Jump to content

prodil89

Active Members
  • Posts

    1318
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by prodil89

  1. la Show off i guess >_>
  2. Sunteti niste inconstienti si si nuciile au o viata. Ia uite domne nu poate o nuca sa se sperie si sa cada.... O fii auzit si el... Da chiar asa tu te uitai la copaci...nu la accident?
  3. Hmmm... Pai sunt o gramada de filme in care un ostrogot/tarzan/mostru face zgomote ciudate(ma gandesc de ce xD) in jungla si si vezi cum isi iau talpasitza pasariile din copaci ))
  4. Da....tu nu ai o senzatie proasta cand vezi ca majoritatea threaduriilor tale ajung la "Cele Mai Penale Posturi"
  5. Nu stiu daca e potrivit dar unii ar pute sa fie interesati ce fac jeguriile cu bani... [url=http://norcaltruth.org/]Norcaltruth[/url]
  6. Lol ce titlu "A murit poetul de curte a lui Ceausecsu." Astia chiar nu au un pic de respect...
  7. In its anti-piracy lab in Dublin, Microsoft uses microscopes and other equipment to detect counterfeits of its products. Readers' Comments All but the lead vehicle turned off their headlights to evade lookouts, called “falcons,” who work for La Familia Michoacana, the brutal Mexican cartel that controls the drug trade. This time, the police weren’t hunting for a secret stash of drugs, guns or money. Instead, they looked to crack down on La Familia’s growing counterfeit software ring. The police reached the house undetected, barreled in and found rooms crammed with about 50 machines used to copy CDs and make counterfeit versions of software like Microsoft Office and Xbox video games. They arrested three men on the spot, who were later released while the authorities investigate the case. “The entire operation was very complicated and risky,” says a person close to the investigation, who demanded anonymity out of fear for his life. The raid added to a body of evidence confirming La Familia’s expansion into counterfeit software as a low-risk, high-profit complement to drugs, bribery and kidnapping. The group even stamps the disks it produces with “FMM,” which stands for Familia Morelia Michoacana, right alongside the original brand of various software makers. The cartel distributes the software through thousands of kiosks, markets and stores in the region and demands that sales workers meet weekly quotas, this person says, describing the operation as a “form of extortion” on locals. The arrival of organized criminal syndicates to the software piracy scene has escalated worries at companies like Microsoft, Symantec and Adobe. Groups in China, South America and Eastern Europe appear to have supply chains and sales networks rivaling those of legitimate businesses, says David Finn, Microsoft’s anti-piracy chief. Sometimes they sell exact copies of products, but often peddle tainted software that opens the door to other electronic crime. “As long as intellectual property is the lifeblood of this company, we have to go protect it,” Mr. Finn says. Microsoft has adopted a hard-line stance against counterfeiting. It has set up a sophisticated anti-piracy operation that dwarfs those of other software makers; the staff includes dozens of former government intelligence agents from the United States, Europe and Asia, who use a host of “CSI”-like forensic technology tools for finding and convicting criminals. But the hunt for pirates carries with it a cost to Microsoft’s reputation. The company’s profit from Windows and Office remains the envy of the technology industry, and critics contend that Microsoft simply charges too much for them. In countries like India, where Microsoft encourages local police officers to conduct raids, the company can come off as a bully willing to go after its own business partners if they occasionally peddle counterfeit software to people who struggle to afford the real thing. “It is better for the Indian government to focus on educating its children rather than making sure royalties go back to Microsoft,” says Eben Moglen, a law professor at Columbia Law School and a leading advocate of free software. Mr. Finn argues that Microsoft has no choice but to be aggressive in its fight, saying its immense network of resellers and partners can’t make a living in areas flush with counterfeit software. He says consumers and businesses are being coaxed into buying counterfeit products that either don’t work or do serious harm by clearing the way for various types of electronic fraud. And, crucially, the counterfeit software cuts into Microsoft’s potential profit. A software industry trade group estimated the value of unlicensed software for all companies