riassunto art hacking cinema mediatico

curarsi il mal di schiena
http://www.macrolibrarsi.it/libri/__come_sconfiggere_mal_di_schiena-dolori_reumatici_dvd_con_esercizi.php
hostess aereo sexy
http://www.youtube.com/watch?v=gAVwJqJheFw&feature=related
http://www.youtube.com/watch?v=w-08WO4RNgM&feature=related
alitalia volo parigi roma
http://www.youtube.com/watch?v=IJKXbWtowOg
attentato all alitalia
http://www.youtube.com/watch?v=g0t-otkw15M&feature=related
alitalia
http://www.youtube.com/watch?v=lao0c_HT88s&feature=related
psicologia del volo
http://www.youtube.com/watch?v=a-oBbShfEOE&feature=related
http://www.youtube.com/watch?v=EXPryiQ-GL4&feature=related
un informatica dell alitalia
http://www.youtube.com/watch?v=LiwshnGQ2BI&feature=related
http://www.youtube.com/watch?v=jd-tUUBn5hw&feature=related
alitalia guida
http://www.youtube.com/watch?v=Mt3nemSK9RE
roma bergamo maria  il mio amore al microfono
http://www.youtube.com/results?search_query=alitalia+bergamo&search_type=&aq=f


http://www.youtube.com/watch?v=N3aVCK-IP2Q

era in chat col nick MARTINA45231
http://www.geocities.com/azafleet/dc7.html
http://www.geocities.com/azafleet/index.html


http://www.youtube.com/watch?v=R44_gGVV9SQ

arte dell hacking il punto del giorno

http://www.apogeonline.com/argomenti/Hacker%20e%20Hacking
http://www.apogeonline.com/libri/9788850326983/scheda

http://www.nostarch.com/download/booksrc.zip


http://it.wikipedia.org/wiki/SYN_flood
o l’esistenza di un DoS come naptha,
http://www.cert.org/advisories/CA-2000-21.html
 esistente dal 2000, che
 webserver
netstrike
pagine precedenti syn flood
http://www.niksula.hut.fi/~dforsber/synflood/result.html
pag 244 arte dell hacking
noto col nomignolo "the ping of death"
http://en.wikipedia.org/wiki/Ping_of_death
linux kernel archivie
http://www.ussg.iu.edu/hypermail/linux/kernel/0808.1/index.html
Mike Bremford
http://big.faceless.org/blog/aboutAuthor.action?user=mike
 explained Mike Bremford, who is hosting a comprehensive site on the attack, called The Ping o’ Death Page.

http://news.cnet.com/Ping-of-Death-averted/2100-1023_3-250036.html?hhTest=1
http://www.iss.net/security_center/advice/Intrusions/2000012/default.htm
http://en.wikipedia.org/wiki/Ping_flood
un listato
http://insecure.org/sploits/ping-o-death.html
exploit
http://insecure.org/sploits_all.html
http://compnetworking.about.com/od/networksecurityprivacy/l/bldef_pingdeath.htm
http://blogs.msdn.com/larryosterman/archive/2007/10/16/larry-and-the-ping-of-death.aspx

http://insecure.org/sploits/USR.total.control.chassis.html
pag. 243
tcp randoom dal mit
http://dspace.mit.edu/handle/1721.1/30606
http://www.leave-me-alone.com/hackers_pingofdeath.htm

da http://www.altran.com/
finire come un hacker
http://www.aiea.it/pdf/sessioni%20di%20studio%20e%20di%20formazione/2008/Torino%2017%20gennaio%202008%20Finire%20com
e%20un%20hacker.pdf
Pag 261 analisi con GDB
Pag 263 attacco con bombe a mano

 

 

