FUD Crypter Source code

Hi guys i have a different types of source codes for crypter ....

What Free Crypter Sources are Included in the pack?
A pack of  Crypter Sources codes  varying from C++, VB6, VB.NET and C# will be provided and will be available for download.
.NET Requires.

Either C# or VB.NET

You can download from:

VISUAL BASIC 2010 EXPRESS http://www.microsoft.com/visualstudio/en-us/products/2010-editions/visual-basic-express
VISUAL C# 2010 EXPRESS  http://www.microsoft.com/visualstudio/en-us/products/2010-editions/visual-csharp-express

Some Sources Require C++ or VB6

VISUAL C++ 2010 EXPRESS http://www.microsoft.com/visualstudio/en-us/products/2010-editions/visual-cpp-express
Visual Basic 6.0 http://www.microsoft.com/download/en/confirmation.aspx?id=20429

interested in buying it i will give u guys a discount can contact me at hackin9crazy@gmail.com

TrainSignal 70-646 MCITP W2k8 Server Administration

Today, there is one idea that is transforming how we conduct business that idea is e-operations. 1995 Microsoft steps into the web browsers market, releases internet Explorer version 1.0.The question becomes one of determining which data to use. Better result might require simplifying design and operations, even as our techniques for handling complex phenomena improve.
 
If you are interested in the SQL world, then look at the MCITP Business Intelligence Developer 2008 certification. Given that that the SQL world is specialized to begin with, this is a specialty certification within the SQL world!

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com MCITP certification validates the comprehensive skills that are necessary for performing a particular job specialization role which includes enterprise messaging administration or database administration. MCITP certification also builds up technical proficient that are measured in the Microsoft certification informational technology professional. Microsoft MCITP Certification can bring you recognition and Career growth in the IT industry.

However, getting the certification is not a simple or easy process. There are seven different MCITP exams that must be taken in order to certify you as a Microsoft Certified Technology Specialist. Each MCITP exam must be passed in order to secure the certification. Once you pass the seven MCITP exams, you have the MITP certification for life, and may even apply it towards future certifications from Microsoft that are eligible. There are some wonderful study aids that you can use for the MCITP exam. One of my favorite is the Cert kingdom MCITP Certification MCITP Testing Engine. Not only does the MCITP Testing Engine cover each MCITP exam in mind numbingly explicit detail, but it will also give you practice MCITP exams to help check your readiness levels for each MCITP exam, Best MCITP Training via Testing Engine some features are listed below. * Live Realistic practice MCITP exams * Live Virtual MCITP exam environment * Live Practice MCITP exam environment * Mark unanswered Q&A * Free Life Time Updates * Realistic simulations of practice exams * 100% Success Guaranteed * Mail your MCITP exams results * Re-examine the unanswered Q&A * Make your own MCITP exam scenario (settings) * Get you’re self completely prepared for real MCITP exam * Included in Life Time Membership. The job marketplace of the IT industry, and for that matter all other industries too is becoming tougher and stricter, with no space left for compromises. Companies want to hire the best of professionals. This stands even more true and apt in case of the IT industry because every day, there are new challenges coming up, and there is a need for smart and efficient people who can deal with all obstacles effectively. The industry is growing at a fast rate, and only few have the ability to manage with all kinds of situations. To confirm that you are among the cream of the lot, Microsoft brings the MCITP certification.
MCITP stands for Microsoftcertification informational technology professional. With this certification, you will be able to show technical expertise in a variety of tasks which include Windows Operating System, Microsoft Exchange Server, Microsoft SQL Server, and Microsoft Visual Studio. The MCITP certification ensures that you gain both practical as well as theoretical knowledge. This kind of training helps in knowing and understanding the basic concepts well, and also helps to know their practical application. The MCITP guarantee is for fine-tuning quite a number of skills that you already know; which is precisely the reason why the candidate profile demands at least one to two years of experience in installing, configuring, troubleshooting, building and debugging of any one Microsoft Technology.


DownLoad Torrents Video Tutorials

Best Windows Tweaks for Windows 7 by Dark Lucifer

Windows 7 is already released and there is  a huge upgrade from previous versions of Windows.
Just got your hands on Windows 7 and want to bend it to your will? No problem. We've got plenty of tips, hacks and secrets to keep you busy for a long time, including automatically opening Windows Explorer to a folder of your choice, speeding up taskbar thumbnails, finding hidden desktop themes, forcing User Account Control to act the way you'd like, keeping your Explorer searches secret from others, and more.So check out these cool tips. If you like them, we'll keep more coming.
This list is not comprehensive by any means—if you have a favorite tweak that you like to use, leave us a comment and we’ll see about adding it to the list.

