Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 04/19/14 in all areas

  1. Un nou produs a fost lansat. HiddenVPN HiddenVPN US x 10ips = 35$ / mo HiddenVPN RU x 10ips = 35$ / mo HiddenVPN AU x 10ips = 35$ / mo HiddenVPN GB x 8ips = 28$ / mo HiddenVPN Combo1 { RO x 1ip ; CZ x 1ip ; FR x 1ip ; NL x 1ip ; ES x 1ip ; IT x 1ip ; CH x 1ip ; BG x 1ip ; DK x 1ip ; NZ x 1ip } = 28$ / mo HiddenVPN Combo2 { JP x 1ip ; TW x 1ip ; AU x 1ip ; SA x 1ip ; HK x 1ip ; IN x 1ip ; UA x 1ip ; TH x 1ip ; KZ x 1ip ; LB x 1ip } = 28$ / mo HiddenVPN Demo US x 1ip = FREE Platile se fac momentan prin intermediul site-ului ipsocks.pro Acceptam WMZ, PerfectMoney, platile se proceseaza manual. Aveti si un cont demo mai jos. !!!! NU PASTRAM LOGURI !!!! !!!! Trafic NELIMITAT !!!! Download soft: 1: ipsocks.pro/hiddenvpn-betav1.0.zip 2: Download hiddenvpn-betav1.0.zip from Sendspace.com - send big files the easy way Demo account: Username: demo ; Password: demo Contact: ICQ: 601162845 YM!: unlimited.socks jabb: unlimitedsocks@jabber.cz
    1 point
  2. Mass validator pentru ID-uri de yahoo facut in bash #!/bin/sh CURL="`which curl`" GREP="`which grep`" PARAMS="-s --head" YAHOO="http://img.msg.yahoo.com/v1/displayImage/yahoo" INVALID_STR="profile_96" for i in `cat ids.txt` ; do if [ -z "`$CURL $PARAMS $YAHOO/$i |$GREP $INVALID_STR`" ] then echo "$i - Valid user ID" else echo "$i - Invalid user ID" fi done Am facut o lista de test numita 'ids.txt' flash_seby amiradavison elly_deea18 anyta_mary93623 test_teste3r412 jojojaja35r2_r2 anyta_mary94 Test: macbook ~$ ./val flash_seby - Valid user ID amiradavison - Valid user ID elly_deea18 - Valid user ID anyta_mary93623 - Invalid user ID test_teste3r412 - Invalid user ID jojojaja35r2_r2 - Invalid user ID anyta_mary94 - Valid user ID macbook ~$ ** Nota: Functioneaza pe orice distributie de linux + FreeBSD si Mac OS X. Sunt necesare doar curl si grep.
    1 point
  3. How Sercomm saved my Easter! Another backdoor in my router: when Christmas is NOT enough! Released 18/04/2014 By Eloi Vanderbeken - Synacktiv Download: http://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf
    1 point
  4. nu pot sa iti spun ca da sau nu, trebuie incercat pe propriul tau telefon neverlock ca test, daca iti da semnal esti baiat, faza e, iti dau un exemplu : "Eu daca iti "iau" tie 5ul tau fara instiintarea ta si ma duc frumusel in Setari>Icloud> si iti sterg icloud-ul doar daca este activat de tine, mie imi sterge contul de icloud care l-ai avut tu si ca o paranteza in icloud.com, iphonul nu iti va aparea la find my iphone.. si telefonul a zburat, dar sa ma fac inteles trebuie activat ca sa faci bugul pana ajungi u la un Browser". Dar uite o idee, din cate am auzit un scripter a customizat ipsw 7 prin skip la icloud, fara sa m-ai introduci neaparat Userul si Parola in Icloud. Un altul a reusit prin Total Commander fara java script = ssh, sa intre intr-un 5 a rootat kernel modeul, deci se poate, dar aici e vorba de bani dupa cate vezi Dev Team = ih8fasss, evasi0n7 etc. si nu circula asa ceva prin google. Iti dau un sfat tine banii... acolo, exemplu in 2010 deabea s-a facut unlockul la ios 4.2.1, dar sa nu vorbim ca in 2014 deabea au uplodat unlockerul la ios 5.1.1, pana in 2015 vor baga la ios 6.1.2, 2016 la 7.1.5, etc... stai chill tine banii... http://code.google.com/p/t-pot/wiki/Installation succes!
