Friday 18 December 2015

Download Metasploit: The Penetration Tester's Guide 1st Edition Ebook

Metasploit: The Penetration Tester's Guide 1st Edition Ebook(6.9 MB only) 


Description:


    "The best guide to the Metasploit Framework."—HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.

Learn how to:

    Find and exploit unmaintained, misconfigured, and unpatched systems
    Perform reconnaissance and find valuable information about your target
    Bypass anti-virus technologies and circumvent security controls
    Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
    Use the Meterpreter shell to launch further attacks from inside the network
    Harness standalone Metasploit utilities, third-party tools, and plug-ins
    Learn how to write your own Meterpreter post exploitation modules and scripts

You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Download From Here(mediafire.com)

-- A Black Hack: post

Thursday 10 December 2015

Mcent Refer And Earn, Now Rs 700 Free Recharge Per Referral [New User]

Mcent Refer And Earn , Now Rs 700 Free Recharge Per Referral [New User]



Previously we have posted a trick about " Mcent Invite And Earn Offer- Rs 350 Per Referral". But today we got an thankyou email from one of our blog reader, with the information that Now Mcent is Giving Rs 700 free recharge on each referral to its new users. Old users are still getting Rs 50 free recharge credits/points per referral.so article is mainly for the new users of mcent . So if you haven't used Mcent yet, then it's a great opportunity to grab this amazing offer.just download the mcent app from the link given below and start earning free recharge.

MCent is a great way to discover free Android apps and get rewarded with free airtime right on your mobile phone.Just download mCent and register with your mobile number. Next, they will show you some great new apps that they think you'll love. Download and try out the apps, and you will get reward of free airtime.You can also earn by refering your friends to Mcent app .lets talk about how :

How To Get Free Recharge from mcent - 

1. First of all click here to download the app from Here
2. Install the app and Click on singup.
Note:- Dont forgot to signup with a new phone number, if you choose login with old phone number then this is not work. This is for new user only
3. Enter your mobile number and singup .
4. Now Verify Your Account by entering the OTP (one time password).

Done now complete your profile and download atleast one app to start earning .

How Refer or invite a friend to mcent ?

1. Open The Mcent app
2. Tap on the Refer icon on the top Right side of the app
3. Here You will see the detail of Mcent Refer and earn offer with your Referral Link .
4. Now Share your Referral link with your friends to Get Unlimited Free Recharge .


After This Refer your friends to mcent and get free 700 rs recharge per referral,

Note:-
Referral Reward Can Change at any Time
You will be rewarded only when your friend download atleast one app after Registration

Proof:-

--A Black Hack post

Monday 7 December 2015

GRAY HAT PYTHON by Justin Seitz

Download GRAY HAT PYTHON by Justin Seitz -(2.55 MB only)
Python Programming for Hackers and Reverse Engineers



BRIEF CONTENTS
Chapter 1: Setting Up Your Development Environment.
Chapter 2: Debuggers and Debugger Design. 
Chapter 3: Building a Windows Debugger. 
Chapter 4: PyDbg—A Pure Python Windows Debugger.
Chapter 5: Immunity Debugger—The Best of Both Worlds.
Chapter 6: Hooking.
Chapter 7: DLL and Code Injection.
Chapter 8: Fuzzing.
Chapter 9: Sulley.
Chapter 10: Fuzzing Windows Drivers.
Chapter 11: IDAPython—Scripting IDA Pro.
Chapter 12: PyEmu—The Scriptable Emulator.

Download from Here

-- A Black Hack: Post

Monday 9 November 2015

What is a MAC Address?

How do I find a MAC address of network device?

MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6byte (48bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3bytes are serial number assigned by the manufacturer.
MAC layer represents layer 2 of the TCP/IP (adopted from OSI Reference Model), where IP represents layer 3. MAC address can be thought of as supporting hardware implementation whereas IP address supports software . MAC addresses are permanently burned into hardware by hardware manufacturer, but IP addresses are assigned to the network devices by a network administrator. DHCP relies on MAC address to assign IP addresses to network devices.

How do I find a MAC address of network device?

Operating Systems support various commandline and GUI utilities to allow users to find MAC address of the system. On Unix variants including Solaris and Linux support "ifconfig a", "ip link list" or "ip address show" command that displays MAC address of the network device among other useful information. Windows including NT, 2000, XP and 2003 support "ipconfig /all" command that displays MAC address. On a MacOS, one can find MAC address by opening "System Preferences", then selecting "Network".

Full forms: Computer related terms

* HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile Telecommunication System.
* SIM - Subscriber Identity Module.
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic Interchangeable Format
* JPEG = Joint Photographic Expert Group
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - Uninterruptible Power Supply.
* HSDPA - High Speed Downlink Packet Access.
* EDGE - Enhanced Data Rate for GSM [Global System for Mobile          
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research Project Agency Network.
* IBM - International Business Machines.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency Modulation.
* WLAN - Wireless Local Area Network

Saturday 17 October 2015

Download: Kali Linux Operating System Highly Compressed In 53 MB

<<<<<<<<<<<<<<<Highly Compressed>>>>>>>>>>>>>>

About Kali Linux:

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.


