPLS.html don

http://www.4shared.com/account/file/19861307/4f45fc6a/03-MPLS-VPN-Overview.html don

http://www.4shared.com/account/file/19860917/e3752f98/frame-relay.html

http://www.4shared.com/account/file/19861323/7a1e5af1/Frame-Relay2.html

http://www.4shared.com/account/file/19861313/51330932/FrameRelay.html

http://www.4shared.com/account/file/19861320/e3170b4b/FrameRelay1.html

http://www.4shared.com/file/81567850/15566b23/CCNA-SECURITY-640553.html 33mb

http://www.4shared.com/file/54755659/f48d7ab/NotesonCCNASecurity.html

http://www.4shared.com/file/73217673/556d9a3c/Bosan_Stand_Alone_labs_CCNA.html

Saturday, September 12, 2009

PROXY SERVER ALL !

The following proxy servers are not verified to be non-transparent and they can't be used for anonymous surfing. But if all you care is to find a fast proxy server here is the list for you:


122.6.245.14:8090
123.184.6.251:8088
123.236.215.131:6588
172.163.146.56:6588
189.37.28.147:6588
190.53.89.103:6588
200.104.104.91:6588
200.126.98.135:6588
200.252.201.144:80
201.42.59.201:6588
202.134.202.226:80
211.140.151.214:8080
212.12.114.252:3128
218.252.37.227:808
59.95.1.229:6588
59.95.73.173:6588
61.174.122.2:8088
61.54.82.130:808
66.167.100.59:6649
68.175.47.31:9090
69.36.7.253:4004
70.86.138.210:8131
71.61.176.210:3128
78.138.131.150:8080
79.172.81.79:44933
81.164.167.69:9090
82.228.101.113:14841
82.23.123.51:9090
83.167.122.41:3128
85.11.150.211:6588
85.24.89.199:6588
98.175.97.7:8080
125.137.151.104:3128
193.19.82.24:3128
195.89.143.211:8090
200.112.83.72:6588
200.140.83.108:6588
200.150.139.211:6588
201.17.188.5:6588
201.229.208.2:80
201.229.208.3:80
207.38.251.111:9090
212.17.86.109:8080
218.83.248.32:8088
222.88.211.181:8089
24.1.166.12:9090
24.10.243.231:7212
24.10.84.226:9090
24.116.25.150:9090
24.118.207.118:9090
24.125.84.2:9090
24.126.147.186:9090
24.127.113.227:9090
24.137.215.227:9090
24.139.68.242:9090
24.14.112.139:9090
24.15.52.62:9090
24.185.121.80:9090
24.189.131.189:9090
24.189.29.189:9090
24.217.194.73:9090
24.222.220.140:9090
24.230.182.225:9090
24.3.105.116:9090
24.4.239.144:9090
24.98.81.111:9090
58.253.111.2:8089
59.94.189.230:6588
61.153.140.106:808
64.179.172.134:9090
64.30.123.252:9090
65.75.189.33:9090
67.149.165.201:9090
67.149.215.109:9090
67.161.239.245:9090
67.166.66.244:9090
67.191.220.137:9090
67.9.3.63:9090
68.10.87.155:9090
68.180.117.215:9090
68.194.177.78:9090
68.198.252.19:9090
68.198.72.147:9090
68.59.217.62:9090
68.63.27.57:9090
68.84.47.147:9090
69.113.232.218:9090
69.120.173.183:9090
69.123.44.118:9090
69.127.115.255:9090
69.136.136.125:9090
69.138.47.42:9090
69.180.245.32:9090
69.180.8.201:9090
69.22.123.154:9090
69.242.176.42:9090
69.246.117.136:9090
69.254.246.123:9090
71.194.216.20:7212
71.195.130.227:9090
71.197.189.88:9090
71.199.134.177:9090
71.205.113.223:9090
71.205.37.198:9090
71.224.87.71:9090
71.228.231.241:9090
71.236.126.53:9090
71.237.41.13:9090
71.237.98.13:9090
72.198.36.75:9090
75.64.232.63:9090
75.64.35.123:9090
75.66.1.212:9090
75.85.136.141:9090
76.106.127.211:9090
76.116.82.97:9090
76.117.245.191:9090
76.183.112.143:9090
76.28.0.206:9090
76.28.250.36:9090
76.29.10.61:11055
81.192.16.53:6588
82.238.120.88:8080
82.32.122.223:9090
82.34.88.122:9090
82.35.73.55:9090
86.4.25.128:9090
86.6.122.30:9090
87.116.164.85:6588
87.120.67.39:6588
88.165.169.130:9090
88.171.218.44:9090
88.172.20.212:11033
96.21.139.56:9090
96.28.160.240:9090
98.163.204.145:9090
98.181.63.127:9090
98.192.95.181:9090
98.216.3.48:9090
98.223.204.15:9090
98.240.186.255:9090
99.199.237.158:9090
125.128.25.151:11011
157.182.52.224:9090
160.7.251.98:9090
189.111.166.103:6588
189.18.103.16:6588
200.150.47.167:6588
200.223.197.176:6588
201.40.178.226:6588
202.105.31.68:443
204.111.219.182:9090
208.53.199.48:9090
208.53.199.75:9090
211.90.22.106:8088
216.51.236.24:9090
218.206.194.247:8800
218.75.23.110:3128
218.75.76.74:8088
218.97.194.94:80
219.121.151.29:80
24.125.217.129:9090
24.13.108.167:9090
24.164.253.14:9090
24.175.116.55:9090
24.186.57.77:9090
24.188.121.167:9090
24.19.124.152:9090
24.190.104.34:9090
24.190.65.208:9090
24.20.45.101:9090
24.201.119.10:9090
24.209.62.190:9090
24.211.49.0:9090
24.23.182.99:9090
24.231.250.241:7212
24.254.113.238:9090
24.255.219.247:9090
24.5.195.141:9090
24.8.191.246:9090
58.20.51.207:808
59.92.40.60:6588
61.234.254.69:8088
63.245.152.3:9090
64.136.197.96:9090
64.179.170.189:9090
66.165.197.37:9090
66.175.164.59:9090
66.177.219.202:9090
66.214.17.189:9090
66.229.205.251:9090
66.38.121.88:9090
66.91.101.52:9090
67.162.165.118:9090
67.165.189.3:9090
67.188.156.177:9090
67.48.22.73:9090
67.84.148.144:9090
67.84.35.131:9090
67.87.24.194:9090
68.104.55.221:9090
68.11.237.184:9090
68.199.153.104:9090
68.201.24.46:9090
68.225.96.18:9090
68.8.224.217:9090
68.81.191.233:9090
68.83.91.141:9090
69.116.42.119:9090
69.122.222.90:9090
69.124.132.102:9090
69.127.175.231:9090
69.136.70.21:9090
69.161.78.160:9090
69.246.61.14:9090
69.249.151.19:9090
69.47.165.83:9090
69.47.174.178:9090
70.177.47.119:9090
70.177.53.179:9090
70.180.206.70:9090
70.180.62.153:9090
70.186.174.186:9090
70.225.83.202:9090
70.64.225.85:9090
71.192.234.31:9090
71.204.73.210:9090
71.205.238.140:9090
71.205.238.236:9090
71.207.56.148:9090
71.224.107.188:9090
71.226.155.186:9090
71.64.8.82:9090
72.134.20.99:9090
72.178.207.48:9090
72.188.68.197:9090
72.227.236.241:9090
72.227.36.24:9090
74.15.86.86:9090
75.108.122.150:9090
75.181.46.254:9090
75.64.211.234:9090
75.87.189.110:9090
76.102.161.57:9090
76.102.95.54:9090
76.110.211.162:9090
76.114.240.59:9090
76.115.37.7:9090
76.182.53.239:9090
76.26.216.31:9090
76.89.23.238:9090
80.193.168.196:9090
80.25.151.126:15353
80.4.60.88:9090
82.2.234.184:9090
82.38.36.40:9090
82.4.69.11:9090
89.241.213.95:9090
92.9.76.236:9090
96.18.67.70:9090
96.3.152.82:9090
96.3.172.29:9090
97.85.152.126:9090
97.91.188.113:9090
98.121.129.95:9090
98.193.185.111:9090
98.194.172.64:9090
