1 网络安全基础
1.1 黑客大曝光系列
《黑客大曝光》是全球销量第一的计算机信息安全图书,被信息安全界奉为圣经。作者独创“黑客大曝光方法学”,从攻防两方面系统阐述了最常见的黑客入侵手段及对应的防御策略。
McGraw.HackingExposed.6Ed.Network Security Secrets And Solutions.2009.pdf
HackingExposed Web Applications, Second Edition
HackingExposed Windows, Third Edition
HackingExposed Linux, Third Edition
HackingExposed VoIP
HackingExposed Wireless
HackingExposed Web 2.0
Hacker’sChallenge 3
2 端口扫描
2.1 Nmap
Syngress - Secrets of Network Cartography -A Comprehensive Guide to Nmap - Complete.pdf
nmap-mindmap.pdf
nmap-mindmap.pdf
Fyodor-David-BlackHatUSA-2010-Slides.pdf
Fyodor-David-Defcon18-Slides.pdf
bhdc08-slides-fyodor.pdf
Fyodor-David-BlackHatUSA-2010-Slides.pdf
Fyodor-David-Defcon18-Slides.pdf
2.2 NetCat
Netcat_Tutorial.pdf
3 漏洞扫描
3.1 Nessus
Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf
Syngress.Nessus.Snort.and.Ethereal.Power.Tools.Customizing.Open.Source.Security.Applications.Sep.2005.pdf
4 渗透测试
4.1 Basic
Hacking.The.Art.of.Exploitation.2nd.Edition.Feb.2008.pdf
Penetration Testingprocedures&methologies .pdf
Syngress.Google.Hacking.for.Penetration.Testers.Volume.2.Nov.2007.pdf
The Basics of Hacking and PenetrationTesting-Slicer.pdf
4.2 BackTrack
BackTrack 4 Assuring Security byPenetration Testing.pdf
4.3 Metasploit
Metasploit The Penetration Tester’sGuide.pdf
5 GoogleHacking
Google Hacking For Penetration Testers.pdf
Google_Tips_Tricks.pdf
6 社会工程学
The_Art_of_Deception.pdf
7 逆向工程
Reversing Secrets of ReverseEngineering.pdf
Rootkits Subverting the Windows Kernel.pdf
8 黑客小说
8.1 Stealing the Network系列
syngress - stealing the network how to ownthe box.pdf
Syngress - Stealing the Network - How toOwn a Shadow.pdf
Stealing the Network How to Own aContinent.pdf