Features

Kali Linux has a dedicated project set-aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter.

It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.

BackTrack (Kali's predecessor) contained a mode known as forensic mode. This capability was carried over to Kali via live boot. This mode is very popular for many reasons such as many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. There are however some changes to forensic mode over the regular operation of the system, such as forensic mode doesn't touch the hard drive or swap space and auto mounting is disabled. However, it is recommended by the developers that if Kali is going to be used for real world forensics that these things be tested in that environment.

[OS] Kali Linux:>>32-Bit>>
Highly compressed>>53.3 MB only>>
Free download>>

Direct Link: Download Here



Download>>Install>>Start hacking>>
===========================
Share It And Spread This Post:>>
===========================

Saturday 26 September 2015

1000 Hacking tutorials in an 6mb zip file presented to you by Black Hack


These are  the BEST OF HACKING TUTORIALS OF 2015:>>

Includes The Following:
    How To Add An Option To Print, the Contents of a Folder!.txt
    How To Add Your Own Windows Tips.txt
    How to Back Up the Registry.txt
    How To Backup Ps2 Games.txt
    HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt
    How To Block Websties Without Software, block websites.txt
    How To Boot Xp Faster (updated).txt
    How to build a black box.txt
    how to burn quicker in windows xp.txt
    How to Bypass BIOS Passwords.txt
    How To Bypass Web Filters, tutorial.txt
    HOW TO CAPTURE STREAMING MEDIA.txt
    How To Change A Cmos Battery.txt
    How to change the serial number used in Windows XP, Valid for XP Corporate.txt
    How To Change Thumbnail Size And Quality.txt
    How to clear Bios info 2.txt
    How to clear Bios info.txt
    How To Convert File System, fat – fat32 to ntfs.txt
    How To Copy A Dvd Which Will Play On A X Box.txt
    How to copy songs from your iPod to your PC.txt
    How To Customise Your start Button.txt
    How To Delete Those Persistent Nasty Files.txt 0.53 kB
    How To Directly Go To Inbox.txt 0.35
    How To Find Serial Numbers On Google.txt 0.79 kB
    How to fix corrupted files in XP.txt 1.48 kB
    How to fix Windows Installer problem.txt 0.96 kB
    How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
    HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
    How to Get someones ISP password, Get free internet.txt 2.65 kB
    How To Get Top Ranking, Search Engines.txt 6.58 kB
    How To Hack Windows Xp Admin Passwords.txt 2.52 kB
    How to hack-change your Windows XP Boot Screen.txt 1.52 kB
    how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
    How To Make An Animted Logo.txt 5.26 kB
    How To Make Free Phone Calls.txt 2.29 kB
    How to make key generators.txt 8.83 kB
    How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
    How To Make XP Go Faster.txt 5.58 kB
    How To make your own Radio Station 2.txt 3.26 kB
    How To Make Your Own Radio Station.txt 1.58 kB
    How to Remove DRM Protection for Video Files.txt 2.29 kB
    How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
    How To Remove Signin Details Of Msn Passport.txt 1.04 kB
    How To Remove The Default Admin$ Shares.txt 1.03 kB
    How to remove the Links folder in IE Favorites.txt 0.59 kB
    How to Remove WinXP Splash and See Operations.txt 1.19 kB
    How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
    How to Rename File Extensions.txt 3.11 kB
    How To Rename Multiple Files In Winxp.txt 0.56 kB
    How To Restrict Login Hours Allowed.txt 0.58 kB
    How to safeguard your files when computer crashes.txt 2.94 kB
    How to save Windows xp updates.txt 0.63 kB
    how to search google for RAPIDSHARE links.txt 0.98 kB
    How To See Hidden Files, Using Dos.txt 0.08 kB
    How To Set search For All Files In Winxp.txt 0.71 kB
    How to set up a http server running from you computer.txt 3.06 kB
    How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
    How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
    How To Set Up Direct Connect.txt 26.96 kB
    HOW TO SET UP FTP SERVER.txt 1.79 kB
    How To Set Up Proxies In Your Browser.txt 1.63 kB
    How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
    How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
    How To Speed Up A Slow Computer.txt 1.21 kB
    How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
    How To Stop Spam.txt 8.05 kB
    How to swear in all languages.txt 28.32 kB
    How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
    How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
    How To Use File Compression In Windows Xp.txt 4.19 kB
    How To Use Google To Download Mp3's, and applications…..txt 0.60 kB
    How To Use Newsgroups.txt 0.56 kB
    How To Use You Gmail With Msn Messenger.txt 0.37 kB
    How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
    HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
    New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB
    New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
    New Hacking Ebooks/A Novice’s Guide to Hacking 2004.txt 40.75 kB
    New Hacking Ebooks/A Novice’s Guide To Hacking.txt 8.58 kB
    New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB
    New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB
    New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB
    New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB
    New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB
    New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB
    New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB
    New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB
    New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB
    New Hacking Ebooks/Backdoor.txt 18.71 kB
    New Hacking Ebooks/Backdoors.txt 19.15 kB
    New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB
    New Hacking Ebooks/Bust Avoidance For ~censored~.txt 5.82 kB
    New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB
    New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB
    New Hacking Ebooks/hacking and phreaking.doc 168.00 kB
    New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB
    New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB
    New Hacking Ebooks/hacking in telnet.txt 57.47 kB
    New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
    New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
    New Hacking Ebooks/hacking password protected site.doc 26.50 kB
    New Hacking Ebooks/Hacking Password Protected Website’s.doc 3.06 kB
    New Hacking Ebooks/hacking passwords.doc 26.50 kB
    New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB
    New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB
    New Hacking Ebooks/IP how to.rtf 5.15 kB
    New Hacking Ebooks/NetBios explained.doc 26.68 kB
    New Hacking Ebooks/Proxy how to.rtf 3.13 kB
    New Hacking Ebooks/Routing Basics.pdf 30.25 kB
    New Hacking Ebooks/telnet trick port 25.doc 1.76 kB
    New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB
    New Pc Or New Motherboard.txt 3.77 kB
    New Way To Relive Some Zinio File.txt 1.95 kB
    Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
    Phreaking/A List of every TeleNet code that there is.txt 1.96 kB
    Phreaking/A List Of Government BBS Numbers.txt 13.07 kB
    Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB
    Phreaking/An Introduction into TeleScan.txt 3.98 kB
    Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB
    Phreaking/Area Codes and Time Zones.txt 4.90 kB
    Phreaking/Becoming A Phreaker – The Quick n’ Easy Way.txt 17.09 kB
    Phreaking/Bell Hell Volume #1.txt 10.29 kB
    Phreaking/Bell Hell Volume #2.txt 15.92 kB
    Phreaking/Breaker B0X.txt 1.96 kB
    Phreaking/busybox.txt 1.61 kB
    Phreaking/Cellular Listening with a TV .txt 1.96 kB
    Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
    Phreaking/Drake’s Phreaking Tutorial.txt 3.34 kB
    Phreaking/Hacking VoiceMail Systems.txt 25.89 kB
    Phreaking/How BT phone cards works.txt 4.18 kB
    Phreaking/How Phone Phreaks are Caught.txt 12.00 kB
    Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
    Phreaking/How to make a Free Phone Call.txt 2.16 kB
    Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
    Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
    Phreaking/Phreakers Handbook.txt 9.83 kB
    Phreaking/Quick Phone Modifications.txt 4.12 kB
    Phreaking/The ABC’s of Payphones part 1.txt 2.58 kB
    Phreaking/The ABC’s of Payphones part 2.txt 2.12 kB
    Phreaking/The ABC’s of Payphones part 3.txt 2.21 kB
    Phreaking/The ABC’s of Payphones part 4.txt 2.64 kB
    Phreaking/ThE Beige BoX .txt 6.23 kB
    Phreaking/The History of British Phreaking.htm 8.29 kB
    Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
    Phreaking/The Moterola Bible.txt 116.99 kB
    Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB
    Phreaking/The Official Phreaker’s Manual.txt 499.25 kB
    Phreaking/The Phreakers Handbook-1.txt 62.87 kB
    Phreaking/The Telephone Works.txt 9.25 kB
    Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB
    Phreaking/Understanding the Telephone System.txt 16.34 kB
    Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
    Tutorials – blacksun.box.sk/coding/Base Number Systems.html 7.78 kB
    Tutorials – blacksun.box.sk/coding/BASIC C Socket Programming In Unix .txt 21.50 kB
    Tutorials – blacksun.box.sk/coding/Basics of am 3mp33j3w.txt 18.64 kB
    Tutorials – blacksun.box.sk/coding/Batch File Programming.txt 41.70 kB
    Tutorials – blacksun.box.sk/coding/BOOLEAN LOGIC GATES.html 14.04 kB
    Tutorials – blacksun.box.sk/coding/C++ Tutorial By Clayman.html 23.77 kB
    Tutorials – blacksun.box.sk/coding/Creating A Simple Hit Counter In PHP.html 8.77 kB
    Tutorials – blacksun.box.sk/coding/Creating A Simple Search Engine In PHP.html 9.62 kB
     ----------and many more-----------