General tips

We'll start with a few nifty tips that can make your desktop more interesting, make it easier to get around and increase your computer's power efficiency.

Use Hidden International Wallpapers and Themes

When you first install Windows 7, it asks for your language, time and currency. Based on your responses, it installs a set of wallpapers and themes. If you choose English (United States) for your time and currency format, for example, the available desktop backgrounds and themes will include a United States section with scenery from locations such as Maine, the Southwest and so on.
Hidden, though, are background scenery and themes from other English-speaking countries -- Australia, Canada, Great Britain and South Africa. Normally, you can't access those backgrounds or themes, but there is a simple way you can install and use them:
1. In the search box in the Start menu, type C:\Windows\Globalization\MCT and press Enter. (Note: If Windows 7 is installed in a drive other than C:, use that letter instead.)
2. Windows Explorer will launch and show you a list of subfolders under C:\Windows\Globalization\MCT: MCT-AU, MCT-CA, MCT-GB, MCT-US, and MCT-ZA. Each subfolder has wallpapers for a specific country: AU for Australia, CA for Canada, GB for Great Britain, US for the United States, and ZA for South Africa.
For any of the countries whose wallpaper and themes you want to use, go into its Theme folder, for example, C:\Windows\Globalization\MCT\MCT-ZA\Theme. Double-click the theme you see there (for example ZA).
A South Africa theme, ready to use.
3. That will install a shortcut to the theme and wallpapers in the Personalization section of Control Panel.
You can now use them as you would any other theme or background, by right-clicking the desktop, choosing Personalize, and choosing a background or theme. They will be listed in their own section.

Shake Your Desktop Free of Clutter

If you frequently run multiple programs simultaneously, your desktop can get extremely cluttered. This can get annoying if you're working on one program and want to minimize all the other windows -- in previous versions of Windows you had to minimize them individually.
With Windows 7's "shake" feature, though, you can minimize every window except the one in which you're currently working -- in a single step. Click and hold the title bar of the window you want to keep on the desktop; while still holding the title bar, shake it quickly back and forth until all of the other windows minimize to the taskbar. Then let go. To make them return, shake the title bar again.
You can accomplish the same thing by pressing the Window key-Home key combination -- although doing that is not nearly as much fun.

Get a Power Efficiency Report

Have a laptop and want to get more battery life out of it? Windows 7 includes a hidden built-in tool that will examine your laptop's energy use and make recommendations on how to improve it. To use it:
1. Run a command prompt as an administrator. To do this, type cmd in the search box, and when the cmd icon appears, right-click it and choose "Run as administrator."
2. At the command line, type in the following:
powercfg -energy -output \Folder\Energy_Report.html
where \Folder represents the folder where you want the report to be placed.
3. For about a minute, Windows 7 will examine the behavior of your laptop. It will then analyze it and create a report in HTML format in the folder you specified. Double-click the file, and you'll get a report -- follow its recommendations for ways to improve power performance.

Modify UAC

The User Account Control security feature was one of the most reviled additions to Windows Vista, with good reason -- its constant warning messages asking for permission to continue many operations drove users around the bend. UAC has been significantly improved in Windows 7 so that it's not as intrusive as in Vista, but you can still tweak it if you like.
Here's how to turn UAC on or off, and make it less or more intrusive than the default:
1. Go to the Control Panel --> User Accounts and Family Safety.
2. Click User Accounts, then click Change User Account Control settings.
3. From the screen that appears, use the slider to select the level of protection you want. Here are the four levels and what they mean:
Always notify me. Think of this as UAC Classic. It works like Vista's UAC: When you make changes to your system, when software is installed or when a program tries to make a change to your system, an annoying prompt appears.
Default -- Notify me only when programs try to make changes to my computer. This is, obviously, the default; make a change yourself and UAC leaves you alone. When a program makes a change, a prompt appears and your desktop goes dark, just like it does in Vista. Otherwise, UAC sits there silently.
Notify me only when programs try to make changes to my computer (do not dim my desktop). This setting is identical to the default setting, with one difference: It won't dim your desktop so that you only see the UAC prompt asking you to take action. This presents a slightly elevated security risk over the default setting, because theoretically a program could allow a malicious program to interfere with the UAC prompt.
Never notify me when: In this one, UAC is completely turned off. This is, of course, an insecure option and not recommended for most users.
After you make the selection, click OK. Depending on the selection you made, you may need to restart your system for it to take effect.