98.247.53.216:9090
99.139.195.186:9090
99.228.98.56:9090
99.242.140.117:9090
123.127.110.243:80
189.19.233.32:6588
194.117.157.72:27076
201.17.130.27:6588
201.228.130.234:6588
201.251.34.65:6588
204.112.136.25:9090
210.52.15.210:808
211.167.248.228:8080
216.164.170.134:9090
218.194.80.220:808
220.174.209.178:808
24.10.186.31:9090
24.118.147.89:9090
24.151.126.249:9090
24.175.139.203:9090
24.2.4.204:9090
24.22.86.147:9090
24.77.22.225:9090
24.90.177.18:9090
64.111.32.54:9090
64.83.209.110:9090
65.30.92.48:9090
66.57.1.142:9090
66.99.71.247:9090
67.9.255.2:9090
67.9.28.224:9090
68.105.0.173:9090
68.144.70.254:9090
68.62.176.8:9090
69.151.73.128:9090
69.246.218.125:9090
69.246.38.184:9090
70.127.205.107:9090
70.186.168.130:9090
70.26.57.239:9090
71.178.155.167:9090
71.192.233.196:9090
71.200.233.55:9090
71.89.55.232:9090
72.190.121.79:9090
72.24.212.232:9090
72.24.213.96:9090
72.9.72.199:9090
74.131.139.186:9090
74.192.92.162:9090
74.79.165.21:9090
75.83.57.219:9090
76.170.85.232:9090
76.68.66.51:9090
76.84.237.206:9090
77.97.26.167:9090
82.33.117.189:9090
82.35.165.44:9090
82.40.28.187:9090
82.44.239.26:9090
82.6.69.14:9090
86.42.180.157:9090
98.206.20.88:9090
98.210.111.207:9090
99.253.188.98:9090
142.59.52.201:9090
173.32.150.159:9090
189.79.63.28:6588
200.161.6.214:6588
200.58.206.145:6588
201.21.210.84:6588
201.254.56.35:6588
207.181.207.36:9090
217.119.20.82:3128
24.166.174.56:7212
24.170.82.144:9090
24.2.69.26:9090
24.208.37.143:9090
24.30.90.20:9090
60.28.209.8:80
65.185.5.17:9090
66.186.237.190:9090
66.57.75.68:9090
66.67.106.227:9090
68.104.19.90:9090
68.113.102.37:9090
68.117.211.122:9090
68.118.245.35:9090
68.207.186.253:9090
69.245.52.76:9090
70.74.213.38:9090
72.141.35.81:9090
72.141.53.106:9090
72.174.161.51:9090
75.18.209.8:7212
75.183.7.150:9090
76.107.137.6:9090
80.192.65.203:9090
82.6.184.38:9090
83.220.195.232:9090
92.233.226.34:9090
92.234.58.166:9090
97.87.101.89:9090
98.161.24.110:9090
99.199.229.95:9090
99.21.134.25:9090
201.3.53.102:6588
204.85.72.128:9090
216.117.225.240:9090
24.168.35.163:9090
24.179.152.2:9090
59.56.174.199:808
65.28.107.26:9090
65.28.8.13:9090
67.177.158.94:9090
67.68.46.169:9090
68.188.91.22:9090
68.4.217.7:9090
70.82.140.29:9090
71.90.230.116:9090
72.136.252.159:9090
76.27.54.31:9090
77.99.183.136:9090
78.43.175.129:9090
80.6.34.116:9090
86.2.160.241:9090
88.109.194.140:9090
201.86.70.162:80
208.53.196.161:9090
66.253.168.169:9090
66.26.117.254:9090
67.61.171.202:9090
70.125.110.220:9090
71.200.118.56:9090
75.152.23.65:9090
76.107.94.147:9090
81.106.225.136:9090
92.238.40.83:9090
200.220.222.215:6588
201.26.133.204:8080
209.159.241.112:9090
24.78.155.155:9090
66.57.230.14:9090
70.76.83.81:9090
75.68.212.175:9090
24.11.124.76:9090
66.253.232.57:9090
91.188.161.235:3128
86.12.223.22:9090
116.7.255.88:8080
124.107.149.63:3128
20.132.16.22:80
201.245.152.230:80
202.129.181.242:8080
202.83.174.14:8080
202.99.29.27:80
207.248.228.166:80
212.95.178.130:80
219.102.226.100:8080
62.69.178.8:80
70.86.138.210:8125
114.30.47.10:80
117.102.54.110:8080
12.130.107.115:80
130.225.245.156:8080
131.247.155.3:9090
142.33.100.41:8080
165.166.201.241:8080
190.144.112.42:8080
192.115.90.150:8080
210.51.22.185:80
212.119.85.164:80
212.191.130.227:8080
212.24.237.49:8080
213.130.111.206:8080
219.198.208.140:8080
219.53.216.132:8080
221.249.144.93:8088
222.188.91.85:8080
24.72.74.152:9090
38.103.164.174:9090
58.22.101.251:80
61.19.222.7:80
62.99.163.242:8080
66.171.189.82:9090
66.187.205.130:80
71.227.225.115:8000
75.148.238.58:8080
75.68.4.225:9090
76.110.43.10:7212
82.76.17.46:8080
83.141.17.20:80
85.105.144.28:8088
87.245.155.179:80
89.189.84.1:80
89.189.84.118:80
89.189.85.20:80
89.189.85.67:80
91.203.132.59:3128
119.147.23.118:8080
211.100.4.71:80
218.4.65.118:8080
219.106.246.6:80
219.117.209.83:80
219.133.180.67:80
219.142.121.37:80
220.157.98.136:80
221.11.27.110:8080
24.126.135.71:9090
58.42.242.10:8089
60.213.25.170:3128
62.150.81.35:80
78.109.149.162:3128
120.28.64.69:8080
160.97.36.70:8000
193.173.119.83:8080
195.209.224.91:3128
200.163.66.116:80
203.67.172.25:8080
207.157.9.179:9090
212.14.233.47:3128
213.97.52.28:8080
219.239.90.83:80
221.91.128.132:8080
67.162.88.110:9090
67.85.66.187:9090
82.233.131.115:7212
121.73.79.171:9090
189.19.231.136:8000
194.176.176.82:8080
202.106.121.134:80
206.64.92.16:8000
208.77.219.76:80
63.162.106.70:80
64.184.84.246:80
66.253.186.239:9090
70.181.122.211:9090
75.148.238.57:8080
75.185.79.63:8080
80.126.22.246:80
195.248.239.142:80
200.243.51.252:80
203.94.229.227:8080
210.86.181.202:80
24.189.79.154:8000
62.150.126.228:80
200.104.250.92:80
66.146.139.235:8000
85.252.212.138:9090
118.98.232.202:8080
151.11.232.92:80
203.70.96.9:80
216.195.37.250:82
74.54.156.73:80
195.226.16.132:80
200.55.208.203:80
59.61.88.193:80
211.138.198.6:10917
213.132.44.241:80
217.172.187.98:80
220.224.224.66:3128
92.64.178.98:8080
62.149.95.43:8080
208.81.7.18:80
91.121.84.92:80
125.89.73.159:80
116.90.129.134:80
159.148.82.3:3128
189.51.255.19:8080
192.203.138.63:80
193.45.143.12:80
193.45.143.41:80
194.44.221.137:3128
200.165.90.114:8080
200.171.58.137:3128
200.211.233.132:3128
200.213.117.2:8080
200.49.141.56:8080
201.133.171.213:8080
201.14.116.3:3128
202.134.202.144:80
202.40.182.82:8080
202.71.103.109:3128
206.227.34.10:3128
208.45.143.105:80
208.67.195.32:80
208.74.50.197:3128
209.124.34.27:80
209.20.82.228:80
209.235.218.83:80
209.237.236.110:80
209.34.241.44:80
216.14.98.225:80
216.173.2.205:8080
217.12.51.38:8080
218.107.24.3:3128
222.92.51.221:808
59.93.43.186:3128
60.217.80.36:8080
60.6.205.20:808
63.146.109.190:80
65.199.160.6:80
65.243.68.184:80
65.57.240.117:80
65.57.240.121:80
65.57.240.174:80
65.57.240.176:80
65.57.240.177:80
65.57.240.234:80
66.77.122.132:80
66.77.122.135:80
66.94.172.129:8080
67.15.104.28:80
77.42.159.251:80
79.188.118.70:8080
80.51.221.94:3128
80.81.52.225:8080
81.177.3.10:3128
83.170.109.8:8080
87.204.246.122:8080