Download Links>>


Download from server 1: (Mediafire)
Download from server 2: (Ziddu)

    NOTE:THESE ARE ONLY FOR EDUCATIONAL PURPOSES ONLY IF MISUSED NOT MY RESPONSIBILTY.

-- A Black Hack Post

Thursday 24 September 2015

World's Top Wi-Fi Hacking Books

Download free from Black Hack:


List of Books provided:

1. Wi-Fi Hacking For Dummies.
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

2. Hack Wi-Fi On Windows.
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

3. Wifi Hacking Articles By Black Hack:
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

4. Wifi Hacking For Advance Hacker
    Download From Server 1 (ziddu.com)
    Download From Server 2 (Mediafire.com)

--A Black Hack: Post

The Hacker's Manual-2015 Download free pdf

The Hackers's Manual-2015 -A TECHACTIVE series book.

Take you Linux Skills to the next level
Full and Highly Compressed for you.



Content

1. 146+ Pages of the best linux tutorials
2. 80+ Hacks to make you a linux power user
3. From security tricks to sysadmin secrets.
4. Hardware Hacks -learn how to do it all!
5. Networking .
6. Hacking.
7. Privacy.
8. 100% Safe, 100% Legal
.
.
And much more in a single book.

Download Links:

Download from server 1 (Ziddu.com):

Download from server 2 (Mediafire.com):

-- A Black Hack: Post

Wednesday 23 September 2015

DOWNLOAD THE SECRET OF HACKING- I EDITION

Download Highly Compressed PDF 1.72 MB Only-

The Secret Of Hacking  is awesome for those who have no knowledge in hacking and want to learn hacking, its good start up for them. It has got many tutorials especially for beginners . One can learn basics of hacking using this ebook , The Secret of Hacking. Today,I'm providing Free Download Link to download the secret of hacking.Feel Free To learn Hacking !!!!
I'll provide the latest edition of this ebook very soon..So stay tuned and till that download The Secrets of Hacker Ist edition and read it thoroughly and hack the universe..

Table Of Content:

1. INTRODUCTION TO REAL HACKING
---What is Hacking?
---Understanding the Need to Hack Your Own Systems
---History of Hacking
---Top 5 Most Famous Hackers of All Times
---Real Hacking Process*
---How to Find Latest Exploits?
2. ADVANCED MALWARE RESEARCH
3. WINDOWS HACKING
4. PASSWORD HACKING
5. EMAIL HACKING
6. WEB APPLICATION HACKING
7. WEBSITE DEFACEMENT & DOMAIN HACKING
8. MISCELLANEOUS HACKING
9. MOBILE & COMPUTER FORENSIC
10. VOIP & WIRELESS HACKING
11. VULNERABILITY DISCOVERY & PENETRATION TESTING
12. ADVANCE HACKING WITH METASPLOIT
13. FIREWALL, IDS & HONEY POT HACKING.
14. SECURING SYSTEM & NETWORKS
.
.
.
And much more in a single pdf

Download Links:

Download from server 1 (Ziddu.com)

Download from server 2 (Mediafire.com)

-- A Black Hack: Post

Thursday 17 September 2015

30+ Hacking Books Collection - By Black Hack

Download 30+ Hacking Books Collection - By Black Hack 

Highly Compressed 20MB W/O Password

and give a boost to your hacking carrier.

   Index:

    Hacking for dummies.pdf
    How to Crack CD Protections.pdf
    Untold Windows Tips And Secrets.pdf
    1593270070.chm
    Algorithms Explained.doc
    Ankit Fadia Hacking Guide.pdf
    Base64 Encoding Torn Apart.doc
    Batch File Programming - Ankit Fadia.pdf
    Closing Open Holes.doc
    Defacing Websites A Step By Step Process .pdf
    Dos Attacked.pdf
    Encryption Algorithms Explained.pdf
    firewalls.doc
    FTP Exploits By Ankit Fadia.pdf
    Gathering Info on Remote Host.doc
    Getting geographical Information using an IP Address.doc
    Hacking into Linux.doc
    hacking_gmail.pdf
    Hardcore Windows XP - The Step by Step Guide To Ultimate Performance.pdf
    More Password Cracking Decrypted.doc
    Removing Banners from your site.doc
    Sendmail and Beyond.doc
    SSL Torn Apart.doc
    Syngress.Asterisk.Hacking.May.2007.pdf
    TCP Wrappers Unwrapped.doc
    Tracing IP,DNS,WHOIS-nsLOOKUP.pdf
    Transparent Proxies in Squid.doc
    Transparent_proxies_with_Squid.pdf
    Untold Windows Tips and Secrets.doc
    Windows Password Files Torn Apart.doc 

Download From Here:

 -- A Black Hack: post

Download EaseUS Data Recovery Wizard Technician 9.0.0+Crack

EaseUS Data Recovery Wizard Technician 9.0.0 -Download free+Crack

Highly Compressed(23.7 MB), Without Password

--By Black Hack:



ScreenShot:


Professional data recovery software is compatible with Dynamic Disk and Linux File System. It will help computer users out of all data loss problems. EaseUS Data Recovery Wizard Professional does an amazing job on format recovery, unformat, deleted files recovery or lost data due to partition loss or damage, software crash, virus infection, unexpected shutdown or any other unknown reasons when the data loss disaster strikes, especially when you want to recover data from formatted drive. It provides the most comprehensive data recovery solution for computer users to recover lost data.

Benefits of EaseUS Data Recovery Wizard Professional
* Complete and effective recovery: recover all lost data including documents, emails, photos, videos, audio files and more.
* Safe and easy to use: friendly recovery wizard applies to all levels of computer users and most importantly it works no damage to your data.
* Preview before recovery: preview function helps you to locate your lost files and check their quality before you decide to recover them.
* Total recovery: not only recover files from hard drives, but also get lost data back from RAID, dynamic disks, USBs, external hard drives, memory cards, digital cameras, MP3/MP4 players and more.

When to use?:
Hard Drives that have been formatted.
Corruptted or missing critical file system structures.
• Accidental file deletion.
• File loss without reason.
• Unexpected system shutdown or application failure.
• Computer viruses and worms infection or corruption.
• Boot-up problems.
• Partition structures are damaged or deleted.
• Damage due to a power failure or surge.
• Recover files from devices with unknown file systems including Hard Disk, external ZIP/USB drive, removable SmartMedia, MemoryStick, SD cards, etc.