*********************************************************************************************

=============================================================================
TOPIC: invalidate caches before going into suspend
http://groups.google.com/group/fa.linux.kernel/browse_thread/thread/9c2e0e9ebc6c68f5?hl=en
================================================================================ 
1 of 7 ==
Date: Wed, Aug 13 2008 10:18 am From: Linus Torvalds  On Wed, 13 Aug 2008, Mark Langsdorf wrote:
> > I don't think it's necessary.  I can submit a delta patch later if you
> think it's really necessary.Why not at least move it to after the local_irq_disable()?
That local_irq_disable() will do tons of writes if you have lockdep enabled, it calls trace_hardirqs_off() etc.
 Maybe they don't end up ever mattering, but wouldn't it make much more sense to just move the wbinvd 
down to just before the while (1)  halt();which is also likely to make sure that the compiler won't do anything 
at all because everything is dead at that point with no function calls etc happening.   
Linus--
To unsubscribe from this list: 
send the line "unsubscribe linux-kernel" inthe body of a message 
to majordomo@vger.kernel.orgMore majordomo info at  
http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

*********************************************************************************************
r i a s s u n t o a r t e h a c k i n g *********************************************************************************************
……………………………………………………………………………………………..

Architettura del Kernel Linux

Cliccando sull’immagine è possibile navigare la mappa interattiva dell’

architettura del Kernel Linux. Cliccando successivamente su ogni

componente del kernel si verrà rediretti alla spiegazione funzionale del

singolo componente. Manna dal cielo per tutti gli sviluppatori che lavorano con il Kernel Linux.

linux kernel map

Struttura 3 d in video del kernel

………………………………………………………………………………………………

 

Dear chiudix@autistici.org, Thank you for registering your account at directfileaccess.com.

Please use the link below to authenticate your account and continue.

 http://www.directfileaccess.com/fileaccess/authenticate.php?u=chiudix@autistici.org&p=MBSD3T&a=11398219

 If the link is not working, please copy and paste it into your browser.

 For your convenience, we have enclosed your username and password below.

They are for your use only, please write them down and do not share them with anyone. Username:

chiudix@autistici.org

 Password: MBSD3T

 Kind regards, DirectFileAccess.com Authentication Team

http://directfileaccess.com/fileaccess/download-PDF-Ebook-Guide-Hacking-The-Art-Of-Exploitation-2008-rar.php?id=1905035&aid=7041&files=c2VsZWN0IExpbmtzLiosICdQREYgRWJvb2sgR3VpZGUgSGFja2luZyBUaGUgQXJ0IE9mIEV4cGxvaXRhdGlvbiAyMDA4IHJhcicgYXMgRGVzY3JpcHRpb24gZnJvbSBMaW5rcyB3aGVyZSBtYXRjaChEZXNjcmlwdGlvbikgYWdhaW5zdCAoJ3h4eCcpIG9yZGVyIGJ5IFJBTkQoNjQ4NzYp&z=PDF+Ebook+Guide+Hacking+The+Art+Of+Exploitation+2008+rar&search=PDF%20Ebook%20Guide%20Hacking%20The%20Art%20Of%20Exploitation%202008%20rar
oppure cercrate cin emule o emule adunanza
The Art Exploitation 2008 rar


…………………………………………………………………………………….

~*~*~*~*~*~*~*The Art of Acking~*~*~*~*~*~*~*

…………………………………………………………………………………….


http://www.google.com/codesearch?q=package:libc+system pag 152
www.internic.net                                                                        pag 199
programma tinyweb                                                            pag 205
foto in cartella ah                                                          pag 206


http://www.ritlabs.com/en/products/tinyweb/install.php



o install TinyWeb server just create a shortcut in Startup menu with the following properties:


Target

c:wwwbintiny.exe c:wwwroot

Start In

c:wwwlog


http://en.wikipedia.org/wiki/Tiny_web_servers



http://www.unusualresearch.com/tinytcp/tinytcp.htm


http://books.google.it/books?id=P8ijosP6ti4C&dq=erikson+hacking&pg=PP1&ots=6Q-3WtniJq&sig=32ZReV9IY8WPAb8tKCA31sNHp7s&hl=it&sa=X&oi=book_result&resnum=1&ct=resulthttp://en.wikipedia.org/wiki/Hacking:_The_Art_of_Exploitationhttp://en.wikipedia.org/wiki/Reality_hackinghttp://hackerforum.devil.it/viewtopic.php?t=31http://www.artofhacking.com/perlhttp://www.artofhacking.com/tucops/hack/linuxapp/live/aoh_hack0717.htm

http://directfileaccess.com/fileaccess/search-results.php?act=search&id=7041&search=PDF%20Ebook%20Guide%20Learning%20Windows%20Server%202008%202nd%20Edition%202008%204S%200L

