Ads 468x60px

Ilmu Linux


Kelebihan dan Kegunaan Operation System Linux
Linux adalah sebuah Unix yaitu jenis sistem operasi yang awalnya dibuat oleh Linus Torvalds dengan bantuan dari teman dan dari pengembang di seluruh dunia. Dikembangkan dengan GNU General Public License (Open Source), source code untuk Linux tersedia secara free untuk semua orang. Ada banyak Macam versi atau Distro dari Linux yang di kembangkan di seluruh dunia sebagai Sistem operasi yang Free dan Open source yang sering kali di kenal dengan Istilah FOSS (Free/Open Source Software). Foss adalah Konsep berbagi. Berbagi itu indah.

http://www.kali.org/ Kali Linux merupakan Operasi Sistem yang dibuat khusus untuk menguji keamanan komputer dan aplikasi Software yang bisa di sebut sebagai Penetration Testing. Kali Linux dikembangkan secara resmi oleh Offensive-Security, yang merupakan rebuild/rebirth atau pengembangan dari BackTrack Linux. 

Kali Linux berbasis Debian terlihat lebih stabil dalam berbagai driver interface atau GUI (General User Interface) yang sering menjadi masalah pada BackTrack Linux.

Sahabat_Tutorial berikut ini adalah Ebook atau Panduan Kali Linux. Silahkan di Download dan gunakan dengan BIJAK. Penulis tidak bertanggungjawab apabila di kemudian hari Tutorial yang saya bagikan ini, di salahgunakan.

Laporkan Jika ada Link yang rusak atau tidak jalan.

  1. Hacking 1
  2. Hacking 2
  3. kali cookbook
  4. Metasploit
Berikut Ebook macam-macam tutorial linux beserta link referensinya silahkan di ambil :

Hacking with Kali Linux:
1) http://sh.st/qLkdA
2) http://sh.st/qLxAn

Advanced Linux Programming
http://www.advancedlinuxprogramming.com/alp-folder/

ANDROID SECUIRTY
https://www.dropbox.com/s/lsu5ah1w1njacqc/ANDROID%20SECUIRTY.epub12

EBOOK PEMROGRAMAN VISUAL DI LINUX
http://malsasa.files.wordpress.com/2013/10/pengantar-pemrograman-gui-di-linux.pdf

Pemrograman Qt
1 - Perkenalan Hard Coding:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-1-e28093-membuat-dialog-groupbox-layout-dan-tombol-dengan-menulis-kode-bukan-designer.pdf

2 - Mengenal Layout Sederhana:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-2-e28093-mendayagunakan-qgroupbox-dan-qhboxlayout-untuk-membentuk-kolom-dalam-qdialog.pdf

3 - QFrame dan QVBoxLayout:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-3-e28093-mendayagunakan-qframe-dan-qvboxlayout-untuk-membentuk-kolom-lebih-banyak-dalam-qdialog.pdf4 -

Window Layering:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-4-e28093-qstackedlayout-dan-qcombobox-untuk-window-layering.pdf

5 - Window Layering II:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-5-e28093-qstackedlayout-dan-qpushbutton-untuk-layering-setcurrentindex.pdf

6 - Menggunakan Kelas-Kelas Qt:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-6-e28093-membuat-program-gui-sederhana-menggunakan-sebanyak-mungkin-kelas-qstackedlayout-qpushbutton-qlabel-qcombobox-dan-lainnya.pdf

7 - Membuat GUI Front-End I: http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-7-menjalankan-perintah-linux-dari-gui-c-dengan-mudah-menggunakan-system.pdf

8 -Mengenal Layout Lanjutan <a>http://malsasa.files.wordpress.com/2013/12/pemrograman-qt-8-qvboxlayout-qhboxlayout-qgridlayout-dan-sifat-sifatnya.pdf</a>

9 - Membuat GUI Front-End II:
http://malsasa.files.wordpress.com/2013/12/pemrograman-qt-9-qprocess-dan-menjalankan-perintah-linux.pdf