Key Features:
• Recover files from unreadable Dynamic Disk.
• Recover Linux files in Windows Systems.
• Recover deleted or lost files emptied from the Recycle Bin.
• File recovery after accidental format, even if you have reinstalled Windows.
• Disk recovery after a hard disk crash.
• Get back files after a partitioning error or hard disk crash.
• Get data back from RAW hard drives.
• Recover office document, photo, image, video, music, email, etc.
• Recover from hard drive, USB drive, memory card, memory stick, camera card, Zip, floppy disk or other storage media.
• Support FAT12, FAT16, FAT32, NTFS/NTFS5, EXT2/EXT3 file systems.
• New! Windows 2000/XP/2003/Vista/2008/Windows 7
• High quality of file recovery.
• Bootable media based on WinPE.
• Free file repair service.

EaseUS Data Recovery Wizard WinPE Edition is designed for data recovery in case of any boot-up or system crash problem. There is no need for user to install it so the risk of overwriting lost data could be lowest and it will help computer users out of all data loss problems, format recovery, and recovering deleted files emptied from the Recycle Bin, or data loss due to partition loss or damage, software crash and other unknown reasons.

Recover Data after System Crash or Boot Problems with EaseUS Data Recovery Wizard Professional
- Data recovery boot disk to facilitate data recovery when operating system is damaged
- Non-destructive Windows data recovery software for lost data recovery
- No need to install. Run data recovery software from WinPE bootable CD

Supported OS: Windows 8/7/Vista/XP/2000 and Windows Server 2012/2008/2003

Installation Instructions:
  • Install program.
  • Register application it is pre-cracked.
  • Done, Enjoy. 

Download Links :

Download from Server 1 (ziddu.com)

Download from server 2 (mediafire.com)

-- A Post by Black Hack:

Tuesday 15 September 2015

Download Batch file programming -By Premkumar.S

Batch File Programming -By Premkumar.S is a greatest book on Batch file programming and cmd command, it include all cmd command in depth and how viruses of windows design and works, so if you really command on Windows then this book if for you>>
So it is a book a hacker must have>>



About:Batch File programming:

Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch  file  is  created  using  any  text  editors  like  notepad,  WordPad,  WinWord or  so  on,  which comprises  of  a  sequence  of  built-in  commands  used  to  perform  some  often  done  tasks  like  deleting  a series  of  files  of  same  type  or  of  different  type, creating  logs,  clearing  unwanted  craps  from  your computer and even for creating a batch VIRUS.

Whenever a Batch program is executed, it was interpreted line-by-line by the CLI (Command Line Interpreter) command.com or the cmd.exe. Batch file is really helpful in automating tedious tasks and for maintaining system logs. The commands used while creating a batch file are case insensitive, in the sense that it may accept both small and upper case letters.......... to be continued in the book>>

Download Links:

Download from server 1 (Ziddu.com):

Download from server 2 (mediafire.com):

-- A Black Hack: Post

Monday 14 September 2015

Basic Networking Terms and Protocols every hacker must know

An Introduction to Networking Terminology, Interfaces, and Protocols

A basic understanding of networking is important for anyone managing a server. Not only is it essential for getting your services online and running smoothly, it also gives you the insight to diagnose problems.
This document will provide a basic overview of some common networking concepts. We will discuss basic terminology, common protocols, and the responsibilities and characteristics of the different layers of networking.
This guide is operating system agnostic, but should be very helpful when implementing features and services that utilize networking on your server.

Networking Glossary

Before we begin discussing networking with any depth, we must define some common terms that you will see throughout this guide, and in other guides and documentation regarding networking.
These terms will be expanded upon in the appropriate sections that follow:

•Connection: In networking, a connection refers to pieces of related information that are transfered through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the at the end of the data transfer.

•Packet: A packet is, generally speaking, the most basic unit that is transfered over a network. When communicating over a network, packets are the envelopes that carry your data (in pieces) from one end point to the other.
Packets have a header portion that contains information about the packet including the source and destination, timestamps, network hops, etc. The main portion of a packet contains the actual data being transfered. It is sometimes called the body or the payload.

•Network Interface: A network interface can refer to any kind of software interface to networking hardware. For instance, if you have two network cards in your computer, you can control and configure each network interface associated with them individually.

A network interface may be associated with a physical device, or it may be a representation of a virtual interface. The "loopback" device, which is a virtual interface to the local machine, is an example of this.

•LAN: LAN stands for "local area network". It refers to a network or a portion of a network that is not publicly accessible to the greater internet. A home or office network is an example of a LAN.

•WAN: WAN stands for "wide area network". It means a network that is much more extensive than a LAN. While WAN is the relevant term to use to describe large, dispersed networks in general, it is usually meant to mean the internet, as a whole.
If an interface is said to be connected to the WAN, it is generally assumed that it is reachable through the internet.

•Protocol: A protocol is a set of rules and standards that basically define a language that devices can use to communicate. There are a great number of protocols in use extensively in networking, and they are often implemented in different layers.
Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP.