87.204.246.192:8080
87.204.246.68:8080
87.204.246.78:8080
88.191.44.184:8080
89.208.43.141:80
91.121.61.20:80
119.70.40.101:8080
121.14.211.71:80
121.15.164.9:3128
121.207.252.139:80
121.80.179.213:80
159.148.82.4:3128
189.108.155.120:3128
189.21.136.84:3128
190.24.8.82:3128
190.65.211.154:8080
190.65.224.10:80
195.248.240.146:8080
195.251.38.71:8888
200.207.9.168:3128
200.223.102.82:80
200.223.19.101:3128
200.29.106.240:3128
200.43.141.173:8080
201.24.240.130:3128
201.65.121.102:3128
202.107.231.157:8080
202.181.211.237:80
202.29.22.12:3128
202.29.22.3:3128
202.29.22.4:3128
203.153.214.146:80
203.160.1.103:80
203.160.1.112:80
203.160.1.121:80
203.160.1.130:554
203.160.1.162:554
203.160.1.66:80
203.77.192.92:80
203.89.30.142:80
208.45.143.104:80
210.238.184.150:3128
212.109.155.130:8080
212.117.162.228:3128
212.93.193.72:443
212.93.193.74:443
212.93.193.78:443
212.93.193.82:443
212.93.193.83:443
213.207.35.43:80
218.17.246.197:3128
218.75.100.114:8080
219.101.35.83:3128
219.132.142.10:8080
219.134.242.204:3128
219.159.77.144:3128
220.227.31.179:8080
220.227.47.6:8080
220.227.47.7:8080
221.215.143.18:808
221.224.53.83:3128
221.230.139.83:3128
222.124.5.92:8080
222.223.127.130:808
222.73.227.233:80
222.73.86.75:80
58.242.42.91:3128
58.254.201.237:3128
60.2.93.11:80
66.104.77.20:3128
66.197.252.182:80
66.198.41.11:3128
67.19.148.234:3128
67.228.42.208:80
67.69.254.243:80
67.69.254.246:80
67.69.254.248:80
67.69.254.252:80
67.69.254.254:80
67.69.254.255:80
72.249.149.144:80
75.126.176.161:80
77.240.82.6:80
80.91.112.202:8080
82.192.83.7:3128
85.214.59.79:8080
87.224.243.113:3128
87.237.228.18:8080
89.144.96.79:808
89.210.114.220:8080
89.31.143.2:80
95.82.194.72:3128
117.102.15.218:8080
117.102.60.205:8080
117.102.93.131:3128
118.144.187.156:80
119.10.182.20:80
119.146.73.114:8080
12.191.44.111:80
12.228.215.52:9090
12.228.215.61:9090
12.228.215.62:9090
121.22.29.180:80
121.22.29.181:80
121.22.29.182:80
121.22.29.183:80
122.224.97.85:3128
123.49.42.81:8080
124.106.77.200:3128
124.164.247.43:3128
124.30.18.245:3128
124.81.45.233:80
125.242.128.78:8080
125.93.187.234:3128
187.4.61.2:3128
189.21.246.135:3128
190.136.215.70:3128
196.212.252.194:8080
200.174.31.29:3128
200.254.12.2:8080
200.254.221.146:3128
201.26.37.196:3128
201.75.105.179:8080
203.160.1.75:80
203.160.1.85:80
203.160.1.94:80
203.162.183.222:80
203.162.7.82:8080
203.172.138.187:80
203.177.152.162:3128
203.179.87.186:3128
211.95.176.6:808
218.0.1.30:8080
218.14.227.197:3128
219.136.252.120:3128
219.239.90.85:3128
219.239.90.96:3128
221.203.154.26:8080
222.122.19.72:80
222.122.19.76:80
222.124.9.122:80
222.135.178.62:8080
222.208.242.30:3128
222.239.222.56:8080
41.242.150.184:3128
41.244.100.108:3128
58.222.254.13:3128
58.61.143.137:3128
59.18.13.75:80
60.188.118.172:8088
60.28.252.206:3128
61.139.73.6:8080
61.144.24.106:3128
64.66.192.62:80
67.69.254.245:80
69.90.107.184:80
78.138.4.34:80
89.211.49.84:3128
89.31.143.3:80
118.98.172.34:3128
196.29.205.45:80
201.26.74.58:3128
201.6.125.234:8080
201.9.131.84:80
203.151.233.143:80
212.116.208.242:3128
220.128.169.153:3128
222.215.152.139:8080
59.120.47.230:3128
60.249.176.80:3128
60.49.177.228:3128
67.69.254.240:80
67.69.254.244:80
67.69.254.250:80
77.71.0.246:3128
82.206.129.160:3128
89.207.240.235:3128
12.228.215.55:9090
122.224.222.134:3128
125.22.252.134:80
196.202.28.38:80
200.199.22.92:3128
200.201.187.250:3128
200.41.60.135:3128
201.251.159.7:3128
201.48.46.3:3128
60.12.190.109:8088
60.251.140.10:3128
67.69.254.253:80
86.105.181.238:3128
87.120.60.3:8080
89.31.143.1:80
120.50.176.58:8080
122.224.171.91:3128
187.0.92.17:3128
189.108.124.155:3128
189.85.162.190:3128
190.18.106.88:80
194.44.170.81:3128
195.234.182.13:3128
200.242.232.8:8080
219.88.253.41:80
222.187.221.91:80
87.120.58.65:8080
89.28.20.132:3128
170.210.18.245:8080
187.5.67.55:80
196.29.205.49:80
201.82.32.56:8080
203.73.180.16:3128
59.120.77.147:3128
60.190.151.77:8088
118.98.169.66:80
164.100.42.68:8080
189.114.225.170:80
189.74.11.18:8080
201.17.130.41:3128
210.51.14.197:80
213.169.51.151:8080
213.185.116.152:8080
213.215.7.108:3128
58.213.152.15:3128
60.30.83.220:8080
60.50.80.111:3128
61.19.213.91:80
67.69.254.247:80
67.69.254.251:80
81.85.253.74:80
89.42.17.147:3128
91.121.14.70:3128
219.93.178.162:3128
68.100.4.165:3128
85.114.131.54:8081
87.120.57.8:8080
187.2.151.207:3128
201.75.54.245:3128
202.101.8.184:80
220.194.221.29:3128
222.124.172.220:8080
123.255.250.5:3128
217.10.246.2:8080
217.133.80.15:3128
61.105.175.113:88
61.247.7.8:3128
221.2.145.28:3128
200.243.243.150:3128
212.0.143.5:3128
123.127.110.244:80
200.109.72.53:6588
201.15.184.136:6588
201.44.24.98:80
201.53.164.111:3128
201.53.73.44:6588
24.23.29.41:8080
58.34.239.226:8088
59.95.161.172:6588
59.99.129.193:6588
66.199.247.42:6649
72.55.191.6:3128
86.122.132.27:8080
92.48.127.2:8080
121.204.86.172:8088
121.206.106.110:8090
195.135.236.204:3128
200.118.158.45:6588
201.13.183.108:6588
201.43.215.59:6588
201.88.248.243:6588
202.134.202.251:80
203.86.31.92:3128
216.183.95.239:80
24.125.134.220:9090
24.125.71.100:9090
24.156.135.87:9090
24.188.125.225:9090
24.239.46.244:9090
24.61.52.46:9090
65.182.107.212:9090
65.30.216.140:9090
67.191.141.209:9090
67.84.241.17:9090
67.86.138.122:9090
68.11.182.166:9090
68.11.249.230:9090
68.42.122.142:9090
68.43.246.42:9090
68.45.42.160:9090
68.52.135.28:9090
68.55.132.134:9090
68.55.225.102:9090
69.119.243.192:9090
69.127.102.247:9090
69.136.140.1:9090
69.136.58.38:9090
69.251.251.153:9090
69.253.188.82:9090
71.57.210.123:9090
72.196.135.11:9090
74.131.165.152:9090
74.141.111.159:9090
76.107.38.217:9090
76.107.44.181:9090
76.127.22.84:9090
76.22.0.234:9090
76.30.187.68:9090
80.143.226.158:8080
82.41.96.73:9090
82.43.58.68:9090
82.5.189.202:7212
98.141.23.139:9090
98.192.124.144:9090
98.27.180.252:9090
99.163.104.229:9090
99.233.94.169:9090
12.208.190.71:9090
12.51.72.38:9090
123.6.23.77:8090
142.59.90.148:9090
