Jump to content

virusz

Active Members
  • Posts

    1263
  • Joined

  • Last visited

  • Days Won

    7

Posts posted by virusz

  1. Certified Ethical Hacker Lab 3.0.iso

    ac_1_b.JPG

    Download:

    http://rapidshare.de/files/7829042/0.zip

    [url]http://rapidshare.de/files/7830498/1.zip[/url]

    [url]http://rapidshare.de/files/7831312/2.zip[/url]

    [url]http://rapidshare.de/files/7831137/3.zip[/url]

    [url]http://rapidshare.de/files/7831826/4.zip[/url]

    [url]http://rapidshare.de/files/7832086/5.zip[/url]

    [url]http://rapidshare.de/files/7832305/6.zip[/url]

    [url]http://rapidshare.de/files/7832321/7.zip[/url]

    [url]http://rapidshare.de/files/7832611/8.zip[/url]

    [url]http://rapidshare.de/files/7832993/9.zip[/url]

    [url]http://rapidshare.de/files/7833161/10.zip[/url]

    [url]http://rapidshare.de/files/7833267/11.zip[/url]

    Module 1: Ethics and Legality

    What is an Exploit?

    The security functionality triangle

    The attacker's process

    Passive reconnaissance

    Active reconnaissance

    Types of attacks

    Categories of exploits

    Goals attackers try to achieve

    Ethical hackers and crackers - who are they

    Self proclaimed ethical hacking

    Hacking for a cause (Hacktivism)

    Skills required for ethical hacking

    Categories of Ethical Hackers

    What do Ethical Hackers do?

    Security evaluation plan

    Types of Ethical Hacks

    Testing Types

    Ethical Hacking Report

    Cyber Security Enhancement Act of 2002

    Computer Crimes

    Overview of US Federal Laws

    Section 1029

    Section 1030

    Hacking Punishment

    Module 2: Footprinting

    What is Footprinting

    Steps for gathering information

    Whois

    http://tucows.com

    Hacking Tool: Sam Spade

    Analyzing Whois output

    NSLookup

    Finding the address range of the network

    ARIN

    Traceroute

    Hacking Tool: NeoTrace

    Visual Route

    Visual Lookout

    Hacking Tool: Smart Whois

    Hacking Tool: eMailTracking Pro

    Hacking Tool: MailTracking.com

    Module 3: Scanning

    Determining if the system is alive?

    Active stack fingerprinting

    Passive stack fingerprinting

    Hacking Tool: Pinger

    Hacking Tool: WS_Ping_Pro

    Hacking Tool: Netscan Tools Pro 2000

    Hacking Tool: Hping2

    Hacking Tool: icmpenum

    Detecting Ping sweeps

    ICMP Queries

    Hacking Tool: netcraft.com

    Port Scanning

    TCPs 3-way handshake

    TCP Scan types

    Hacking Tool: IPEye

    Hacking Tool: IPSECSCAN

    Hacking Tool: nmap

    Port Scan countermeasures

    Hacking Tool: HTTrack Web Copier

    Network Management Tools

    SolarWinds Toolset

    NeoWatch

    War Dialing

    Hacking Tool: THC-Scan

    Hacking Tool: PhoneSweep War Dialer

    Hacking Tool: Queso

    Hacking Tool: Cheops

    Proxy Servers

    Hacking Tool: SocksChain

    Surf the web anonymously

    TCP/IP through HTTP Tunneling

    Hacking Tool: HTTPort

    Module 4: Enumeration

    What is Enumeration

    NetBios Null Sessions

    Null Session Countermeasures

    NetBIOS Enumeration

    Hacking Tool: DumpSec

    Hacking Tool: NAT

    SNMP Enumertion

    SNMPUtil

    Hacking Tool: IP Network Browser

    SNMP Enumeration Countermeasures

    Windows 2000 DNS Zone transfer

    Identifying Win2000 Accounts

    Hacking Tool: User2SID

    Hacking Tool: SID2User

    Hacking Tool: Enum

    Hacking Tool: UserInfo

    Hacking Tool: GetAcct

    Active Directory Enumeration

    Module 5: System Hacking

    Administrator Password Guessing

    Performing Automated Password Guessing

    Legion

    NTInfoScan

    Defending Against Password Guessing

    Monitoring Event Viewer Logs

    VisualLast

    Eavesdroppin on Network Password Exchange

    Hacking Tool: L0phtCrack

    Hacking Tool: KerbCrack

    Privilege Escalation

    Hacking Tool: GetAdmin

    Hacking Tool: hk

    Manual Password Cracking Algorithm

    Automatic Password Cracking Algorithm

    Password Types

    Types of Password Attacks

    Dictionary Attack

    Brute Force Attack

    Distributed Brute Force Attack

    Password Change Interval

    Hybrid Attack

    Cracking Windows 2000 Passwords

    Retrieving the SAM file

    Redirecting SMB Logon to the Attacker

    SMB Redirection

    Hacking Tool: SMBRelay

    Hacking Tool: SMBRelay2

    SMBRelay Man-in-the-Middle (MITM)