•Port: A port is an address on a single machine that can be tied to a specific piece of software. It is not a physical interface or location, but it allows your server to be able to communicate using more than one application.

•Firewall: A firewall is a program that decides whether traffic coming into a server or going out should be allowed. A firewall usually works by creating rules for which type of traffic is acceptable on which ports. Generally, firewalls block ports that are not used by a specific application on a server.

•NAT: NAT stands for network address translation. It is a way to translate requests that are incoming into a routing server to the relevant devices or servers that it knows about in the LAN. This is usually implemented in physical LANs as a way to route requests through one IP address to the necessary backend servers.

•VPN: VPN stands for virtual private network. It is a means of connecting separate LANs through the internet, while maintaining privacy. This is used as a means of connecting remote systems as if they were on a local network, often for security reasons.
There are many other terms that you may come across, and this list cannot afford to be exhaustive. We will explain other terms as we need them. At this point, you should understand some basic, high-level concepts that will enable us to better discuss the topics to come.

Network Layers

While networking is often discussed in terms of topology in a horizontal way, between hosts, its implementation is layered in a vertical fashion throughout a computer or network.

What this means is that there are multiple technologies and protocols that are built on top of each other in order for communication to function more easily. Each successive, higher layer abstracts the raw data a little bit more, and makes it simpler to use for applications and users.
It also allows you to leverage lower layers in new ways without having to invest the time and energy to develop the protocols and applications that handle those types of traffic.

The language that we use to talk about each of the layering scheme varies significantly depending on which model you use. Regardless of the model used to discuss the layers, the path of data is the same.

As data is sent out of one machine, it begins at the top of the stack and filters downwards. At the lowest level, actual transmission to another machine takes place. At this point, the data travels back up through the layers of the other computer.
Each layer has the ability to add its own "wrapper" around the data that it receives from the adjacent layer, which will help the layers that come after decide what to do with the data when it is passed off.

OSI Model

Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect.

This model defines seven separate layers. The layers in this model are:

•Application: The application layer is the layer that the users and user-applications most often interact with. Network communication is discussed in terms of availability of resources, partners to communicate with, and data synchronization.

•Presentation: The presentation layer is responsible for mapping resources and creating context. It is used to translate lower level networking data into data that applications expect to see.

•Session: The session layer is a connection handler. It creates, maintains, and destroys connections between nodes in a persistent way.

•Transport: The transport layer is responsible for handing the layers above it a reliable connection. In this context, reliable refers to the ability to verify that a piece of data was received intact at the other end of the connection.
This layer can resend information that has been dropped or corrupted and can acknowledge the receipt of data to remote computers.

•Network: The network layer is used to route data between different nodes on the network. It uses addresses to be able to tell which computer to send information to. This layer can also break apart larger messages into smaller chunks to be reassembled on the opposite end.

•Data Link: This layer is implemented as a method of establishing and maintaining reliable links between different nodes or devices on a network using existing physical connections.

•Physical: The physical layer is responsible for handling the actual physical devices that are used to make a connection. This layer involves the bare software that manages physical connections as well as the hardware itself (like Ethernet).
As you can see, there are many different layers that can be discussed based on their proximity to bare hardware and the functionality that they provide.

TCP/IP Model

The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model:

•Application: In this model, the application layer is responsible for creating and transmitting user data between applications. The applications can be on remote systems, and should appear to operate as if locally to the end user.
The communication is said to take place between peers.

•Transport: The transport layer is responsible for communication between processes. This level of networking utilizes ports to address different services. It can build up unreliable or reliable connections depending on the type of protocol used.

•Internet: The internet layer is used to transport data from node to node in a network. This layer is aware of the endpoints of the connections, but does not worry about the actual connection needed to get from one place to another. IP addresses are defined in this layer as a way of reaching remote systems in an addressable manner.

•Link: The link layer implements the actual topology of the local network that allows the internet layer to present an addressable interface. It establishes connections between neighboring nodes to send data.

As you can see, the TCP/IP model, is a bit more abstract and fluid. This made it easier to implement and allowed it to become the dominant way that networking layers are categorized.

Interfaces

Interfaces are networking communication points for your computer. Each interface is associated with a physical or virtual networking device.
Typically, your server will have one configurable network interface for each Ethernet or wireless internet card you have.
In addition, it will define a virtual network interface called the "loopback" or localhost interface. This is used as an interface to connect applications and processes on a single computer to other applications and processes. You can see this referenced as the "lo" interface in many tools.

Many times, administrators configure one interface to service traffic to the internet and another interface for a LAN or private network.
In DigitalOcean, in datacenters with private networking enabled, your VPS will have two networking interfaces (in addition to the local interface). The "eth0" interface will be configured to handle traffic from the internet, while the "eth1" interface will operate to communicate with the private network.

Protocols

Networking works by piggybacking a number of different protocols on top of each other. In this way, one piece of data can be transmitted using multiple protocols encapsulated within one another.

We will talk about some of the more common protocols that you may come across and attempt to explain the difference, as well as give context as to what part of the process they are involved with.

We will start with protocols implemented on the lower networking layers and work our way up to protocols with higher abstraction.

