linux cbt security CD10(bttrove org)

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
linux cbt security CD10(bttrove org)

Download FREE And Anonymously

Torrent info

Name:linux cbt security CD10(bttrove org)

Total Size: 345.15 MB

Magnet: Magnet Link

Seeds: 0

Leechers: 0

Stream: Watch Full Movie @ Movie4u

Last Updated: 2017-08-18 22:09:59 (Update Now)

Torrent added: 2009-09-02 04:11:45

CyberGhost VPN For Torrents

Torrent Files List

Autorun.inf (Size: 345.15 MB) (Files: 73)


0.03 KB

 Copy of ELECTROSOFT 1.85

2.32 KB


1.04 KB

 Torrent downloaded from BtTrove.org.txt

0.06 KB


8.81 KB



0.28 KB


0.16 KB


0.28 KB


0.16 KB


0.26 KB


0.16 KB


0.26 KB


0.16 KB


0.32 KB


0.27 KB


0.27 KB


0.29 KB


3.74 KB


151.86 KB



3.27 MB


113.16 KB


10.49 MB


4.77 MB


5.64 MB


6.17 MB


5.53 MB


11.27 MB


5.06 MB


120.18 KB


3.56 MB


4.83 MB


5.19 MB


5.55 MB


5.31 MB


5.52 MB


3.75 MB


9.58 MB


4.91 MB


5.21 MB


6.68 MB


16.95 MB


8.13 MB


5.85 MB


3.56 MB


3.35 MB


5.78 MB


3.76 MB


5.21 MB


5.12 MB


12.43 MB


5.46 MB


7.62 MB


5.01 MB


3.61 MB


3.69 MB


9.70 MB


14.06 MB


6.60 MB


10.77 MB


10.66 MB


15.81 MB


5.71 MB


8.55 MB


6.99 MB


7.00 MB


5.26 MB


11.00 MB


6.20 MB


3.40 MB


5.36 MB


5.40 MB


4.47 MB


1.71 KB

Announce URL:

Torrent description

Linux Concepts/Offensive/Defensive Security Implementation Techniques - Module 10

* Secure Shell (SSH) Concepts & Implementation
o SSH client concepts - replacement for clear-text-based Telnet, RCP, FTP protocols.
o Identification of required OpenSSH/OpenSSL components
o Demonstrate SSH connectivity & public key registration
o Implement globally-shared public keys
o Generate RSA & DSA public key/private key pairs
o Configure SSH client and SSHD to authenticate via public/private key pairs
o Authenticate to remote hosts using public/private key pairs
o Use Secure Copy (SCP) to move files
o Port Forwarding implementation
o Port Forwarding integration with Linux & Windows 2003 Server
o X11 Forwarding demonstration
o Use Secure File Transfer Protocol (SFTP) to move files


* Linux Defensive Security Implementation Techniques
o Implement NMAP port scanner and demostrate usage to ascertain open doors
o Discuss & demonstrate operating system fingerprinting techniques with NMAP
o Demonstrate IP-spoofing & packet forging with NMAP
o Discuss the benefits of the NESSUS Security & vulnerability scanner
o Implement Nessus client/server Security vulnerability scanner
o Demonstrate parallel security scanning of local & remote subnets
o Explore Nessus's reporting capabilities (NBE/XML/HTML/etc.)
o Demonstrate Nessus class-based access for corporate usage
o Implement Ethereal network sniffer
o Demonstrate telnet clear-text password theft with Ethereal
o Demonstrate alternative SSH encrypted sessions with Ethereal
o Demonstrate FTP clear-text password theft with Ethereal
o Demonstrate alternative SFTP encrypted sessions with Ethereal
o Implement HPING highly customizable packet forging tool
o Compare & contrast PING with HPING
o Demonstrate IP packet spoofing with HPING & Cisco PIX firewall integration
o Demonstrate HPING's ability to communicate with ICMP-filtered Internet servers
o Demonstrate using HPING to setup a trojan horse backdoor for executing arbritary code
o Implement John the Ripper password cracking tool
o Discuss file and directory security
o Implement chmod,chown,umask,SUID,SGID,etc.
* Linux Defensive Security Implementation Techniques
o Implement Multi-Router Traffic Grapher (MRTG) to establish network performance baseline
o Configure Cisco PIX firewall for MRTG support via Simple Network Management Protocol (SNMP)
o Configure MRTG to generate perfomance & badwidth-related graphs for Cisco PIX firewall
o Implement IP Tables Host-based firewall support
o Configure IP Tables to restrict access to necessary services
o Introduce, discuss & plan the implementation of Snort 2.x Intrustion Detection System (IDS)
o Discuss Snort intrustion detection concepts related to hubs & switches
o Install Snort 2.0 Network-based Intrusion Detection System
o Implement Snort 2.0 network sniffing functionality
o Implement Snort 2.0 sniffing & packet-logging functionality
o Demonstrate Snort's ability to monitor traffic between designated hosts
o Demonstrate password theft using Snort & FTP connections
o Demonstrate password theft using Snort & Apache HTTP basic authentication connections
o Implement Snort 2.0 Network-based Intrusion Detection System
o Implement SnortSnarf for web-based reporting of Snort 2.0 logs
o Examine SnortSnarf reports via SSL-enabled web session
o Demonstrate how to implement port mirroring on Cisco Catalyst switches
o Implement Network Address Translation (NAT)
o Discuss & Implement Port Address Translation (PAT)
o Implement TCP Wrappers
o Configure Xinetd to suppress access to the system from port-scanners
o Discuss & Disable Portmap services

to download: login to http://www.bttrove.org or use the passkey

passkey = ?trove=14pa58tnR0


related torrents

Torrent name

health leech seeds Size

comments (0)

Main Menu