    1 point
  5. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Download: http://upload.evilzone.org/download.php?id=4356861&type=rar Sursa:https://evilzone.org/ebooks/practical-reverse-engineering/
    1 point
  6. Testat pe Debian / Ubuntu " Wheezy / 14 Inainte cititi putin despre BIND - Wikipedia, the free encyclopedia bind server DNS SERVER/: Sistem de nume de domeniu - Wikipedia // ESTE NEAPARAT SA AVETI PORT-UL 53 FORWARDAT PE ROUTER, DACA AVETI WIFI! // DACA ESTE VREO PROBLEMA, DATI-MI UN P.M SA INCERC SA VA AJUT. //Tutorial Made by sleed [Romanian Security Team] 1) Dam full update: apt-get update && apt-get upgrade 2) Instalam bind server: apt-get install bind9 bind9-doc Facem directoare : binddir="/var/cache/bind" etcdir="/etc/bind" 3) Modificam asa in named.conf.local : // // Do any local configuration here // // Consider adding the 1918 zones here, if they are not used in your // organization //include "/etc/bind/zones.rfc1918"; include "/etc/bind/ddns.key[sau nektsistem.sytes.net]"; zone "nektsistem.sytes.net" { type master; notify no; file "/etc/bind/zones/nektsistem.sytes.net"; allow-update { key DDNS_UPDATE; }; }; zone "1.168.192.in-addr.arpa" { type master; notify no; file "/etc/bind/zones/1.168.192.in-addr.arpa"; allow-update { key DDNS_UPDATE; }; }; Apo facem un fisier : [I]ddns-confgen -r /dev/urandom -q -a hmac-md5 -k nektsistem.sytes.net -s nektsistem.sytes.net. | tee -a /etc/bind/neksistem.sytes.net.keys > /etc/bind/key.nektsistem.sytes.net[/I] chown root:bind /etc/bind/nektsistem.sytes.net.keys ->Ca sa adaugam permisiile doar pentru grupul root si bind Mai sus unde vedeti ddns key, la include include,adaugam"/etc/bind/nektsistem.sytes.net.keys"; La /etc/bind/zones sa avem : fisierul nektsistem.sytes.net !!!! Eu il am configurat asa : $TTL 86400 @ IN SOA ns1.nektsistem.sytes.net. admin.nektsistem.sytes.net. ( 2008030501 ; serial number YYMMDDNN 10800 ; Refresh 3600 ; Retry 604800 ; Expire 38400 ; Min TTL ) @ IN NS ns1.nektsistem.sytes.net. @ IN MX 10 mail.nektsistem.sytes.net.#[Nu e cazu ca aia de la rds nu mi-au deblocat portu 25] [Multumesc RDS] ns1 IN A 192.168.0.53 mail IN A 192.168.0.100 Pentru update facem in felu urmator : Acum modificam DHCPD conf in /etc/dhcpd/dhcpd.conf authoritative; option domain-name "nektsistem.sytes.net"; option domain-name-servers ns1.nektsistem.sytes.net; ddns-updates on; ddns-update-style interim; ignore client-updates; update-static-leases on; default-lease-time 700; max-lease-time 700; log-facility local7; include "/etc/dhcp/ddns.key"; zone nektsistem.sytes.net. { primary 127.0.0.1; key DDNS_UPDATE; } zone 0.168.192.in-addr.arpa. { primary 127.0.0.1; key DDNS_UPDATE; } subnet 192.168.0.100 netmask 255.255.255.0 { range 192.168.0.10 192.168.2.100; option routers 192.168.0.1; } RESTART LA SERVERUL BIND9: Service bind9 restart sau /etc/init.d/bind9 restart // Acest tutorial a facut cu ajutorul NO-IP. Faceti cont acolo, apoi la host & redirect : http://www.noip.com/members/dns/ adaugati-va un host, eu am ales nektsistem.Apoi sa aveti no ip instalat pe server / statia de lucru! cd /usr/local/src wget http://www.no-ip.com/client/linux/noip-duc-linux.tar.gz tar xzf noip-duc-linux.tar.gz cd no-ip-2.1.9-1 make make install Si sa faceti update : Aveti aici un