Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. Version 3 Downloads will be available on March 2, 2013
  2. multam !
  3. Description: Business at Fat Dex's Diner is down and he's blaming it on a new joint opening up on the East Side, Iggy's Eats. He also claims to have evidence that Iggy has stolen one of his secret recipes, but this proof is encrypted and Dex doesn't have the key. Can you help Packet Tracy decrypt the recipe and place enough evidence before the Judge to send the thief down the river to Sing Sing? Full story and puzzle file: Here Submit your answer: Here Have fun and please don't share any answers with anyone. The Rules 1 - You cannot enter if you are a member of the BSidesLondon crew 2 - You must submit your answer by April 1st 2013 18:00 (6pm) GMT 3 - The first 3 to submit the correct answer showing all the steps taken to determine the guilty party will get a ticket to BSidesLondon13 4 - After the closing deadline the best answer will get a ticket for Hack In Paris 2013, a ticket to BSidesLondon13 (if required) plus a further winner of BSidesLondon13 tickets will be selected from all those who have submitted a correct and complete answer. These winners will be decided on criteria including the thoroughness and completeness of the presented investigation, and/or the use of an appropriate narrative style. 5 - Judge's decision is final and prizes can't be exchanged for cash or favours ;-) 6 - This challenge will involve you interacting with live systems via the Internet. If the system's name doesn't end in wirewatcher.net, you're in the wrong place and you should stop. 7 - Any forceful attempts to "hack" the challenge systems may result in it being taken offline prematurely, which would be a shame. All necessary information is provided for you - all you need to do is find it! 8 - All characters, organisations and other such entities featured in the challenge are fictitious. Any resemblance to real persons, living or dead, is purely coincidental. Challenge 2 | Security BSides London
  4. 713 RON ar fi 213 USD. nu-i asta ? Amazon.com: Intel Core i5-2500K Quad-Core Processor 3.3 GHz 6 MB Cache LGA 1155 - BX80623I52500K: Electronics
  5. PROCESSOR Cores 4 Threads 4 Name Intel Core i5 2400 Code Name Sandy Bridge Package Socket 1155 LGA Technology 32nm Specification Intel Core i5-2400 CPU @ 3.10GHz Family 6 Extended Family 6 Model A Extended Model 2A Stepping 7 Revision D2 Instructions MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Intel 64 Virtualization Supported, Disabled Hyperthreading Supported, Disabled Fan Speed 1118 RPM Bus Speed 100.3 MHz Stock Core Speed 3100 MHz Stock Bus Speed 100 MHz Average Temperature 32 °C Caches L1 Data Cache Size 4 x 32 KBytes L1 Instructions Cache Size 4 x 32 KBytes L2 Unified Cache Size 4 x 256 KBytes L3 Unified Cache Size 6144 KBytes RAM:Memory slots Total memory slots 4 Used memory slots 2 Free memory slots 2 Memory Type DDR3 Size 4096 MBytes Channels # Dual DRAM Frequency 668.9 MHz CAS# Latency (CL) 9 clocks RAS# to CAS# Delay (tRCD) 9 clocks RAS# Precharge (tRP) 9 clocks Cycle Time (tRAS) 24 clocks Command Rate (CR) 1T PLACA DE BAZA :Manufacturer ASUSTeK Computer INC. Model P8P67-M PRO (LGA1155) Chipset Vendor Intel Chipset Model Sandy Bridge Chipset Revision 09 Southbridge Vendor Intel Southbridge Model P67 Southbridge Revision B3 System Temperature 30 °C PLACA VIDEO :ATI Radeon HD 5770 Series 1Gb emory Type GDDR5 Bus Width (128 bit) hdd Manufacturer SAMSUNG Business Unit/Brand Desktop Model Capacity For This Specific Drive 1TB Heads 16 Cylinders 16,383 SATA type SATA-II 3.0Gb/s Device type Fixed ATA Standard ATA8-ACS Serial Number S246J90B268446 LBA Size 48-bit LBA Power On Count 1905 times Power On Time 140.8 days Speed, Expressed in Revolutions Per Minute (rpm) 7200 Features S.M.A.R.T., APM, AAM, NCQ Transfer Mode SATA II MONITOR SAMSUNG 22 INCI LED HDMI MODEL BX2231 19 mil negociabil, merita sa-l cumpar ? pareri ?
