24小时热门版块排行榜    

查看: 890  |  回复: 12
当前主题已经存档。

lw1966hhh

铁杆木虫 (著名写手)

[交流] 检索秘籍,与你分享!Hacker Highschool project

仔细看一下这本书,会对你的检索有益,书中涉及的网站、论坛更有益!!
All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar.
The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused.

Table of Contents
Lesson 1: Being a Hacker
1.0 Introduction
1.1 Resources
1.1.1 Books
1.1.2 Magazines and Newspapers
1.1.3 Zines and Blogs
1.1.4 Forums and Mailing Lists
1.1.5 Newsgroups
1.1.6 Websites
1.1.7 Chat
1.1.8 P2P
1.2 Further Lessons
Lesson 2: Basic Commands in Linux and Windows
2.1. Introduction and Objectives
2.2. Requirements and Setup
2.2.1 Requirements
2.2.2 Setup
2.3. System Operation: WINDOWS
2.3.1 How to open an MS-DOS window
2.3.2 Commands and tools (Windows)
2.4. System Operations: Linux
2.4.1 How to open a console window
2.4.2 Commands and tools (Linux)
Lesson 3: Ports and Protocols
3.1 Introduction
3.2 Basic concepts of networks
3.2.1 Devices
3.2.2 Topologies
3.3 TCP/IP model
3.3.1 Introduction
3.3.2 Layers
3.3.2.1 Application
3.3.2.2 Transport
3.3.2.3 Internet
3.3.2.4 Network Access
3.3.3 Protocols
3.3.3.1 Application layer protocols
3.3.3.2 Transport layer Protocols
3.3.3.3 Internet layer Protocols
3.3.4 IP Addresses
3.3.5 PortsTABLE OF CONTENTS AND GLOSSARY
3.3.6 Encapsulation
Lesson 4: Services and Connections
4.0 Introduction
4.1 Services
4.1.1 HTTP and The Web
4.1.2 E-Mail – POP and SMTP
4.1.3 IRC
4.1.4 FTP
4.1.5 Telnet and SSH
4.1.6 DNS
4.1.7 DHCP
4.2 Connections
4.2.1 ISPs
4.2.2 Plain Old Telephone Service
4.2.3 DSL
4.2.4 Cable Modems
Lesson 5: System Identification
5.0 Introduction
5.1 Identifying a Server
5.1.1 Identifying the Owner of a domain
5.1.2 Identifying the IP address of a domain
5.2 Identifying Services
5.2.1 Ping and TraceRoute
5.2.2 Banner Grabbing
5.2.3 Identifying Services from Ports and Protocols
5.3 System Fingerprinting
5.3.1 Scanning Remote Computers
Lesson 6: Malware
6.0 Introduction
6.1 Viruses (Virii)
6.1.1 Introduction
6.1.2 Description
6.1.2.1 Boot Sector Viruses
6.1.2.2 The Executable File Virus
6.1.2.3 The Terminate and Stay Resident (TSR) Virus
6.1.2.4 The Polymorphic Virus
6.1.2.5 The Macro Virus
6.2 Worms
6.2.1 Introduction
6.2.2 Description
6.3 Trojans and Spyware
6.3.1 Introduction
6.3.2 Description
6.4 Rootkits and Backdoors
6.4.1 IntroductionTABLE OF CONTENTS AND GLOSSARY
6.4.2 Description
6.5 Logicbombs and Timebombs
6.5.1 Introduction
6.5.2 Description
6.6 Countermeasures
6.6.1 Introduction
6.6.2 Anti-Virus
6.6.3 NIDS
6.6.4 HIDS
6.6.5 Firewalls
6.6.6 Sandboxes
6.7 Good Safety Advice
Lesson 7: Attack Analysis
7.0 Introduction
7.1 Netstat and Host Application Firewalls
7.1.1 Netstat
7.1.2 Firewalls
7.2 Packet Sniffers
7.2.1 Sniffing
7.2.2 Decoding Network Traffic
7.2.3 Sniffing Other Computers
7.2.4 Intrusion Detection Systems
7.3 Honeypots and Honeynets
7.3.1 Types of Honeypots
7.3.2 Building a Honeypot
Lesson 8: Digital Forensics
8.0 Introduction
8.1 Forensic Principals
8.1.0 Introduction
8.1.1 Avoid Contaminiation
8.1.2 Act Methodically
8.1.3 Chain of Evidence
8.1.4 Conclusion
8.2 Stand-alone Forensics
8.2.0 Introduction
8.2.1 Hard Drive and Storage Media Basics
8.2.2 Encryption, Decryption and File Formats
8.2.3 Finding a Needle in a Haystack
8.2.3.1 find
8.2.3.2 grep
8.2.3.3 strings
8.2.3.4 awk
8.2.3.5 The Pipe “|”
8.2.4 Making use of other sources