    SMBRelay MITM Countermeasures

    Hacking Tool: SMBGrinder

    Hacking Tool: SMBDie

    Hacking Tool: NBTDeputy

    NetBIOS DoS Attack

    Hacking Tool: nbname

    Hacking Tool: John the Ripper

    LanManager Hash

    Password Cracking Countermeasures

    Keystroke Logger

    Hacking Tool: Spector

    AntiSpector

    Hacking Tool: eBlaster

    Hacking Tool: SpyAnywhere

    Hacking Tool: IKS Software Logger

    Hardware Tool: Hardware Key Logger

    Hacking Tool: Rootkit

    Planting Rootkit on Windows 2000 Machine

    _rootkit_ embedded TCP/IP Stack

    Rootkit Countermeasures

    MD5 Checksum utility

    Tripwire

    Covering Tracks

    Disabling Auditing

    Auditpol

    Clearing the Event Log

    Hacking Tool: Elslave

    Hacking Tool: Winzapper

    Hacking Tool: Evidence Eliminator

    Hidding Files

    NTFS File Streaming

    Hacking Tool: makestrm

    NTFS Streams Countermeasures

    LNS

    Steganography

    Hacking Tool: ImageHide

    Hacking Tool: MP3Stego

    Hacking Tool: Snow

    Hacking Tool: Camera/Shy

    Steganography Detection

    StegDetect

    Encrypted File System

    Hacking Tool: dskprobe

    Hacking Tool: EFSView

    Buffer Overflows

    Creating Buffer Overflow Exploit

    Outlook Buffer Overflow

    Hacking Tool: Outoutlook

    Module 6: Trojans and Backdoors

    What is a Trojan Horse?

    Overt and Covert

    Hacking Tool: QAZ

    Hacking Tool: Tini

    Hacking Tool: Netcat

    Hacking Tool: Donald Dick

    Hacking Tool: SubSeven

    Hacking Tool: BackOrifice 2000

    Back Oriffice Plug-ins

    Hacking Tool: NetBus

    Wrappers

    Hacking Tool: Graffiti

    Hacking Tool: Silk Rope 2000

    Hacking Tool: EliteWrap

    Hacking Tool: IconPlus

    Packaging Tool: Mic*ft WordPad

    Hacking Tool: Whack a Mole

    Trojan Construction Kit

    BoSniffer

    Hacking Tool: FireKiller 2000

    Covert Channels

    ICMP Tunneling

    Hacking Tool: Loki

    Reverse WWW Shell

    Backdoor Countermeasures

    BO Startup and Registry Entries

    NetBus Startup and Registry Keys

    Port Monitoring Tools

    fPort TCPView

    Process Viewer

    Inzider - Tracks Processes and Ports

    Trojan Maker

    Hacking Tool: Hard Disk Killer

    Man-in-the-Middle Attack

    Hacking Tool: dsniff

    System File Verification

    TripWire

    Module 7: Sniffers

    What is a Sniffer?

    Hacking Tool: Etheral

    Hacking Tool: Snort

    Hacking Tool: WinDump

    Hacking Tool: EtherPeek

    Passive Sniffing

    Active Sniffing

    Hacking Tool: EtherFlood

    How ARP Works?

    Hacking Tool: DSniff

    Hacking Tool: Macof

    Hacking Tool: mailsnarf

    Hacking Tool: URLsnarf

    Hacking Tool: Webspy

    Hacking Tool: Ettercap

    Hacking Tool: SMAC

    MAC Changer

    ARP Spoofing Countermeasures

    Hacking Tool: WinDNSSpoof

    Hacking Tool: WinSniffer

    Network Tool: IRIS

    Network Tool: NetInterceptor

    SniffDet

    Hacking Tool: WinTCPKill

    Module 8: Denial of Service

    What is Denial of Service Attack?

    Types of DoS Attacks

    How DoS Work?

    What is DDoS?

    Hacking Tool: Ping of Death

    Hacking Tool: SSPing

    Hacking Tool: Land

    Hacking Tool: Smurf

    Hacking Tool: SYN Flood

    Hacking Tool: CPU Hog

    Hacking Tool: Win Nuke

    Hacking Tool: RPC Locator

    Hacking Tool: Jolt2

    Hacking Tool: Bubonic

    Hacking Tool: Targa

    Tools for Running DDoS Attacks

    Hacking Tool: Trinoo

    Hacking Tool: WinTrinoo

    Hacking Tool: TFN

    Hacking Tool: TFN2K

    Hacking Tool: Stacheldraht

    Hacking Tool: Shaft

    Hacking Tool: mstream

    DDoS Attack Sequence

    Preventing DoS Attack

    DoS Scanning Tools

    Find_ddos

    SARA

    DDoSPing

    RID

    Zombie Zapper

    Module 9: Social Engineering

    What is Social Engineering?

    Art of Manipulation

    Human Weakness

    Common Types of Social Engineering

    Human Based Impersonation

    Important User

    Tech Support

    Third Party Authorization

    In Person

    Dumpster Diving

    Shoulder Surfing

    Computer Impersonation

    Mail Attachments

    Popup Window

    Website Faking

    Reverse Social Engineering

    Policies and Procedures

    Social Engineering Security Policies

    The Importance of Employee Education

    Module 10: Session Hijacking

    What is Session Hijacking?

