Certified Penetration Testing Specialist
(http://www.mile2.com/images/CPTS-Wht.png)
(http://www.mile2.com/images/Penetration_Tester.jpg)
Detalles en:
http://www.mile2.com/Certified_Penetration_Testing_Specialist_CPTS.html
http://rapidshare.com/files/167651603/Certified_Penetration_Testing_Specialist__CPTS_.part01.rar
http://rapidshare.com/files/167663331/Certified_Penetration_Testing_Specialist__CPTS_.part02.rar
http://rapidshare.com/files/167675074/Certified_Penetration_Testing_Specialist__CPTS_.part03.rar
http://rapidshare.com/files/167686833/Certified_Penetration_Testing_Specialist__CPTS_.part04.rar
http://rapidshare.com/files/167698484/Certified_Penetration_Testing_Specialist__CPTS_.part05.rar
http://rapidshare.com/files/167710266/Certified_Penetration_Testing_Specialist__CPTS_.part06.rar
http://rapidshare.com/files/167721204/Certified_Penetration_Testing_Specialist__CPTS_.part07.rar
http://rapidshare.com/files/167732062/Certified_Penetration_Testing_Specialist__CPTS_.part08.rar
http://rapidshare.com/files/167741584/Certified_Penetration_Testing_Specialist__CPTS_.part09.rar
http://rapidshare.com/files/167750214/Certified_Penetration_Testing_Specialist__CPTS_.part10.rar
http://rapidshare.com/files/167758372/Certified_Penetration_Testing_Specialist__CPTS_.part11.rar
http://rapidshare.com/files/167765730/Certified_Penetration_Testing_Specialist__CPTS_.part12.rar
http://rapidshare.com/files/167772547/Certified_Penetration_Testing_Specialist__CPTS_.part13.rar
http://rapidshare.com/files/167779160/Certified_Penetration_Testing_Specialist__CPTS_.part14.rar
http://rapidshare.com/files/167785313/Certified_Penetration_Testing_Specialist__CPTS_.part15.rar
http://rapidshare.com/files/167479956/Certified_Penetration_Testing_Specialist__CPTS_.part16.rar
http://rapidshare.com/files/167567396/Certified_Penetration_Testing_Specialist__CPTS_.part17.rar
http://rapidshare.com/files/167577620/Certified_Penetration_Testing_Specialist__CPTS_.part18.rar
http://rapidshare.com/files/167588144/Certified_Penetration_Testing_Specialist__CPTS_.part19.rar
http://rapidshare.com/files/167599352/Certified_Penetration_Testing_Specialist__CPTS_.part20.rar
http://rapidshare.com/files/167610569/Certified_Penetration_Testing_Specialist__CPTS_.part21.rar
http://rapidshare.com/files/167622701/Certified_Penetration_Testing_Specialist__CPTS_.part22.rar
http://rapidshare.com/files/167634296/Certified_Penetration_Testing_Specialist__CPTS_.part23.rar
http://rapidshare.com/files/167640123/Certified_Penetration_Testing_Specialist__CPTS_.part24.rar
Megauploadhttp://www.megaupload.com/?d=3SIT0V4C
http://www.megaupload.com/?d=HP1RJ41S
http://www.megaupload.com/?d=DRJ75W60
http://www.megaupload.com/?d=1VOTOXQ6
http://www.megaupload.com/?d=NI7WBG44
http://www.megaupload.com/?d=8K3WUAE1
http://www.megaupload.com/?d=2M0VSQ69
http://www.megaupload.com/?d=WDQBX0V0
http://www.megaupload.com/?d=G9IB9PYE
http://www.megaupload.com/?d=6HKCYAAB
http://www.megaupload.com/?d=MLPN98MB
http://www.megaupload.com/?d=O59PR72O
http://www.megaupload.com/?d=R5HQKU8L
http://www.megaupload.com/?d=5GP0F16W
http://www.megaupload.com/?d=9GMSORJ0
http://www.megaupload.com/?d=6LJL5LCL
http://www.megaupload.com/?d=NPYZH83X
http://www.megaupload.com/?d=HOX451L6
http://www.megaupload.com/?d=JVYV6AEC
http://www.megaupload.com/?d=99OJB0R3
http://www.megaupload.com/?d=9GOIC4CU
http://www.megaupload.com/?d=NC1H94YW
http://www.megaupload.com/?d=OAISPX2J
http://www.megaupload.com/?d=W27BWB4G
Module 0: Introduction
Module 1: Business and Technical Logistics of Penetration Testing