8.3 Network Forensics
8.3.0 Introduction
8.3.1 Firewall LogsTABLE OF CONTENTS AND GLOSSARY
8.3.2 Mail Headers
Lesson 9: Email Security
9.0 Introduction
9.1 How E-mail Works
9.1.1 E-mail Accounts
9.1.2 POP and SMTP
9.1.3 Web Mail
9.2 Safe E-mail Usage Part 1: Receiving
9.2.1 Spam, Phishing and Fraud
9.2.2 HTML E-Mail
9.2.3 Attachment Security
9.2.4 Forged headers
9.3 Safe E-mail Usage Part 2: Sending
9.3.1 Digital Certificates
9.3.2 Digital Signatures
9.3.3 Getting a certificate
9.3.4 Encryption
9.3.5 How does it work?
9.3.6 Decryption
9.3.7 Is Encryption Unbreakable?
9.4 Connection Security
Lesson 10: Web Security
10.1 Fundamentals of Web Security
10.1.1 How the web really works
10.1.2 Rattling the Locks
10.1.3 Looking through Tinted Windows - SSL
10.1.4 Having someone else do it for you – Proxies
10.2 Web Vulnerabilities
10.2.1 Scripting Languages
10.2.2 Top Ten Most Critical Web Application Vulnerabilities
10.2.3 Security Guidelines for Building Secure Web Applications
10.3 HTML Basics – A brief introduction
10.3.1 Reading HTML
10.3.2 Viewing HTML at its Source
10.3.3 Links
10.3.4 Proxy methods for Web Application Manipulation
10.4 Protecting your server
10.4.1 Firewall
10.4.2 Intrusion Detection System (IDS)
10.5 Secure Communications
10.5.1 Privacy and Confidentiality
10.5.2 Knowing if you are communicating securely
10.6 Methods of Verification
10.6.1 OSSTMM
10.6.2 OWASPPLETE TABLE OF CONTENTS AND GLOSSARY
Lesson 11: Passwords
11.0 Introduction
11.1 Types of Passwords
11.1.1 Strings of Characters
11.1.2 Strings of Characters plus a token
11.1.3 Biometric Passwords
11.2 History of Passwords
11.3 Build a Strong Password
11.4 Password Encryption
11.5 Password Cracking (Password Recovery)
11.6 Protection from Password Cracking
Lesson 12: Legalities and Ethics
12.1. Introduction
12.2. Foreign crimes versus local rights
12.3. Crimes related to the TICs
12.4. Prevention of Crimes and Technologies of double use
12.4.1. The global systems of monitoring: concept "COMINT"
12.4.2. "ECHELON" System
12.4.3. The "CARNIVORE" system
12.5. Ethical Hacking
12.6. The 10 most common internet frauds

下载后,别忘了支持顶一个撒!

[ Last edited by lw1966hhh on 2006-8-13 at 18:28 ]
回复此楼

» 猜你喜欢

一往无前
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

逆水行舟10

木虫 (职业作家)

1

great!thank you!!
2楼2006-08-13 23:51:39
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

songzg

铁杆木虫 (知名作家)

太极虫

0.5

good!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!11good!!!!!
3楼2006-08-14 07:50:38
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

bluesnow

4楼2007-01-29 00:41:46
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

izon90

多谢分享。
5楼2007-02-03 01:56:45
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

yin740606

至尊木虫 (著名写手)

1

good!
海纳百川,有容乃大。壁立千仞,无欲则刚。
6楼2007-02-03 08:07:11
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

iahnil

金虫 (小有名气)

0.5

ding先,晚上在来下
7楼2007-02-03 13:46:08
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

catv2006

金虫 (小有名气)

8楼2007-02-06 15:20:33
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

1

9楼2007-02-07 08:10:17
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

qjleerui

木虫 (正式写手)

1


Let me try!!!
10楼2007-02-12 00:03:11
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 lw1966hhh 的主题更新
普通表情 高级回复 (可上传附件)
信息提示
请填处理意见