10 - Membuat GUI Front-End III:
http://malsasa.files.wordpress.com/2013/12/pemrograman-qt-10-qtextedit-qfile-qtextstream-qlabel-membaca-standard-output-shell-membaca-berkas-dan-membuat-berkas-txt.pdf

11 - Memainkan Audio

http://malsasa.files.wordpress.com/2013/10/pemrograman-qt-11-phonon-framework-untuk-memutar-audio-ogg-ketika-qpushbutton-diklik.pdf

=======================================
Ebook Linux:

Linux Forensics:
http://www.digitalforensics.ch/nikkel05b-4page.pdf
http://www.deer-run.com/~hal/IntroToDigitalForensics.pdf
http://ncfs.org/craiger.ifip.05.FINAL.pdf
http://www.uscyberpatriot.org/CP5/CP%20V%20Documents/CP_Forensics_Challenge_Information.pdf
http://www.cms.livjm.ac.uk/pgnet2009/Proceedings/Papers/2009001.pdf
https://forensicfocus.files.wordpress.com/2012/08/generating-computer-forensic-supertimelines-under-linux-a-comprehensive-guide-for-windows-based-disk-images1.pdf

http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6643000&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6642226%2F6642914%2F06643000.pdf%3Farnumber%3D6643000

LFS:
http://www.linuxfromscratch.org/lfs/downloads/7.3/LFS-BOOK-7.3.pdf

FHS:
http://www.tldp.org/LDP/Linux-Filesystem-Hierarchy/Linux-Filesystem-Hierarchy.pdf
http://www.pathname.com/fhs/pub/fhs-2.3.pdf
http://www.usna.edu/EE/ec310/Resource/Linux_File_System.PDF

Linux Driver Programming:
http://www.mulix.org/lectures/intro_to_linux_device_drivers/intro_linux_device_drivers.pdf
http://free-electrons.com/doc/books/ldd3.pdf
http://www.freescale.com/files/soft_dev_tools/doc/ref_manual/Linux%20Device%20Drivers.pdf
http://studenti.fisica.unifi.it/~carla/manuali/linux_device_driver_tutorial.pdf
http://www.plantation-productions.com/Webster/LinuxAsm/1_LDD.pdf
https://www.kernel.org/doc/ols/2002/ols2002-pages-545-555.pdf
http://mirror.isoc.org.il/pub/pub/august-penguin/ap2011/Mark%20Veltzer%20-%20Developing%20Linux%20drivers%20in%20C++.pdf

Instalasi Gentoo:
http://ronnybull.com/assets/docs/gentoo.pdf
http://scst.sourceforge.net/Gentoo-HOWTO.pdf
http://www.uwyn.com/resources/benefits_of_gentoo.pdf
http://tech.fradkin.com/gentoo/gentoo-linux-good-bad-ugly.pdf
http://blu.org/meetings/2003/10/gentoo_presentation.pdf
http://donik.org/wiki/images/2/20/MythTV_gentoo_HOWTO.pdf

Btrfs:
http://events.linuxfoundation.org/sites/events/files/slides/LinuxCon_2013_NA_Eckermann_Filesystems_btrfs.pdf
http://www.oracle.com/us/technologies/linux/btrfs-features-1405320.pdf
http://oss.oracle.com/projects/btrfs/dist/documentation/btrfs-ukuug.pdf
http://www.netgear.com/images/BTRFS%20on%20ReadyNAS%20OS%206_9May1318-76105.pdf
www.opensfs.org/wp-content/uploads/2012/12/100-130_Doug_Fuller_LUG-btrfs.pdf
https://www.usenix.org/legacy/publications/login/2012-02/openpdfs/Bacik.pdf
http://domino.watson.ibm.com/library/CyberDig.nsf/papers/6E1C5B6A1B6EDD9885257A38006B6130/%24File/rj10501.pdf
http://people.redhat.com/lczerner/files/btrfs_lczerner.pdf