*************************************************************************************************
 2) JON ERIKSON ART HACKING

prima edizione
http://www.apogeonline.com/libri/88-503-2347-6/scheda
sfoglia il libro
http://books.google.com/books?vid=ISBN8850323476&printsec=toc&hl=it
http://www.nostarch.com/extras/hacking/index.html
http://books.google.com/books?vid=ISBN8850323476&printsec=toc&dq=isbn:8850323476&hl=it
dal 21 febbraio la seconda edizione
http://www.nostarch.com/frameset.php?startat=hacking2
http://www.apogeoeditore.com/
con link da www.nostarch.com zip libro scaricabile
http://www.apogeonline.com/libri/9788850326983/scheda
http://www.apogeonline.com/2008/libri/9788850326983/ebook/pdf/prefazione.pdf
http://www.apogeonline.com/2008/libri/9788850326983/ebook/pdf/indice.pdf
http://www.apogeonline.com/libri/9788850325948/scheda
http://hpp.recursiva.org/it/index.php
http://libri.html.it/recensioni/libro/145.html
pag 18 iniziamo a sporcarci le mani
source book hacking
http://www.apogeonline.com/libri/9788850326983/scheda
http://www.nostarch.com/download/booksrc.zip
http://www.tinker.tv/download/hacking2e_toc.pdf
http://www.tinker.tv/download/hacking2_sample.pdf
http://www.tinker.tv/download/hacking2_index.pdf
http://www.tinker.tv/download/hacking2_sample.pdf
tecniche hacking con link codice sorgente
http://www.autistici.org/index.php

ora scannerizzo le pagine della 2 edizione 

in http://www.autistici.org/cybercinema  cartella ah

esempio

http://www.autistici.org/cybercinema/ah/

da cui

http://www.autistici.org/cybercinema/ah/img001.jpg

questo lavoro come detto ai moderatori si unirà a immagini

di festival cinema in zone  naturali irpine. 

e  mostro gli esercizi

preciso che questo è un esperimento che non ha nulla a che vedere

se non con liste libere tipo aha 

i file della nuova edizione dell arte dell hacking

che ho messo facendo leggere la cartella in

http://www.autistici.org/cybercinema e cliccate su su booksrc

oppure andate in http://www.autistici.org/cybercinema/booksrc/ 

il sito è in lettura grazie a joomla che uso come usavo quando si chiamava mambo,

togliendo l home page in lettura in a.php. 

Welcome to the LiveCD for Hacking : The Art of Exploitation
The source code is found in the ~/booksrc directory

    -=[ Unix Basics (enough to get you started) ]=-

command |   description             |   example
——–|—————————|———————
  ls    |  lists files              |  ls -la
  man   |  manual page help         |  man ls
  pwd   |  print working directory  |  pwd
  cat   |  dump file to console     |  cat unix_basics
  cd    |  change directory         |  cd ~/booksrc
  nano  |  simple text editor       |  nano firstprog.c
———————————————————-
 
To run a command as administrator (user "root"), use "sudo <command>".
See "man sudo_root" for details.

