-
Posts
3972 -
Joined
-
Last visited
-
Days Won
22
Everything posted by begood
-
motive de securitate. pentru a atasa poze poti folosi un host free. imageshack.us || tinypic.com || ce iti doreste sufletelul. pui linkul direct catre imagine intre tagurile
-
pentru a atasa poze poti folosi un host free. imageshack.us || tinypic.com || ce iti doreste sufletelul. pui linkul direct catre imagine intre tagurile
-
mi-o bagat iubita pe gat cartea si sa vizionez filmul, nu-s rele
-
ratati, astia n-au auzit de Schwarzschild vreau sa ma joc cu gauri negre care se ciocnesc ! rahat, vad ca au implementat, I made a black hole but everything just got flung into space. Why didn't they get sucked in? Your time step is too high for a body with such a large mass. Press the A key or the numpad Enter key to turn on auto time step before you create the black hole. Auto time step adjusts the time step to maintain an reasonably accurate simulation.
-
The latest version of Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming brute-force attack. It was also the first product to decrypt BitLocker drives. Long believed unbreakable, TrueCrypt is a free open-source full-disk encryption software for Windows 7/Vista/XP, Mac OS X and Linux, that creates virtual hard disks with real-time encryption. Passware Kit Forensic allows for memory acquisition of a seized computer over the FireWire port, even if the computer is locked. When a target computer is seized and turned on with the encryption disk accessible, the software scans its memory image and extracts the encryption keys, so law enforcement personnel can access the stored data. Passware Kit Forensic 9.7 is a complete encrypted evidence discovery solution that reports all password-protected items on a computer and gains access to these items using the advanced decryption and password recovery algorithms. The software, which can also run in portable mode from a USB drive, is capable of finding encrypted data and recovering file and website passwords without making any changes to the target computer. It supports over 180 different file types and features recovery of passwords for PGP archives and virtual disks. The software supports Windows 7, Vista, 2003, XP, and 2008 Server, and now works with Guidance EnCase E01 disk image files -- the de-facto standard for computer forensics. The solution is now available with a suggested list price that starts at $795. The software comes with one year of free software updates. Free trial licenses are also available. Break TrueCrypt hard drive encryption quickly ----------- NOTE: If a TrueCrypt volume is already dismounted, or the target computer is turned off, the memory image will not contain the encryption keys. Therefore, instant decryption of the volume is impossible. In this case Passware Kit assigns Brute-force attacks to recover the original password for the volume. //de asta daca auzi politia la usa, nu trebuie decat sa faci o combinatie de taste pentru inchide partitia (in truecrypt)
-
In an unexpected turn of events, a presentation about "The Underground Economy" by Italian white hat hacker and security expert Raoul Chiesa at the Hack In The Box conference held last week in Amsterdam, was replaced at the last minute with a presentation on "Side Channel Analysis on Embedded Systems" by Job de Haas. According to Softpedia, the reason behind this cancellation was the fact that the originally scheduled presentation covers details of various techniques and exploits of vulnerabilities that cyber criminals use to break into ATM machines. As you can surmise, ATM vendors weren't too happy about that fact and employed legal means to prevent Chiesa from addressing the conference crowd. Even though this is not the first time that ATM vendors prevented a security researcher to publicly disclose findings about flaws in their devices at a conference, this instance is really surprising, since Chiesa held this same presentation at a couple of security conferences already, and the slides he employed are also available online. What the vendors hoped to accomplish with this threatening approach is anyone's guess. The organizer of the conference also pointed out that the vendors had plenty of time to patch the vulnerabilities, since they have been notified of them a long time ago. This unexpected development makes me wonder if Barnaby Jack's previously thwarted demonstration will actually take place at this year's Black Hat USA taking place later this month. Will the ATM vendors try to block that one at the last minute - again? ATM vendors threaten researcher, stop his presentation on ATM flaws
-
Cyber criminals and spammers have been (mis)using Twitter for a long time. Twitter has tried to stop or at least limit their use of the platform by defining some Web page limitations regarding the amount of messages and updates allowed per day or per hour, and other things like API requests and changes of the account email. Unfortunately for Twitter, the fight against these spammers is often similar to a game of Whack-A-Mole - it takes a malicious account down, another springs up in its place. Finding a way to bypass the limitations set by the social network is another key to success for these malicious users. Luckily for them, other criminals are there to help them - for a price. Trend Micro has recently spotted a toolkit being offered for sale on many underground forums. Dubbed "Twitter Kit", it allows the malicious user to send messages to thousands of followers using SOCKS5 proxy and to send Follow invites to users and their followers. It also breaks the aforementioned account limits set by the social network. Trend Micro believes it is mostly used to send out messages with links to pornographic sites, since it is offered as a bonus when one buys a list of 10,000 Twitter users that follow adult content. But, the small price of $20 for the toolkit alone, it can and will be likely used for sending out a variety of malicious messages. Twitter Kit, a spammer's dream come true
-
Sunt interesat s? studiez diferi?i bo?i cu arhitectura p2p. Pute?i posta chiar ?i executabile în caz ca nu g?si?i surse. Mul?umesc !