Media Access Control

Media access control is a communications protocol that is used to distinguish specific devices. Each device is supposed to get a unique MAC address during the manufacturing process that differentiates it from every other device on the internet.

Addressing hardware by the MAC address allows you to reference a device by a unique value even when the software on top may change the name for that specific device during operation.

Media access control is one of the only protocols from the link layer that you are likely to interact with on a regular basis.

IP

The IP protocol is one of the fundamental protocols that allow the internet to work. IP addresses are unique on each network and they allow machines to address each other across a network. It is implemented on the internet layer in the IP/TCP model.
Networks can be linked together, but traffic must be routed when crossing network boundaries. This protocol assumes an unreliable network and multiple paths to the same destination that it can dynamically change between.
There are a number of different implementations of the protocol. The most common implementation today is IPv4, although IPv6 is growing in popularity as an alternative due to the scarcity of IPv4 addresses available and improvements in the protocols capabilities.

ICMP

ICMP stands for internet control message protocol. It is used to send messages between devices to indicate the availability or error conditions. These packets are used in a variety of network diagnostic tools, such as ping and traceroute.
Usually ICMP packets are transmitted when a packet of a different kind meets some kind of a problem. Basically, they are used as a feedback mechanism for network communications.

TCP

TCP stands for transmission control protocol. It is implemented in the transport layer of the IP/TCP model and is used to establish reliable connections.

TCP is one of the protocols that encapsulates data into packets. It then transfers these to the remote end of the connection using the methods available on the lower layers. On the other end, it can check for errors, request certain pieces to be resent, and reassemble the information into one logical piece to send to the application layer.

The protocol builds up a connection prior to data transfer using a system called a three-way handshake. This is a way for the two ends of the communication to acknowledge the request and agree upon a method of ensuring data reliability.

After the data has been sent, the connection is torn down using a similar four-way handshake.

TCP is the protocol of choice for many of the most popular uses for the internet, including WWW, FTP, SSH, and email. It is safe to say that the internet we know today would not be here without TCP.

UDP

UDP stands for user datagram protocol. It is a popular companion protocol to TCP and is also implemented in the transport layer.
The fundamental difference between UDP and TCP is that UDP offers unreliable data transfer. It does not verify that data has been received on the other end of the connection. This might sound like a bad thing, and for many purposes, it is. However, it is also extremely important for some functions.

Because it is not required to wait for confirmation that the data was received and forced to resend data, UDP is much faster than TCP. It does not establish a connection with the remote host, it simply fires off the data to that host and doesn't care if it is accepted or not.

Because it is a simple transaction, it is useful for simple communications like querying for network resources. It also doesn't maintain a state, which makes it great for transmitting data from one machine to many real-time clients. This makes it ideal for VOIP, games, and other applications that cannot afford delays.

HTTP

HTTP stands for hypertext transfer protocol. It is a protocol defined in the application layer that forms the basis for communication on the web.
HTTP defines a number of functions that tell the remote system what you are requesting. For instance, GET, POST, and DELETE all interact with the requested data in a different way.

FTP

FTP stands for file transfer protocol. It is also in the application layer and provides a way of transferring complete files from one host to another.

It is inherently insecure, so it is not recommended for any externally facing network unless it is implemented as a public, download-only resource.

DNS

DNS stands for domain name system. It is an application layer protocol used to provide a human-friendly naming mechanism for internet resources. It is what ties a domain name to an IP address and allows you to access sites by name in your browser.

SSH

SSH stands for secure shell. It is an encrypted protocol implemented in the application layer that can be used to communicate with a remote server in a secure way. Many additional technologies are built around this protocol because of its end-to-end encryption and ubiquity.
There are many other protocols that we haven't covered that are equally important. However, this should give you a good overview of some of the fundamental technologies that make the internet and networking possible.

Conclusion

At this point, you should be familiar with some basic networking terminology and be able to understand how different components are able to communicate with each other. This should assist you in understanding other articles and the documentation of your system.

-- A Black Hack: Post

Very Useful Run Commands In Windows

Here i bring some new and very usefull windows run commands>>

1. Open RUN(Win+R)
2. Enter any command from list below.

In this article a complete list of Run Commands in Windows 7 and 8 . These commands allows to quickly access features and applications to customize operative system environment.

These run commands are available for almost all settings available in Windows control panel.

Note : most part of these commands are compatible with Windows 7, Vista e Windows XP.

As someone has kindly reported, some commands are not compatible between different versions. Please check the commands and use the correct ones for your version of the operating system. Technical feedbacks are always appreciated, please send me any info that it helpful to improve this article.