reader@hacking:~ $ sudo -s
root@hacking:~ # cd ~/booksrc
root@hacking:~/booksrc # ls -la
total 572
drwxr-xr-x  3 reader reader  2740 2008-06-14 12:35 .
drwxr-xr-x 15 reader reader   620 2008-06-14 10:38 ..
-rw-r–r–  1 reader reader   471 2008-06-14 12:35 addressof2.c
-rw-r–r–  1 reader reader   134 2008-06-14 12:35 addressof.c
-rw-r–r–  1 reader reader   426 2008-06-14 12:35 addr_struct.c
-rw-r–r–  1 reader reader   181 2008-06-14 12:35 aslr_demo.c
-rw-r–r–  1 reader reader   299 2008-06-14 12:35 aslr_execl.c
-rw-r–r–  1 reader reader   804 2008-06-14 12:35 aslr_execl_exploit.c
-rw-r–r–  1 reader reader   660 2008-06-14 12:35 auth_overflow2.c
-rw-r–r–  1 reader reader   660 2008-06-14 12:35 auth_overflow.c
-rw-r–r–  1 reader reader   867 2008-06-14 12:35 bind_port.c
-rw-r–r–  1 reader reader  1846 2008-06-14 12:35 bind_port.s
-rw-r–r–  1 reader reader    92 2008-06-14 12:35 bind_shell
-rw-r–r–  1 reader reader   101 2008-06-14 12:35 bind_shell_beta
-rw-r–r–  1 reader reader  2978 2008-06-14 12:35 bind_shell_beta.s
-rw-r–r–  1 reader reader  2872 2008-06-14 12:35 bind_shell.s
-rw-r–r–  1 reader reader   518 2008-06-14 12:35 bitwise.c
-rw-r–r–  1 reader reader   129 2008-06-14 12:35 char_array2.c
-rw-r–r–  1 reader reader   355 2008-06-14 12:35 char_array.c
-rw-r–r–  1 reader reader   224 2008-06-14 12:35 commandline.c
-rw-r–r–  1 reader reader    78 2008-06-14 12:35 connectback_shell
-rw-r–r–  1 reader reader  2718 2008-06-14 12:35 connectback_shell.s
-rw-r–r–  1 reader reader   513 2008-06-14 12:35 convert2.c
-rw-r–r–  1 reader reader   512 2008-06-14 12:35 convert.c
-rw-r–r–  1 reader reader  1275 2008-06-14 12:35 crypt_crack.c
-rw-r–r–  1 reader reader   335 2008-06-14 12:35 crypt_test.c
-rw-r–r–  1 reader reader   530 2008-06-14 12:35 datatype_sizes.c
-rw-r–r–  1 reader reader  3631 2008-06-14 12:35 decode_sniff.c
-rw-r–r–  1 reader reader  7797 2008-06-14 12:35 dissembler.c
-rw-r–r–  1 reader reader   274 2008-06-14 12:35 drop_privs.c
-rw-r–r–  1 reader reader   323 2008-06-14 12:35 dtors_sample.c
-rw-r–r–  1 reader reader    73 2008-06-14 12:35 encoded_socket_reuse_restore
-rw-r–r–  1 reader reader    71 2008-06-14 12:35 encoded_sockreuserestore
-rw-r–r–  1 reader reader  1695 2008-06-14 12:35 encoded_sockreuserestore_dbg.s
-rw-r–r–  1 reader reader  1697 2008-06-14 12:35 encoded_sockreuserestore.s
-rw-r–r–  1 reader reader  1815 2008-06-14 12:35 errorchecked_heap.c
-rw-r–r–  1 reader reader   100 2008-06-14 12:35 evil_name
-rw-r–r–  1 reader reader    36 2008-06-14 12:35 exec_shell
-rw-r–r–  1 reader reader   325 2008-06-14 12:35 exec_shell.c
-rw-r–r–  1 reader reader   736 2008-06-14 12:35 exec_shell.s
-rw-r–r–  1 reader reader   115 2008-06-14 12:35 exploit_buffer
-rw-r–r–  1 reader reader   961 2008-06-14 12:35 exploit_notesearch.c
-rw-r–r–  1 reader reader   586 2008-06-14 12:35 exploit_notesearch_env.c
-rw-r–r–  1 reader reader  1519 2008-06-14 12:35 fcntl_flags.c
-rw-r–r–  1 reader reader   239 2008-06-14 12:35 find_jmpesp.c