200.3.252.170:3128
201.75.9.88:6588
210.245.63.218:80
216.80.118.13:9090
220.72.71.220:8080
222.179.57.225:808
24.12.214.237:9090
24.127.136.205:9090
24.161.131.67:9090
24.189.5.235:9090
24.192.240.240:9090
24.228.49.186:9090
24.59.34.24:9090
58.33.52.65:8088
61.191.53.137:808
61.238.104.200:808
65.29.85.76:9090
66.167.228.62:9090
67.163.161.226:9090
67.217.17.182:9090
67.84.196.173:9090
67.87.64.23:9090
68.11.145.150:9090
68.194.169.106:7212
68.49.227.31:9090
69.142.108.83:9090
69.142.114.143:9090
69.181.224.191:9090
69.71.85.202:9090
70.172.242.76:9090
70.95.110.195:9090
71.101.126.174:9090
71.12.195.20:9090
71.82.77.13:9090
71.86.150.78:9090
72.174.123.174:9090
74.211.5.196:9090
75.34.25.118:7212
75.87.150.14:9090
76.104.70.144:9090
76.105.105.96:9090
76.123.18.157:9090
76.176.208.180:9090
76.228.201.224:9090
76.9.38.239:9090
76.98.163.114:9090
77.99.40.240:9090
80.195.186.31:9090
81.105.32.186:9090
86.17.234.113:9090
87.232.56.70:9090
92.236.137.151:9090
98.169.171.231:9090
98.181.60.131:9090
98.202.107.151:9090
98.208.46.176:9090
98.210.147.111:9090
99.155.153.203:9090
12.167.39.75:9090
12.240.37.195:9090
156.34.176.45:9090
171.66.223.221:9090
174.0.50.242:9090
200.89.39.210:6588
207.50.148.37:9090
210.34.14.166:81
218.6.15.70:8080
221.11.11.202:30781
24.125.158.161:9090
59.37.166.56:3128
64.17.66.234:9090
65.25.158.119:7212
65.31.98.112:9090
66.184.78.194:9090
68.11.226.141:9090
68.118.147.60:9090
69.246.123.26:9090
70.101.148.107:9090
70.176.119.94:9090
70.179.177.238:9090
71.14.93.226:9090
71.14.94.189:9090
71.229.16.100:9090
71.86.181.6:9090
71.89.7.99:28848
72.128.40.214:9090
72.203.130.111:9090
74.222.221.250:9090
74.77.117.65:9090
76.22.128.2:9090
77.96.218.150:9090
82.22.138.43:9090
82.36.17.30:9090
99.254.218.6:9090
202.98.141.200:808
203.129.53.177:9090
222.242.221.156:8080
24.230.163.136:9090
65.190.207.153:9090
66.211.127.78:9090
68.111.231.178:9090
69.250.8.55:9090
69.46.16.232:34311
70.24.40.159:9090
71.17.227.187:9090
71.71.69.209:9090
74.60.191.215:9090
75.81.22.134:9090
75.94.87.64:9090
76.102.189.58:9090
76.107.111.45:9090
81.103.66.124:9090
82.39.25.203:9090
82.41.10.6:9090
92.233.176.50:9090
99.252.209.25:9090
202.149.113.148:8080
206.174.3.131:9090
207.192.207.240:9090
209.124.242.193:9090
209.145.114.173:9090
24.108.35.246:7212
24.174.246.62:9090
24.197.130.9:9090
24.70.39.70:9090
65.50.35.144:9090
65.50.35.157:9090
68.13.235.68:9090
71.205.51.156:9090
74.197.219.75:9090
75.119.93.168:9090
76.107.42.95:9090
76.107.93.40:9090
81.100.109.24:9090
82.29.59.18:9090
82.33.114.102:9090
82.38.0.167:9090
92.233.166.55:9090
194.117.157.72:14624
208.59.142.26:9090
68.183.54.233:7212
81.106.241.109:9090
82.33.168.194:9090
86.61.76.7:8088
99.225.136.21:9090
24.68.44.46:7212
68.98.0.233:9090
24.14.107.77:9090
208.149.67.192:9090
72.222.172.142:9090
76.9.42.163:9090
77.103.136.52:9090
99.253.240.184:9090
193.69.186.83:80
70.111.46.122:7212
81.98.109.201:9090
71.109.3.95:7212
82.46.144.165:9090
163.29.250.4:3128
190.67.73.194:8080
193.2.8.8:80
212.193.5.226:80
217.12.254.154:80
220.15.224.200:8080
221.25.244.167:8080
67.84.8.11:7212
80.88.242.32:9090
84.113.7.221:8080
124.35.158.72:80
203.82.52.210:8080
219.191.64.95:8080
220.22.196.3:80
24.44.64.205:8000
67.208.3.220:8080
68.196.110.175:8000
68.43.151.18:9090
72.191.26.100:7212
72.214.91.6:8008
74.210.245.5:8008
84.23.101.224:8080
91.203.68.222:80
92.239.116.56:9090
98.165.169.136:8000
124.29.140.84:80
124.5.165.8:8080
195.34.253.66:3128
200.253.135.236:80
212.11.179.159:80
212.57.189.242:80
213.166.145.170:80
216.102.26.104:8000
41.240.178.30:80
76.31.231.123:8000
220.53.245.8:8080
41.242.80.113:80
59.144.175.48:8080
91.121.3.29:9090
212.123.91.165:80
221.8.16.189:3128
62.244.72.48:80
65.190.201.251:9090
88.2.102.209:3128
218.182.134.23:8080
218.222.200.97:8080
67.69.140.58:80
82.41.145.108:9090
194.55.138.53:80
200.31.42.3:80
217.86.159.36:80
219.201.68.111:8080
91.189.240.25:80
150.188.8.211:80
222.255.29.46:8888
76.25.6.162:7212
210.86.181.201:80
216.101.231.130:8000
122.169.242.249:8080
174.36.168.202:8080
202.168.193.131:80
210.82.31.151:80
200.104.250.91:80
187.153.52.168:80
212.100.132.149:3128
65.57.240.166:80
65.57.240.173:80
65.57.240.178:80
65.57.240.211:80
65.57.240.214:80
65.57.240.227:80
65.57.240.241:80
67.69.254.249:80
81.177.3.10:80
82.146.41.129:80
88.80.194.14:3128
12.68.114.188:8080
125.160.60.131:80
187.5.16.81:8080
189.16.1.204:3128
200.49.141.58:8080
200.49.141.71:8080
64.66.192.61:80
64.66.192.62:32080
67.69.254.241:80
84.50.83.126:3128
85.10.197.73:8000
125.160.145.163:3128
201.34.32.45:3128
201.68.9.74:3128
202.152.27.181:3128
202.57.9.186:8080
203.160.1.130:553
203.160.1.162:553
211.137.205.254:8008
211.99.188.218:80
58.211.186.250:3128
67.69.254.242:80
91.142.12.174:8080
124.106.77.46:3128
200.49.141.59:8080
201.73.61.2:3128
212.100.132.146:3128
212.100.132.148:3128
220.227.170.27:80
85.255.79.34:3128
86.62.23.70:8080
88.255.57.7:3128
91.193.255.174:3128
200.164.91.8:8080
200.87.30.3:3128
202.133.85.68:8080
202.155.10.131:8080
204.16.127.126:8080
222.124.226.43:8080
60.50.8.98:3128
91.112.244.198:8080
189.111.206.139:3128
201.17.130.41:80
202.152.3.82:8080
83.3.145.82:8080
89.191.100.2:8080
91.142.12.62:8080
118.98.172.187:3128
121.242.41.67:3128
203.70.237.16:3128
212.100.64.41:3128
220.181.19.108:8090
61.220.224.115:3128
118.136.202.245:3128
219.163.71.130:3128
222.124.9.122:8080
200.140.88.98:3128
200.171.149.199:3128
202.57.48.195:3128
218.94.9.38:8080
222.123.83.42:3128
222.124.177.60:3128
60.54.129.30:3128
87.250.37.182:80
125.162.90.26:3128
190.216.249.4:80
201.42.136.25:3128
24.91.133.150:57223
24.46.40.108:56537
24.61.217.227:30223
24.22.4.18:37119
160.80.2.198:4304
24.95.66.210:25997
24.191.8.191:52369
69.37.32.236:22243
189.47.129.62:1080
69.255.94.177:46129
24.94.66.230:56033
189.111.207.75:1080
71.233.35.25:4021
69.137.215.241:52441
71.204.34.188:30503
71.79.69.245:2731
24.214.140.113:6293