config : ####################################################### #! /bin/sh case "$1" in start) echo "Serviciu NOIP2-PORNIT." /usr/local/bin/noip2 ;; stop) echo -n "Serviciu NOIP2-Oprit." killall -q -TERM /usr/local/bin/noip2 ;; *) echo "Usage: $0 {start|stop}" exit 1 esac exit 0 ####################################################### Pentru a putea face update-urile zilnice Cam atat a fost, acest l-am facut eu de la 0 si m-am chinuit putin sa fiu mai catolic ca si Papa! [ sleed from RST ] Daca copiati acest tutorial nu uitati sa puneti LInk-ul Si sa facem test! host nektsistem.sytes.net nektsistem.sytes.net has address 188.26.170.208 dig nektsistem.sytes.net ; <<>> DiG 9.8.4-rpz2+rl005.12-P1 <<>> nektsistem.sytes.net ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63698 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 5 ;; QUESTION SECTION: ;nektsistem.sytes.net. IN A ;; ANSWER SECTION: nektsistem.sytes.net. 41 IN A 188.26.170.208 ;; AUTHORITY SECTION: sytes.net. 10149 IN NS nf3.no-ip.com. sytes.net. 10149 IN NS nf2.no-ip.com. sytes.net. 10149 IN NS nf1.no-ip.com. sytes.net. 10149 IN NS nf4.no-ip.com. ;; ADDITIONAL SECTION: nf1.no-ip.com. 33761 IN A 50.31.129.129 nf1.no-ip.com. 10271 IN AAAA 2001:1838:f002::129 nf2.no-ip.com. 24260 IN A 69.72.255.8 nf3.no-ip.com. 33761 IN A 69.65.40.108 nf4.no-ip.com. 873 IN A 69.65.5.122 ;; Query time: 4 msec ;; SERVER: 192.168.0.1#53(192.168.0.1) ;; WHEN: Sat Apr 19 19:32:29 2014 ;; MSG SIZE rcvd: 227 ig +qr nektsistem.sytes.net -x 127.0.0.1 nektsistem.sytes.net ns +noqr ; <<>> DiG 9.8.4-rpz2+rl005.12-P1 <<>> +qr nektsistem.sytes.net -x 127.0.0.1 nektsistem.sytes.net ns +noqr ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41956 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 5 ;; QUESTION SECTION: ;nektsistem.sytes.net. IN A ;; ANSWER SECTION: nektsistem.sytes.net. 60 IN A 188.26.170.208 ;; AUTHORITY SECTION: sytes.net. 10091 IN NS nf4.no-ip.com. sytes.net. 10091 IN NS nf1.no-ip.com. sytes.net. 10091 IN NS nf3.no-ip.com. sytes.net. 10091 IN NS nf2.no-ip.com. ;; ADDITIONAL SECTION: nf1.no-ip.com. 33703 IN A 50.31.129.129 nf1.no-ip.com. 10213 IN AAAA 2001:1838:f002::129 nf2.no-ip.com. 24202 IN A 69.72.255.8 nf3.no-ip.com. 33703 IN A 69.65.40.108 nf4.no-ip.com. 815 IN A 69.65.5.122 ;; Query time: 41 msec ;; SERVER: 192.168.0.1#53(192.168.0.1) ;; WHEN: Sat Apr 19 19:33:26 2014 ;; MSG SIZE rcvd: 227 ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41425 ;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;1.0.0.127.in-addr.arpa. IN PTR ;; ANSWER SECTION: 1.0.0.127.in-addr.arpa. 3600 IN PTR localhost. ;; AUTHORITY SECTION: 0.0.127.in-addr.arpa. 3600 IN NS localhost. ;; Query time: 1 msec ;; SERVER: 192.168.0.1#53(192.168.0.1) ;; WHEN: Sat Apr 19 19:33:26 2014 ;; MSG SIZE rcvd: 106 ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49872 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;nektsistem.sytes.net. IN NS ;; AUTHORITY SECTION: sytes.net. 60 IN SOA nf1.no-ip.com. hostmaster.no-ip.com. 2046448184 600 300 604800 600 ;; Query time: 66 msec ;; SERVER: 192.168.0.1#53(192.168.0.1) ;; WHEN: Sat Apr 19 19:33:26 2014 ;; MSG SIZE rcvd: 98 //Edit-> Am sa revin si cu slave, partea a II + Securizare cand am sa am timp!
    -1 points
×
×
  • Create New...