Skip to main content

Certified Ethical Hacker v7 Complete package



This contains the complete package to the Certified Ethical Hacker course, version 7 (the most recent at the time of this upload).  It contains the lectures (as videos), the study guide, unencrypted copies of the teacher's instructor slides, and all the programs you'll need in the course.  Note that the programs are put in ISO images.  To open the ISOs, you can either burn them to a disk and open them like any other data-containing disk, or you can open them with software such as 7-zip (which is what I prefer, because after all ISOs are only containers).  Along with the tools are animations that explain how to use them (and how to install them).  Also, just because this focuses on "ethical hacking" (or authorized hacking as I prefer to call it) doesn't mean it doesn't teach you black hat methods.

The official Certified Ethical Hacker course costs something like $500, and you can only take the exam once.  If you fail, you have to pay another $500 to retake it.  That's what this torrent is for, studying.  And its not just studying for the CEH exam, its also simply a great way to learn hacking.  Note that this course assumes you have moderate understanding of computers, a computer with Windows (the course is oriented around Windows, but if you have Linux then many of the Windows tools can be run through Wine), and plenty of time on your hands.  You do not need to be a Linux guru or have programming knowledge to learn from this course.

The course is broken up into different sections, called "modules", each teaching a slightly different subject.  The modules are:
-Module 02: Footprinting and Reconnaissance
-Module 03: Scanning Networks
-Module 04: Enumeration
-Module 05: System Hacking
-Module 06: Trojans and Backdoors
-Module 07: Viruses and Worms
-Module 08: Sniffers
-Module 09: Social Engineering
-Module 10: Denial of Service
-Module 11: Session Hijacking
-Module 12: Hacking Webserver
-Module 13: Hacking Web Applications
-Module 14: SQL Injection
-Module 15: Hacking Wireless Networks
-Module 16: Evading IDS, Firewalls, and Honeypots
-Module 17: Buffer Overflows
-Module 18: Cryptography
-Module 19: Penetration Testing


I originally found this torrent on TPB, but it was so tremendously helpful I decided to upload it elsewhere.  Enjoy this torrent, remember to seed, and get hacking!
Category:Other
Size:16.30 GB
Click to see files:
84 files


Torrent FileTorrent File
Torrent File
Direct Download
Direct Download
No client needed
Magnet Link
Magnet Link
Fast search in Other category:    

Downloaded:179 times
Info Hash:01f570c325730973138652e9d482deb1822f192f
Tracker listSeedsLeechersCompleteLast update
udp://tracker.yify-torrents.com:80/announce697316331/08/2012 17:04:13
http://tracker.ccc.de:80/announce687216231/08/2012 16:26:41
http://bt.rghost.net:80/announce677017931/08/2012 18:41:33
udp://tracker.publichd.eu/announce667316431/08/2012 18:05:10
http://tracker.yify-torrents.com:80/announce646716831/08/2012 17:27:57
http://ipv4.tracker.harry.lu/announce646017631/08/2012 16:44:28
http://tracker.publichd.eu/announce495517931/08/2012 18:10:31
http://tracker.torrentbay.to:6969/announce28331931/08/2012 17:52:55
udp://torrentbay.to:6969/announce27341731/08/2012 17:07:57
http://torrentbay.to:6969/announce26441731/08/2012 18:14:44
http://www.h33t.com:3310/announce252913931/08/2012 19:01:17
udp://fr33dom.h33t.com:3310/announce22345531/08/2012 18:28:11
http://fr33dom.h33t.com:3310/announce22295531/08/2012 19:11:05
http://torrento.net:2810/announce23531/08/2012 17:32:34
http://tracker.coppersurfer.tk:6969/announce211031/08/2012 16:09:52


sourav


thanks a trillion frnd...

Comments

Have a look!

Norton Internet Security 2013 20.0.0.39

 Norton Internet Security 2013 20.0.0.39 Norton Internet Security 2013 provides an early look at the next generation of Symantec's security suite. There are no major changes this time around - at least, not yet, and not that we've spotted. The most significant and obvious tweaks have been made to the interface. The style is similar to the previous edition, but it's been optimised for touch (and if you install the package on Windows 8, can now be controlled via a Metro app). Support for hardware acceleration should improve its responsiveness, too. The program does also provide improvements in protection, although they're mostly out of sight. The Insight file reputation database is now updated more rapidly, for instance; Insight technology has been incorporated into the firewall to "improve the ability to detect and block malicious network activity"; SONAR now works in Safe Mode to detect more threats via their behaviour; and Internet Security 2013 c

Gangs of Wasseypur II (2012) DVDScr 650mb

Storyline: Wasseypur is no more the town that was once consumed by the raging war between Sardar Khan and Ramadhir Singh. It has spawned a new generation of money squandering lobbyists, turning into foolhardy gangs overnight. With illegal profiteering through scrap trade auctions over the Internet, corrupt government officials, election rigging and hooliganism, the town got murkier. Everyone wants alliance with the most powerful man of Wasseypur, Faizal Khan. His sole ambition however, is to annihilate Ramadhir Singh, the man with the grand scheme. Gangs of Wasseypur-Part 2 is a fitting conclusion to this story of vengeance, which by now, not just the family but also this town has come to inherit. Movie Info: http://www.imdb.com/title/tt2284926/ [TITLE]…………………….[ Gangs of Wasseypur II [DIRECTOR]………………….[ Anurag Kashyap [RELEASE DATE]………………[ 8 August 2012 (India) [FORMAT]:…………………..[ Matroska (MKV) [GENRE]:……………………[ Action | Crime | Drama [NO OF CDs]…………………[ 1 [FILE SIZE]:……

How To Hack Facebook Account-PART-2- The Web Browser Attack

PART 1 LINK In this following post  ll discus with you about  how you can hack facebook account  using tools that can attack web browser's password safe. Each web browser has feature of storing passwords, every browser first encrypts that password and then stores it in password database but the fact is that their encryption method is so weak that these tools can retrieve passwords  from them with or without master password enabled. They can sometimes retrieve passwords even from cookies and caches stored by web browsers that means you only need your victim to use web browser at least for once. Here I am providing you link to those tools along with small description as per by their manufactures, all of them are free and one click and output ready tools, surely they don't require tutorials just because result is obtained just by a single click. Facebook Password Decryptor: FacebookPasswordDecryptor is the FREE software to instantly recover stored Facebook acc