at $51.4 billion last year. The most vociferous critics of Microsoft and the overall proprietary software industry describe the anti-piracy crusade as a sophisticated dog-and-pony show. They say the software makers tolerate a certain level of piracy because they would rather have people use their products — even if counterfeit — than pick up lower-cost alternatives. At the same time, the critics say, the software companies conduct periodic raids to remind customers and partners that playing by the rules makes sense. “It has always been in Microsoft’s interests for software to be available at two different prices — expensive for the people that can afford it and inexpensive for those that can’t,” Mr. Moglen says. “At the end of the day, if you’re a monopolist, you have to tolerate a large number of copies you don’t get paid for just to keep everyone hooked.” MUCH More... [url]http://www.nytimes.com/2010/11/07/technology/07piracy.html?_r=2&pagewanted=1[/url]
  8. An 18-month-old boy has had a miraculous escape in Paris after he fell from a seventh floor apartment while playing with his sister. He survived without even so much as a scratch after being caught by a passer-by. Video... [url=http://www.bbc.co.uk/news/world-europe-11689585]BBC News - Baby caught by passer-by after seven floor fall[/url]
  9. The hacker who created the Firesheep tool which showed Twitter and Facebook users how insecure they were has defended its release to the great unwashed. Eric Butler, a freelance web application and software developer based in Seattle, developed the Firesheep tool as an add-on for the Firefox web browser and it allows even idiots to break into the online accounts of people using unsecured Wi-Fi. Writing in his bog Butler said that some had questioned the legality of the tool. However, he said that it was "nobody's business telling you what software you can or cannot run on your own computer... like any tool, Firesheep can be used for many things." Butler said that in addition to raising awareness, it has already proven very useful for people who want to test their own security as well as the security of their (consenting) friends. He said that many cafes and hotels leave their Wi-Fi unsecured so that users don't need to put in a password to access it. Hit by the hack was PayPal's own mobile payments iPhone app which has since been patched in a software update. What the software highlighted was the fact that Facebook only used the encryption when punters first log-in to it, to protect your username and password from leaking. It then controlled a session using an unencrypted cookie. It was this cookie that Firesheep was snuffling. Apparently the social notworking site is looking at adopting a totally encrypted system. [url=http://www.techeye.net/security/twitter-and-facebook-hacker-defends-firesheep/]Twitter and Facebook hacker defends Firesheep - People need to know how baad their security really is | TechEye[/url]
  10. The Chevy Volt: An Electric Car With Its Own IP Address CrunchGear’s Matt Burns recently called the Chevy Volt GM’s “knight in shining chrome and white plastic.” Burns was not citing projected sales numbers, instead he was making the point that the Volt has saved GM by forcing the troubled automaker to “change internally and reinvent nearly ever aspect of how it does business.” In support of Burns’ thesis, IBM and GM revealed new details on Monday on the car’s electronic backbone and how it came together in 29 months, from concept to finish. Although the Volt is far from the first car with computer functionality, it is a major technological step forward for GM. According to IBM, the Volt is equipped with 100 electronic controllers, its very own IP address and roughly 10 million lines of software code. That’s far more than its peers and, according to Robert LeBlanc, SVP of IBM’s Middleware Software, that’s also more than today’s Boeing 787 Dreamliner which features a paltry 8 million lines of code. “Think of it as a data center and computer on wheels,” LeBlanc says. Given the Volt’s reliance on its software and electronic components, it’s no wonder that GM relied heavily on IBM’s software to put all the pieces together. As explained in Monday’s press release, GM used IBM’s suite of Rational software products (which includes design and simulation tools) “to develop some of the Volt’s critical electronic controls for the vehicle’s innovative battery system, electric drive unit, and cabin electronics.” According to LeBlanc, IBM’s software allowed disparate engineering teams to collaborate, put products to the test and it