Windows Exploitation Course: Stack and Heap Overflows

Rating: 
Amazon Price: $499.00 $499.00 (as of February 17, 2018 18:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This course gives intrinsic details of exploiting stack and heap overflows in Windows software applications. It walks the students through all the steps that are necessary for bug hunting from reverse engineering to fuzzing to actually writing exploits in Windows software applications. It also teaches how a student should actually go about exploiting these vulnerabilities and bypassing the various Windows protection mechanisms. Overall, this is a course worth the money. It is one of the best tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass them.

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Rating: 
Amazon Price: $60.00 $44.80 You save: $15.20 (25%). (as of February 17, 2018 15:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks.

In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done:
Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital versionFor IT security professionals, help to understand the risksFor system administrators, help to deploy systems securelyFor developers, help to design and implement secure web applicationsPractical and concise, with added depth when details are relevantIntroduction to cryptography and the latest TLS protocol versionDiscussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilitiesCoverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and HeartbleedThorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinningGuide to using OpenSSL to generate keys and certificates and to create and run a private certification authorityGuide to using OpenSSL to test servers for vulnerabilitiesPractical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and TomcatThis book is available in paperback and a variety of digital formats without DRM. Digital version of Bulletproof SSL and TLS can be obtained directly from the author, at feistyduck.com.

Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

Rating: 
Amazon Price: N/A (as of February 17, 2018 05:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.

Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
Continue reading “Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware”

Sabrent USB 3.0 to SATA External Hard Drive Lay-Flat Docking Station for 2.5 or 3.5in HDD, SSD [Support UASP and 4TB] (EC-DFLT)

Rating: 
Amazon Price: $22.99 $22.99 (as of February 17, 2018 07:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Description:

The Sabrent EC-DFLT SATA Lay-Flat Docking Station supports the direct insertion of Desktop 2.5"/3.5" SATA Hard Drives. It is a caseless solution that makes swapping hard drives easier than ever before. Plus, now you can take advantage of the lightening speed of USB 3.0 to quickly transfer files up to 5 Gbps!
Continue reading “Sabrent USB 3.0 to SATA External Hard Drive Lay-Flat Docking Station for 2.5 or 3.5in HDD, SSD [Support UASP and 4TB] (EC-DFLT)”

icablelink Hot Password Cracking USB Wifi Lan Card 15dBi wifi Antenna Network Ralink 3070 High Power 2000MW WiF

Amazon Price: N/A (as of February 17, 2018 15:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Package included:
1 X High power USB? wireless adapter
1 X 80cm USB cable
1 X 15dbi antenna
1 X CD driver
1 X User manual