    Session Hijacking Steps

    Spoofing Vs Hijacking

    Active Session Hijacking

    Passive Session Hijacking

    TCP Concepts - 3 way Handshake

    Sequence Numbers

    Sequence Number Example

    Guessing the Sequence Numbers

    Hacking Tool: Juggernaut

    Hacking Tool: Hunt

    Hacking Tool: TTYWatcher

    Hacking Tool: IP Watcher

    Hacking Tool: T-Sight

    Remote TCP Session Reset Utility

    Dangers Posed by Session Hijacking

    Protection against Session Hijacking

    Module 11: Hacking Web Servers

    Apache Vulnerability

    Attacks against IIS

    IIS Components

    ISAPI DLL Buffer Overflows

    IPP Printer Overflow

    msw3prt.dll

    Oversized Print Requests

    Hacking Tool: Jill32

    Hacking Tool: IIS5-Koei

    Hacking Tool: IIS5Hack

    IPP Buffer Overflow Countermeasures

    ISAPI DLL Source Disclosure

    ISAPI.DLL Exploit

    Defacing Web Pages

    IIS Directory Traversal

    Unicode

    Directory Listing

    Clearing IIS Logs

    Network Tool: LogAnalyzer

    Attack Signature

    Creating Internet Explorer (IE) Trojan

    Hacking Tool: IISExploit

    Hacking Tool: UnicodeUploader.pl

    Hacking Tool: cmdasp.asp

    Escalating Privilages on IIS

    Hacking Tool: IISCrack.dll

    Hacking Tool: ispc.exe

    Unspecified Executable Path Vulnerability

    Hacking Tool: CleanIISLog

    File System Traversal Countermeasures

    Mic*ft HotFix Problems

    UpdateExpert

    Cacls utility

    Network Tool: Whisker

    N-Stealth Scanner

    Hacking Tool: WebInspect

    Network Tool: Shadow Security Scanner

    Module 12: Web Application Vulnerabilities

    Documenting the Application Structure

    Manually Inspecting Applications

    Using Google to Inspect Applications

    Directory Structure

    Hacking Tool: Instant Source

    Java Classes and Applets

    Hacking Tool: Jad

    HTML Comments and Contents

    Hacking Tool: Lynx

    Hacking Tool: Wget

    Hacking Tool: Black Widow

    Hacking Tool: WebSleuth

    Cross Side Scripting

    Session Hijacking using XSS

    Cookie Stealing

    Hacking Tool: IEEN

    Module 13: Web Based Password Cracking Techniques

    Basic Authentication

    Message Digest Authentication

    NTLM Authentication

    Certificate based Authentication

    Digital Certificates

    Mic*ft Passport Authentication

    Forms based Authentication

    Creating Fake Certificates

    Hacking Tool: WinSSLMiM

    Password Guessing

    Hacking Tool: WebCracker

    Hacking Tool: Brutus

    Hacking Tool: ObiWan

    Hacking Tool: Munga Bunga

    Password dictionary Files

    Attack Time

    Hacking Tool: Varient

    Hacking Tool: PassList

    Query Strings

    Post data

    Hacking Tool: cURL

    Stealing Cookies

    Hacking Tool: CookieSpy

    Hacking Tool: ReadCookies

    Hacking Tool: SnadBoy

    Module 14: SQL Injection

    What is SQL Injection Vulnerability?

    SQL Insertion Discovery

    Blank sa Password

    Simple Input Validation

    SQL Injection

    OLE DB Errors

    1=1

    blah' or 1=1

    Stealing Credit Card Information

    Preventing SQL Injection

    Database Specific SQL Injection

    Hacking Tool: SQLDict

    Hacking Tool: SQLExec

    Hacking Tool: SQLbf

    Hacking Tool: SQLSmack

    Hacking Tool: SQL2.exe

    Hacking Tool: Oracle Password Buster

    Module 15: Hacking Wireless Networks

    802.11 Standards

    What is WEP?

    Finding WLANs

    Cracking WEP keys

    Sniffing Trafic

    Wireless DoS Attacks

    WLAN Scanners

    WLAN Sniffers

    MAC Sniffing

    Access Point Spoofing

    Securing Wireless Networks

    Hacking Tool: NetTumbler

    Hacking Tool: AirSnort

    Hacking Tool: AiroPeek

    Hacking Tool: WEP Cracker

    Hacking Tool: Kismet

    WIDZ- Wireless IDS

    Module 16: Virus and Worms

    Cherobyl

    ExploreZip

    I Love You

    Melissa

    Pretty Park

    Code Red Worm

    W32/Klez

    BugBear

    W32/Opaserv Worm

    Nimda

    Code Red

    SQL Slammer

    How to write your own Virus?

