46 / May 1, 2013
(4.3/5) (32)

Description

All content is offline(i.e. available withoutan internet connection.) If you want an online searchableresource(I will be adding offline search soon) check out my site,rmusser.net/infosec

-NO ADS!-

The Best Information Security Reference on the Market!

Check out the Github page: https://github.com/rmusser01/infosec-ref

Ever wondered how hackers do what they do? Wonder what a SQLInjection is? How it's performed?

Want to learn about information security? Want to learn abouthacking or penetration testing?

Our review from DroidTweak:

"The Best Hacking Reference Available! For Beginners and Expertsalike! 5/5 Stars!"

***THIS APPLICATION IS FOR LEARNING/EDUCATIONAL PURPOSES ONLY.THE CREATORS OF THIS APP DO NOT CONDONE ILLLEGAL ACTIVITIES. THISAPP IS DESIGNED AS A REFERENCE FOR ETHICAL HACKERS AND PENETRATIONTESTERS.***

-------

The Largest and Most Extensive Information Security Reference onthe Market!

-------

Learn how to:

- Secure yourself and your devices from malicious attackers!-

- Properly install and configure anti-virus for your Windows PC-

- Configure and secure your web browser so as to remainimpervious to online hackers and various scripting attacks! -

- Learn how to spot and remove malware from your system! -

- Learn how to secure your android device from maliciousapplications, hackers stealing your data, and eavesdroppers! -

- Encrypt and backup your android device! Learn how to preventthieves from stealing your data with your device! -

- Use the very same guides used by the NSA, CIA, FBI, and DoD tosecure their devices! -

Some of the sections:

Cracking WEP Encryption
Cracking WPA/2 Encryption
Introduction to Sniffing the Wire
Cracking WEP/WPA(2) through WPS
SQL Injection How-To
Cross Site Scripting
Webshells
Lockpicking
Scanning the Network & Enumerating Services
Exploiting Services
Maintaining Access
Linux Post-Exploitation Cheat Sheet
OS X Post-Exploitation Cheat Sheet
Windows Post-Exploitation Cheat Sheet
USB Device hacking

Plus learn how to create a legal hacking lab for testing andtraining!


If there is something you don't see that you feel should be inthere, please let us know how we can make it better.

Thank You.

[email protected]

THIS APPLICATION PERFORMS NO HACKING. IT IS ONLY A TEXTUALREFERENCE.

This app is similar to: Hackers Handbook, Black Hat, Hacking aguide

App Information InfoSec Reference (Donation)

  • App Name
    InfoSec Reference (Donation)
  • Package Name
    my.first.app
  • Updated
    May 1, 2013
  • File Size
    1,010k
  • Requires Android
    Android 2.2 and up
  • Version
    46
  • Developer
    Frustration Free Solutions
  • Installs
    1,000 - 5,000
  • Price
    $1.99
  • Category
    Books & Reference
  • Developer
    Email [email protected]
    1705 withers avenue Monterey CA
  • Google Play Link

Frustration Free Solutions Show More...

How to Hack Wireless Networks 25 APK
*** This app is designed for legal professionals, and is foreducational purposes only. The authors of this application do notcondone illegal activities or hacking where it is illegal. ***This app is a step by step tutorial on how to crack WEP and WPAnetworks to figure out the password.The full version contains:- Cracking WiFi networks secured with WEP and WPA/2- Acquiring Email account passwords through Man in the Middleattacks(google, yahoo, hotmail)!- Intercept and hack Facebook accounts!- Bypassing school and work filters and firewalls onnetworks!- Hacking websites through various attack methods(SQL Injection,XSS, CSRF, RFI, LFI)!- How to acquire software/movies/games/music- Creating a hacking lab, so you can practice what you'velearned!- How to install Backtrack 5 R1 to USB/CD/DVD as a bootable liveoperating system!- Social Engineering How-To, Including a guide on the SocialEngineering Toolkit!+ MORECheck it out here:
InfoSec Reference (Donation) 46 APK
All content is offline(i.e. available withoutan internet connection.) If you want an online searchableresource(I will be adding offline search soon) check out my site,rmusser.net/infosec-NO ADS!-The Best Information Security Reference on the Market!Check out the Github page: https://github.com/rmusser01/infosec-refEver wondered how hackers do what they do? Wonder what a SQLInjection is? How it's performed?Want to learn about information security? Want to learn abouthacking or penetration testing?Our review from DroidTweak:"The Best Hacking Reference Available! For Beginners and Expertsalike! 5/5 Stars!"***THIS APPLICATION IS FOR LEARNING/EDUCATIONAL PURPOSES ONLY.THE CREATORS OF THIS APP DO NOT CONDONE ILLLEGAL ACTIVITIES. THISAPP IS DESIGNED AS A REFERENCE FOR ETHICAL HACKERS AND PENETRATIONTESTERS.***-------The Largest and Most Extensive Information Security Reference onthe Market!-------Learn how to:- Secure yourself and your devices from malicious attackers!-- Properly install and configure anti-virus for your Windows PC-- Configure and secure your web browser so as to remainimpervious to online hackers and various scripting attacks! -- Learn how to spot and remove malware from your system! -- Learn how to secure your android device from maliciousapplications, hackers stealing your data, and eavesdroppers! -- Encrypt and backup your android device! Learn how to preventthieves from stealing your data with your device! -- Use the very same guides used by the NSA, CIA, FBI, and DoD tosecure their devices! -Some of the sections:Cracking WEP EncryptionCracking WPA/2 EncryptionIntroduction to Sniffing the WireCracking WEP/WPA(2) through WPSSQL Injection How-ToCross Site ScriptingWebshellsLockpickingScanning the Network & Enumerating ServicesExploiting ServicesMaintaining AccessLinux Post-Exploitation Cheat SheetOS X Post-Exploitation Cheat SheetWindows Post-Exploitation Cheat SheetUSB Device hackingPlus learn how to create a legal hacking lab for testing andtraining!If there is something you don't see that you feel should be inthere, please let us know how we can make it better.Thank [email protected] APPLICATION PERFORMS NO HACKING. IT IS ONLY A TEXTUALREFERENCE.This app is similar to: Hackers Handbook, Black Hat, Hacking aguide