Advanced White Hat Hacking Video Series
This white hat hacking video course series brushes over a list of common penetration testing software. It is an excellent method of introduction to the subject.
Playlist on Youtube 01. Advanced White Hat Hacking And Penetration Testing - Introduction 0101 What You Should Expect 0102 What You Should Know 0103 What You Will Learn 0104 System Requirements 02. Advanced White Hat Hacking And Penetration Testing - Getting Organized 0201 Ethical Hacking 0202 Dradis Framework 0203 Using Notes With Dradis 0204 Importing Data With Dradis 0205 Installing Plugins In Google Chrome 0206 Installing Plugins In Mozilla Firefox 0207 Raspberry PI 0208 SSH Forwarding 03. Advanced White Hat Hacking And Penetration Testing - Scanning 0301 Refresher On NMAP 0302 Scan Types 0303 Stealth Scanning 0304 Application Scans Using AMAP 0305 Web Testing With NMAP 0306 Scanning And Scripting With NMAP And UDP 0307 Scanning With Hping 0308 Payload-Based Scanning With Unicorn Scan 0309 TCP Scanning With Unicorn Scan 04. Advanced White Hat Hacking And Penetration Testing - Data Acquisition 0401 Using Wappalyzer 0402 Using Passive Recon 0403 Using Firebug 0404 Using Groundspeed 0405 Converting With Hackbar 0406 Managing Cookies 05. Advanced White Hat Hacking And Penetration Testing - Metasploit 0501 Starting Up Metasploit 0502 Scanning With Metasploit 0503 Service Scanning With Metasploit 0504 SMB Scanning With Metasploit 0505 Importing Nessus Results 0506 Creating Payloads 0507 Creating Standalone Exploits 0508 Encoding And Packing 0509 Writing Fuzzers Using Metasploit 0510 Exploits 0511 Using Meterpreter 0512 Post-Exploitation 0513 Pivoting 0514 Manipulating Windows API 0515 Client Side Attacks 0516 Social Engineering Toolkit 0517 Spear Phishing 0518 Web Attacks 0519 Automating Metasploit 0520 SQL Server Logins 0521 Token Stealing 0522 Extending Metasploit 06. Advanced White Hat Hacking And Penetration Testing - Web Testing 0601 Running Burp Suite 0602 Passive Scanning 0603 Active Scanning 0604 Using The Intruder 0605 Brute Forcing Passwords 0606 SQL Injection Testing With Burp Suite 0607 Cross Site Scripting With Burp Suite 0608 Using The Burp Suite Repeater 0609 Using The Burp Suite Sequencer 0610 XSS-Me 0611 SQL-Inject Me 0612 TamperData 0613 Injection Attacks With TamperData 0614 Hidden Form Fields 0615 ZED Attack Proxy 0616 Fuzzing With ZED Attack Proxy 0617 Hackbar 07. Advanced White Hat Hacking And Penetration Testing - Reverse Engineering 0701 Assembly Basics - nasm 0702 Buffer Overflows 0703 Format String Attacks 0704 Debugging - Linux 08. Advanced White Hat Hacking And Penetration Testing - Fuzzing 0801 Peach Fuzzer 0802 HTTP Fuzzing With Peach 0803 E-Mail Fuzzing With Peach 0804 File And Network Fuzzing With Peach 0805 Sulley 0806 Spike Proxy 09. Advanced White Hat Hacking And Penetration Testing - Wrapping Up 0901 Extending Your Learning 10. Advanced White Hat Hacking And Penetration Testing - About The Author 1001 About Ric Messier
White Hat Hacking Video Series
Following list from here. 00. Free Videos - Learning White Hat Hacking And Penetration Testing What You Should Expect From The Video About Me Methodology What Is Footprinting? Mining For Information Using Google Hacking UDP Cryptographic Analysis Vulnerability Scanning Password Cracking And Complexity Malware Analysis DoS Attacks Wireless Sniffing De-Compilation 00. Free Videos - Advanced White Hat Hacking And Penetration Testing What You Will Learn About Ric Messier Ethical Hacking Importing Data With Dradis Stealth Scanning Using Wappalyzer Starting Up Metasploit Running Burp Suite Buffer Overflows File And Network Fuzzing With Peach 01. Learning White Hat Hacking And Penetration Testing - Introduction 0101 What You Should Expect From The Video 0102 What Is Hacking? 0103 Why Do We Hack? 0104 Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc) 0105 Being Ethical 0106 Legal Issues Around Hacking 0107 Methodology 0108 Types Of Attacks 0109 Skills Necessary And Skills To Be Learned 0110 What Is Penetration Testing/Scope? 02. Learning White Hat Hacking And Penetration Testing - Getting The Background - Footprinting And Reconnaissance 0201 What Is Footprinting? 