helped them model and better understand how various electronic systems would interact. That’s a significant departure from the past, when GM’s engineering teams would develop components independently, with minimal sharing during the development process. Forging ahead, the GM/IBM partnership for the Volt is expected to be a template for the development of new GM cars: “We hope to extend the Rational platform to other vehicle lines. Cars are only going to be more complex, every automaker will have to deal with that higher level of complexity and interaction.” Vid and more... [url=http://techcrunch.com/2010/11/01/the-chevy-volt-electric-gm-ib/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=Google+Reader/r:t]The Chevy Volt: An Electric Car With Its Own IP Address[/url]
  11. It’s been a while since our last blog post, so we thought we’d give a quick status update with our progress. We are a week behind schedule with the release of BT4 R2, which is undergoing heavy testing at this moment. We will of course announce the download once it is available. Another interesting event taking place is the 2nd German BackTrack Day (0x7da). The event will take place in Fulda on the 6-7.11.2010. The whole event is organized by the German BackTrack Team and will include great talks, workshops and CTFs. Tickets are pretty much sold out, except for 5 VIP tickets reserved for speakers. [url=http://www.backtrack-linux.org/backtrack/backtrack4-r2-imminent-release-and-2nd-german-backtrack-day/]BackTrack4 R2 Imminent Release | BackTrack Linux - Penetration Testing Distribution[/url]
  12. It's been a long road on this one, total line count for version 1.0 was larger then all of the other releases combined. This version adds several key components including new attack vectors, a web GUI interface, a way to automate SET behavior, and a slew of bug fixes. I have to thank everyone that contributed to this edition, there were a number of people that reported bugs on 0.7.1 that have all been addressed in this version and a new module added by a security company. Be sure to check out the newly updated tutorials on the Metasploit-Unleashed course: Here or in the readme/User_Manual.pdf file. Thanks everyone for your contributions and continuing to support SET, we have over 1.4 million downloads since its creation, that's amazing! Below is a list of all of the changes: ~~~~~~~~~~~~~~~~ version 1.0 ~~~~~~~~~~~~~~~~ * Added the new set-automate functionality which will allow you to use SET answer files to automate setting up the toolkit * Added bridge mode to Ettercap if you want to utilize that capability within Ettercap * Fixed an issue where multiple meterpreter shells would spawn on a website with multiple HEAD sections in the HTML site * Added the Metasploit Browser Autopwn functionality into the Metasploit Attack Vector section * Fixed the dates on DerbyCon, suppose to be September 30 - Oct 2 2011 instead of Septemeber 29 - Oct 2 2011 * Added the ability to utilize templates or import your own websites when using credential harvester, tabnabbing, or webjacking * Fixed an integer error issue with Java Applet when exiting SET * Changed the timing for the wscript payload from 15 seconds to 10 seconds to minimize delay * Added a custom written DLL for SET and the DLL Hijacking, user has to extract the zip file for it to work properly * Redid the report templates for credential harvester to reflect the new look for secmaniac.com * Removed the modified calc.exe and replaced with a modified version of putty.exe to get better AV detection * Redid the dll hijacking attack to include rar and zip files, rar is better to use winzip compatible and will execute * Added an additional dll hijacking dll that will be used for the main attack, uses a purely C++ native method for downloading and executing payloads * Fixed the defaulting application for the Client-Side attack vector, it was defaulting to PDF when it should be an IE exploit * Fixed a bug where hitting enter at the web attack vector would cause an integer base 10 error message * Added the Adobe Shockwave browser exploit that I wrote for the Metasploit Framework. * Moved all of the SET menu mode source to main/set.py, the main set loader is just a small import now. More clean. * Changed some spacing issues in the client-side attack vectors * In spear-phishing, cleaned up excess messages being presented back to the user when PDF was created or files were moved * Fixed a bug in the web cloner where certain ASPX sites wouldn't clone and register properly, thanks for the patch Craig! Added you to credits. * Added the