Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 01/18/13 in all areas

  1. Project GameOver was started with the objective of training and educating newbies about the basics of web security and educate them about the common web attacks and help them understand how they work . GameOver has been broken down into two sections . Section 1 consists of special web applications that are designed especially to teach the basics of Web Security . Section 1 will cover XSS CSRF RFI & LFI BruteForce Authentication Directory/Path traversal Command execution SQL injection Section 2 is a collection of dileberately insecure Web applications . This section provides a legal platform to test your skills and to try and exploit the vulnerabilities and sharpen your skills before you pentest live sites. We would advice newbies to try and exploit these web applications . These applications provide real life environments and will boost their confidence. System Requirements : In order to run the VM image , you need to have a VM Player 4.0.2 or higher .(We have not tested it in lower versions of VM Player). You may allocate 256MB or higher RAM to this instance . In case you do not have a VM Player installed or for some reason you prefer another virtualization software , you may download the .iso and run it in a 'Live' mode . Getting Started : In case you have chosen the Live CD , select 'Live' from the grub menu and Enter. Login with the following credentials : username : root password : gameover Once you login , type 'ifconfig' in your GameOver machine command prompt and hit Enter . This will give you the ip address of the GameOver machine (Server) . Now in your client browser enter this IP address and hit Enter . You should be able to access GameOver now . Download : GameOver - Browse Files at SourceForge.net Sursa : GameOver Web Security & Hacking | Ethical Hacking-Your Way To The World Of IT Security
    1 point
  2. CCIE R&S / CCIE Service Provider Performance Routing/Optimized Edge Routing SP Catalyst 3560 QoS Basics Catalyst Switching – Part 1 Catalyst Switching – Part 2 Routing Protocol Redistribution RIP Frame Relay Interdomain Multicast Routing OSPF Area Types Advanced MPLS L3 VPNs IP Multicast and Protocols MPLS 101 BGP Path Selection and Filtering IPv6 Protocols and Routing Multicast VPN EIGRP How I Passed CCIE 4.0 CCIE Voice Presence Integrations Sip Trunks Gatekeeper Troubleshooting Mobile Connect and Mobile Voice Access High Availability/CME as SRST v2 SIP Phone Setup & Features CUCME Features UCCX Integration and Troubleshooting Strategy for the Voice Lab Exam Cube Unity Connection Integration CCIE Wireless CCIE Wireless Preparation Tips Autonomous AP Modes Unified AP Modes Radio Resource Management WLC Templates in WCS ACS Server Configuration Unified Authentication and Encryption CCIE Security Cut-Thru Proxy Scenarios Zone Based Firewalls Easy VPN Troubleshooting IPsec VRF Aware VPN Nac Framework Security PKI Infrastructure ASA & IOS based NAT Ask the Expert Security Voice Link: Free CCIE vLectures for R&S,Voice, Wireless, Security & Service Provider | IPexpert Inc.
    1 point
  3. Commerical 0day malicious code is often undetectable by antivirus software, as it is using stealth mechanisms to mask its presence in compromised system. All actual methods for detecting rootkits depend on actual system functioning disruption. And that is the point where Oshi Unhooker keeps an eye on, allowing to detect malicious hooks. Oshi Unhooker provides easy to use interface without any sophisticated settings and options. On-demand scan is started after Scan button is pressed by user. Oshi Unhooker scans the system and reports all its actions in the notification area, listing all found threats and abnormal system activities. Using Oshi Unhooker is easy as 123. Keeping operating system up-to-date cant guarantee 100% confidence, as malware can use 0day exploit which is not reported and is not known by security software vendors. Oshi Unhooker intensively uses complex inspection methods for detecting rootkits which are not even known, using heuristics algorithms and indepth system analysis. Important notes: - It is highly recommended to save all unsaved data on your computer before starting hook cleaning as there is possibility of applications or system crash. - On 64-bit systems it is impossible to clear kernel hooks after Windows launched due to Patchguard system. http://www.oshiunhooker.com/Unhooker.exe
    1 point
  4. RogueKiller is a useful application which will scan the running processes from your computer and kill those who are malicious. This tool was developed after seeing that some rogues (eg Security Tools) block the execution of disinfection programs, and some programs (eg rkill) appeared ineffective in killing the rogue process. So a tool based on timeliness was created, which can clean up the process, as well as clean the registry and sanitize it faster and safer than using other apps. http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe http://www.sur-la-toile.com/RogueKiller/RogueKillerX64.exe
    1 point
  5. A venit din nou timpul s? deschidem înregistr?rile pentru encoderi, de data aceasta pentru toate grupurile. Ce ave?i de f?cut? 1. Înregistra?i-v? pe acest forum; 2. Dup? ce v-a?i înregistrat, loga?i-v? ?i accesa?i pagina principal?; 3. Da?i click pe imaginea aferent? grupului pentru care dori?i s? aplica?i; 4. Completa?i formularul; 5. Submit! Pentru întreb?ri folosi?i aceasta categorie.
    1 point
  6. Cod 5 orange disponibil ... 5lei/euro pp sau mb + transfer celelalte retele
    -1 points
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...