Kompilasi Kernel:
http://www.mulix.org/lectures/tau_linux_workshop/kernel_compilation.pdf
http://software.intel.com/sites/default/files/article/146679/linuxkernelbuildwhitepaper.pdf
http://llvm.org/devmtg/2012-04-12/Slides/Mark_Charlebois.pdf
http://homepage.smc.edu/morgan_david/linux/b03-kernelbuild.pdf
http://www.proware.com.tw/support/software/cdb16patch-lnx/linux-patch.pdf

Kernel Module Programming:
http://www.tldp.org/LDP/lkmpg/2.6/lkmpg.pdf
http://ibiblio.org/pub/Linux/docs/HOWTO/other-formats/pdf/Modules.pdf
http://download.gabsoftware.com/docs/SqueezeKernelCompilation.pdf
http://www.kerneltravel.net/downloads/tester_guide.pdf
http://mentorlinux.files.wordpress.com/2013/02/kernel-compilation-ml.pdf
http://twiki.di.uniroma1.it/pub/Sistemioperativi3/OnLine/LinuxKernelStructure.pdf
http://decal.ocf.berkeley.edu/2012-fall/labs/lab10.pdf
http://kernelbook.sourceforge.net/kernel-hacking.pdf
http://read.pudn.com/downloads155/sourcecode/embed/690510/Linux%20Kernel%20Hackers%27%20Guide.pdf

Kernel-Level Scheduler:
https://www.cs.columbia.edu/~smb/classes/s06-4118/l13.pdf
http://smacked.org/docs/scheduler-2.6.pdf
http://www.cs.princeton.edu/courses/archive/fall09/cos318/lectures/ThreadImplementation.pdf
https://www.cs.drexel.edu/~wmm24/cs370/resources/Scheduler.pdf
http://home.mit.bme.hu/~meszaros/edu/oprendszerek/segedlet/unix/2_folyamatok_es_utemezes/linux_utemezes.pdf
http://joshaas.net/linux/linux_cpu_scheduler.pdf
http://pc2.uni-paderborn.de/fileadmin/pc2/media/staffweb/Andre_Brinkmann/Courses/Operating_Systems/Operating_Systems_9.pdf
http://happyli.org/tongli/papers/linsched.pdf

Pemaketan
http://www.debian.org/doc/manuals/packaging-tutorial/packaging-tutorial.pdf
http://www.debian.org/doc/manuals/maint-guide/maint-guide.en.pdf
http://csee.wvu.edu/~tbielawa/deb.pdf
http://www.tldp.org/HOWTO/pdf/Debian-Binary-Package-Building-HOWTO.pdf
http://foss-sthlm.haxx.se/mote1/debian-packaging-per-andersson.pdf

http://jon.oxer.com.au/sb/modules/talks/attachments/30/20060721-Google-DebianPackages.pdf
http://mirror.linux.org.au/linux.conf.au/2004/papers/34-wayne-piekarski-paper.pdfSource: http://forum.pos-id.org/showthread.php?tid=132

======================================

Banyak juga ni referensi di sini:
http://csrc.nist.gov/publications/PubsTC.html

Penetration Testing Sample Report:
http://www.offensive-security.com/reports/penetration-testing-sample-report-2013.pdf

List Kali Linux tools:https://dl.dropboxusercontent.com/u/77838630/KaliToolslistAug2013.pdf===================================================
http://www.mediafire.com/folder/9oa64cav2dw6o/CHFI_v8


#update-update


 Berikut untuk CEH v8 ::
===================================================================