SMS attack vector which can spoof SMS messages to a victim, it will be useful in nature if you want them to click a link or go somewhere you have a malicious site. Thanks to the TB-Security.com for the addition. * Added the Metasploit Sun Java Runtime New Plugin docbase Buffer Overflow universal client side attack * Added the parameter for the java applet called separate_jvm, this will spawn a new jvm instance so cache does not need to be cleaned * Fixed a bug where the SET Python web server would not properly shut down in certain circumstances * Added a repeatitive refresh flash for the java applet, so if a user hits cancel, it will prompt over and over until run is hit. Better way of getting the user to hit run. * Added the configuration option to turn off the java repeater, so if your using something like multi-attack you can specify so it doesn't keep nagging the user if you want multiple attack vectors * Fixed a bug where spear phishing attack would not spawn meterpreter listener when yes was specified, this was caused by the new dll hijacking addition. * Added better connection handling through the spear-phishing and gmail integration, it wasn't properly closing the connection per request * Fixed bug where using infectious media and file format would prompt you to use the spear-phishing mailer option afterwards, it no longer prompts for that during infectious media creation * Removed the option to include how many times to include, automatically defaults to 4, option is configurable in set_config now * Added the Metasploit Adobe FlashPlayer "Button" Remote Code Execution exploit to the spear-phishing/file format attack vectors * Added the ability to hit enter on yes or no payload selection default to the infectious usb method, enter would just return you to the menu, it now spawns a listener * Removed the return to continue prompt in the Teensy HID USB attack vector, it wasn't needed and added additional steos * Added the new SET web interface, it primarily utilizes the new set-automate functionality based on responses for a payload, will improve as time goes on * Added the reverse DNS meterpreter payload to both client-side attacks as well as payload generators for things like Java Applet, Teensy, attacks, etc. * Fixed an issue where the Adobe 'Button' exploit was not properly loading and exporting the PDF through Metasploit * Added the Internet Explorer CSS Tags Memory Corruption exploit to the Metasploit Client-Side attack vector through web attack. * Fixed a large bug within mass mailer, if you were using Google Mail with multiple targets, there was a mis-matched counter that would only send one email, not to the rest of the list. It now functions correctly * Fixed a bug where if you turned sendmail to off and you used open mail relays, the email wouldn't be delivered properly. It now sends as expected * Added javascript replacement of the ipaddress under name in Java Applet, this is configurable under set_config, it defaults now to Secure Java Applet instead of your IP Address (more believable) * Added the ability to change the bind interface for the command center. By default its on localhost only, but you can configure to listen on all interfaces and hit the web interface remotely. * Updated the SET User Manual to reflect the changes of version 1.0, it incorporates the web interface, set-automate, SMS spoofing, new configuration options, and much more. * Fixed a bug where you would leave SET or still be in and a stale HTTP web server process would still be there. SET now checks to see if the process is stale and terminates it. * Added the ability to toggle different shell terminal windows within the command-center. For example you can select XTERM, KONSOLE, SOLO, and GNOME through the set_config. XTERM will be the default. [url]http://www.secmaniac.com/november-2010/the-social-engineer-toolkit-v1-0-devolution-release/[/url]
  13. .....o da sunt sigur ca la asta sau referit aia de la parazitii cand au compus... Daca va regasiti in versuri....e ok.....dar cand va regasiti cu ceva de pe un forum cacat blablab etc E BULlSHIT....e grav E grav si indica un singur lucru... Cat despre tutorial OMG esti prea 1337 m-am chinuti sa inteleg..esti prea avanasat blalbal *insultele obisnuite care se folosesc la skids de genu*
  14. Pai si cum plm vrei sa isi deie seama daca aude??? )
  15. Sa dovedit ca: 1.Exista un concept de telefon mobil chiar din anul 1922...cae putea fii si folosit 2.Ar putea sa fie un aparat "Hearing Aid" pentru surzi Dar nu e nici telefon , nici hearing aid e unu(sau una nu pot sa imi dau seama xD) cu purici.
