Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 04/19/14 in all areas

  1. Un nou produs a fost lansat. HiddenVPN HiddenVPN US x 10ips = 35$ / mo HiddenVPN RU x 10ips = 35$ / mo HiddenVPN AU x 10ips = 35$ / mo HiddenVPN GB x 8ips = 28$ / mo HiddenVPN Combo1 { RO x 1ip ; CZ x 1ip ; FR x 1ip ; NL x 1ip ; ES x 1ip ; IT x 1ip ; CH x 1ip ; BG x 1ip ; DK x 1ip ; NZ x 1ip } = 28$ / mo HiddenVPN Combo2 { JP x 1ip ; TW x 1ip ; AU x 1ip ; SA x 1ip ; HK x 1ip ; IN x 1ip ; UA x 1ip ; TH x 1ip ; KZ x 1ip ; LB x 1ip } = 28$ / mo HiddenVPN Demo US x 1ip = FREE Platile se fac momentan prin intermediul site-ului ipsocks.pro Acceptam WMZ, PerfectMoney, platile se proceseaza manual. Aveti si un cont demo mai jos. !!!! NU PASTRAM LOGURI !!!! !!!! Trafic NELIMITAT !!!! Download soft: 1: ipsocks.pro/hiddenvpn-betav1.0.zip 2: Download hiddenvpn-betav1.0.zip from Sendspace.com - send big files the easy way Demo account: Username: demo ; Password: demo Contact: ICQ: 601162845 YM!: unlimited.socks jabb: unlimitedsocks@jabber.cz
    1 point
  2. Mass validator pentru ID-uri de yahoo facut in bash #!/bin/sh CURL="`which curl`" GREP="`which grep`" PARAMS="-s --head" YAHOO="http://img.msg.yahoo.com/v1/displayImage/yahoo" INVALID_STR="profile_96" for i in `cat ids.txt` ; do if [ -z "`$CURL $PARAMS $YAHOO/$i |$GREP $INVALID_STR`" ] then echo "$i - Valid user ID" else echo "$i - Invalid user ID" fi done Am facut o lista de test numita 'ids.txt' flash_seby amiradavison elly_deea18 anyta_mary93623 test_teste3r412 jojojaja35r2_r2 anyta_mary94 Test: macbook ~$ ./val flash_seby - Valid user ID amiradavison - Valid user ID elly_deea18 - Valid user ID anyta_mary93623 - Invalid user ID test_teste3r412 - Invalid user ID jojojaja35r2_r2 - Invalid user ID anyta_mary94 - Valid user ID macbook ~$ ** Nota: Functioneaza pe orice distributie de linux + FreeBSD si Mac OS X. Sunt necesare doar curl si grep.
    1 point
  3. How Sercomm saved my Easter! Another backdoor in my router: when Christmas is NOT enough! Released 18/04/2014 By Eloi Vanderbeken - Synacktiv Download: http://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf
    1 point
  4. nu pot sa iti spun ca da sau nu, trebuie incercat pe propriul tau telefon neverlock ca test, daca iti da semnal esti baiat, faza e, iti dau un exemplu : "Eu daca iti "iau" tie 5ul tau fara instiintarea ta si ma duc frumusel in Setari>Icloud> si iti sterg icloud-ul doar daca este activat de tine, mie imi sterge contul de icloud care l-ai avut tu si ca o paranteza in icloud.com, iphonul nu iti va aparea la find my iphone.. si telefonul a zburat, dar sa ma fac inteles trebuie activat ca sa faci bugul pana ajungi u la un Browser". Dar uite o idee, din cate am auzit un scripter a customizat ipsw 7 prin skip la icloud, fara sa m-ai introduci neaparat Userul si Parola in Icloud. Un altul a reusit prin Total Commander fara java script = ssh, sa intre intr-un 5 a rootat kernel modeul, deci se poate, dar aici e vorba de bani dupa cate vezi Dev Team = ih8fasss, evasi0n7 etc. si nu circula asa ceva prin google. Iti dau un sfat tine banii... acolo, exemplu in 2010 deabea s-a facut unlockul la ios 4.2.1, dar sa nu vorbim ca in 2014 deabea au uplodat unlockerul la ios 5.1.1, pana in 2015 vor baga la ios 6.1.2, 2016 la 7.1.5, etc... stai chill tine banii... http://code.google.com/p/t-pot/wiki/Installation succes!
    1 point
  5. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Download: http://upload.evilzone.org/download.php?id=4356861&type=rar Sursa:https://evilzone.org/ebooks/practical-reverse-engineering/
    1 point
  6. Am fost intrebat de cineva de aici ce cunostinte ar trebui sa aibe un sysadmin. O sa incep cu un sysadmin ce lucreaza in industria de hosting/securitate. Cunostinte standarde de monitorizare - Analiza loguri de sistem. - Monitorizare performante echipamente/retea. - Monitorizare conexiuni, incarcare servere, daemoni, conexiuni(tcp/ip). - Generarea de rapoarte in cazul in care se detecteaza probleme. Administrare echipamente (servere unix/linux, routere, etc ...) - Update-uri de securitate - Stabilire nivele de access - Instalare, configurare si tuning software open source - Cunostinte solide nginx, lighttpd, apache, mysql, postgresql, memcached, dns, networking, iptables, ipfilter, ipwf, packet filter - Cunostinte posix, environmente, bash, acls - Cunostinte solide networking. - Cunostinte configurare routere (exemple: cisco, hp, juniper, force 10) - Cunostinte OSI Layers, LACP, BGP Stuff ... Evaluare infrastructura - Evaluarea infrastructurii IT existente. - Estimarea necesitatilor informatice reale pe termen mediu si lung Audit & Sec - Identificarea vulnerabilitatilor in site-urile web gazduite pe un sistem linux. (necesare cunostinte bune in php) - Cunostinte f. bune in logging. (trebuie sa stiti exact sa configurati la ce anume se face logging si cum se trimit alerte) - Determinarea punctelor slabe unui sistem informatic. - Generarea de rapoarte in cazul in care se detecteaza probleme. - Identificarea si inlaturarea serviciilor/software-ului care prezinta riscuri din punct de vedere al securitatii. - Proiectare si implementare firewall personalizat in functie de serviciile rulate. - Patching (compilarea kernelului din surse, patching, etc) (*hardening) Servere de email - Cunostinte solide despre postfix, qmail, exim, spamassassin, clamav, amavis, DKIM, SPF (spf este legat si de dns.) Management baze de date - Testarea bazelor de date inainte de mediul de productie - Diagnostic al performatelor bazelor de date - Optimizare (Tuning) MySQL/PostgreSQL - Analize de baze de date - Reorganizari baze de date - Replicari de date (replication) - Backup & Restore Pentru un sysadmin ce lucreaza intr-o corporatie aveti nevoie de mai multe: Oracle, RHEL, AIX, Solaris, LPAR ... si altele (depinde de caz)
    1 point
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...