Start Menu tips

Many people overlook the Start Menu, rarely using it except as a jumping off point to run an application or get to the Control Panel. But there's actually plenty you can do with it.

Search the Internet from the Start Menu

The Start Menu's search box is a convenient way to search through your PC -- but you can also have it do double-duty and perform Internet searches as well. To enable this feature:
1. In the Start Menu search box, type GPEDIT.MSC and press Enter to run the Group Policy Editor.
2. Go to User Configuration --> Administrative Templates --> Start Menu and Taskbar.
3. Double-click "Add Search Internet link to Start Menu," and from the screen that appears, select Enabled. Then click OK and close the Group Policy Editor.
4. From now on, when you type a search term in the Search box on the Start Menu, a "Search the Internet" link will appear. Click the link to launch the search in your default browser with your default search engine.

Customize the Shut Down Button

The default action of the Start Menu's Shut down button is to turn off your PC. If you want to use the button for another action, such as restarting your PC, you click the arrow to the right of the Shut down button and select an action from the drop-down menu.
What if you rarely shut your PC down completely but frequently restart it? You can change the Shut down button's default action to be Restart -- or Switch user, Log off, Lock, Sleep or Hibernate.
To change your default, right-click the Start button and select Properties. On the Start Menu tab, click the "Power button action" drop-down menu and select which action you want to be the default. Then click OK, and OK again.

Add a Videos Link to the Start Menu

The Windows 7 Start Menu includes links to your Pictures and Music folders, but not to your Videos folder. If you watch a lot of videos and want a link to them on your Start Menu, here's what you can do:

1. Right-click the Start button and select Properties.
2. On the screen that appears, go to the Start Menu tab and click Customize.
3. In the dialog box that appears, scroll to the bottom, look for the Videos section, select "Display as a link," and click OK and then OK again.
If you'd prefer that Videos display as a menu, with links to files and submenus, instead select "Display as a menu.

Windows Explorer tips

Windows Explorer is the heart and soul of the Windows interface, and overall it works quite well. But you can make it better.

Use check boxes to select multiple files

In order to select multiple files for an operation such as copying, moving or deleting in Windows Explorer, you generally use the keyboard and the mouse, Ctrl-clicking every file you want to select. But if you're mouse-centric, there's a way to select multiple files in Windows 7 using only your mouse, via check boxes. To do it:
1. In Windows Explorer, click Organize, and then select "Folder and search options."
2. Click the View tab.
3. In Advanced Settings, scroll down and check the box next to "Use check boxes to select items." Click OK.
4. From now on, when you hover your mouse over a file in Windows Explorer, a check box will appear next to it; click it to select the file. Once a file is selected, the checked box remains next to it; if you uncheck it, the box will disappear when you move your mouse away.

Open a command prompt at any folder

Command prompt fans will welcome this tip. With it, when you're in Windows Explorer, you can open a command prompt to any folder. This tip does exactly what the Windows XP PowerToy "Open Command Window Here" does.
To use it, hold down the Shift key and right-click a folder, then choose "Open command window here" from the context menu that appears. (Note that this tip doesn't work in the Documents folder.)

Protect the privacy of your Explorer searches

When you search through your PC from Windows Explorer, you can see the most recent searches that have been performed. If you share a PC and don't want others to see what you've searched for, you can turn off the recent searches feature:
1. In the Start menu's Search box, type GPEDIT.MSC and press Enter to launch the Group Policy Editor.
2. Go to User Configuration --> Administrative Templates --> Windows Components --> Windows Explorer.
3. Double-click "Turn off display of recent search entries in the Windows Explorer search box" and select Enabled from the screen that appears. Then click OK. The recent searches feature will now be turned off.