-rw-r–r–  1 reader reader   106 2008-06-14 12:35 firstprog.c
-rw-r–r–  1 reader reader  3147 2008-06-14 12:35 fms.c
-rw-r–r–  1 reader reader   566 2008-06-14 12:35 fmt_strings.c
-rw-r–r–  1 reader reader   498 2008-06-14 12:35 fmt_uncommon2.c
-rw-r–r–  1 reader reader   501 2008-06-14 12:35 fmt_uncommon.c
-rw-r–r–  1 reader reader   671 2008-06-14 12:35 fmt_vuln2.c
-rw-r–r–  1 reader reader   567 2008-06-14 12:35 fmt_vuln.c
-rw-r–r–  1 reader reader   498 2008-06-14 12:35 funcptr_example.c
-rw-r–r–  1 reader reader 15307 2008-06-14 12:35 game_of_chance.c
-rw-r–r–  1 reader reader   392 2008-06-14 12:35 getenvaddr.c
-rw-r–r–  1 reader reader   129 2008-06-14 12:35 getenv_example.c
-rw-r–r–  1 reader reader  1222 2008-06-14 12:35 hacking.h
-rw-r–r–  1 reader reader  3451 2008-06-14 12:35 hacking-network.h
-rw-r–r–  1 reader reader  1912 2008-06-14 12:35 heap_example.c
-rw-r–r–  1 reader reader    49 2008-06-14 12:35 helloworld1
-rw-r–r–  1 reader reader   648 2008-06-14 12:35 helloworld1.s
-rw-r–r–  1 reader reader   694 2008-06-14 12:35 helloworld2.s
-rw-r–r–  1 reader reader    40 2008-06-14 12:35 helloworld3
-rw-r–r–  1 reader reader   913 2008-06-14 12:35 helloworld3.s
-rw-r–r–  1 reader reader   720 2008-06-14 12:35 helloworld.asm
-rw-r–r–  1 reader reader    74 2008-06-14 12:35 helloworld.c
-rw-r–r–  1 reader reader   704 2008-06-14 12:35 helloworld.o
-rw-r–r–  1 reader reader   575 2008-06-14 12:35 host_lookup.c
-rw-r–r–  1 reader reader   263 2008-06-14 12:35 input.c
-rw-r–r–  1 reader reader    83 2008-06-14 12:35 loopback_shell
-rw-r–r–  1 reader reader   102 2008-06-14 12:35 loopback_shell_restore
-rw-r–r–  1 reader reader  3157 2008-06-14 12:35 loopback_shell_restore.s
-rw-r–r–  1 reader reader  2791 2008-06-14 12:35 loopback_shell.s
-rw-r–r–  1 reader reader    44 2008-06-14 12:35 mark
-rw-r–r–  1 reader reader    44 2008-06-14 12:35 mark_break
-rw-r–r–  1 reader reader   611 2008-06-14 12:35 mark_break.s
-rw-r–r–  1 reader reader    53 2008-06-14 12:35 mark_restore
-rw-r–r–  1 reader reader   701 2008-06-14 12:35 mark_restore.s
-rw-r–r–  1 reader reader   611 2008-06-14 12:35 mark.s
-rw-r–r–  1 reader reader  1103 2008-06-14 12:35 memory_segments.c
-rw-r–r–  1 reader reader  3451 2008-06-14 12:35 notesearch.c
-rw-r–r–  1 reader reader  1659 2008-06-14 12:35 notetaker.c
-rw-r–r–  1 reader reader   907 2008-06-14 12:35 overflow_example.c
-rw-r–r–  1 reader reader   754 2008-06-14 12:35 pcap_sniff.c
-rw-r–r–  1 reader reader   550 2008-06-14 12:35 pointer.c
-rw-r–r–  1 reader reader   767 2008-06-14 12:35 pointer_types2.c
-rw-r–r–  1 reader reader   791 2008-06-14 12:35 pointer_types3.c
-rw-r–r–  1 reader reader   754 2008-06-14 12:35 pointer_types4.c
-rw-r–r–  1 reader reader   804 2008-06-14 12:35 pointer_types5.c
-rw-r–r–  1 reader reader   693 2008-06-14 12:35 pointer_types.c
-rw-r–r–  1 reader reader    92 2008-06-14 12:35 portbinding_shellcode
-rw-r–r–  1 reader reader  7553 2008-06-14 12:35 ppm_crack.c