Module 2: Information Gathering
Module 3: Linux Fundamentals
Module 4: Detecting Live Systems
Module 5: Reconnaissance -- Enumeration
Module 6: Cryptography
Module 7: Vulnerability Assessments
Module 8: Malware – Software Goes Undercover
Module 9: Hacking Windows
Module 10: Advanced Vulnerability and Exploitation Techniques
Module 11: Attacking Wireless Networks
Module 12: Networks, Firewalls, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies
Module 1: Business and Technical Logistics of Pen Testing • Definition of a Penetration Test
• Benefits of a Penetration Test
• ID Theft Statistics
• Recent Hacking News
• The Evolving Threat
• Vulnerability Life Cycle
• Exploit Time Line
• Zombie Statistics
• Zombie Definition
• Botnet Definition
• Types of Penetration Testing
• Pen Testing Methodology
• Hacker vs. Penetration Tester
• Tools vs. Technique
• Penetration Testing Methodologies
• OSSTMM - Open Source Security Testing Methodologies
• Website Review
• SecurityNOW! SX
• Case Study and Lab
Module 2: Information Gathering • What Information is Gathered by the Hacker
• Methods of Obtaining Information
• Physical Access
• Social Access
• Digital Access
• Passive vs. Active Reconnaissance
• Footprinting Defined
• Footprinting Tool: Kartoo Website.
• Footprinting Tools
• Google and Query Operators
• Johnny.Ihackstuff.com.
• Aura
• Wikto
• Websites used for Information Gathering
• Internet Archive: The WayBack Machine
• Domain Name Registration
• Whois
• Websites used to Gather Whois Information
• DNS Databases
• Using NSlookup
• Dig for Unix / Linux
• Traceroute Operation
• EDGAR for USA Company Info.
• Company House For British Company Info
• Intelius info and Background Check Tool
• Web Server Info Tool: Netcraft
• Countermeasure: Domainsbyproxy.com
• Footprinting Countermeasures
• Review White Papers/Templates
• Case Study and Lab.
Module 3: Linux Fundamentals • History of Linux
• The GNU Operating System
• Linux Introduction
• Desktop Environment
• Linux Shell
• Linux Bash Shell
• Recommended Linux Book
• Password and Shadow File Formats
• User Account Management
• Changing a user account password
• Configuring the Network Interface
• Mounting Drives
• Tarballs and Zips
• Compiling Programs
• Typical Linux Operating Systems
• Gentoo = Simple Software Install Portal
• VLOS and Emerge
• Why Use Live Linux Boot CDs
• Security Live Linux CDs
• FrozenTech's Complete Distro List
• Most Popular: BackTrack
• My Slax Creator
• Slax Modules (Software Packages)
• Case Study and Lab
Module 4: Detecting Live Systems • Port Scanning Introduction
• Port Scan Tips
• What are the Expected Results
• How Do We Organize the Results
• Ping
• NMAP Introduction
• The TCP/IP Stack
• Ports and Services
• The TCP 3-way Handshake
• TCP Flags
• Vanilla Scan
• NMAP TCP Connect Scan
• Half-open Scan
• Tool Practice : TCP half-open and Ping Scan
• Fire-walled Ports
• NMAP Service Version Detection
• UDP Port Scanning
• Advanced Scanning Technique
• Popular Port Scanning Tools
• Tool: Superscan
• Tool: LookatLan
• Tool: Hping2
• Tool: Auto Scan
• Packet Crafting and Advanced Scanning Methods
• OS Fingerprinting
• OS Fingerprinting: Xprobe2 – Auditor Distro
• Xprobe Practice
• Fuzzy Logic
• Tool: P0f – Passive OS Finger Printing Utility
• Tool Practice: Amap
• Packet Crafting
• Tool Fragrouter: Fragmenting Probe Packets
• Countermeasures: Scanning
• Scanning Tools Summary
• Case Study and Lab
Module 5: Reconnaissance – Enumeration • Overview of Enumeration
• Web Server Banner
• Practice: Banner Grabbing with Telnet