71.201.65.181:57783
121.8.124.42:1080
71.71.23.25:61197
69.126.32.27:49185
124.128.224.2:1080
70.52.129.143:58329
71.87.102.164:8329
69.140.56.187:7539
58.56.87.2:1080
58.57.60.26:1080
58.214.247.198:1080
124.42.122.163:1080
98.222.47.229:42929
71.58.225.132:16935
72.11.85.77:3661
194.117.157.72:19245
72.136.220.101:42931
98.238.35.199:52173
69.91.87.60:53935
70.71.22.79:33963
69.134.50.18:44429
75.111.227.101:42359
71.192.9.147:5789
98.231.8.76:30595
123.203.186.11:1080
162.83.95.16:40547
71.60.128.209:9043
74.192.84.183:54889
71.139.163.70:17429
75.139.61.41:27359
122.50.139.155:1080
74.14.253.48:62113
24.46.70.97:7831
59.94.41.39:1080
70.121.145.153:37501
75.159.127.60:43575
75.42.200.67:22127
75.26.160.76:3533
75.64.104.185:33459
122.121.228.92:1080
98.228.131.188:39001
75.64.157.172:34403
71.60.244.81:59593
123.237.251.19:1080
69.253.217.118:24359
75.137.111.30:49866
75.70.34.248:26447
98.28.87.38:53629
99.142.87.117:35231
99.147.198.31:53047
200.161.118.198:1080
74.210.132.235:24096
76.109.20.32:26679
200.161.81.98:1080
76.111.241.84:14457
201.68.227.8:1080
200.59.10.45:1080
76.101.214.203:22421
76.113.229.133:59145
76.28.70.104:12907
76.254.6.241:57023
76.187.180.235:23269
76.89.0.61:43229
76.122.50.197:4675
82.114.78.222:1080
82.114.78.225:1080
78.227.88.37:20053
76.119.132.67:52737
66.30.83.96:5991
66.177.89.235:60729
61.116.180.131:1080
60.10.193.26:1080
61.150.92.158:1080
202.57.10.38:1080
67.161.140.214:47347
219.136.191.218:1080
211.3.199.21:1080
202.104.35.116:1080
220.189.227.2:1080
66.41.99.70:50111
218.5.18.252:1080
65.184.60.38:22319
218.90.161.189:1080
202.152.44.62:1080
220.136.65.183:1080
67.160.54.36:25065
221.2.196.4:1080
221.12.147.80:1080
64.85.160.217:1080
221.7.229.66:1080
67.174.172.234:35419
67.165.59.130:51743
67.167.42.106:14691
87.244.211.184:1080
60.177.244.252:1080
88.161.144.236:53415
65.64.246.51:9169
87.250.47.36:1080
88.169.195.83:21523
222.167.234.172:1080
201.92.247.3:1080
24.190.48.233:5435
67.168.244.141:50877
24.190.96.97:55059
85.159.104.183:1080
24.179.130.205:54045
222.88.11.22:1080
66.203.232.67:60947
222.88.5.182:1080
84.194.160.12:40475
216.194.70.3:1080
83.136.12.2:1080
91.139.241.58:1080
66.186.237.85:6549
88.213.4.99:1080
24.125.77.113:55539
80.247.189.158:1080
220.138.34.244:1080
76.20.225.237:30165
64.85.160.216:1080
99.230.89.13:54249
80.74.94.234:1080
67.43.175.139:1080
96.30.133.60:21811
83.13.143.74:1080
216.12.76.66:21025
66.41.24.69:13247
68.113.197.114:59841
65.26.42.225:53917
98.201.26.161:25345
67.162.119.247:31667
68.194.114.144:12739
67.173.210.137:22289
98.206.48.50:40439
67.86.21.88:44093
76.27.146.194:22487
67.82.164.145:26677
76.119.53.226:6391
76.29.75.139:46051
76.78.62.28:13261
76.97.75.84:15765
24.128.2.134:16967
98.216.91.216:15821
91.124.185.172:1080
98.206.0.42:3085
67.66.50.118:18233
66.56.6.98:17941
99.238.161.230:41241
68.45.202.49:34077
24.10.102.196:19105
66.177.236.251:48293
99.244.41.222:2717
68.54.147.33:35223
97.82.166.34:7849
68.62.24.79:6817
99.254.37.138:34693
207.229.149.149:39451
69.120.62.83:62419
123.238.50.6:1080
125.130.27.204:11033
121.12.249.207:1080
116.113.47.21:1080
66.133.217.190:3751
118.98.163.109:1080
92.241.102.118:1080
189.47.137.189:1080
123.55.226.74:1080
125.128.25.151:11011
123.176.47.202:1080
189.111.208.162:1080
61.177.248.202:1080
124.119.145.2:1080
189.122.89.74:1080
66.169.175.223:51089
123.237.8.238:1080
67.166.13.16:13403
194.117.157.72:10416
67.167.42.106:40277
189.11.210.77:1080
67.189.231.137:33927
66.189.248.247:20573
193.206.43.85:8605
189.47.170.203:1080
189.122.187.204:1080
61.159.214.215:1080
189.23.208.37:1080
189.55.219.252:1080
173.98.165.201:2963
64.247.11.135:3307
123.238.35.104:1080
189.19.233.32:1080
61.238.104.200:1080
114.145.227.183:43231
65.184.65.236:18191
64.247.11.131:3307
62.150.4.22:1080
123.238.135.198:1080
64.198.81.120:1080
68.117.181.133:44633
64.247.11.130:3307
61.51.18.104:5394
68.48.134.218:51067
201.252.211.201:1080
202.78.225.1:8888
202.96.159.221:1080
98.182.56.177:23071
69.14.101.143:7445
200.161.139.161:15853
200.109.72.53:1080
208.4.254.138:49187
210.6.236.122:1080
207.229.149.149:9983
207.255.39.7:15261
71.90.109.248:15099
217.219.80.4:1080
72.4.29.178:58941
218.248.20.160:1080
209.155.105.37:85
218.7.191.182:1080
200.171.17.23:1080
220.112.40.251:1080
220.127.244.50:11033
220.231.180.251:1080
75.142.138.35:25552
220.248.224.54:1080
218.250.204.134:1080
75.62.232.144:27055
75.64.39.150:59557
222.135.178.62:1080
222.66.47.115:8088
76.10.169.62:4695
24.121.82.58:6052
75.70.66.136:47311
24.185.240.113:19017
222.161.2.180:1080
76.29.10.61:11055
76.171.146.35:23949
98.228.131.188:4905
77.242.19.9:1080
82.225.176.17:17327
82.72.56.119:3388
77.104.239.1:1080
84.127.213.40:48023
24.197.121.90:32557
88.172.20.212:11033
78.83.225.40:11033
85.159.104.245:1080
89.252.5.210:1080
99.130.28.48:34525
99.170.149.73:51849
99.243.172.100:46533
60.191.89.44:1080
121.22.20.202:1080
61.116.180.128:1080
123.240.192.1:1080
118.98.184.86:1080
60.30.83.220:1080
72.178.126.227:39767
72.252.152.124:1080
24.46.217.248:4633
189.101.18.148:1080
64.247.11.128:3307
24.99.196.253:21143
189.19.233.59:1080
189.19.75.98:1080
189.3.176.130:1080
74.174.5.68:1080
189.54.209.254:1080
200.153.197.14:1080
190.67.91.234:1080
194.117.157.72:11251
201.228.149.35:1080
75.94.67.90:1080
201.26.8.186:1080
201.93.128.110:1080
202.57.10.25:1080
201.90.55.194:1080
217.219.80.3:1080
218.241.238.141:1080
202.98.141.200:1080
68.20.20.140:6475
218.56.21.226:1080
213.255.196.219:1080
218.64.215.86:1080
219.150.227.101:1080
219.159.199.34:1080
222.134.69.181:8000
222.188.10.1:1080
68.82.102.9:25552
80.108.206.239:11033
85.113.252.214:1080
86.100.64.151:14841
85.132.201.196:25552
82.228.53.39:11033
80.35.156.3:17327
82.238.32.72:14848
89.77.158.227:17327
87.97.237.135:11033
69.226.246.172:41941
89.77.94.73:22568
69.116.194.146:3073
83.143.145.67:1080
88.174.252.233:11011
71.145.167.207:15621