  6. Penetration Testing and Vulnerability Analysis - Multiple instructors - “This is the course website for Penetration Testing and Vulnerability Analysis currently taught at the Polytechnic Institute of New York University. This course introduces the fundamental technical skills required to identify, analyze, and exploit software vulnerabilities. Taught by a team of security industry experts, we cover the following topics: •Introduction to Penetration Testing, taught by Dan Guido Where the industry is now, where it's going, and how these skills fit in •Operational Reviews and Code Audits, taught by Brandon Edwards Identify vulnerabilities and programmer errors by auditing source code •Reverse Engineering, taught by Alex Sotirov and Aaron Portnoy Understand, modify, and analyze compiled applications and systems to identify vulnerabilities •Exploitation, taught by Dino Dai Zovi Take advantage of vulnerabilities to gain access to restricted data and break security policies •Web Hacking, taught by Joe Hemler and Marcin Wielgoszewski Vulnerability discovery and exploitation on the web •Network Pentests: Post exploitation, persistence and exfiltration, taught by Colin Ames Expanding access, maintaining persistence, and evading detection” Open Source Network and Computer Security (OCW) - MIT, Dr. Ron RIvest - “6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: •Techniques for achieving security in multi-user computer systems and distributed computer systems; •Cryptography: secret-key, public-key, digital signatures; •Authentication and identification schemes; •Intrusion detection: viruses; •Formal models of computer security; •Secure operating systems; •Software protection; •Security of electronic mail and the World Wide Web; •Electronic commerce: payment protocols, electronic cash; •Firewalls; and •Risk assessment.” Cryptography and Cryptanalysis (OCW) - MIT - “This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.” Advanced Topics in Cryptography (OCW) - MIT - “The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.” Selected Topics in Cryptography (OCW) - MIT, Dr. Ran Canetti - “This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.” Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues - U. Mich, Dr. Don Blumenthal - “As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of all kinds are under increasing pressure to draft and implement effective laws, regulations, and security and privacy programs under rapidly changing technological, business, and legal conditions. A strong need is arising for individuals with the training and skills to work in this unsettled and evolving environment. This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal.” Free IDA Pro Reverse Code Engineering and Binary Auditing Training Material for University Lectures - Dr. Thorsten Schneider - “The training package includes all necessary files to run a complete lecture for Binary Auditing and Reverse Code Engineering at university. All files are well sorted by topics and with increasing difficulty. You need Windows XP, Windows Vista or Windows 7 to use this training package. The training package does NOT include runnable viruses! ” Hacking Techniques and Intrusion Detection - English - Arabic - Dr. Ali Al-Shemery - “This course covers the most common methods used in computer and network hacking with the intention of learning how to better protect systems from such intrusions. These methods include reconnaissance techniques, system scanning, accessing systems by network and application level attacks, and denial of service attacks. Traffic analysis methods and tools will be studied in this course. Also, it covers techniques for traffic filtering and monitoring, and intrusion detection.” Open Access Securing Digital Democracy - Dr. J. Alex Halderman - Computer technology has transformed how we participate in democracy. The way we cast our votes, the way our votes are counted, and the way we choose who will lead are increasingly controlled by invisible computer software. Most U.S. states have adopted electronic voting, and countries around the world are starting to collect votes over the Internet. However, computerized voting raises startling security risks that are only beginning to be understood outside the research lab, from voting machine viruses that can silently change votes to the possibility that hackers in foreign countries could steal an election. This course will provide the technical background and public policy foundation that 21st century citizens need to understand the electronic voting debate. You'll learn how electronic voting and Internet voting technologies work, why they're being introduced, and what problems they aim to solve. You'll also learn about the computer- and Internet-security risks these systems face and the serious vulnerabilities that recent research has demonstrated. We'll cover widely used safeguards, checks, and balances — and why they are often inadequate. Finally, we'll see how computer technology has the potential to improve election security, if it's applied intelligently. Along the way, you'll hear stories from the lab and from the trenches on a journey that leads from Mumbai jail cells to the halls of Washington, D.C. You'll come away from this course understanding why you can be confident your own vote will count — or why you should reasonably be skeptical. Cryptography I - Dr. Dan Boneh - Cryptography is an indispensable tool for protecting information in computer systems. This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two or more parties generate a shared secret key. We will cover the relevant number theory and discuss public-key encryption and basic key-exchange. Throughout the course students will be exposed to many exciting open problems in the field. The course will include written homeworks and programming labs. The course is self-contained, however it will be helpful to have a basic understanding of discrete probability theory. Cryptography II - Dr. Dan Boneh - Cryptography is an indispensable tool for protecting information in computer systems. This course is a continuation of Crypto I and explains the inner workings of public-key systems and cryptographic protocols. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications. The course begins with constructions for digital signatures and their applications. We will then discuss protocols for user authentication and zero-knowledge protocols. Next we will turn to privacy applications of cryptography supporting anonymous credentials and private database lookup. We will conclude with more advanced topics including multi-party computation and elliptic curve cryptography. Throughout the course students will be exposed to many exciting open problems in the field. The course will include written homeworks and optional programming labs. The material is self-contained, but the course assumes knowledge of the topics covered in Crypto I as well as a basic understanding of discrete probability theory. Applied Cryptography, Science of Secrets - Dr. David Evans & Shayan Doroudi - Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing. Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly. Internet History, Technology, and Security - Dr. Charles Severance - The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology. This course will open up the Internet and show you how it was created, who created it and how it works. Along the way we will meet many of the innovators who developed the Internet and Web technologies that we use today. Malicious Software and its Underground Economy: Two Sides to Every Story - Dr. Lorenzo Cavallaro - Cybercrime has become both more widespread and harder to battle. Researchers and anecdotal experience show that the cybercrime scene is becoming increasingly organized and consolidated, with strong links also to traditional criminal networks. Modern attacks are indeed stealthy and often profit oriented. Malicious software (malware) is the traditional way in which cybercriminals infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. Once stolen, such information can enable more sophisticated attacks, generate illegal revenue, and allow for cyber-espionage. By mixing a practical, hands-on approach with the theory and techniques behind the scene, the course discusses the current academic and underground research in the field, trying to answer the foremost question about malware and underground economy, namely, "Should we care?". Students will learn how traditional and mobile malware work, how they are analyzed and detected, peering through the underground ecosystem that drives this profitable but illegal business. Understanding how malware operates is of paramount importance to form knowledgeable experts, teachers, researchers, and practitioners able to fight back. Besides, it allows us to gather intimate knowledge of the systems and the threats, which is a necessary step to successfully devise novel, effective, and practical mitigation techniques. Building an Information Risk Management Toolkit - Dr. Barbara Endicott-Popovsky - In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective. Information Security and Risk Management in Context - Barbara Endicott-Popovsky - Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Discover how to foster the development of future information security leaders. Topics covered include: Information security strategies and individual privacy Legal security implications Medical health record confidentiality and integrity Cutting-edge technologies Foundations of Computer and Information Security - Dr. Matt Bishop - This graduate course taught by UC Davis computer science professor Matt Bishop covers the mathematical foundations of computer security. He asks, "What can we prove is secure, and what can we demonstrate cannot be proved? How can we analyze specific types of systems in order to determine whether they provide the desired security? How do we build systems that do what they are supposed to?" This course presents the basic mathematical models that underlie much of modern computer security and information assurance. Internet Security, Weaknesses and Targets - Dr. Christoph Meinel - "Internet Security - Weaknesses and Targets" is based on "Internet & WWW Technologies" and gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Beside others the following topics are discussed in detail: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in the WWW, and viruses. The lecture course concludes with a discussion about the possibilities to detect attacks and intrusions and also describes ethical issues. External Resources
      • 1
      • Upvote
  7. Beginner Classes: •Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review •Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration •Introduction to ARM •The Life of Binaries •Introduction to Network Forensics •Introduction to Vulnerability Assessment •Introduction to Trusted Computing •Offensive, Defensive, and Forensic Techniques for Determining Web User Identity •Android Forensics & Security Testing Intermediate Classes: •Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration •Introduction to Software Exploits •Exploits 2: Exploitation in the Windows Environment Advanced Classes: •Rootkits: What they are, and how to find them •Introduction to Reverse Engineering Software •Reverse Engineering Malware •Advanced x86: Virtualization with Intel VT-x Training
  8. exploit fudding ? https://www.google.ro/search?q=shellcode+obfuscation&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a
  9. And this https://rstforums.com/forum/65227-vreti-sqli-intai-invatati-sql.rst
  10. download - filecloud.io download - filecloud.io download - filecloud.io download - filecloud.io download - filecloud.io download - filecloud.io download - filecloud.io
  11. Sunt curios cine se mai ocupa cu exploit dev, de pe aici. Puteti sa-mi dati PM daca nu doriti sa postati.
  12. How to Get a Refund for an Accidental Kindle Book Purchase
  13. fucking awesome !! e brilianta metoda !
  14. numa titlu ma dezgusta //n-am citit articolul.
  15. Ai putea vinde o versiune [pro] ce foloseste un exploit ca cel descris de alinh0. Felicitari !
  16. daca-i casa io.kentzilor tu ce plm cauti aici? jet, si da, stiu cine esti.
  17. ce optimizari ai adus ? la ce algoritm ?
  18. suna bine ! sa citesc asta si cred ca ma inscriu
  19. a fost o perioada in care toate programele de genul, erau scanate si analizate de mine si usr_6. nu e posibil ca doua persoane sa faca asta manual. apoi sa le si curete si sa modereze topicul. 99% din softurile de genul contin malware, le rulati in masina virtuala si va pisati pe ele. daca vreti sa le curarati, invatati in plm RE.
  20. Stanford Class2Go | Introduction to Databases Am facut si la facultate Baze de Date, dar aici totul e foarte compact si poate fi invatat intr-o zi - doua. Combinat cu SQLZOO si cu putin C# sau php (cautati tutoriale pe forum) puteti face chestii marete.
  21. { box + pocket + google reader + url2pdf + ftp2cloud } -> https://ifttt.com/
  22. https://www.box.com/signup/o/dell_50gb_give_get enjoy.
  23. lenovo thinkpad recomand, nu alta versiune.
  24. normal ca-i gratuit.
×
×
  • Create New...