• Sam Spade Tool: Banner Grabbing
• SuperScan 4 Tool: Banner Grabbing
• SMTP Banner
• DNS Enumeration Methods
• Zone Transfers
• Countermeasure: DNS Zone Transfser
• SNMP Insecurity
• SNMP Enumeration
• SNMP Enumeration Countermeasures
• Active Directory Enumeration
• AD Enumeration countermeasures
• Null Session
• Syntax for a Null Session
• Viewing Shares
• Tool: DumpSec
• Tool: USE42
• Tool: Enumeration with Cain and Abel
• NAT Dictionary Attack Tool
• Injecting the Able Service
• Null Session Countermeasures
• Enumeration Tools Summary
• Case Study and Lab
Module 6: Cryptography • Cryptography Introduction
• Encryption
• Encryption Algorithm
• Implementation
• Symmetric Encryption
• Symmetric Algorithms
• Crack Times
• Asymmetric Encryption
• Key Exchange
• Hashing
• Hash Collisions
• Common Hash Algorithms
• Hybrid Encryption
• Digital Signatures
• SSL Hybrid Encryption
• IPSEC
• Transport Layer Security – SSH
• PKI ~ Public Key Infrastructure Models
• PKI-Enabled Applications
• Quantum Cryptography
• Hardware Encryption: DESlock
• Attack Vectors
• Case Study & Lab
Module 7: Vulnerability Assessments • Vulnerability Assessments Introduction
• Testing Overview
• Staying Abreast: Security Alerts
• Vulnerability Scanners
• Qualys Guard
• Nessus Open Source
• Nessus Interface
• Scanning the Network
• Nessus Report
• Retina
• Nessus for Windows
• LANguard
• Analyzing the Scan Results
• Microsoft Baseline Analyzer
• MBSA Scan Report
• Dealing with the Assessment Results
• Patch Management
• Patching with LANguard Network Security Scanner
• Case Study and Lab
Module 8: Malware - Software Goes Undercover • Defining Malware: Trojans and Backdoors
• Defining Malware: Virus & Worms
• Defining Malware: Spyware
• Company Surveillance Software
• Malware Distribution Methods
• Malware Capabilities
• Auto Start Methods
• Countermeasure: Monitoring Autostart Methods.
• Tool: Netcat
• Netcat Switches
• Executable Wrappers
• Benign EXEs Historically Wrapped with Trojans
• Tool: Restorator
• Tool: Exe Icon
• The Infectious CD-ROM Technique
• Backdoor.Zombam.B
• JPEG GDI+ All in One Remote Exploit
• Advanced Trojans: Avoiding Detection
• Malware Countermeasures
• Gargoyle Investigator
• Spy Sweeper Enterprise
• www.Glocksoft.com
• Port Monitoring Software
• File Protection Software
• Windows File Protection
• Windows Software Restriction Policies
• Hardware-based Malware Detectors
• Countermeasure: User Education
• Case Study and Lab
Module 9: Hacking Windows • Types of Password Attacks
• Keystroke Loggers
• Password Guessing
• Password Cracking LM/NTLM Hashes
• LanMan Password Encryption
• NT Password Generation
• SysKey Encryption
• Password Salting
• Password Extraction and Password Cracking
• Precomputation Detail
• Cain and Abel's Cracking Methods
• Free LM Rainbow Tables
• NTPASSWD:Hash Insertion Attack
• Password Sniffing
• Windows Authentication Protocols
• Hacking Tool: Kerbsniff & KerbCrack
• Countermeasure: Monitoring Event Viewer Log
• Hard Disk Security
• Free HD Encryption Software
• Tokens & Smart Cards.
• Covering Tracks Overview
• Disabling Auditing
• Clearing the Event Log
• Hiding Files with NTFS Alternate Data Streams
• NTFS Streams Countermeasures
• Stream Explorer
• What is Steganography?
• Steganography Tools
• Shredding Files Left Behind
• Leaving No Local Trace
• SecurSURF
• StealthSurfer II Privacy Stick
• Tor: Anonymous Internet Access
• Encrypted Tunnel Notes
• Rootkits
• Rootkit Countermeasures
• Case Study and Lab.
Module 10: Advanced Vulnerability & Exploitation Techniques • How Do Exploits Work?