Disclaimer: this list is provided for information purposes only. Use it on your own risk. Legally you need to ask a permission to use any of the proxy servers in this list. I shall not be responsible for any damages of any kind arising out of use of these servers and the list itself.
How does proxy surfing work?
Anonymous web surfing works by putting a proxy server between the user and the web site. Your web browser talks to the proxy server, and the proxy server talks to the web site. The web site does not know who you are, it only knows who the proxy server is. The proxy server does know who you are, so you better choose a proxy server that you trust.



Disclaimer: this list is provided for information purposes only. Use it on your own risk. Legally you need to ask a permission to use any of the proxy servers in this list. I shall not be responsible for any damages of any kind arising out of use of these servers and the list itself.
How does proxy surfing work?
Anonymous web surfing works by putting a proxy server between the user and the web site. Your web browser talks to the proxy server, and the proxy server talks to the web site. The web site does not know who you are, it only knows who the proxy server is. The proxy server does know who you are, so you better choose a proxy server that you trust.

Tuesday, August 4, 2009

CEH All !

Students will find this info. valuable : CEH ( syllabus )

Module 1: Ethics and Legality
What is an Exploit?
The security functionality triangle
The attacker's process
Passive reconnaissance
Active reconnaissance
Types of attacks
Categories of exploits
Goals attackers try to achieve
Ethical hackers and crackers - who are they
Self proclaimed ethical hacking
Hacking for a cause (Hacktivism)
Skills required for ethical hacking
Categories of Ethical Hackers
What do Ethical Hackers do?
Security evaluation plan
Types of Ethical Hacks
Testing Types
Ethical Hacking Report
Cyber Security Enhancement Act of 2002
Computer Crimes
Overview of US Federal Laws
Section 1029
Section 1030
Hacking Punishment


Module 2: Footprinting
What is Footprinting
Steps for gathering information
Whois
http://tucows.com
Hacking Tool: Sam Spade
Analyzing Whois output
NSLookup
Finding the address range of the network
ARIN
Traceroute
Hacking Tool: NeoTrace
Visual Route
Visual Lookout
Hacking Tool: Smart Whois
Hacking Tool: eMailTracking Pro
Hacking Tool: MailTracking.com


Module 3: Scanning
Determining if the system is alive?
Active stack fingerprinting
Passive stack fingerprinting
Hacking Tool: Pinger
Hacking Tool: WS_Ping_Pro
Hacking Tool: Netscan Tools Pro 2000
Hacking Tool: Hping2
Hacking Tool: icmpenum
Detecting Ping sweeps
ICMP Queries
Hacking Tool: netcraft.com
Port Scanning
TCPs 3-way handshake
TCP Scan types
Hacking Tool: IPEye
Hacking Tool: IPSECSCAN
Hacking Tool: nmap
Port Scan countermeasures
Hacking Tool: HTTrack Web Copier
Network Management Tools
SolarWinds Toolset
NeoWatch
War Dialing
Hacking Tool: THC-Scan
Hacking Tool: PhoneSweep War Dialer
Hacking Tool: Queso
Hacking Tool: Cheops
Proxy Servers
Hacking Tool: SocksChain
Surf the web anonymously
TCP/IP through HTTP Tunneling
Hacking Tool: HTTPort


Module 4: Enumeration
What is Enumeration
NetBios Null Sessions
Null Session Countermeasures
NetBIOS Enumeration
Hacking Tool: DumpSec
Hacking Tool: NAT
SNMP Enumertion
SNMPUtil
Hacking Tool: IP Network Browser
SNMP Enumeration Countermeasures
Windows 2000 DNS Zone transfer
Identifying Win2000 Accounts
Hacking Tool: User2SID
Hacking Tool: SID2User
Hacking Tool: Enum
Hacking Tool: UserInfo
Hacking Tool: GetAcct
Active Directory Enumeration