Set a New Windows Explorer Launch Folder

When you run Windows Explorer, it always opens to the Libraries folder. That's fine if you use Microsoft's default file organization, which designates Libraries as the overall container for your folders. But what if you don't? You might prefer to have Windows Explorer open to Computer or any other folder you choose. Here's how to do it
1. Right-click the Windows Explorer icon on the taskbar (it's the one that looks like a folder), and then right-click the Windows Explorer icon from the context menu that appears and select Properties. The Windows Explorer Properties dialog box appears.
2. You'll have to edit the Target field on the Shortcut tab of this dialog box in order to change the default location at which Explorer opens.
If you want Explorer to open to a specific folder, simply enter the name of the folder, substituting your folder name for Folder, below, like this:
%windir%\explorer.exe c:\Folder
So to open Explorer to the folder named Budget, you would type this in the Target field:
%windir%\explorer.exe c:\Budget
If you want Explorer to open to special, pre-set locations, such as Computer, you'll need to enter special syntax in the Target field. Following is a list of three common locations and the syntax to use, followed by the syntax for the Libraries folder in case you ever want to revert to the default.
  • Computer: %windir%\explorer.exe ::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
  • My Documents: %windir%\explorer.exe ::{450D8FBA-AD25-11D0-98A8-0800361B1103}
  • Network: %windir%\explorer.exe ::{208D2C60-3AEA-1069-A2D7-08002B30309D}
  • Libraries: %SystemRoot%\explorer.exe
3. After you've changed the Target field, click OK. Next time you launch Windows Explorer, it will open to the new location you've designated.

Show all Your Drives in Windows Explorer

Depending on your system settings, when you go to Computer in Windows Explorer, you may be in for a shock -- you may not see all your drives such as memory card readers if those drives are empty. If this disconcerts you, there's a simple way for you to see them even if there's nothing there:
1. Launch Windows Explorer and press the Alt button to reveal the top menu.
2. Select Tools --> Folder Options and click the View tab.
3. Under "Advanced settings," uncheck the box next to "Hide empty drives in the Computer folder." Click OK. The drives will now always be visible.

Build Your Own Internet Search Connector

Windows 7 has a very useful new feature called a Search Connector that lets you search through a Web site from right inside Windows Explorer. With it, you type in a search term and select the Search Connector for the site you want to search; Explorer searches the Web site without having to open Internet Explorer, and the results appear inside Windows Explorer. Click any of the results to head there using your default Web browser.
Normally, you'll need to get each Search Connector from the Web site through which you want to search, and very few Connectors are available. Sites normally need to adhere to OpenSearch standards in order for their Connectors to work.
However, there's a work-around that will let you easily build your own Search Connector for any site, using Windows Live Search as a kind of go-between. Don't worry, you don't need to know any code to write a Connector. Just follow these steps:
1. Copy the following text and paste it into Notepad. The text you'll need to change is in bold, all-caps text:
<?xml version="1.0" encoding="UTF-8"?>
<OpenSearchDescription xmlns="http://a9.com/-/spec/opensearch/1.1/" xmlns:ms-ose="http://schemas.microsoft.com/opensearchext/2009/">
<ShortName>NAME YOUR SEARCH</ShortName>
<Description>DESCRIPTION OF SEARCH</Description>
<Url type="application/rss+xml" template="http://api.bing.com/rss.aspx?source=web&query={searchTerms} site:SITENAME.COM&web.count=50"/>
<Url type="text/html" template="http://www.bing.com/search?q={searchTerms}+site:SITENAME.COM"/>
</OpenSearchDescription>

2. In place of NAME YOUR SEARCH, type in the name of the search as you want it to appear. In our case, we're going to build a Search Connector for Computerworld, so we'll just type in Computerworld.
3. In place of DESCRIPTION OF SEARCH, type in a longer description of the search. In our instance, it will be Search through Computerworld.
4. In the two SITENAME.COM entries, enter the Web site's domain. Don't use the http:// or www -- just the domain name. In our instance it will be computerworld.com.
5. To the right of "count=", type in the number or results you want to appear. In our instance, we'll keep it at 50.
6. In our example, here's what the code should look like (no bold necessary):
<?xml version="1.0" encoding="UTF-8"?>
<OpenSearchDescription xmlns="http://a9.com/-/spec/opensearch/1.1/" xmlns:ms-ose="http://schemas.microsoft.com/opensearchext/2009/">
<ShortName>Computerworld</ShortName>
<Description>Search through Computerworld</Description>
<Url type="application/rss+xml" template="http://api.bing.com/rss.aspx?source=web&query={searchTerms} site:computerworld.com&web.count=50"/>
<Url type="text/html" template="http://www.bing.com/search?q={searchTerms}+site:computerworld.com"/>
</OpenSearchDescription>
7. Save the file in Notepad, choose UTF-8 from the Encoding drop-down box near the bottom of the Save As screen, and give it an .osdx extension. In our instance, we'll call the file Computerworld.osdx.
8. In Windows Explorer, right-click the .osdx file and select Create Search Connector. The Search Connector will be created.
9. You can now use the Search Connector. To get to it, in Windows Explorer go to YourName --> Searches --> Connector, where YourName is your account name, and Connector is the name of the Connector.