• Memory Organization
• Buffer Overflows
• Stages of Exploit Development
• Prevention
• The Metasploit Project
• Defense in Depth
• Core Impact
• Case Study Lab
Module 11: Attacking Wireless Networks • Wireless LAN Network Types
• Deployed Standards
• A vs. B vs. G
• 802.11n - MIMO
• SSID - Service Set Identifier
• MAC Filtering
• WEP – Wired Equivalent Privacy
• Weak IV Packets
• XOR Basics
• WEP Weaknesses
• TKIP
• How WPA improves on WEP
• The WPA MIC Vulnerability
• 802.11i - WPA2
• WPA and WPA2 Mode Types
• WPA-PSK Encryption
• Tool: NetStumbler
• Tool: KNSGEM
• Tool: Kismet
• Analysis Tool: OmniPeek Personal
• Tool: Aircrack
• DOS: Deauth/disassociate attack
• Tool: Aireplay
• ARP Injection (Failure)
• ARP Injection (Success)
• EAP Types
• EAP Advantages/Disadvantages
• Typical Wired/Wireless Network
• EAP/TLS Deployment
• Case Study and Lab
Module 12: Networks, Firewalls, Sniffing and IDS • Packet Sniffers
• WinPcap / Pcap
• Tool: Wireshark (Ethereal)
• Re-assembling TCP Session Packets
• Tool: Packetyzer
• tcpdump & windump
• Tool: OmniPeek
• Sniffer Detection
• Passive Sniffing Methods
• Active Sniffing Methods
• Flooding the Switch Forwarding Table
• ARP Cache Poisoning in Detail
• ARP Normal Operation
• ARP Cache Poisoning
• Technique: ARP Cache Poisoning (Linux)
• ARP Countermeasures
• Tool: Cain and Abel
• Ettercap
• Dsniff Suite
• MailSnarf, MsgSnarf, FileSnarf
• What is DNS Spoofing?
• DNS Spoofing Tools
• Intercepting and Cracking SSL
• Tool: Breaking SSL Traffic
• Tool: Cain and Abel
• VoIP Systems
• Intercepting VoIP
• Intercepting RDP
• Cracking RDP Encryption
• Routing Protocols Analysis
• Countermeasures for Sniffing
• Firewalls, IDS and IPS
• Firewall ~ 1st Line of Defense
• IDS ~ 2nd Line of Defense
• IPS ~ Last Line of Defense
• Evading The Firewall and IDS
• Evasive Techniques
• Firewall – Normal Operation
• Evasive Technique –Example
• Evading With Encrypted Tunnels
• 'New Age' Protection
• SpySnare - Spyware Prevention System (SPS)
• Intrusion 'SecureHost' Overview
• Intrusion Prevention Overview
• Secure Surfing or Hacking?
• Case Study and Lab
Module 13: Injecting the Database • Overview of Database Servers
• Types of Databases
• Tables, Records, Attributes, Domains
• Data Normalization, SQL , Object-Oriented Database Management
• Relational Database Systems
• Vulnerabilities and Common Attacks
• SQL Injection
• Why SQL "Injection
• SQL Connection Properties
• SQL Injection: Enumeration
• Extended Stored Procedures
• Shutting Down SQL Server
• Direct Attacks
• Attacking Database Servers
• Obtaining Sensitive Information
• Hacking Tool: SQL Ping2
• Hacking Tool: osql.exe
• Hacking Tool: Query Analyzers
• Hacking Tool: SQLExec
• Hacking Tool: Metasploit
• Hardening Databases
• Case Study and Lab
Module 14: Attacking Web Technologies • Common Security Threats
• The Need for Monitoring
• Seven Management Errors
• Progression of The Professional Hacker
• The Anatomy of a Web Application Attack
• Web Attack Techniques
• Components of a generic web application system
• URL mappings to the web application system
• Web Application Penetration Methodologies
• Assessment Tool: Stealth HTTP Scanner
• HTTrack Tool: Copying the website offline
• Httprint Tool: Web Server Software ID
• Wikto Web Assessment Tool
• Tool: Paros Proxy
• Tool: Burp Proxy
• Attacks against IIS
• IIS Directory Traversal
• Unicode
• IIS Logs
• What is Cross Side Scripting (XSS?
• XSS Countermeasures
• Tool: Brutus
• Dictionary Maker
• Query String
• Cookies
• Top Ten Web Vulnerabilities
• Putting all this to the Test
• Case Study and Lab
Gracias a
modemhead .
Todos los links funcionales recien testeados. Salu2 espero que les guste
MM no tenia idea de esta certificación xD...Desde hoy comienzo a descargar, gracias por el aporte jpmo4...Lo que mas me gusta de estas certificaciones es que tratan muchos temas y abarcan con mucha informacion.
No seamos negativossss..... pedazo aporte macho...!!! genial, ahora a la gente que pide tutos a redireccionarlos aqui, el ingles corre de su cuenta, jejeje, muy buena, un saludo...!!!!
se ve interesante, pero reitero lo del hoster, igual voy a intentar bajarlos asi.
gracias men.
Yo agradezco que nos pongas el material al alcanze, lo del host es lo de menos para mi :xD (no se ofendan los demas) los pondre en mi lista del jdownlader, gracias ;D
Saludos
De nada xD. Salu2
Igualmente muchas gracias por el aporte.