Module 5: System Hacking
Administrator Password Guessing
Performing Automated Password Guessing
Legion
NTInfoScan
Defending Against Password Guessing
Monitoring Event Viewer Logs
VisualLast
Eavesdroppin on Network Password Exchange
Hacking Tool: L0phtCrack
Hacking Tool: KerbCrack
Privilege Escalation
Hacking Tool: GetAdmin
Hacking Tool: hk
Manual Password Cracking Algorithm
Automatic Password Cracking Algorithm
Password Types
Types of Password Attacks
Dictionary Attack
Brute Force Attack
Distributed Brute Force Attack
Password Change Interval
Hybrid Attack
Cracking Windows 2000 Passwords
Retrieving the SAM file
Redirecting SMB Logon to the Attacker
SMB Redirection
Hacking Tool: SMBRelay
Hacking Tool: SMBRelay2
SMBRelay Man-in-the-Middle (MITM)
SMBRelay MITM Countermeasures
Hacking Tool: SMBGrinder
Hacking Tool: SMBDie
Hacking Tool: NBTDeputy
NetBIOS DoS Attack
Hacking Tool: nbname
Hacking Tool: John the Ripper
LanManager Hash
Password Cracking Countermeasures
Keystroke Logger
Hacking Tool: Spector
AntiSpector
Hacking Tool: eBlaster
Hacking Tool: SpyAnywhere
Hacking Tool: IKS Software Logger
Hardware Tool: Hardware Key Logger
Hacking Tool: Rootkit
Planting Rootkit on Windows 2000 Machine
_rootkit_ embedded TCP/IP Stack
Rootkit Countermeasures
MD5 Checksum utility
Tripwire
Covering Tracks
Disabling Auditing
Auditpol
Clearing the Event Log
Hacking Tool: Elslave
Hacking Tool: Winzapper
Hacking Tool: Evidence Eliminator
Hidding Files
NTFS File Streaming
Hacking Tool: makestrm
NTFS Streams Countermeasures
LNS
Steganography
Hacking Tool: ImageHide
Hacking Tool: MP3Stego
Hacking Tool: Snow
Hacking Tool: Camera/Shy
Steganography Detection
StegDetect
Encrypted File System
Hacking Tool: dskprobe
Hacking Tool: EFSView
Buffer Overflows
Creating Buffer Overflow Exploit
Outlook Buffer Overflow
Hacking Tool: Outoutlook


Module 6: Trojans and Backdoors
What is a Trojan Horse?
Overt and Covert
Hacking Tool: QAZ
Hacking Tool: Tini
Hacking Tool: Netcat
Hacking Tool: Donald Dick
Hacking Tool: SubSeven
Hacking Tool: BackOrifice 2000
Back Oriffice Plug-ins
Hacking Tool: NetBus
Wrappers
Hacking Tool: Graffiti
Hacking Tool: Silk Rope 2000
Hacking Tool: EliteWrap
Hacking Tool: IconPlus
Packaging Tool: Microsoft WordPad
Hacking Tool: Whack a Mole
Trojan Construction Kit
BoSniffer
Hacking Tool: FireKiller 2000
Covert Channels
ICMP Tunneling
Hacking Tool: Loki
Reverse WWW Shell
Backdoor Countermeasures
BO Startup and Registry Entries
NetBus Startup and Registry Keys
Port Monitoring Tools
fPort TCPView
Process Viewer
Inzider - Tracks Processes and Ports
Trojan Maker
Hacking Tool: Hard Disk Killer
Man-in-the-Middle Attack
Hacking Tool: dsniff
System File Verification
TripWire




Module 7: Sniffers
What is a Sniffer?
Hacking Tool: Etheral
Hacking Tool: Snort
Hacking Tool: WinDump
Hacking Tool: EtherPeek
Passive Sniffing
Active Sniffing
Hacking Tool: EtherFlood
How ARP Works?
Hacking Tool: DSniff
Hacking Tool: Macof
Hacking Tool: mailsnarf
Hacking Tool: URLsnarf
Hacking Tool: Webspy
Hacking Tool: Ettercap
Hacking Tool: SMAC
MAC Changer
ARP Spoofing Countermeasures
Hacking Tool: WinDNSSpoof
Hacking Tool: WinSniffer
Network Tool: IRIS
Network Tool: NetInterceptor
SniffDet
Hacking Tool: WinTCPKill


Module 8: Denial of Service
What is Denial of Service Attack?
Types of DoS Attacks
How DoS Work?
What is DDoS?
Hacking Tool: Ping of Death
Hacking Tool: SSPing
Hacking Tool: Land
Hacking Tool: Smurf
Hacking Tool: SYN Flood
Hacking Tool: CPU Hog
Hacking Tool: Win Nuke
Hacking Tool: RPC Locator
Hacking Tool: Jolt2
Hacking Tool: Bubonic
Hacking Tool: Targa
Tools for Running DDoS Attacks
Hacking Tool: Trinoo
Hacking Tool: WinTrinoo
Hacking Tool: TFN
Hacking Tool: TFN2K
Hacking Tool: Stacheldraht
Hacking Tool: Shaft
Hacking Tool: mstream
DDoS Attack Sequence
Preventing DoS Attack
DoS Scanning Tools
Find_ddos
SARA
DDoSPing
RID
Zombie Zapper




Module 9: Social Engineering
What is Social Engineering?
Art of Manipulation
Human Weakness
Common Types of Social Engineering
Human Based Impersonation
Important User
Tech Support
Third Party Authorization
In Person
Dumpster Diving
Shoulder Surfing
Computer Impersonation
Mail Attachments
Popup Window
Website Faking
Reverse Social Engineering
Policies and Procedures
Social Engineering Security Policies
The Importance of Employee Education


Module 10: Session Hijacking
What is Session Hijacking?
Session Hijacking Steps
Spoofing Vs Hijacking
Active Session Hijacking
Passive Session Hijacking
TCP Concepts - 3 way Handshake
Sequence Numbers
Sequence Number Example
Guessing the Sequence Numbers
Hacking Tool: Juggernaut
Hacking Tool: Hunt
Hacking Tool: TTYWatcher
Hacking Tool: IP Watcher
Hacking Tool: T-Sight
Remote TCP Session Reset Utility
Dangers Posed by Session Hijacking
Protection against Session Hijacking


Module 11: Hacking Web Servers
Apache Vulnerability
Attacks against IIS
IIS Components
ISAPI DLL Buffer Overflows
IPP Printer Overflow
msw3prt.dll
Oversized Print Requests
Hacking Tool: Jill32
Hacking Tool: IIS5-Koei
Hacking Tool: IIS5Hack
IPP Buffer Overflow Countermeasures
ISAPI DLL Source Disclosure
ISAPI.DLL Exploit
Defacing Web Pages
IIS Directory Traversal
Unicode
Directory Listing
Clearing IIS Logs
Network Tool: LogAnalyzer
Attack Signature
Creating Internet Explorer (IE) Trojan
Hacking Tool: IISExploit
Hacking Tool: UnicodeUploader.pl
Hacking Tool: cmdasp.asp
Escalating Privilages on IIS
Hacking Tool: IISCrack.dll
Hacking Tool: ispc.exe
Unspecified Executable Path Vulnerability
Hacking Tool: CleanIISLog
File System Traversal Countermeasures
Microsoft HotFix Problems
UpdateExpert
Cacls utility
Network Tool: Whisker
N-Stealth Scanner
Hacking Tool: WebInspect
Network Tool: Shadow Security Scanner



Module 12: Web Application Vulnerabilities
Documenting the Application Structure
Manually Inspecting Applications
Using Google to Inspect Applications
Directory Structure
Hacking Tool: Instant Source
Java Classes and Applets
Hacking Tool: Jad
HTML Comments and Contents
Hacking Tool: Lynx
Hacking Tool: Wget
Hacking Tool: Black Widow
Hacking Tool: WebSleuth
Cross Side Scripting
Session Hijacking using XSS
Cookie Stealing
Hacking Tool: IEEN


Module 13: Web Based Password Cracking Techniques
Basic Authentication
Message Digest Authentication
NTLM Authentication
Certificate based Authentication
Digital Certificates
Microsoft Passport Authentication
Forms based Authentication
Creating Fake Certificates
Hacking Tool: WinSSLMiM
Password Guessing
Hacking Tool: WebCracker
Hacking Tool: Brutus
Hacking Tool: ObiWan
Hacking Tool: Munga Bunga
Password dictionary Files
Attack Time
Hacking Tool: Varient
Hacking Tool: PassList
Query Strings
Post data
Hacking Tool: cURL
Stealing Cookies
Hacking Tool: CookieSpy
Hacking Tool: ReadCookies
Hacking Tool: SnadBoy