0202 History Lessons - Way Back Machine 0203 Using Your Resources - Job Listings, People Searches, Social Networks 0204 Using Whois Lookups 0205 Using DNS To Extract Information 0206 Finding Network Ranges 0207 Google Hacking 0208 Mining For Information Using Google Hacking 0209 Google Hacking Database 03. Learning White Hat Hacking And Penetration Testing - Networking Fundamentals 0301 History Of TCP/IP 0302 Using Wireshark To Examine Packets 0303 OSI And IP Models 0304 Addressing 0305 UDP 0306 TCP 0307 Services 0308 Using Wireshark For Deep Analysis 0309 DHCP 0310 Using ARP - Address Resolution Protocol - Ettercap 04. Learning White Hat Hacking And Penetration Testing - Cryptography 0401 History Of Cryptography 0402 Types Of Cryptography 0403 Public Key 0404 Certificates 0405 Hashing 0406 AES, DES, 3DES 0407 SSL/TLS 0408 SSH 0409 Disk Encryption 0410 Cryptographic Analysis 05. Learning White Hat Hacking And Penetration Testing - Scanning And Enumeration 0501 Types Of Scans 0502 Using NMAP 0503 Other Types Of Scans 0504 Using hping And Its Uses Hping PackETH 0505 War Dialing 0506 IDS Evasion 0507 Banner Grabbing 0508 Vulnerability Scanning 0509 Using Nessus 0510 Enumeration Techniques 0511 SNMP 0512 LDAP 0513 Using Proxies - OWASP ZAP 0514 Tor And Anonymizers 0515 Tunneling 06. Learning White Hat Hacking And Penetration Testing - Penetration 0601 Goals 0602 Password Cracking And Complexity - Ophcrack, John the Ripper, Cain and Able 0603 Password Attacks - Lophtcrack 0604 Password Storage Technique 0605 Privilege Escalation 0606 Spyware, Rootkits And Key Loggers 0607 Metasploit Basics 0608 Auditing/Logging 0609 Metasploit Again 07. Learning White Hat Hacking And Penetration Testing - Malware - Trojans, Backdoors, Viruses And Worms 0701 Definitions And History 0702 Detection Of Malware 0703 Anti-Virus Evasion 0704 Deployment Of Malware - Zeus and EliteWrap 0705 Virus Types 0706 Malware Analysis 0707 Windows ADS And Hiding Malware 0708 Doing Debugging - OllyDbg Ollydbg Immunity Debugger 0709 Packing And Automated A/V Maker Tools - zeus builder 0710 More Malware Analysis 08. Learning White Hat Hacking And Penetration Testing - Denial Of Service Attacks 0801 What Is DoS? DDoS? 0802 DoS Attacks - PacketStormSecurity.com 0803 Cyber Crime 0804 Botnets 0805 Attack Countermeasures - Flooding 09. Learning White Hat Hacking And Penetration Testing - Web Application Hacking 0901 What Is Web Application Testing? - Burp Suite Vicnum Project 0902 Web Application Architecture 0903 Web Testing Tools Burp Suite Professional OWASP ZAP 0904 Cross Site Scripting 0905 SQL Injection 0906 Cross Site Request Forgery 0907 Session Hijacking And Attacks And Cookies 0908 Password Attacks 0909 Encoding 10. Learning White Hat Hacking And Penetration Testing - Wireless Networking 1001 Wireless Networking 1002 Encryption Techniques - WEP, WPA, WPA2 1003 Finding Hotspots 1004 Breaking WEP Encryption 1005 Rogue Access Points And Attacks 1006 Wireless Sniffing 1007 Protecting Wireless Networks 11. Learning White Hat Hacking And Penetration Testing - Detection Evasion 1101 What Is Evasion And Why Do We Use It? 1102 Steganography 12. Learning White Hat Hacking And Penetration Testing - Programming Attacks 1201 Stacks And Heaps 1202 Buffer Overflows 1203 Protecting Against Buffer Overflow Attacks 1204 Format String 1205 De-Compilation 1206 Reverse Engineering 13. Learning White Hat Hacking And Penetration Testing - About The Author 1301 About Me Note Links
Installing CyanogenMod on Verizon p4vzw Samsung Galaxy Tab 10.1
These are my notes on how to install CyanogenMod on a Samsung Galaxy Tab 10.1. Since I wrote this entry CyanogenMod website has gone off the air.
OverView of CyanogenMod and Flashing – all the CyanogenMod links are now dead.
- Youtube: What is CyanogenMod
- Wiki.CyanogenMod: About
- Wiki:CyanogenMod: Information: Samsung Galaxy Tab 10.1 (Verizon) ("p4vzw")
- Wiki:CyanogenMod: Install CyanogenMod for p4vzw
- alaya·techne: Upgrading a Galaxy Tab 10.1 to CyanogenMod – this is a full procedure with a version of the ROM available for the p4vzw
- Google: rom for p4vzw tablet
Wikipedia: Samsung Galaxy Tab 10.1 – has many useful links at the bottom of the page
Activating a Galaxy Tab 10.1 without a sim card and without Verizon 4G access – The Verizon version of the Samsung Galaxy Note 10.1 will boot up with a message that it does not have a SIM. This can be bypassed as follows:
- Touch the top left corner, then top right corner, then bottom left (just above the android controls, and then bottom right (above the status tray) and last volume UP once. All five steps are done relatively quickly and in sequence. Your tablet will spring to life. Video.
