Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Sécurité informatique by Mind Map: Sécurité informatique
5.0 stars - 2 reviews range from 0 to 5

Sécurité informatique

veille

gouv

fiches sensibilisation http://www.ene.fr/fr/eneinformer/fiches-information-usages-tic/fiches-ssi-pratic.html

forum iranien http://forum.itsecteam.com/

http://www.offensivecomputing.net/

securityfocus

archives

mindmaps

source code

Search engines http://r00tsec.blogspot.com/2011/05/search-engine-for-everything.html

http://lulzsecurity.com/releases

http://www.exploitsearch.net/

crypto

Infond

Ubuntu post installation script infondlinux

botnets

http://www.clusif.asso.fr/fr/production/ouvrages/pdf/CLUSIF-2009-Bots-et-Botnets.pdf

http://www.cisco.com/web/about/security/intelligence/bots.html

http://www.lasecuriteoffensive.fr/faisabilité-d’un-réseau-décentralisé-introduction

publication Cliff Zou

framework peer to peer GNUnet

Resilient botnet command and control with tor

Take a deep breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

trusted platforms

Noémie Floissac

Infond

pentest

Static code analysis

training

information gathering

protocole

listes outils pentest

deobfuscation de code

decompileur

versionning

assembleur

bruteforce

audit windows

reversing

exploit

google hacking

creation de backdoor

race conditions

LFI/RFI

local exploit

Remote shells

routeurs

ids decoy

XSS

forensics

divers

svn

antivirus

icones

SimpleHttpServer

MediaWiki

archives events http://avondale.good.net/dl/bd/

openssl

soft old versions http://www.filehippo.com/

find 0days

Crypto

Metasploit

zenk roulette

photos

credentials

astuce anti spidering

mets une image d'un pixel sur ta page. Si le lien est visité, blacklister l'IP qui visite: c'est un robot.

RFID

installation Linux

créer dessins réseaux

anti-reversing technics

Mots de passe des applications Windows

certification SSI

logs

Forensics

taskmanager trick at 10:41 /interactive “cmd.exe”

openvpn

anonymat

Moteur de recherche

le format PE

dd

Signatures exécutables

Anti sniffing

Cheat sheets http://packetlife.net/library/cheat-sheets/

pkzip plaintext attack using pkcrack http://www.securiteam.com/tools/5NP0C009PU.html

forensics

captcha

Sniff via iptables http://r00tsec.blogspot.com/2011/06/sniffing-using-iptables.html

gdb tuto howto http://sourceware.org/gdb/current/onlinedocs/gdb/

Ruby RVM utiliser simultanément plusieurs versions http://beginrescueend.com/rvm/basics/

Routeurs

RSS http://fulltextrssfeed.com/

Steganographie

Proxy python http://code.google.com/p/proxpy

ctf

phones

iPhone

Android

DDoS

defense

attack

references

Cloud

Memcached

forensics

analyse pdf http://peepdf.googlecode.com

windows

fuzzers

802.11 wifi access points http://code.google.com/p/wifuzz/

IDS detection nmap nse script http://seclists.org/nmap-dev/2011/q2/1005

socat http://stuff.mit.edu/afs/sipb/machine/penguin-lust/src/socat-1.7.1.2/EXAMPLES

GSM

osmocombb