-rw-r–r–  1 reader reader  4410 2008-06-14 12:35 ppm_gen.c
-rw-r–r–  1 reader reader  2411 2008-06-14 12:35 printable_helper.c
-rw-r–r–  1 reader reader  1841 2008-06-14 12:35 printable.s
-rw-r–r–  1 reader reader    37 2008-06-14 12:35 priv_shell
-rw-r–r–  1 reader reader  1011 2008-06-14 12:35 priv_shell.s
-rw-r–r–  1 reader reader   311 2008-06-14 12:35 rand_example.c
-rw-r–r–  1 reader reader   487 2008-06-14 12:35 raw_tcpsniff.c
-rw-r–r–  1 reader reader  4664 2008-06-14 12:35 rst_hijack.c
-rw-r–r–  1 reader reader   716 2008-06-14 12:35 scope2.c
-rw-r–r–  1 reader reader  1111 2008-06-14 12:35 scope3.c
-rw-r–r–  1 reader reader   472 2008-06-14 12:35 scope.c
-rw-r–r–  1 reader reader    35 2008-06-14 12:35 shellcode
-rw-r–r–  1 reader reader    35 2008-06-14 12:35 shellcode.bin
-rw-r–r–  1 reader reader  1033 2008-06-14 12:35 shellcode.s
-rw-r–r–  1 reader reader  5478 2008-06-14 12:35 shroud.c
-rw-r–r–  1 reader reader  2070 2008-06-14 12:35 signal_example.c
-rw-r–r–  1 reader reader  1872 2008-06-14 12:35 simplenote.c
-rw-r–r–  1 reader reader  1695 2008-06-14 12:35 simple_server.c
-rw-r–r–  1 reader reader    62 2008-06-14 12:35 socket_reuse_restore
-rw-r–r–  1 reader reader  1477 2008-06-14 12:35 socket_reuse_restore.s
-rw-r–r–  1 reader reader   168 2008-06-14 12:35 stack_example.c
-rw-r–r–  1 reader reader   665 2008-06-14 12:35 static2.c
-rw-r–r–  1 reader reader   617 2008-06-14 12:35 static.c
-rw-r–r–  1 reader reader  3324 2008-06-14 12:35 synflood.c
-rw-r–r–  1 reader reader  1414 2008-06-14 12:35 time_example2.c
-rw-r–r–  1 reader reader   754 2008-06-14 12:35 time_example.c
-rw-r–r–  1 reader reader    25 2008-06-14 12:35 tiny_shell
-rw-r–r–  1 reader reader   648 2008-06-14 12:35 tiny_shell.s
-rw-r–r–  1 reader reader  4987 2008-06-14 12:35 tinyweb.c
-rw-r–r–  1 reader reader  6590 2008-06-14 12:35 tinywebd.c
-rw-r–r–  1 reader reader  2005 2008-06-14 12:35 tinyweb_exploit2.c
-rw-r–r–  1 reader reader  1747 2008-06-14 12:35 tinyweb_exploit.c
-rw-r–r–  1 reader reader   316 2008-06-14 12:35 typecasting.c
-rw-r–r–  1 reader reader   119 2008-06-14 12:35 uid_demo.c
-rw-r–r–  1 reader reader  1532 2008-06-14 12:35 update_info.c
-rw-r–r–  1 reader reader   102 2008-06-14 12:35 vuln.c
drwxr-xr-x  2 reader reader   100 2008-06-14 12:35 webroot
-rw-r–r–  1 reader reader  1178 2008-06-14 12:35 webserver_id.c
-rwxr-xr-x  1 reader reader   771 2008-06-14 12:35 xtool_tinywebd_cback.sh
-rwxr-xr-x  1 reader reader  1115 2008-06-14 12:35 xtool_tinywebd_reuse.sh
-rwxr-xr-x  1 reader reader   586 2008-06-14 12:35 xtool_tinywebd.sh
-rwxr-xr-x  1 reader reader  1054 2008-06-14 12:35 xtool_tinywebd_silent.sh
-rwxr-xr-x  1 reader reader   997 2008-06-14 12:35 xtool_tinywebd_spoof.sh
-rwxr-xr-x  1 reader reader   781 2008-06-14 12:35 xtool_tinywebd_steath.sh
root@hacking:~/booksrc # prima di inziare gi esercizi hp epnsato che non tutti hanno una tastiera americana,
bash: prima: command not found
root@hacking:~/booksrc #
root@hacking:~/booksrc #