Post ur valuable comments........

Tutorial For setting up Zeus Bot Free

This Tutorial is for education purposes ONLY and I am NOT responsible in any way on how you use the information provided and what you do with the files. Thank you and enjoy reading.

First of all I want to tell you that ZeuS Bot is the most illegal bot out there. It is the only bot that connects to a webhost and not to a IRC channel or a PC. It is highly illegal as it is considered as a banking trojan as it logs every internet activity to a database. Well lets start.

Step 1:
First of all you need offshore hosting, preferably bulletproof.
The best i've found so far is Addon Hosting with cPanel.
Think of a domain that is not easily tracked tho if possible.

After that get the files needed.
Download % Mirrors:


################################################################

- THIS LINK/DOWNLOAD/IMAGE OR TEXT HAS BEEN HIDDEN -Requset for download
Step 2:
Uploading the files.
1. Go and login into your CPanel X.
[Image: 201003241645cpanel.png]

2. Go to File Manager.
[Image: 201003241647cpanelx.png]

3. Go and create a directory of your choice.
[Image: 201003241649cpanelfilem.png]

4. Upload the upload.zip to the directory created.
[Image: 201003241657cpanelfilem.png]

5. After that extract the files.
[Image: 201003241659cpanelfilem.png]

6. Chmod the directory /install/ and /system/ to 777. Also the whole directory.
[Image: 201003241703cpanelfilem.png]

Step 3:
Creating the Database.
1. Go to MySQL Databases in your CPanel.
[Image: 201003241707cpanelx.png]

2. Create a database and write the name down.
[Image: 201003241709cpanelx.png]

3. Add new user and write the details down.
[Image: 201003241711cpanelx.png]

4. Now add the created user to the created database. Be sure to select all privileges.
[Image: 201003241713cpanelx.png]
[Image: 201003241713cpanelx2.png]

5. Be sure you have written everything down and move to the next step.

Step 4:
Installing the panel.
1. Navigate to the directory you created and got to /directory/install/. A Panel installer should appear.
[Image: 201003241720controlpane.png]

What to enter:
Code:
Username: Enter the default username which you will use when logging in.
Password: Your password when logging in. Make it strong.
MySQL server:
Host: "localhost"
User: Your database user created before.
Password: Your database password created for the user.
Database: The database name.

Online bot timeout: Leave it as it is.
Encryption key use something VERY strong.

Then Click Install.
[Image: 201003241730controlpane.png]

Step 5:
Making the bot.
1. Navigate to your ZeuS files and open config.txt
Replace the link where it says with your link. Also the encryption key you used before.
[Image: 201003241739zeus.png]

2. Open the zsb.exe
The builder also has a remover so if you test your server on your own pc you can just remove it with a mouse click.
Click on Builder.
[Image: 201003241742zeus.png]

Then click on Build Config. Save the file.
Click Build Loader. Save the file.
[Image: 201003241743zeusbuilder.png]

Now go and upload cfg.bin and bt.exe to the same directory as the panel.
Also you can delete the /install/ folder since the panel has been installed in the previous step.
[Image: 201003241749cpanelfilem.png]

In final the directory with Zeus installed should look like this:
[Image: 201003241750cpanelfilem.png]

Installed! Now a tutorial on how everything works!

