Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 11/23/16 in all areas

  1. La multean via @Gecko
    4 points
  2. Ca în fiecare an, RST vă pune la dispoziție pachetul de revelion "lăbarchat", mâncarea și băutura incluse din ce are fiecare pe acasă. Pachetul este gratuit în limita în care un administrator nu se decide să închidă chatul din varii motive ("mai ieșiți în plm și pe afară măcar odată pe an", cum ar zice @Nytro) Nu uitați să aduceți de acasă o farfurie cu meme-uri și niște sarmale.
    2 points
  3. Shellcode Compiler Shellcode Compiler is a program that compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows. It is possible to call any Windows API function in a user-friendly way. Shellcode Compiler takes as input a source file and it uses it's own compiler to interpret the code and generate an assembly file which is assembled with NASM (http://www.nasm.us/). Shellcode compiler was released at DefCamp security conference in Romania, November 2016. Link: https://github.com/NytroRST/ShellcodeCompiler
    1 point
  4. In principiu as fi interesat sa sustin proiectul cu hosting, domeniu daca e nevoie sau o tema wp buna, etc. Insa as vrea sa discutam putin mai intai, daca imi dai add pe Skype la
    1 point
  5. Din pacate nu mai avem hosting Daca se ofera cineva sau stie un hosting free bun, astept pm.
    1 point
  6. https://stackoverflow.com/questions/3002067/how-are-software-license-keys-generated Se poate sa fie doar base 64 din ceva bit array. (mai ales ca are padding ==) E greu de realizat ce poate fi ci ce entropie are fara sa ai detalii despre cum este generat sau validat.
    1 point
  7. Functie apelata static fara keyword static la declarare , functie apelata static din clasa deja instantata.
    1 point
  8. Asa era pana anul trecut, cica. Din 2016 s-ar fi modificat sa se aplice pentru toti programatorii.
    1 point
  9. 1 point
  10. Troopers 14 - Easy Ways To Bypass Anti-Virus Systems - Attila Marosi Description: All IT security professionals know that antivirus systems can be avoided. But few of them knows that it is very easy to do. (If it is easy to do, its impact is huge!) In this presentation I will, on the spot, fully bypass several antivirus systems using basic techniques! I will bypass: signatures detection, emulation/virtualization, sandboxing, firewalls. How much time (development) is needed for it, for this result? Not more than 15 hours without a cent of investment! If I could do this, anyone can do this… so I think we have to focus to this problem. Using these easy techniques I can create a ‘dropper’ that can deliver any kind of Metasploit (or anything else) shellcode and bypass several well-known antivirus in real-life and full bypass the VirusTotal.com detection with a detection rate in 0. In my presentation I use 6 virtual machines and 9 real-time demos. Resulting the audience always have a big fun and surprise when they see the most well-know systems to fail – and the challenges what the AVs cannot solved are ridiculously simple and old. So the IT professionals might think too much about the systems which they rely on and which cost so much. Bypassed AntiVirus Systems: F-Secure, AVG, NOD32 6 and 7, !avast, Kaspersky, Trend Micro, McAfee… Educational value of the topic: We look at how the virus writers develop their codes. We will develop a puzzle which may distract the AV virtualization engine to avoid the detection. We will develop a code to encrypt/decypt our malicious shellcode. We will look at which built-in Windows functions helps the attacker to inject malicious code to a viction process and we try it. (We will use the iexplorer.exe to bypass the firewall.) We will look at what solutions are often used to avoid the sandbox. Learn the difference between the metamorphous and polymorphous code. I wrote a python script which can create a metamorphous version from a byte code. We will test it in realtime and it will be able to seen, that it is a real challenge for the AVs. BIO: Attila Marosi has always been working in information security field since he started working. As a lieutenant of active duty he worked for years on special information security tasks occuring within the SSNS. Newly he was transferred to the just established GovCERT-Hungary, wich is an additional national level in the internationally known system of CERT offices. He has several international certificates such as CEH, ECSA, OSCP, OSCE. During his free time he also read lections and does some teaching on different levels; on the top of them for white hat hackers. He has presented at many security conferences including Hacker Halted, DeepSEC and Ethical Hacking. For More Information please visit : - https://www.troopers.de Sursa: Troopers 14 - Easy Ways To Bypass Anti-Virus Systems - Attila Marosi
    1 point
  11. pai nu gasesti pe google?sunt o gramada free
    -1 points
  12. Ai experienta in vanzari? Plata se face la comision: 7% la vanzari pana in 10.000 lei 20% la vanzari peste 10.000 lei Detalii in privat.
    -1 points
×
×
  • Create New...