 

prima di inziare gi esercizi ho pensato che non tutti hanno una tastiera americana,

allora mi son preparato e ho cercato chi linka listati on line:

Chapter 0x200 Programming

overflow.c
vuln.c
exploit.c
vuln2.c
env_exploit.c
getenvaddr.c
heap.c
bss_game.c
fmt_example.c
fmt_vuln.c
dtors_sample.c
hello.asm
shell.asm
shellcode.asm_original
shellcode.asm_final
stackshell.asm
tinyshell.asm
print.asm
printable_exploit.c
print2.asm
only_print.c
cleared_stack.c

Chapter 0x300 Networking

arpredirect.pl
hijack_rst.sh
shroud.sh
shroud2.sh

Chapter 0x400 Cryptology

crack.pl
ppm_gen.c
ppm_crack.c
fms.c
il sito? http://tecalibri.altervista.org/E/ERICKSON-J_arte.htm#p004

che scopro essere i listati della prima edizione che si può leggere on line
http://books.google.com/books?vid=ISBN8850323476&printsec=toc&dq=isbn:8850323476&hl=it#PPP1,M1

poi ho scoperto che l autore del libro con cd rom ubuntu hacks contenente i listati

 

usa il pc fin da quando era bambino: join erickson

 

http://www.tinker.tv/download/hacking2e_toc.

http://www.oreillynet.com/pub/au/1648 art hacking http://www.gizmosforgeeks.com/2008/02/24/book-review-hacking-the-art-of-exploitation/

art hacking

Hacking and Security – 70 books

Citazione:
Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
Wiley.The Database Hacker’s Handbook- Defending Database Servers.chm
John Wiley & Sons.Hacking GMail (ExtremeTech).pdf
Hacking.Guide.V3.1.pdf
A-List Publishing.Hacker Linux Uncovered.chm
Hacker’S.Delight.chm
Hacker.Bibel.[278.kB_www.netz.ru].pdf
HackerHighSchool.pdf
Hacker’s Desk Reference.pdf
Hackers Beware Defending Your Network From The Wiley Hacker.pdf
Addison Wesley – Hackers Delight 2002.pdf
addison wesley – web hacking – attacks and defense.chm
Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm
Anti-Hacker ToolKit – McGraw Hill 2E 2004.chm
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.2003.eBook-DDU.pdf
ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf
ebook.oreilly.-.windows.xp.hacks.sharereactor.chm
For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
hacker-disassembling-uncovered.9781931769228.20035.chm
Hacking Cisco Routers.pdf
Hacking the Code – ASP.NET Web Application Security Cookbook (2004) .chm
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf
Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm
Linux-Server.Hacks-OReilly.pdf
McGraw Hill – Web Applications (Hacking Exposed).pdf
McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
OReilly – Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm
Oreilly Access Hacks Apr 2005.chm
OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm
oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm
Oreilly.Amazon.Hacks.eBook.LiB.chm
oreilly.firefox.hacks.ebook-lib.chm
OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm
OReilly.Google.Maps.Hacks.Jan.2006.chm
Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm
OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm
OReilly.Network.Security.Hacks.chm
OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm
OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm
OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm
OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm
OReilly.Statistics.Hacks.May.2006.chm
OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm
OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm
oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm
OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm
prentice hall – pipkin – halting the hacker- a practical guide to computer security, 2nd edition.chm
Que – UNIX Hints Hacks.chm
Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm
Syngress – Hack Proofing Linux (2001).pdf
Syngress – Hack Proofing Your Identity in the Information Age – 2002.pdf
Syngress — Hack Proofing Your Wireless Network.pdf
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm
Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf
Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf
Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf
Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf
Wiley.Lifehacker.Dec.2006.pdf


Codice:
http://hackingandsecurity.com/hacks/


hackish.altervista.org/forum/viewtopic.php?t=199 http://www.yyztech.ca/articles/view/review_hacking_the_art_of_exploitation

************************************************************************************************

djvù
http://it.wikipedia.org/wiki/DjVu

Sito Web:
http://www.djvu.org/

block notes salvare .txt oppure .html

Youtube http://www.youtube.com/

Scarica video

http://www.getmiro.com/

 

*********************************************************************************************
ho fatto l attore per anni ma le organizzatrici rimangono mediatiche e brumate

fortuna che a salvare al serata ci ha pensato la bionda

http://www.sens.it/biondinascrivimi.avi

http://www.sens.it/

Image and video hosting by TinyPic

This entry was posted in Generale. Bookmark the permalink.