-
If you are involved in vulnerability research, reverse engineering or penetration testing, I suggest to try out the Python programming language. It has a rich set of useful libraries and programs. This page lists some of them. Most of the listed tools are written in Python, others are just Python bindings for existing C libraries, i.e. they make those libraries easily usable from Python programs. Some of the more aggressive tools (pentest frameworks, bluetooth smashers, web application vulnerability scanners, war-dialers, etc.) are left out, because the legal situation of these tools is still a bit unclear in Germany -- even after the decision of the highest court. This list is clearly meant to help whitehats, and for now I prefer to err on the safe side. Network Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library pypcap, Pcapy and pylibpcap: several different Python bindings for libpcap libdnet: low-level networking routines, including interface lookup and Ethernet frame transmission dpkt: fast, simple packet creation/parsing, with definitions for the basic TCP/IP protocols Impacket: craft and decode network packets. Includes support for higher-level protocols such as NMB and SMB pynids: libnids wrapper offering sniffing, IP defragmentation, TCP stream reassembly and port scan detection Dirtbags py-pcap: read pcap files without libpcap flowgrep: grep through packet payloads using regular expressions httplib2: comprehensive HTTP client library that supports many features left out of other HTTP libraries Debugging and reverse engineering Paimei: reverse engineering framework, includes PyDBG, PIDA, pGRAPH Immunity Debugger: scriptable GUI and command line debugger IDAPython: IDA Pro plugin that integrates the Python programming language, allowing scripts to run in IDA Pro PyEMU: fully scriptable IA-32 emulator, useful for malware analysis pefile: read and work with Portable Executable (aka PE) files pydasm: Python interface to the libdasm x86 disassembling library PyDbgEng: Python wrapper for the Microsoft Windows Debugging Engine uhooker: intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory diStorm64: disassembler library for AMD64, licensed under the BSD license python-ptrace: debugger using ptrace (Linux, BSD and Darwin system call to trace processes) written in Python Fuzzing Sulley: fuzzer development and fuzz testing framework consisting of multiple extensible components Peach Fuzzing Platform: extensible fuzzing framework for generation and mutation based fuzzing antiparser: fuzz testing and fault injection API TAOF, including ProxyFuzz, a man-in-the-middle non-deterministic network fuzzer untidy: general purpose XML fuzzer Powerfuzzer: highly automated and fully customizable web fuzzer (HTTP protocol based application fuzzer) FileP: file fuzzer. Generates mutated files from a list of source files and feeds them to an external program in batches SMUDGE Mistress: probe file formats on the fly and protocols with malformed data, based on pre-defined patterns Fuzzbox: multi-codec media fuzzer Forensic Fuzzing Tools: generate fuzzed files, fuzzed file systems, and file systems containing fuzzed files in order to test the robustness of forensics tools and examination systems Windows IPC Fuzzing Tools: tools used to fuzz applications that use Windows Interprocess Communication mechanisms WSBang: perform automated security testing of SOAP based web services Construct: library for parsing and building of data structures (binary or textual). Define your data structures in a declarative manner fuzzer.py (feliam): simple fuzzer by Felipe Andres anzano Web ProxMon: processes proxy logs and reports discovered issues WSMap: find web service endpoints and discovery files Twill: browse the Web from a command-line interface. Supports automated Web testing Windmill: web testing tool designed to let you painlessly automate and debug your web application FunkLoad: functional and load web tester Forensics Volatility: extract digital artifacts from volatile memory (RAM) samples SandMan: read the hibernation file, regardless of Windows version LibForensics: library for developing digital forensics applications TrIDLib, identify file types from their binary signatures. Now includes Python binding Malware analysis pyew: command line hexadecimal editor and disassembler, mainly to