    Worm Construction Kit

    Module 17: Novell Hacking

    Common accounts and passwords

    Accessing password files

    Password crackers

    Netware Hacking Tools

    Chknull

    NOVELBFH

    NWPCRACK

    Bindery

    BinCrack

    SETPWD.NLM

    Kock

    userdump

    Burglar

    Getit

    Spooflog

    Gobbler

    Novelffs

    Pandora

    Module 18: Linux Hacking

    Why Linux ?

    Linux Basics

    Compiling Programs in Linux

    Scanning Networks

    Mapping Networks

    Password Cracking in Linux

    Linux Vulnerabilities

    SARA

    TARA

    Sniffing

    A Pinger in Disguise

    Session Hijacking

    Linux Rootkits

    Linux Security Countermeasures

    IPChains and IPTables

    Module 19: IDS, Firewalls and Honeypots

    Intrusion Detection System

    System Integrity Verifiers

    How are Intrusions Detected?

    Anomaly Detection

    Signature Recognition

    How does IDS match Signatures with Incoming Traffic?

    Protocol Stack Verification

    Application Protocol Verification

    What Happens after an IDS Detects an Attack?

    IDS Software Vendors

    SNORT

    Evading IDS (Techniques)

    Complex IDS Evasion

    Hacking Tool: fragrouter

    Hacking Tool: TCPReplay

    Hacking Tool: SideStep

    Hacking Tool: NIDSbench

    Hacking Tool: ADMutate

    IDS Detection

    Tools to Detect Packet Sniffers

    Tools to inject strangely formatted packets onto the wire

    Hacking Through Firewalls

    Placing Backdoors through Firewalls

    Hiding behind Covert Channels

    What is a Honeypot?

    Honeypots Evasion

    Honeypots vendors

    Module 20: Buffer Overflows

    What is a Buffer Overflow?

    Exploitation

    Assembly Language Basics

    How to Detect Buffer Overflows in a Program?

    Skills Required

    CPU/OS Dependency

    Understanding Stacks

    Stack Based Buffer Overflows

    Buffer Overflow Technical Implementation

    Writing your own Buffer Overflow Exploit in C

    Defense against Buffer Overflows

    Type Checking Tools for Compiling Programs

    StackGuard

    Immunix

    Module 21: Cryptography

    What is PKI?

    Digital Certificates

    RSA

    MD-5

    RC-5

    SHA

    SSL

    PGP

    SSH

    Encryption Cracking Techniques

    ---

    have fun!

  2. rrs is a reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). The listener will accept the connection and receive a shell from the remote host. rrs features full pseudo-tty support, full OpenSSL support (high encryption, client/server authentication, choice of cipher suites), Twofish encryption, a simple XOR cipher, plain-text (unencrypted) session, peer-side session monitoring (snooping), daemon option and reconnection features. rrs is Free Software distributed under the MIT License and is known to compile and run under Linux, FreeBSD, NetBSD, OpenBSD and QNX.

    HomePage:

    http://www.cycom.se/dl/sishell

    Download:

    http://www.cycom.se/uploads/36/19/rrs-1.70.tar.gz

  3. Whoppix is a stand alone penetration testing live cd based on Knoppix. With the latest tools and exploits, it is a must for every penetration tester and security auditor. Whoppix includes Several exploit archives, such as Securityfocus, Packetstorm, SecurityForest and Milw0rm, as well as a wide variety of updated security tools. The new custom kernel also allows for better WIFI support, for tools such as Aireplay.

    Licence : GPL

    Version : 2.7.1 [stable]

    Platforms : Linux

    Requirements : Minimum of 128MB RAM, Pentium 1 processor

    Size : 700 Mb

    Download:

    ftp://ftp.caliu.info/pub/distribucions/kn...2.7.1-final.iso

  4. Astalavista's Security Toolbox DVD v2.0 is considered to be the largest and most comprehensive Information Security archive.As always we are committed to provide you with a resource for all of your security and hacking interests, in an interactive way! The Information found on the Security Toolbox DVD has been carefully selected, so that you will only browse through quality information and tools.No matter if you are a computer enthusiast, a computer geek, a newbie looking for information on "how to hack", or an ITSecurity professional looking for quality and up to date information for offline use or just for convenience, we are sure that you will be satisfied, even delighted by the DVD!

    http://rapidshare.de/files/22963029/astb2.0.part01.rar 

    [url]http://rapidshare.de/files/22965966/astb2.0.part02.rar[/url]

    [url]http://rapidshare.de/files/22968906/astb2.0.part03.rar[/url]

    [url]http://rapidshare.de/files/22971825/astb2.0.part04.rar[/url]

    [url]http://rapidshare.de/files/22974520/astb2.0.part05.rar[/url]

    [url]http://rapidshare.de/files/22977300/astb2.0.part06.rar[/url]

    [url]http://rapidshare.de/files/22980233/astb2.0.part07.rar[/url]

    [url]http://rapidshare.de/files/22983005/astb2.0.part08.rar[/url]

    [url]http://rapidshare.de/files/22985842/astb2.0.part09.rar[/url]

    [url]http://rapidshare.de/files/22988432/astb2.0.part10.rar[/url]

    [url]http://rapidshare.de/files/22991189/astb2.0.part11.rar[/url]