CEH v8

EC-Council Certified Ethical Hacker CEH v8 Tools DVD ISO 6DVDs |
  1. http://thepiratebay.sx/torrent/8625280/ 
  2. http://uploaded.net/file/bmt2zwz5/EC-Council.CEHv8.Courseware.Tools.part01.rar 
  3. http://uploaded.net/file/303x5nus/EC-Council.CEHv8.Courseware.Tools.part02.rar
  4. http://uploaded.net/file/rnwkauvo/EC-Council.CEHv8.Courseware.Tools.part03.rar
  5. http://uploaded.net/file/lqeccibx/EC-Council.CEHv8.Courseware.Tools.part04.rar
  6. http://uploaded.net/file/8yje7ya0/EC-Council.CEHv8.Courseware.Tools.part05.rar
  7. http://uploaded.net/file/rbwmd6jk/EC-Council.CEHv8.Courseware.Tools.part06.rar
  8. http://uploaded.net/file/j75cfumo/EC-Council.CEHv8.Courseware.Tools.part07.rar
  9. http://uploaded.net/file/sqfylmaf/EC-Council.CEHv8.Courseware.Tools.part08.rar
  10. http://uploaded.net/file/uxcpkom1/EC-Council.CEHv8.Courseware.Tools.part10.rarhttp://uploaded.net/file/1sqh6w22/EC-Council.CEHv8.Courseware.Tools.part11.rar
  11. http://uploaded.net/file/4leb6zo9/EC-Council.CEHv8.Courseware.Tools.part12.rar
  12. http://uploaded.net/file/3395ubzc/EC-Council.CEHv8.Courseware.Tools.part13.rar
  13. http://uploaded.net/file/tjire6hl/EC-Council.CEHv8.Courseware.Tools.part14.rar
  14. http://uploaded.net/file/bc0q6xpu/EC-Council.CEHv8.Courseware.Tools.part15.rar
  15. http://uploaded.net/file/zmf0jxpl/EC-Council.CEHv8.Courseware.Tools.part16.rar
  16. http://uploaded.net/file/y8azhm7s/EC-Council.CEHv8.Courseware.Tools.part17.rar
  17. http://uploaded.net/file/g41futr1/EC-Council.CEHv8.Courseware.Tools.part18.rar
  18. http://uploaded.net/file/iodvv2le/EC-Council.CEHv8.Courseware.Tools.part19.rar
  19. http://uploaded.net/file/wbhnptwi/EC-Council.CEHv8.Courseware.Tools.part20.rar
  20. http://uploaded.net/file/zv1ycmqw/EC-Council.CEHv8.Courseware.Tools.part21.rar
  21. http://uploaded.net/file/4ika153o/EC-Council.CEHv8.Courseware.Tools.part22.rar
  22. http://uploaded.net/file/tt7n9d9n/EC-Council.CEHv8.Courseware.Tools.part23.rar
  23. http://uploaded.net/file/m7epjau0/EC-Council.CEHv8.Courseware.Tools.part24.rar
Selengkapnya untuk Linux Virtualization Tutorial;::

==================================================Linux Virtualization Tutorial;

Selengkapnya untuk Ethical Hacking :

====================================================Ethical Hacking CEHv7:

Videos, Tools and Tutorials
  1. http://rapidgator.net/file/cc3521991305ba3190509368a8783140/EC-Council.Ethical.Hacking.CEHv7.part01.rar.html
  2. http://rapidgator.net/file/f1c56841898fb5c6eefb9a8eb361d89e/EC-Council.Ethical.Hacking.CEHv7.part02.rar.html
  3. http://rapidgator.net/file/7897a0e9253ee911884f99881d0ae65c/EC-Council.Ethical.Hacking.CEHv7.part03.rar.html
  4. http://rapidgator.net/file/c9b4923c04484737d63234f09e613c44/EC-Council.Ethical.Hacking.CEHv7.part04.rar.html
  5. http://rapidgator.net/file/8e008a70f3f3069aeb7f93f3b8dc00a4/EC-Council.Ethical.Hacking.CEHv7.part05.rar.html
  6. http://rapidgator.net/file/0cf86e00510d4af562bd019eb0e2c1a1/EC-Council.Ethical.Hacking.CEHv7.part06.rar.html
  7. http://rapidgator.net/file/f4b690e4cf0d1087c9f7af541fa04707/EC-Council.Ethical.Hacking.CEHv7.part07.rar.html
  8. http://rapidgator.net/file/3c7e6c2b0cebcfba451fc3c292f42c0a/EC-Council.Ethical.Hacking.CEHv7.part08.rar.html
  9. http://rapidgator.net/file/5ea5b93d592ec1ab8b13169c0c67e2b1/EC-Council.Ethical.Hacking.CEHv7.part09.rar.html
  10. http://rapidgator.net/file/bf1576c765c7b7270e512dd54f951220/EC-Council.Ethical.Hacking.CEHv7.part10.rar.html
  11. http://rapidgator.net/file/ae2f85a0748656eaf2bff0fedba66ca8/EC-Council.Ethical.Hacking.CEHv7.part11.rar.html
  12. http://rapidgator.net/file/321fa7d6cc76c3cde2ef66417dd88168/EC-Council.Ethical.Hacking.CEHv7.part12.rar.html
  13. http://rapidgator.net/file/0e141794313d1ee145ccbf23a529e2d0/EC-Council.Ethical.Hacking.CEHv7.part13.rar.html
  14. http://rapidgator.net/file/eb83d01fe82e500d147bd9e3e6b47cc7/EC-Council.Ethical.Hacking.CEHv7.part14.rar.html
  15. http://rapidgator.net/file/869cb20f34e9b2bd17bb2974ee56ebc3/EC-Council.Ethical.Hacking.CEHv7.part15.rar.html
  16. http://rapidgator.net/file/4adc1227a2932c0a15c73588fceb67a2/EC-Council.Ethical.Hacking.CEHv7.part16.rar.html
  17. http://rapidgator.net/file/c3e1d1c37c5da7df5d8909e9ce1254f0/EC-Council.Ethical.Hacking.CEHv7.part17.rar.html
  18. http://rapidgator.net/file/7ad6e17cf90e65ce7b3ed7d8ee4bccfd/EC-Council.Ethical.Hacking.CEHv7.part18.rar.html
Selengkapnya untuk Penetration Testing With Kali Linux :



===========================================
Instant Penetration Testing: Setting Up a Test Lab How-to
https://www.dropbox.com/s/z90g6hx000f0g2t/Instant%2BPenetration%2BTesting-%2BSetting%2BUp%2Ba%2BTest%2BLab%2BHow-to.pdf 

Metasploit The Penetration Testers Guide
https://www.dropbox.com/s/e1bh2bio6fqn0my/Metasploit%20The%20Penetration%20Testers%20Guide.pdf

The Basics of Hacking and Penetration Testing
https://www.dropbox.com/s/7oyt756a0s0icjn/0-The.Basics.of.Hacking.and.Penetration.Testing.pdf

 Seven Deadliest Wireless Technologies Attacks
https://www.dropbox.com/s/4k4480acv7gf8jh/Seven%20Deadliest%20Wireless%20Technologies%20Attacks.rar

 Seven Deadliest USB Attacks
https://www.dropbox.com/s/oue30dhq41ridxm/Seven%20Deadliest%20USB%20Attacks.rar

Seven Deadliest Unified Communication Attacks
https://www.dropbox.com/s/0dra293eblaqx77/Seven%20Deadliest%20Unified%20Communications%20Attacks.rar

Seven Deadliest Microsoft Attacks
 https://www.dropbox.com/s/vosfuqt2qyw57ub/Seven%20Deadliest%20Microsoft%20Attacks.rar

Seven
Deadliest Attacks Social Network
https://www.dropbox.com/s/2p48qayg9j3oia0/Seven%20Deadliest%20AttackSocialNetWork.rar

Seven Deadliest Network Attacks
https://www.dropbox.com/s/buuj378twuskn41/Seven%20Deadliest%20Network%20Attacks.rar

Biggest password cracking wordlist with millions of words
http://backtrack-page.blogspot.com/2013/05/biggest-password-cracking-wordlist-with.html

Access Denied: The Practice and Policy of Global Internet Filtering:
https://www.dropbox.com/s/oq3jlzsrhvgzxpz/Access.Denied.The.Practice.and.Policy.of.Global.Internet.Filtering.pdf

Linux Iptables:
https://www.dropbox.com/s/qccju93nzq0v5tz/Oreilly.Linux.iptables.Pocket.Reference.pdf

Low Tech Hacking: Street Smarts for Security Professionals:
https://www.dropbox.com/s/64h5tvpi3g1oyil/Syngress.Low.Tech.Hacking.pdf