Module 14: SQL Injection
What is SQL Injection Vulnerability?
SQL Insertion Discovery
Blank sa Password
Simple Input Validation
SQL Injection
OLE DB Errors
1=1
blah' or 1=1
Stealing Credit Card Information
Preventing SQL Injection
Database Specific SQL Injection
Hacking Tool: SQLDict
Hacking Tool: SQLExec
Hacking Tool: SQLbf
Hacking Tool: SQLSmack
Hacking Tool: SQL2.exe
Hacking Tool: Oracle Password Buster


Module 15: Hacking Wireless Networks
802.11 Standards
What is WEP?
Finding WLANs
Cracking WEP keys
Sniffing Trafic
Wireless DoS Attacks
WLAN Scanners
WLAN Sniffers
MAC Sniffing
Access Point Spoofing
Securing Wireless Networks
Hacking Tool: NetTumbler
Hacking Tool: AirSnort
Hacking Tool: AiroPeek
Hacking Tool: WEP Cracker
Hacking Tool: Kismet
WIDZ- Wireless IDS


Module 16: Virus and Worms
Cherobyl
ExploreZip
I Love You
Melissa
Pretty Park
Code Red Worm
W32/Klez
BugBear
W32/Opaserv Worm
Nimda
Code Red
SQL Slammer
How to write your own Virus?
Worm Construction Kit


Module 17: Novell Hacking
Common accounts and passwords
Accessing password files
Password crackers
Netware Hacking Tools
Chknull
NOVELBFH
NWPCRACK
Bindery
BinCrack
SETPWD.NLM
Kock
userdump
Burglar
Getit
Spooflog
Gobbler
Novelffs
Pandora


Module 18: Linux Hacking
Why Linux ?
Linux Basics
Compiling Programs in Linux
Scanning Networks
Mapping Networks
Password Cracking in Linux
Linux Vulnerabilities
SARA
TARA
Sniffing
A Pinger in Disguise
Session Hijacking
Linux Rootkits
Linux Security Countermeasures
IPChains and IPTables


Module 19: IDS, Firewalls and Honeypots
Intrusion Detection System
System Integrity Verifiers
How are Intrusions Detected?
Anomaly Detection
Signature Recognition
How does IDS match Signatures with Incoming Traffic?
Protocol Stack Verification
Application Protocol Verification
What Happens after an IDS Detects an Attack?
IDS Software Vendors
SNORT
Evading IDS (Techniques)
Complex IDS Evasion
Hacking Tool: fragrouter
Hacking Tool: TCPReplay
Hacking Tool: SideStep
Hacking Tool: NIDSbench
Hacking Tool: ADMutate
IDS Detection
Tools to Detect Packet Sniffers
Tools to inject strangely formatted packets onto the wire
Hacking Through Firewalls
Placing Backdoors through Firewalls
Hiding behind Covert Channels
What is a Honeypot?
Honeypots Evasion
Honeypots vendors


Module 20: Buffer Overflows
What is a Buffer Overflow?
Exploitation
Assembly Language Basics
How to Detect Buffer Overflows in a Program?
Skills Required
CPU/OS Dependency
Understanding Stacks
Stack Based Buffer Overflows
Buffer Overflow Technical Implementation
Writing your own Buffer Overflow Exploit in C
Defense against Buffer Overflows
Type Checking Tools for Compiling Programs
StackGuard
Immunix


Module 21: Cryptography
What is PKI?
Digital Certificates
RSA
MD-5
RC-5
SHA
SSL
PGP
SSH
Encryption Cracking Techniques

====================================================================================

Downloads : CEH

info@eccouncil.org

http://www.4shared.com/get/55981869/c5749040/CEH_V5.html


http://www.4shared.com/file/30961765/ecf90317/CEH_v5_Module_00__Student_Introduction.html

http://www.4shared.com/file/30961789/7bcc62b2/CEH_v5_Module_01_Introduction_to_Ethical_Hacking.html

http://www.4shared.com/file/30961830/eab844e0/CEH_v5_Module_02_Footprinting.html

http://www.4shared.com/file/30961875/febe756b/CEH_v5_Module_03_Scanning.html

http://www.4shared.com/file/30961885/792669a4/CEH_v5_Module_04_Enumeration.html

http://www.4shared.com/file/30961931/9c7d1e41/CEH_v5_Module_05_System_Hacking.html

http://www.4shared.com/file/30961965/e6672e1d/CEH_v5_Module_06_Trojans_and_Backdoors.html

http://www.4shared.com/file/30962030/f61ebab6/CEH_v5_Module_07_Sniffers.html

http://www.4shared.com/file/30962055/d02ee9bf/CEH_v5_Module_08_Denial_of_Service.html

http://www.4shared.com/file/30962116/2c891736/CEH_v5_Module_09_Social_Engineering.html

http://www.4shared.com/file/30962122/c980ec/CEH_v5_Module_10_Session_Hijacking.html

http://www.4shared.com/file/30962210/c7ac0c5a/CEH_v5_Module_11_Hacking_Webservers.html

http://www.4shared.com/file/30962250/a3c0c95e/CEH_v5_Module_12_Web_Application_Vulnerabilities.html

http://www.4shared.com/file/30962294/818424b/CEH_v5_Module_13_Web-based_Password_Cracking_Techniques.html

http://www.4shared.com/file/30962310/c66e666d/CEH_v5_Module_14_SQL_Injection.html

http://www.4shared.com/file/30962358/acd92b5b/CEH_v5_Module_15_Hacking_Wireless_Networks.html

http://www.4shared.com/file/30962388/19775516/CEH_v5_Module_16_Virus_and_Worms.html

http://www.4shared.com/file/30962436/1874b75f/CEH_v5_Module_17_Physical_Security.html

http://www.4shared.com/file/30962458/a9963dde/CEH_v5_Module_18_Linux_Hacking.html

http://www.4shared.com/file/30962519/bb3fa27b/CEH_v5_Module_19_Evading_IDS_Firewall_and_Honeypot.html

http://www.4shared.com/file/30962527/77aadcbf/CEH_v5_Module_20_Buffer_Overflow.html

http://www.4shared.com/file/30962543/269dbf20/CEH_v5_Module_21_Cryptography.html

http://www.4shared.com/file/30962555/d6e52b54/CEH_v5_Module_22_Penetration_Testing.html

http://www.4shared.com/file/30962577/add28fa/CEH_v5_Module_24_Covert_Hacking.html

http://www.4shared.com/file/30962590/a3a90d7/CEH_v5_Module_25_Writing_Virus_Codes.html

http://www.4shared.com/file/30962621/9c8fc7d3/CEHv5_Assembly_Language_Tutorial.html

http://www.4shared.com/file/30962657/3aadf421/CEHv5_Module_23a_-_Exploit_Writing.html


http://www.4shared.com/file/30962672/78f1622c/CEHv5_Module_23b_-_Exploit_Writing.html

http://www.4shared.com/file/30962689/68bba76b/CEHv5_Module_23c_-_Exploit_Writing.html

http://www.4shared.com/file/30962745/cc7ace7b/CEHv5_Module_26_-_Reverse_Engineering_Techniques.html

http://www.4shared.com/file/30331545/b43019ed/IP_Access_Control_List_Security.html

http://www.4shared.com/file/30963206/8f68ff4b/Snort_21_-_Intrusion_Detection_Second_Edition.html

http://www.4shared.com/file/30963218/71cbe30d/snort_manual.html

http://www.4shared.com/file/30962593/9333c16d/cehv5.html


http://www.4shared.com/file/54958683/9253f955/CEHv5_Instructor_Slides.html

61mb
http://www.4shared.com/file/54618288/65e9c14/CEHV5_Full_Coursepart7.html

http://www.4shared.com/file/54617925/d636f794/CEHV5_Full_Coursepart6.html

http://www.4shared.com/file/54617346/14f2847e/CEHV5_Full_Coursepart5.html




more to come !