List of Useful Run Commands in Windows

To Access… Run Command
Accessibility Controls access.cpl
Accessibility Wizard accwiz
Add Hardware Wizard hdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Tools control admintools
Adobe Acrobat (if installed) acrobat
Adobe Designer (if installed) formdesigner
Adobe Distiller (if installed) acrodist
Adobe ImageReady (if installed) imageready
Adobe Photoshop (if installed) photoshop
Automatic Updates wuaucpl.cpl
Bluetooth Transfer Wizard fsquirt
Calculator calc
Certificate Manager certmgr.msc
Character Map charmap
Check Disk Utility chkdsk
Clipboard Viewer clipbrd
Command Prompt cmd
Component Services dcomcnfg
Computer Management compmgmt.msc
Control Panel control
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Manager devmgmt.msc
Direct X Control Panel (if installed)* directx.cpl
Direct X Troubleshooter dxdiag
Disk Cleanup Utility cleanmgr
Disk Defragment dfrg.msc
Disk Management diskmgmt.msc
Disk Partition Manager diskpart
Display Properties control desktop
Display Properties desk.cpl
Display Properties (w/Appearance Tab Preselected) control color
Dr. Watson System Troubleshooting Utility drwtsn32
Driver Verifier Utility verifier
Event Viewer eventvwr.msc
Files and Settings Transfer Tool migwiz
File Signature Verification Tool sigverif
Findfast findfast.cpl
Firefox (if installed) firefox
Folders Properties folders
Fonts control fonts
Fonts Folder fonts
Free Cell Card Game freecell
Game Controllers joy.cpl
Group Policy Editor (XP Prof) gpedit.msc
Hearts Card Game mshearts
Help and Support helpctr
HyperTerminal hypertrm
Iexpress Wizard iexpress
Indexing Service ciadv.msc
Internet Connection Wizard icwconn1
Internet Explorer iexplore
Internet Properties inetcpl.cpl
Internet Setup Wizard inetwiz
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns
IP Configuration (Release All Connections) ipconfig /release
IP Configuration (Renew All Connections) ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns
IP Configuration (Display DHCP Class ID) ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid
Java Control Panel (if installed) jpicpl32.cpl
Java Control Panel (if installed) javaws
Keyboard Properties control keyboard
Local Security Settings secpol.msc
Local Users and Groups lusrmgr.msc
Logs You Out Of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access (if installed) msaccess
Microsoft Chat winchat
Microsoft Excel (if installed) excel
Microsoft Frontpage (if installed) frontpg
Microsoft Movie Maker moviemk
Microsoft Paint mspaint
Microsoft Powerpoint (if installed) powerpnt
Microsoft Word (if installed) winword
Microsoft Syncronization Tool mobsync
Minesweeper Game winmine
Mouse Properties control mouse
Mouse Properties main.cpl
Nero (if installed) nero
Netmeeting conf
Network Connections control netconnections
Network Connections ncpa.cpl
Network Setup Wizard netsetup.cpl
Notepad notepad
Nview Desktop Manager (if installed) nvtuicpl.cpl
Object Packager packager
ODBC Data Source Administrator odbccp32.cpl
On Screen Keyboard osk
Opens AC3 Filter (if installed) ac3filter.cpl
Outlook Express msimn
Paint pbrush
Password Properties password.cpl
Performance Monitor perfmon.msc
Performance Monitor perfmon
Phone and Modem Options telephon.cpl
Phone Dialer dialer
Pinball Game pinball
Power Configuration powercfg.cpl
Printers and Faxes control printers
Printers Folder printers
Private Character Editor eudcedit
Quicktime (If Installed) QuickTime.cpl
Quicktime Player (if installed) quicktimeplayer
Real Player (if installed) realplay
Regional Settings intl.cpl
Registry Editor regedit
Registry Editor regedit32
Remote Access Phonebook rasphone
Remote Desktop mstsc
Removable Storage ntmsmgr.msc
Removable Storage Operator Requests ntmsoprq.msc
Resultant Set of Policy (XP Prof) rsop.msc
Scanners and Cameras sticpl.cpl
Scheduled Tasks control schedtasks
Security Center wscui.cpl
Services services.msc
Shared Folders fsmgmt.msc
Shuts Down Windows shutdown
Sounds and Audio mmsys.cpl
Spider Solitare Card Game spider
SQL Client Configuration cliconfg
System Configuration Editor sysedit
System Configuration Utility msconfig
System File Checker Utility (Scan Immediately) sfc /scannow
System File Checker Utility (Scan Once At The Next Boot) sfc /scanonce
System File Checker Utility (Scan On Every Boot) sfc /scanboot
System File Checker Utility (Return Scan Setting To Default) sfc /revert
System File Checker Utility (Purge File Cache) sfc /purgecache
System File Checker Utility (Sets Cache Size to size x) sfc /cachesize=x
System Information msinfo32
System Properties sysdm.cpl
Task Manager taskmgr
TCP Tester tcptest
Telnet Client telnet
Tweak UI (if installed) tweakui
User Account Management nusrmgr.cpl
Utility Manager utilman
Windows Address Book wab
Windows Address Book Import Utility wabmig
Windows Backup Utility (if installed) ntbackup
Windows Explorer explorer
Windows Firewall firewall.cpl
Windows Magnifier magnify
Windows Management Infrastructure wmimgmt.msc
Windows Media Player wmplayer
Windows Messenger msmsgs
Windows Picture Import Wizard (need camera connected) wiaacmgr
Windows System Security Tool syskey
Windows Update Launches wupdmgr
Windows Version (to show which version of windows) winver
Windows XP Tour Wizard tourstart
Wordpad write

-- A Black Hack: Post