analyze malware Didier Stevens' PDF tools: analyse, identify and create PDF files (includes PDFiD, pdf-parser and make-pdf and mPDF) Origapy: Python wrapper for the Origami Ruby module which sanitizes PDF files Exefilter: filter file formats in e-mails, web pages or files. Detects many common file formats and can remove active content pyClamAV: add virus detection capabilities to your Python software Misc InlineEgg: toolbox of classes for writing small assembly programs in Python Exomind: framework for building decorated graphs and developing open-source intelligence modules and ideas, centered on social network services, search engines and instant messaging RevHosts: enumerate virtual hosts for a given IP address simplejson: JSON encoder/decoder, e.g. to use Google's AJAX API Other useful libraries and tools IPython: enhanced interactive Python shell with many features for object introspection, system shell access, and its own special command system Beautiful Soup: HTML parser optimized for screen-scraping matplotlib: make 2D plots of arrays Mayavi: 3D scientific data visualization and plotting RTGraph3D: create dynamic graphs in 3D Twisted: event-driven networking engine Suds: lightweight SOAP client for consuming Web Services M2Crypto: most complete OpenSSL wrapper NetworkX: graph library (edges, nodes) pyparsing: general parsing module lxml: most feature-rich and easy-to-use library for working with XML and HTML in the Python language Pexpect: control and automate other programs, similar to Don Libes `Expect` system Sikuli, visual technology to search and automate GUIs using screenshots. Scriptable in Jython Dirk Loss: Python tools for penetration testers
-
si cam pe ce site-uri online vi-ati inregistrat si numarul de telefon ?
-
da...vezi tu, doar asa are logica. mai intai citesti si apoi comentezi, nu invers.
-
ascult playlist-ul meu : A2480f25 (Romania) on MixPod Music Playlist
-
@sirgod mate m2 ? si la informatica ?
-
sau pentru cei care studiaza exploituri
-
esti ratat. te-ai uitat macar peste rezultate ? e un singur rezultat. De fapt nu e asa Leo. imi permit sa ii copiez postul cu nerusinare eu nu inteleg o singura chestie : ce drac invatati voi la scoala ? daca nici bazele nu le stiti
- 13 replies
-
- de fapt
- de fapt defapt
- (and 6 more)
-
@demon_zone in povray ies chestii super interesante de exemplu cubul ala ti-l faceam (anu trecut) din sticla (rubin) cu indicele de refractie care il doreai tu, luminozitate, etc ar trebui sa ma reapuc de scripting in povray
-
ColdEffect is an automated exploitation tool for Time Based SQL Injection vulnerabilities. Very simple usage, fast exploitation and minimal false positive. (mostly no false positive) ColdEffect - Time Based SQL Injection Exploitation Tool | ADEO Security Labs
-
Hello everyone ! Today, i’m going to talk about the latest PHP vulnerability discovered by Stefan Esser and published on the 25 of june. You can read the advisory here. Esser did not publish many informations regarding this new vulnerability because of its « dangerous nature », and probably the fact that it’s still unpatched. He only posted few indications and the output of a working exploit without its source code. I never myself really looked into the interpreter’s source code, and decided this was the perfect opportunity to start. According to the advisory, the vulnerability is caused by the way SPLObjectStorage handle unserialization. For those of you who are not familiar with PHP, the serialize() function allows you to convert native php data types (arrays, objects) to a string. unserialize do the opposite and convert a string to a php variable. Those two functions are straightforward to use: read it all here : Nibbles microblog Pwning PHP for fun and chocapicz
-
inlocuieste intr-o propozitie si iti dai si singur seama. De fapt acum m-am trezit. Datorita faptului acum m-am trezit. iti suna bine ? sinonim "de fapt" de fapt = in realitate, pe de alta parte ... gasiti si voi sinonime
- 13 replies
-
- de fapt
- de fapt defapt
- (and 6 more)
-
Postez ca s? v? intre în cap, nu exist? cuvântul defapt în limba român?. De fiecare data, în fiecare caz posibil se scrie "de fapt", desp?r?it.
- 13 replies
-
- de fapt
- de fapt defapt
- (and 6 more)
-
multam ! nu stiam de ei.
-
anu trecut la fizica s-a dat din doua capitole la alegere ? asa e si anu asta ?