Now navigate to the directory where you hav your ZeuS bot panel. Got to /directory/cp.php
A login box like this should be there:
[Image: 201003261654login.png]

Enter your panel username and password.
if you would like for your browser to keep cookies so that you don't need to login again every time you leave the page check the option.
Click Submit.
[Image: 201003261656login.png]

So now here is the panel.
[Image: 201003261704newthreadin.png]

1. Shows you the current user
2. Shows you the summary (see green comments)
3. Shows you the OS statistics of the infected bots.
4. You can browse through the bots and and their reports
5. You can browse through the scripts you got. Add/edit them.
6. There you can search trough the reports in the database
7. There you can search through the reports which are most times is txt format.
8. Just random information about your system and stuff.
10. Options. If you change the encryption key the automatically you loose all your bots. You need to make new server and config file with the new encryption key and spread it again.
11. Change your password.
12. Add and manage users.

1. Shows you the number of total reports in database.
2. Shows you the time the first bot came online.
3. Shows you total bots. The number of total pc's infected.
4. Shows you the number of active bots ins the past 24 hours.
5. Shows you the minimal version of bots.
6. Shows you the maximal version of bots.
7. Installs. Every pc which has not been infected with a Zeus bot server before gets on this list.
8. With this buttons you can reset the installs.
9. Shows you how much bots are currently online.
10. Lets you jump to statistics of a botnet.

Now you just need to spread your server.

Thank you for reading.
Please take your time to reply

Tutorial How to install cythosia Bot Free


Requirements:

- Cythosia bot, download Link will be Given to the members who send request because of security issues.
- A web host on http://www.000webhost.com/ or any other web host but this one is for free.

First Step:

Login into your webhost account or register and get into your web host. The website takes you to a page where you have": List of your domains."
Click on go to cPanel of the domain you've just made.

Second Step:

Extract the file you just downloaded to your desktop.
Scroll down the new page that is open and click on "File Manager" in the " Files" section.
note: If the site asks for a login, enter the password of your account.
Having a new page open, Open the document called " public_html",
There, Click the upload button,
You'll be redirected to a page where is:

Files
Files entered here will be transferred to the FTP server.

And

Archives (zip, tar, tgz, gz)
Archives entered here will be decompressed, and the files inside will be transferred to the FTP server.

- Under the archives section, click " Choose File". and choose the " webPanel zip archive that just came after you've extracted the download one. After that click the "Check" above the : "Upload to directory" and wait a few seconds.

Third Step:

Return back to the first page of the File manager.
Now to configure the files you've just uploaded so the bot could work, you have to enter the webpanel folder on your webhost and click on Chmod after selecting all the files in it. You get redirected to : "Chmod directories and files" there change the Chmod value of the files to 777 and click the Check mark button.

Forth step:

Now you can exit the window your are in, and return to the members area: " Cpanel". There scroll down until you see : "» Software / Services", inside that section, click the one named after " MySQL ".
Create a new database with the username, database name and password you want, but keep them in your mind or save them somewhere.

Fifth Step:

Return back to the CPanel and click the " phpMyAdmin " in the same section as of the MySQL one. Press Enter phpMyAdmin to the database you've just created. A new window will open, in the one that just opened click, Import, the file that we must choose is the one named dump which is located in the Webpanel folder that you've extracted also in the beginning, select it and press " GO ". After doing that, you can now close that window.

Sixth Step:

Get Back to the Cpanel and press file manager again, Navigate to:
/public_html/Botnet/Webpanel/admin/inc
And Edit the config.php file, Edit it with the details of the Mysql Database, username and password you've just created.
Finally, save the file and exit the window.

Seventh Step:

Enter the domain of your webhost, you'll get to put a password, Type in " admin ".

*Creating a bot:

To create your bot just Open " CythBuilder " and change the " Domain " thing to your domain. After that you can change " 1.0.6 [beta] [23-03-2011]" to a name of your choice. And the " Drop Name.exe " to the file name you want to appear.

Any Queries Post ur comments i will clarify ur doubts

Exploit Writing (Complete Guidelines For Penetration Testers)

 
I put some time in and compiled a list in a course type layout to help people in process of learning exploit development. I hope my research will help others spend more time learning and less time searching.
First off I want to thank the Friends for the help they have provided me so far in the process.
layout: I will be posting in a hierarchical structure, each hierarchy structure should be fully understood before moving on to the next section. I will also post sets of Parallel learning topics that you can use to study in line with other topics to help prevent monotony. These Parallel areas will have a start and end mark which shows when they should be complete in perspective to the overall learning
 

 Other Posts like this one i have discovered while googling :
Because of quality of these posts I wanted to put them at the top. I could not figure out where to put them in the list because they cover so much.