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing:
https://www.dropbox.com/s/g7dxxnr98awxd44/No%20TechHacking.epub

http://www.cs.fsu.edu/~redwood/OffensiveSecurity/lectures.html

OWASP TOP 10 2013:
 https://www.dropbox.com/s/q4c99eeuc3xe1n4/OWASP%20Top%2010%20-%202013.pdf

Squid: The Definitive Guide:
https://www.dropbox.com/s/8bn23mk487les2w/Squid%20The%20Definitive%20Guide.pdf

Network Warrior:
 https://www.dropbox.com/s/iw6t8k77edow104/O%27Reilly%20-%20Network%20Warrior.pdf

Computer viruses:
https://www.dropbox.com/s/xlm6s1jp7wpqnbt/Computer%20Viruses%20for%20Dummies.pdf

Wireless Networking Complete:
 https://www.dropbox.com/s/k8w6u87hzftxppt/Wireless.Networking.Complete.pdf

Network Security Hacks, 2nd Edition:
https://www.dropbox.com/s/g3j0vqo37wfttuf/Oreilly.Network.Security.Hacks.2nd.Edition.pdf

The Hacker's Underground Handbook: Learn how to hack and what it takes to crack even the most secure systems!
https://www.dropbox.com/s/zpl7g4veh1jqbp7/The_Hacker_s_Underground_Handbook.pdf

Computer Networks (5th Edition):
https://www.dropbox.com/s/oulnocaw192m6kl/Computer_Network_5th.pdf

Hacking Secret Ciphers with Python
https://www.dropbox.com/s/2lzqbqpmf045wkp/HackingSecretCiphersWithPython.pdf

Ubuntu Hacks Tips & Tools for Exploring, Using, and Tuning Linux
https://www.dropbox.com/s/80jma4i6cdlq3yx/ubuntu_hacks.pdf

Inside Cyber Warfare: Mapping the Cyber Underworld
https://www.dropbox.com/s/lrhzhu368vhguwd/Inside_Cyber_Warfare_Mapping_.pdf

Hacking Exposed Windows
https://www.dropbox.com/s/xn3ga63m94n8doh/Hacking%20Exposed-Windows%20-%20Windows%20Security%20Secrets%20%26%20Solutions%2C%203rd%20Ed..pdf

The Art of Deception: Controlling the Human Element of Security (Penulis: Kevin Mitnick & William):
https://www.dropbox.com/s/5oug9skng5rdsk4/The%20Art%20Of%20Deception.pdf

Ebook Secrets of a Super Hacker
https://www.dropbox.com/s/luxbil1a0tsed8q/Secrets%20of%20a%20super%20hacker.pdf

Ebook Secrets of a Super Hacker
 https://www.dropbox.com/s/luxbil1a0tsed8q/Secrets%20of%20a%20super%20hacker.pdf

Ebook Ninja Hacking:
https://www.dropbox.com/s/487ktwxx8rlbwpv/Ninja%20Hacking%20-%20Unconventional%20Penetration%20Testing%20Tactics%20and%20Techniques.pdf

Ebook WordPress 3 Ultimate Security:
https://www.dropbox.com/s/95w0dpykcjwnvc4/Packtpub.WordPress.3.Ultimate.Security.pdf

Ebook Hacking and Securing iOS Applications:
https://www.dropbox.com/s/ttc4qw8ztk6piu3/Oreilly.Hacking.and.Securing.iOS.Applications.Jan.2012.pdf

iOS Hacker's Handbook:
https://www.dropbox.com/s/ptqvi2ot1l4ybqg/Wiley.iOS.Hackers.Handbook.Apr.2012.epub

CISCO PACKET TRACERFedora
  1. http://otodidak.freeserver.me/tarball/PacketTracer533_i386_installer-rpm.bin 
  2. http://otodidak.freeserver.me/tarball/PacketTracer533_i386_installer-deb.bin
  3. http://code.google.com/p/lazykali/downloads/detail?name=lazykali.sh
  4. http://code.google.com/p/lazykali/source/browse/lazykali.sh

No comments :

Post a Comment