Lo estare descargando, con la esperanza de algun dia resubirlo a MU
Saludos.
Joder llevo esperando mas de 15 dias, no termino de bajar grrr, me urge una cuenta RP premium :-(
-berz3k.
No habia visto este post, bajandooo.
Y no sean llorones, son 2 miseros gb, usen Jdownloader!
Yo tengo algo mas de velocidad, si alguien me prestara la cuenta premium de megaupload para resubirlo :xD, sino de todas formas lo intentaré resubir a megaupload(sin garantias) ya que los links de las gratuitas duran poquisimo :silbar:
PD: Gracias por el aporte ;D
subirlo a mediafire.com, descargas multiples e ilimitadas, es el mejor hoster por el momento.
Tengo 10 megas de bajada telefonica, y 3 de subida si no me equivoco, pero vamos tengo un pc parado que solo lo uso para subir archivos, asi que al host que me digais, lo unico que tendria que subirlo por gratuito, creo que lo intentaré subir a megaupload o a mediafire, os lo postearé, 1 saludo ;)
subelo a mediafire, con cuenta gratuita los links no se borran, y nosotros los bajamos al maximo de nuestra conexion y podemos poner varios a la vez.
Me parece que es mejor megaupload, es una opinion, a pesar de q no se puede bajar simultanemente con una cuenta gratituta. Bht Sata, 10MB :o >:( jaja, salu2
Tengo tiempo, lo subiré a los 2, asi veo cual me gusta mas :rolleyes:, si chico si, 10 megas de bajada, que le voy a hacer, asta que telefonica libere sus 30 megas y no me venda 15 cosas mas que no quiero :laugh:.
En cuanto lo tenga subido lo posteo ;)
Por fin acabe de bajarlo, descomprimidos se hacen mas de 3 GB y 3 .iso´s. :D
Saludos.
Ya esta!!! ;D, con una cuenta premium que conseguí buscando, y una bajada de 10 megas en 20 minutos lo terminé :xD, pero hay un problema, me da problemas con la subida a mediafire...termina en segundos, y se queda checkeando, mañana lo intentaré otra vez, 1 saludo ;)
Yo ya lo tengo ;D, pero aún no he llegado a revisar nada de su contenido :rolleyes:
Bueno como mediafire permite archivos de 2gb, lo intentaré subir todo en un mismo rar, para un solo link, si os parece bien, en megaupload va por partes de 100, pero no esta terminado, mañana a estas horas espero tenerlo :)
Nadie conoce Jdownloader, o cual es el problema? no entiendo como a mi se me bajo en 1 dia con 3mb y aca hay panzada de gente quejandose de que tarda mucho :o
Ya los estoy numerando ;D, he subido los primeros 8, mañana subo los 14 restantes, maldito megamanager :rolleyes:
http://www.torrentreactor.net/torrents/1884041/TBKResources-Certified-Penetration-Testing-Specialist-(CPTS)-2-DVDs (http://www.torrentreactor.net/torrents/1884041/TBKResources-Certified-Penetration-Testing-Specialist-(CPTS)-2-DVDs)
Perfect vacio, entre los tuyos y los mios ya está full, solo falta que lo añadan al primer post, 1 saludo ;)
se ve interesante pero seria bueno que se colocara en que ideoma esta :¬¬ :¬¬ :¬¬ :¬¬
Si en el primer post el indice de los módulos esta en inglés, supongo que estará en Austriaco, ¿No te parece?
Gracias vacio y Bht Sata por subirlo a megaupload, ya me lo he bajado y le di un vistazo. El curso esta muy bien pero espero sinceramente que a nadie le den un certificado en pen-test solo por saber lo que contienen los 3 DVDs :xD.
Será como en todas las academias (las que te preparan para el MCSE y MCSA, por ejemplo), te dan el temario básico en mano pero luego se profundiza mucho mas en clase y en las prácticas.
Y como ya te puedes imaginar, Banker25, el curso esta en Inglés.
hola, se que es un post muy antiguo pero alguien podria resubir las partes 1,15 y 17, los links estan caidos, gracias, saludos
ya lo estoy descargando, desde hace 5 horas y hasta ahora 2.2% pero bueno, este tipo de información es difícil de encontrar, gracias por el aporte
Grandioso matrial.
Los archivos 1, 15 y 17 dan problemas.
Jdownloader... exelente idea!.
De donde bajo los que faltaron?