    [url]http://rapidshare.de/files/22993837/astb2.0.part12.rar[/url]

    [url]http://rapidshare.de/files/22996059/astb2.0.part13.rar[/url]

    [url]http://rapidshare.de/files/22998048/astb2.0.part14.rar[/url]

    [url]http://rapidshare.de/files/22999947/astb2.0.part15.rar[/url]

    [url]http://rapidshare.de/files/23001613/astb2.0.part16.rar[/url]

    [url]http://rapidshare.de/files/23031359/astb2.0.part17.rar[/url]

    [url]http://rapidshare.de/files/23033928/astb2.0.part18.rar[/url]

    [url]http://rapidshare.de/files/23036563/astb2.0.part19.rar[/url]

    [url]http://rapidshare.de/files/23039246/astb2.0.part20.rar[/url]

    [url]http://rapidshare.de/files/23042664/astb2.0.part21.rar[/url]

    [url]http://rapidshare.de/files/23045279/astb2.0.part22.rar[/url]

    [url]http://rapidshare.de/files/23048210/astb2.0.part23.rar[/url]

    [url]http://rapidshare.de/files/23051249/astb2.0.part24.rar[/url]

    [url]http://rapidshare.de/files/23054164/astb2.0.part25.rar[/url]

    [url]http://rapidshare.de/files/23057062/astb2.0.part26.rar[/url]

    [url]http://rapidshare.de/files/23059901/astb2.0.part27.rar[/url]

    [url]http://rapidshare.de/files/23062926/astb2.0.part28.rar[/url]

    [url]http://rapidshare.de/files/23065780/astb2.0.part29.rar[/url]

    [url]http://rapidshare.de/files/23068662/astb2.0.part30.rar[/url]

    [url]http://rapidshare.de/files/23071370/astb2.0.part31.rar[/url]

    [url]http://rapidshare.de/files/23073876/astb2.0.part32.rar[/url]

    [url]http://rapidshare.de/files/23076444/astb2.0.part33.rar[/url]

    [url]http://rapidshare.de/files/23078753/astb2.0.part34.rar[/url]

    [url]http://rapidshare.de/files/23081470/astb2.0.part35.rar[/url]

    [url]http://rapidshare.de/files/23083045/astb2.0.part36.rar[/url]

    [url]http://rapidshare.de/files/23084586/astb2.0.part37.rar[/url]

    [url]http://rapidshare.de/files/23086010/astb2.0.part38.rar[/url]

    [url]http://rapidshare.de/files/23087524/astb2.0.part39.rar[/url]

    [url]http://rapidshare.de/files/23088971/astb2.0.part40.rar[/url]

    [url]http://rapidshare.de/files/23090266/astb2.0.part41.rar[/url]

    [url]http://rapidshare.de/files/23090468/astb2.0.part42.rar[/url]

    have phun!

  5. Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits.This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.

    version 2.6

    for windows

    http://www.metasploit.com/tools/framework-2.6.exe

    for linux and mac and sun

    http://www.metasploit.com/images/os/osx.gif

    version 3.0

    for linux and mc and sun

    http://www.metasploit.com/projects/Framework/msf3/download.html?Release=alpha-r3

    3nJoy!

  6. I dont take Responsability if you get your a*s in jail for using this. use it at your own risk.

    The latest version of the Uncapping Kit fromtheoryshare. Learn to uncapyour modem step by step with pictures. NewFeatures include updatedfirmware and eurodocsis support

    http://rapidshare.de/files/13189106/Cable_Modem_Uncapping_Kit-www.WebXposed.de.rar.html 

    password: .webxposed.de

  7. Cum sa patrunzi intr-un sistem de operare (Windows XP si SP1)

    Salut, sa incepem cu inceputul: Treaba "merge" atat in retea cat si in afara retelei in care te afli, dar mai nou providerii de servicii internet au inchis porturile folosite in general la exploatarea sistemelor. Am sa va explic cum faceti "treaba" in retea, tot asa se face si in afara doar ca va trebui sa aveti noro (sa nu fie inchise principalele porturi. ...metode sunt multe, va voi explica o metoda simpla si functionala. Presupun ca ati auzit de "blaster" sau "sasser" :D ,poate v-ati confruntat cu ei, sunt doi virusi care patrund intr-un calculator fara ca voi sa executati ceva sau sa intrati pe o pagina ciudata... Windows XP si Windows XP + Sp1 sunt vulnerabile: Sistemele Windows XP Home, Pro sunt vulnerabile la "blaster" si "sasser", Windows XP Pro + sp1 este vulnerabil doar la "sasser".. Oare ce inseamna "blaster", este numele unui virus care patrunde in calculator cu Windows XP (fara update-uri), el foloseste porturile: 135,139,445,539 , in general 135. Ah.."sasser" este tot un virus asemanator lui "blaster" dar acesta patrunde prin alta matoda si foloseste portul 445. .Cum patrundem intrun calculator care are Windows XP (fara update-uri).

    1.Cautam cu ajutorul unui motor de cautare, "rpc dcom exploit" (sursa o gasim mai usor) compilam sursa (daca nu aveti posibilitatea, cautati mai bine, veti da si de exploitul deja compilat).

