Your Ad Here

You're up late, banging away at your keyboard. You find the hole you
were looking for. Now you just find the right directory, copy a couple
files, back right out of the system, and erase your tracks. Within 15
minutes of finding a back door into the network, you've downloaded
transaction data for all credit card transactions within the last two
years. You'd think credit card processing companies would be more
secure than that.

The FBI should be busting down your door any minute now. But they
won't. You print out your keystroke logger info. You make a phone call.
"I got in." They don't believe it. But when you deliver the keystroke
log the next day, they're floored. They cut you a check, and offer you
an even bigger contract to help them fix the hole.

Do things that should get you arrested - but get paid instead. Ethical hacking is so cool.

The Certified Ethical Hacker Series contains:

- Series Intro (free video)

- Hacker Terms

- Hacker Procedures

- Using VMWare

- Using Linux

- Passive Intelligence Gathering Part 1

- Passive Intelligence Gathering Part 2

- Social Engineering

- Network Reconnaissance Part 1

- Network Reconnaissance Part 2

- Service Identification and Enumeration

- Vulnerability Assessment: Nessus & GFI Languard

- Vulnerability Assessment: Network Sniffing



- password cracking

- Exploits Part 1: Linux

- Exploits Part 2: Windows

- Web and File Exploits

- Wireless Security

- Erasing Tracks


Posted by Cyber Trunks


Your Ad Here