How view the IMEI number internally
GSMArena: SCH-I905 specifications – this is a CDMA only box
Unit #1 Particulars
- IMEI = 990000270503743 This suggests this unit will do GSM
- MEID=99000027050374
- Hardware version= i905.03
- Model Number= SCH-I905
- Android version = 3.2
Unit #2 Particulars
- IMEI=990000244202463
- MEID= 99000024420246 This suggests this unit uses CDMA See difference between IMEI and MEID
- Hardware version=i905.02
- Model Number= SCH-I905
- Android version=3.1
Research Links
- YouTube: How to Unroot / Unbrick the Samsung Galaxy Tab 10.1
- YouTube: Unlock Galaxy Tab – How to Unlock Samsung Galaxy Tab Network 8.9 / 10.1 by Unlock Code Instructions
- Google: kali linux tablet
Notes
- I had trouble getting 1 of my 2 units to turn on after I charged it to capacity. It would only turn on after I pulled the cover and pulled the battery connector then reattached it.
Other Models of Interest
- INSIGNIA FLEX | NS-P11W7100 | 11.6" | 32GB | WIFI | BLACK
- Ebay: lot samsung tablet
- Samsung Galaxy Tab SCH-I905 32GB Wi-Fi + 4G LTE Cellular Verizon GSMArena: Samsung Galaxy Tab 10.1 LTE I905
- GSMArena: Samsung P7500 Galaxy Tab 10.1 3G
- Ebay Search: Samsung Galaxy Tab 10.1
- Ebay Search: Samsung gsm Galaxy Tablet 10.1
- Ebay Search: Samsung Galaxy Tab 4 10.1
- Ebay: Refurb Samsung Galaxy Tab E/S2/4 8in/10.1 Android 16GB 32GB WiFi Warranty
Wifi Pineapple on Raspberry Pi
Research Links
- WiFi Pineapple on Raspberry Pi forum
- Yellow for a slice of pineapple – project blog entry
- GitHub code for the blog entry above
WiFi Pineapple Mark 4 – AP121U Flashing
In this tutorial for Cr0w's Place we are going to be introduced in the WiFi Pineapple. In it we make our own cheap WiFi Pineapple with only 40 USD
In this tutorial for Cr0w's Place we are going to be introduced in the WiFi Pineapple. In it we make our own cheap WiFi Pineapple with only 40 USD. WiFi Pineapple is a wifi penetration testing device that exploits the "Karma" vulnerability that most of present wifi enabled devices have. This tutorial can also be used for flashing a bricked WiFi Pineapple Mark 4.
Author's Links
- About this video
- In the following link you can find any file that I used in this tutorial and that you are going to need: https://drive.google.com/file/d/0B_sr…
- You can buy the Alfa AP121U that I used from : http://www.ebay.co.uk/itm/ALFA-Portab…
- Disclaimer: Do NOT buy the AP121 that don't have a USB port, buy the AP121U with the USB port or else you will not be able to succeed in this tutorial.
- You can buy the USB 2.0 to TTL UART that I used from : http://www.ebay.co.uk/itm/USB-2-0-to-…
- You can find every command I used in the video, in the correct order, in this file: https://drive.google.com/file/d/0B_sr…
- Website Post: https://cr0wsplace.wordpress.com/2014…
- Cr0w has many good videos
Research Links
- DropBear Software
- Ebay: Alfa AP121U – comments below the video say to use only the 32mb version
- Data Alliance webpage where they sell the Hornet UB WiFi board and accessories
- Alfa AP/Router W/ Web Content Filtering. WiFi Wireless 802.11n Hornet-UB
- Alfa.com: Hornet PCBA
- WiFi Pineapple Mark IV – Clean Flash UART Mark IV Clean Flash over Serial (UART)
- Alfa AP121U manual pdf
Confidence Games, Swindling and Diddling
Your diddler is minute. His operations are upon a small scale. His business is retail for cash or approved paper at sight. Should he ever be tempted into magnificent speculation he then at once loses his distinctive freatures and becomes what we term a "financier".
Jeremy Diddler
Research Links
- Archive.org: The Diddler
- Book: Yellow Kid Weil – Various formats – my previous research page on Yellow Kid Weil See the following books linked at the bottom of this page. Those links are placed below for safe keeping.
- The handbook of swindling, and other papers
- https://archive.org/details/cu31924030319325
- https://archive.org/details/handbookswindlin00jerriala
- https://archive.org/details/diddlersenter00sentiala
- https://archive.org/details/knightsofindustr00reusiala
- https://archive.org/details/norfleetactualex00norf
- https://archive.org/details/fishingforsucker00watk
- https://archive.org/details/fraudsofamericao00redmuoft
- https://archive.org/details/cu31924031217528