    2.Cautam tot cu ajutorul unui motor de cautare: a. un scanner de porturi cu care scanam porturile 135,139 etc... sau b. un scanner pentru vulnerabilitatea "rpc dcom" - o varianta simpla.

    3.Avem nevoie de un client (pentru conectare la calculatorul "spart" - putty sau NetCat sunt cele mai bune pentru asa ceva. !!!Avem tot ce ne trebuie, sa ii dam drumul: Rulam scannerul pentru vulnerabilitatea "rpc dcom", scriem ip-urile (intreaga clasa) care dorim sa fie scanate, asteptam sa gasim un calculator vulnerabil, sa presupunem ca am gasit unul: 21.242.53.87 Pornim consola (start>run> cmd), ne ducem acolo unde am pus exploitul "rpc dcom" care presupunem ca are numele "dcom.exe",dam comanda: dcom.exe -d 21.242.53.87 -t 1 -r 0100139d -p 135 -l 7315 Dupa ce am dat comanda, daca victima nu are firewall.. ne v-a aparea ceva de genu "c:windowssystem32" de acum nu aveti decat sa ii puneti un troian sau sa va deschideti un port anume.. si sa ii dati comenzi, sa il spionati si alte cele...

    metoda veche dar inca functionala :D lolikz

  8. This program performs reverse DNS lookups for network blocks or an input file. The requests can be performed mulit-threaded.

    Usage:

    ./res <subnet or filename to resolve> <forks>

    Download:

    http://www.bindshell.net/tools/massresolve/res.c

  9. ===========================================

    How to autorun a program in Windows:

    ===========================================

    There are many ways .exe,.bat,.vbs,.com, etc programs can autostart

    on a target computer.

    1. Winstart.bat on older systems - Winstart.bat will start with

    windows every

    time the computer boots on older machines. Any command prompt

    commands can be

    used in the batch file.

    ===================================================================

    2. Startup Folder - The startup folder is the most basic way of

    getting an

    executable to start with windows. This method is easy to detect and

    will be

    found. If the method is used I would suggest to have it not matter

    if it is found

    (use your imagination) and/or have an alternative auto startup method

    as well.

    The default startup folder for windows 9x & ME is found at:

    C:windowsstart menuprogramsstartup

    Windows 2k, XP, 2003 use :

    C:Documents and SettingsAdministratorStart MenuPrograms

    (Administrator can be changed to another user name if you know what

    it is.)

    Any executable files placed in this folder will be automaticaly

    executed at

    startup.

    ====================================================================

    3. Win.ini & System.ini - The Win.ini & System.ini methods are old

    favorites.

    Find the files are located in c:windows or c:winnt depending on

    the

    version of windows and where it is installed.

    To use Win.ini to autostart your program first open Win.ini with a

    text editor

    find [windows] or add it if its not there and then add (making sure

    path is

    right) load=Whatever.exe and then run=Whatever.exe.

    Ex.

    [windows]

    load=Whatever.exe

    run=Whatever.exe

    System.ini is very simple too, first open System.ini in notepad and

    then find

    [boot] in the text and add Shell=Explorer.exe Whatever.exe.

    Ex.

    [boot]

    Shell=Explorer.exe Whatever.exe

    ======================================================================

    4. Registry - Registry is probably the most popular method of auto

    starting

    trojans, worms and viruses. Most people do not know how to remove

    registry entries or how to even find them via regedit.

    To make software run automaticaly a string can be added to either of

    the

    following registry keys:

    [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServi

    ces]

    [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServi

    cesOnce]

    [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun]

    [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunOnce]

    For the above keys all you have to do is add a string with what ever

    name you

    want and data of what ever path to your exe, such as:

    Name | Type | Data

    -------------------

    Windows Update | REG_SZ | c:windowssystem32Whatever.exe

    Another key is:

    [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunOnceE

    x

  10. Sending Anonymous Emails

    Sometimes it is neccasary to send an email anonymously.

    There are several web based utilities that allow this, but each one registers the ip info in the headers which allows tracing. They also

    will not allow you to use a proxy and utilize their service. This is for security reasons.

    My definition of anonymous includes the email addresses appearing as if they have been sent from whatever address you specify as well

    as no accurate record of your IP in the headers of the mail that could be traced back to you.

    The method that follows supports my definition of anonymous.

    Amazingly, all you need to accomplish this is telnet and a smtp server. Allow me to break it down.

    Telnet is a software application that connects one machine to another, allowing you to log on to that other machine as a user.

    If you don't have telnet, you can easily download it for free from the web - do a search on "telnet" or "download telnet"in any search

    engine.

    ...and just for the sake of being thorough...

    What is SMTP?

    SMTP stands for "Simple Mail Transfer Protocol"

    Basiclly just a protocol for sending e-mail.

    Where do you get a SMTP server?