  16. Nice one doode Si ce daca nu sunt indexate de google?Nu inseamna ca o sa gasesti ceva "special" in "DeepWeb" In schimb in google gasesti tot ce vrei si un pic mai mult....care nu vrei
  17. )))))))))
  18. GENEVA (Reuters) - Physicists probing the origins of the cosmos hope that next year they will turn up the first proofs of the existence of concepts long dear to science-fiction writers such as hidden worlds and extra dimensions. And as their Large Hadron Collider (LHC) at CERN near Geneva moves into high gear, they are talking increasingly of the "New Physics" on the horizon that could totally change current views of the universe and how it works. "Parallel universes, unknown forms of matter, extra dimensions... These are not the stuff of cheap science fiction but very concrete physics theories that scientists are trying to confirm with the LHC and other experiments." This was how the "ideas" men and women in the international research center's Theory Group, which mulls over what could be out there beyond the reach of any telescope, put it in CERN's staff-targeted Bulletin this month. As particles are collided in the vast underground LHC complex at increasingly high energies, what the Bulletin article referred to informally as the "universe's extra bits" -- if they do exist as predicted -- should be brought into computerized, if ephemeral, view, the theorists say. Optimism among the hundreds of scientists working at CERN -- in the foothills of the Jura mountains along the border of France and Switzerland -- has grown as the initially troubled $10 billion experiment hit its targets this year. PROTON COLLISIONS By mid-October, Director-General Rolf Heuer told staff last weekend, protons were being collided along the 27-km (16.8 mile) subterranean ring at the rate of 5 million a second -- two weeks earlier than the target date for that total. By next year, collisions will be occurring -- if all continues to go well -- at a rate producing what physicists call one "inverse femtobarn," best described as a colossal amount, of information for analysts to ponder. The head-on collisions, at all but the speed of light, recreate what happened a tiny fraction of a second after the primeval "Big Bang" 13.7 billion years ago which brought the known universe and everything in it into being. [url=http://abcnews.go.com/Technology/wireStory?id=11926151]CERN Scientists Eye Parallel Universe Breakthrough - ABC News[/url] HA! Good news....Sa speram ca se confirma niste teorii. \m/
  19. Hmm...pai atunci TV-u e de vina pentru ca , cablul este izolat(are jacketa din aia de metal ) Credeti ca modemul de la orange este atat de "puternic" sa interfereze cu TV-u :S Si da este destul de vechi... PS:Stau destul de aproape de o antena Orange
  20. Bun.... Deci am un TV mai scartzait/vechi cu cablu prin RDS. Am un Laptot cu net de la Orange. [Weird thing 1]:De cate ori este laptopul aprins si aproape de TV , televizoru are pureci si cateodata ecranu goes BLACK pt 1-2 secunde. Dupa ce sting laptopu TV-u isi revine. [Weird thing 2]:Cu laptopu stins tot am impresia ca TV-u prinde statii radio sau alte canale TV in timp ce ma uit la un canal. Pentru 1-2-3 secunde face sunetu ala ciudat care vine odata cu purecii (static or w/e ) iar in timpu ala aud si voci sau melodii Amuzant e ca tin minte perfect ca era unu pe forum care zicea ca boxa lui prindea statii radio...si eu mi-am batut joc de el [intrebare]: 1.Ce pwla mea de legatura are laptopu cu Tv-u de imi face purici? 2.E posibil sa prind statii radio sau sa interceptez alte canale?Cum? Si nu luati threadu la mijto ca eu VB. SERIOS!!!!!
  21. O spui de parca ai inventat ceva nou
  22. Lasa-ma sa ghicesc ai schimbat numele autorului in graba sau ce?
  23. prodil89

    Break 4 IT

    That's just DUMB!!!
  24. Lol pana la urma a fost vreunu sau ati dat din gura ca de obicei
  25. Vorbesti prostii nu patesti nimic daca citesti chestiile alea Probabil se lucreaza la site , se uploadeaza ceva. Mai informeazate si tu despre Wikileaks.
×
×
  • Create New...