So Check This Out Guys Before u go down
past-present-future of windows exploitation
smashing the stack in 2010
IT-Sec-catalog  

            Part 1: Programming
Parallel learning #1:
(complete this section before getting to the book "Hacking Art of exploitation") While going through the programming area I concentrate on core topics to help us later on with exploit writing. One area that is very good to pick up is some kind of scripting language. Listed below are some of the most popular scripting languages and ones I feel will prove to be the most useful. Python: One of my favorite languages and growing in popularity python is a powerful language that is easy to use and well documented. 1. Learn Python the hard way
5.Grey hat python                                                                                              If you plan on later on working inside of metasploit this may be the language you want to start with. I highly suggest this for exploit developers to learn. Wikibooks Ruby,   LittleBookOfRuby,   Ruby Programmers Guide,   onlinecomputerbooks.com                                                                                                 Perl: An older language that still has a lot of use perl is one of the highest used scripting languages and you will see it used in many exploits. (I would suggest python over perl) [book] O'Reilly Learning Perl onlinecomputerbooks.com C and C++ programming: It is very important to understand what you are exploiting so to get started let us figure out what we are exploiting. You do not need to go through all of these but when finished with this section you should have a good understanding of C and C++ programming. Cprogramming.com http://www.java2s.com/Tutorial/C/CatalogC.htm http://beej.us/guide/bgc/ onlinecomputerbooks.com X86 Assembly: Ok now to understand what the computer reads when we compile C and C++. I am going to mostly stick to the IA-32(X86) assembly language. Read the first link to understand why. It explains it very well. Skullsecurity: Assembly Windows Assembly Programming Tutorial http://en.wikibooks.org/wiki/X86_Assembly [book]The Art of Assembly Assembly primer for hackers PC Assembly Language Windows Programming: This is to help understand what we are programming in and the structure of libraries in the OS. This area is very important far down the line http://en.wikibooks.org/wiki/Windows_Programming http://www.relisoft.com/win32/index.htm [book]Windows Internals 5 [book]Windows Internals 4 Disassembly: Dissassembly is not as much programming as it is what the computer understands and the way it is interpreted from CPU and memory. This is where we start getting into the good stuff. http://en.wikibooks.org/wiki/X86_disassembly The Art of Disassembly   

Part 2: Getting started 
Now that we have a very good understanding of programming languages and what the machine is doing we can start working on task at hand, exploitation. Here I will start a lot of the learning in very much a list format and adding in comments or Parallel learning areas when needed. Smash the stack for fun and profit (Phrack 49) C function call conventions and the stack Anatomy of a program in memory Function Calls, Part 1 (the Basics) IA-32 Architecture [videos]Code Audit from cryptocity.net (Parallel learning #1 finished: You should now have finished on Parallel learning 1 and have a good understanding of one of the 3 languages) [Book]Hacking art of exploitation [Chapter 1&2] 
#2:(complete this section before end of part 2) (Read the first few posts on this blog has some good info) Kspice blog (Read some of the post from this blog they are very helpful with starting out with fuzzers.) Nullthreat's blog (I am linked directly to a demo exploit for this area but this is a useful blog to keep track of for many things) A demo exploit tenouk.com: Buffer overflow intro The Tao of Windows Buffer Overflow nsfsecurity on BOF Hacker center: BOF [video]Buffer overflow Primer [Book]Shellcoder's Handbook Ch1&2 [Book]Hacking art of exploitation [Chapter 3]  SEH Based Exploits and the development process SEH overwrite simplified ((Parallel learning #2 finished:) 

Part 3:Tools of the trade
This is a list of tools I have started using and find very useful. Immunity Debugger Ollydbg Windbg IDA Pro explorer suite Sysinternals And here are some corelan posts on how to use them. I will supply more in future but this is a very good start. (Or Drop in a Comment Box Or mail me at suren.click.com) 
Part 4: Network and Metasploit
Part 5: Shellcode
Part 6: Engineering in Reverse
  1. Part 7: Getting a little deeper into BOF

Part 8: Heap overflow

Part 9: Exploit listing sites

 I Hope Its a great post for those who get some skills on exploit writing

Thanks, 

Delicious FacebookStumbleupon Favorites More