    Heres a few links, but as always be aware that these sites may not be here forever or their content may change. Searching for "SMTP servers"

    or "SMTP server list" should produce effective results.

    http://www.gr0w.com/help/email_help_smtp_servers.htm

    http://www.uic.edu/depts/accc/ecomm/smtpmove/isps.html

    http://www.thebestfree.net/free/freesmtp.htm

    http://www.registerdirect.co.nz/help/smtp_servers.html

    http://www.bu.edu/pcsc/email/remote/smtplist.html

    Once you've selected a server, open the command prompt, and type:

    telnet xxxxxx.com 25

    (obviously replace the x's with the SMTP server you've selected)

    now type the following:

    --------------------------------

    HELO targetsmailserver.com

    MAIL FROM: whoever@whatever.com

    RCPT TO: target@address.com

    DATA

    from: whoever@whatever.com

    to: target@address.com

    subject: whatever

    received: xxx.xxx.xxx.xxx

    x-header: xxx.xxx.xxx.xxx

    The body of the message goes here

    .

    ----------------------------------------

    *Note 1: Remember to end with "." on a line by itself as directed.

    *Note 2: Adding x-header and received allows you to alter the IP information found in the headers of the mail, making it untracable and

    totally anonymous**

    *Note 3: There are ISPs that have port 25 (SMTP) blocked. Be sure your settings and ISP allow connections to port 25. If all else fails,

    get the SMTP sever address from your ISP.

    Thats all it takes to send a totally anonymous email. Hope you enjoyed.

  11. Free SMS Messaging With Nokia

    Section 1: The Introduction

    ----------------------------

    Once again here is another tutorial written by your's truly. I was

    going to implement this concept into a program, but it came to me

    early on that the idea just wasn't going to work. So instead I bring

    this information to you in my typical tutorial format. So read, and

    enjoy...

    Section 2: The Method

    ----------------------

    This method is known to work on the nokia 3210, 5610, and 9110 models.

    To perform this trick we will first turn off your phone. Then turn

    your phone on and enter your pin. Once you have done this, punch in

    the following string...

    *#746025625#

    If your model works with this trick then you will get a "SIM CLOCK

    STOP ALLOWED" message on the screen. That's it, now you can send

    sms messages for free. Be warned, this trick sometimes doesn't work

    on certain networks so I wouldn't go overboard with this trick until

    you receive your first bill. If you get no signs of the sms messaging

    you did after performing this trick on your bill then feel free to

    chat all you want. Have fun! =)

    Section 3: The Conclusion

    --------------------------

    Well once again I hope you enjoyed reading this as much as I enjoyed

    writing this. I'm right now trying to work with programming under the

    SymbianOS (for those a bit illiterate in this field, basically,

    programming nokia phones) so hopefully you will all see some nokia

    apps made by me coming out soon enough. And of course, I have a

    couple of tutorial ideas I might pick back up on when I get the chance,

    but life has been keeping me busy lately so don't expect any immediate

    release of anything. Well anyways, until next time...

  12. Making Free Calls With Nokia

    Section 1: The Introduction

    ----------------------------

    Tired of wondering if you have gone over your minute limit? Tired of

    trying to guess how many minutes you are going to use? Tired of even

    paying for the shit? Then this is the tutorial for you. This is a

    short and simple tutorial that will teach you, the reader, how to

    make free calls on your Nokia cell phone. So let's proceed...

    Section 2: So How Do We Do It?

    -------------------------------

    This technique works on most of the nokia models out today. Meaning

    this will work for you as long as you don't have an old fossil sort

    of model. So what you will first do is turn on your phone. Then punch

    in the code *3001#12345#. This will bring up the NAM programming menu.

    From here go down and select the option NAM 1. Once you are in the NAM

    1 menu, go down until you see "Emergency Numbers", and enter. You then

    go down until you see an empty slot and enter the empty slot. Then

    simply punch in the number that you want to call and exit the NAM

    programming menu. Now when you dial up the number, the number will be

    treated as an emergency call number, which will therefore put the

    phone into emergency call mode (which you can exit out of once you are

    finished with your call). No number in the emergency call number list

    is ever billed to you. There are a couple of other things you can do

    from within the NAM programming menu, but that can be saved for another

    time, and another tutorial.

    Section 3: The Conclusion

    --------------------------

    Once again I hoped you enjoyed reading this as much as I enjoyed

    writing this. This trick for the most part only works on the Nokia

    60 series, though I believe may also work for a couple of other models.

    Be sure to also note that this trick also doesn't work on all

    networks. Therefore, if you indeed do have a compatible model, first

    try it with just one or two calls before you start going wild. Then

    just wait for the bill, and if nothing shows up about the calls you

    made with this trick, then feel free to call away. Anyways, until next

    time...

    Note: If you have a question or comment and feel the need to reach me

    then you can do so at murdermouse@informationleak.net and I will try to get back

    with you as soon as possible.

  13. Sprajax is the first web security scanner developed specifically to scan AJAX web applications for security vulnerabilities. Denim Group, an IT consultancy specializing in web application security, recognized that there were no tools available on the market able to scan AJAX. AJAX allows web-based applications a higher degree of user-interactivity, a feature with growing popularity among developers.



    [url]http://www.denimgroup.com/Sprajax/Default.aspx[/url]

  14. Actually I released this a bit while ago, but I wasn't active here on Igniteds when I released it so I never had the chance to post it here. Anyways, the Anti School Kit (or simply ASK) offers the following...

    Guides

    ------

    Hacking Win98: by Halla

    How to bypass restrictions to get to the command prompt: by Halla &

    Murder Mouse

    Thawing Out DeepFreeze: by Murder Mouse

    Hacking The School Network: by Murder Mouse

    Hijacking The School PA System: by Murder Mouse

    Net Send Time Bomb: by Murder Mouse

    How to bypass web filters: by Halla

    Hacking Windows NT/2K/XP: by Halla

    Tools

    -----

    Silent Web Cgi Shell: description self-explanatory

    bindin: identifies which novell users have what permissions

    chknull: cracks novell accounts

    Deep UnFreezer: unfreezes affected versions of DeepFreeze

    FileDate Changer v1.1: description self-explanatory

    Haxernet Explorer v2.01: a browser that uses translation services

    to browse sites not allowed by the web filtering software.

    NetStumbler: scans and reports wireless access points

    OnSite: browses the cached network

    Pandora: kit full of novell related warez

    SharesFinder: uh, finds open shares of course

    SMAC: spoofs MAC address

    snlist: CLI app that is used for the same purpose that ONSite is

    userdump: naturally dumps a list of users on the network

    The programs are meant to compliment the guides, and the guides meant to show you how to apply the included tools (in short for some of you who may need to be reminded, don't just jump at the programs, take a little time out of your life to read the tutorials included). Anyways, here is the link, and be sure to tell me what you think (it's like I make a rhyme, everytime)...

    Download:

    www.informationleak.net/ask.zip

  15. Warning

    =======

    This information should only be used to test your own server's security. Do not attempt to "test" a website's security without permission from it's administrator. Hacking is illegal.

    Quick Intro

    =========

    If you're not familiar with dictionary-based password cracking then this tutorial is not for you.

    Using dictionaries to crack passwords can be very frustrating – Especially after you've waited over two days for a program to use a 240MB list that doesn't seem to have that password. So what do you do? There's a way to dramatically increase your chances of cracking that password. How? By making your own dictionary. No, I don’t mean creating a list by hand in notepad (Don't worry it's all mostly automated)

    Tools needed

    ===========

    PassParse:

    http://darknet.org.uk/content/files/passwo...d/passparse.zip

    RemDupes:

    http://ksoze.deny.de/RemDupes2.exe

    Brutus:

    http://217.125.24.22/h/brutus.zip

    Intellitamper:

    http://www.intellitamper.com/download/inte...amper_v2.07.exe

    The Steps

    =========

    1. Alright. What we need to do first is extract all text from the website. Sounds like a huge task but IntelliTamper will make things a little easier for us. Okay let's open IntelliTamper, enter the website, and press the "Start Search" button. What this will do is find all (or most) pages of the site. Once it's finished, save all the pages it found into one directory on your computer (Right-Click > Save).

    diction1.jpg

    2. Now let's navigate to the directory where we saved the files. Next we're gonna make a simple batch file that will read all the files and send the output to a text file named "ppin.txt". Open Notepad and enter the following:

    CODE

    type *.* > ppin.txt

    and save it as "lister.bat" (without quotations of course). Once you've saved it, run it. Ppin.txt should have been created. (Note the file MUST be name ppin)

    diction2.jpg

    3. Next we're going to create the actual list itself. If you open ppin.txt you'll see that it's just a bunch of html/text. We're gonna use Pass Parse to extract all the words and put in list format. Alright. Copy the file "ppin.txt" and paste it into the same directory as your Pass Parse program. If there’s already a file named ppin then overwrite it. Now launch Pass Parse. The DOS Prompt should have shown for a second or less. Your new password list, "ppout.txt", was just created.

    diction3.jpg

    4. Almost finished. If you open your new password list you'll notice that there are many words used more than once. To take care of the problem we'll use RemDupes. This program will remove all duplicated words and sort your list in alphabetical order. So open your copy of RemDupes, click "Add", and navigate to your password file (ppout.txt). Click "Find Dupes" and when that's finished click "Save List". Your list is completely finished.

    p><p>5. Open Brutus and let

    diction5.jpg

    "Positive Authentication with User: Admin Password: inagokart"

  16. MAC SPOOFER is a MAC Address Modifying Utility (spoofer) for Windows 2000, XP, and Server 2003 systems, regardless of whether the manufactures allow this option or not. MAC SPOOFER is a MUST-HAVE TOOL for IT, Security, Networking professionals, gamers, and everyone who needs a MAC Addresses Changer.

    Key Features

    Easy usage and simple configuration, highly intuitive interface makes operation easy for both beginners and power users.

    Able to manage up to 16 network interfaces.

    In detail, it does not change the hardware built-in MAC-address, but changes software based MAC Address on the Windows NT, 2000, XP and 2003.

    Display all available network adpaters.

    Works with wireless network adapters.

    Low resource required.

    Download:

    http://www.goguz.com/counter/click.php?id=2

×
×
  • Create New...