-
Posts
2099 -
Joined
-
Last visited
-
Days Won
17
Everything posted by pyth0n3
-
User-ul care vinde poate primi un feedback in legatura cu serviciul vandut (calitate) bad | good
-
Spre exemplu ma refer la un user care incepe sa vanda si devine unul de incredere va fi targat cu ceva de genul Trusted?
-
Quitz and encryption challenge | get access and deface
pyth0n3 replied to tdxev's topic in Challenges (CTF)
@nedo probabil sursa , dar nu acum Mai a?tept sa mai fac? ?i al?ii -
Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you’ll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients. Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-12 introducing more complex bots that can be used for logging, servicing communities, searching, announcing, networking, managing channels or simply for having fun. Chapter 13 delves into the IRC protocol in more detail, and Chapter 14 demonstrates some interesting alternative methods for connecting to IRC. Finally, Chapter 15 will move you on to new pastures by showing you how to set up your own IRC server. This book presents an opportunity to learn how IRC works and how to make best use of some of the features that have made it the most successful, most scalable, and most mature chat system on this planet. IRC Hacks delves deep into the possibilities. Download : http://tinyurl.com/5v47n6k Password : 1ns3cur3 .chm format Xchm Unix/Linux reader http://xchm.sourceforge.net/
- 1 reply
-
- 1
-
-
Quitz and encryption challenge | get access and deface
pyth0n3 replied to tdxev's topic in Challenges (CTF)
@Flubber verificat, ok! [EDIT] altcineva ? MP -
Quitz and encryption challenge | get access and deface
pyth0n3 replied to tdxev's topic in Challenges (CTF)
A fost introdus doar modulul time ,nu schimba nimic , totul r?mîne asa cum a fost , va sincroniza intrun fel timpul la anumite opera?ii -
Nici de la mirc ,nici de la telnet , nici la ftp si probabil multe alte servicii care nu suporta nici un tip de criptografie
-
Yahoo Messenger nu cripteaza mesajele , pot fi citite in clar text cu orice sniffer , indiferent de router sau hub intro lan
-
A to Z guides consist of 100 3-5 page articles, heavily illustrated, covering the basic concepts, technologies, standards and protocols ? everything you need to master the field. Networking A to Z covers the key concepts and technologies of Local Area Networking. From traditional data and management topics to cutting edge wireless options, this is a precise ? and concise ? quick look up reference to the industry. Download Checkfiles Here Source && Password default : shytex.net
-
. Intro to MYSQL Admin area and High table setup . Intro to PHP, sending a MYSQL Query and getting the results . Using a While Loop in PHP, and displaying all rows from Database Table . Limiting Query Results and formatting them for flash to receive . Setting up Flash to receive variables from PHP and displaying the High Scores . Setting up the Flash file for submitting a new High Score to the Database . Modifying the PHP file to submit a new High Score and Drop Lower Scores Design an Update-able Members Only Area: . MySQL Admin Area for new Login Table . PHP Functions and Global Variables . PHP code for checking member login data . PHP Sessions and modifying default PHP settings with a php.ini file . Setting up the Flash file for checking relogin data . Modifying the Flash file to detect if a PHP Sessions is still active . Setting up the FLash file for submitting a new member to the Database . PHP code for submitting a new member to the Database . Testing Submissions to the Database, Error Message Handing, & Debugging . Posting a Variable from the Flash file to Substitute for using a PHP Session . PHP code for Updating Info on the Database . Modifying the Flash File to Save (Update) Info on the Database . Using a Function to test if variables have been loaded into Flash from the PHP file . Embedding a Flash File with PHP to display ONLY if a member is logged in . Disabling an .SWF file from playing unless a variable advances the timeline forward Download content : Here Check filesHere Source && Password default : shytex.net
-
E o poza care arata acelasi screen de pe wildfire (era doar ca sa explic ce screen de boot am ) Nu reusesc sa intru in nici o optiune , imi ramane blocat asa Ar trebui sa folosesc butoanele de la volum dar nu au nici un efect deoarece nu reusesc sa navighez in menu O data aprins nu reusesc nici sa il inchid Nu am setat optiunea usb recovery mode ,asadar nu reusesc sa intru din pc in telefon
-
Secure Delete File Unix/Linux
pyth0n3 replied to pyth0n3's topic in Sisteme de operare si discutii hardware
@Duppy Retineti, shred se bazeaza pe un lucru important, ca sistemul de fisiere rescrie datele in loc Multe tipuri de sistem de fisiere moderne nu indeplinesc acest lucru In acest caz shred nu garnteaza in mod eficient stergerea fisierelor Un exemplu poate fi un filesystem de tipul ext3,jfs,reiserfs,xfs si altele Toate sistemele moderne de Linux spre exemplu folosesc un asemenea filesystem shred nu va garanta 100% stergerea fisierelor in aceste sisteme @ph3wl ar trebui sa folosesti sfill pt a formata stickul , sau macar sa treci cu truecrypt peste el deoarece o formatare normala cu un simplu filesystem nu va garanta 100% stergerea fisierelor Oricum depinde de situatie si de importanta datelor -
Secure Delete File Unix/Linux [RO] ______________________________________________________ In acest articol voi descrie putin cum poate fi sters un fisier sau un director intrun sistem Unix/Linux Probabil majoritatea folosesc si cunosc comandul "rm" Ce face acest comand ?Sterge cu adevarat un fisier sau un director? Voi explica in mod foarte simplu Comandul "rm" va face doar in asa fel incat un filesystem sa uite unde este fisierul asupra carui vine rulat Exemplu: rm file1 -> filesystem-ul nu va mai tine cont unse se afla file1 Note: file1 nu va fi sters Ce se va intampla cu file1? file1 va ocupa un loc undeva in filesystem chiar daca nu se va tine cont de el Acest loc unde va exista file1 va fi adaugat la celelalte blocuri libere si va fi rescris atunci cand va fi nevoie de acel spatiu Avand in vedere faptul ca un hard-disk va avea o gramada de spatiu va trece o gramada de timp pana cand locul in care se afla file1 va fi rescris de catre un alt fisier Note: Intrun filesystem fisierele sunt stocate de la inceputul unui bloc si ocupa un numar intreg de blocuri Bineinteles pot fi folosite diverse metode pt acest lucru Presupunem ca file1 poate fi orice fel de document Un tool care se ocupa de recovery il va putea gasi Unii folosesc urmatorul comand rm -rf file1 Ce face acest comand? Optiunea -r specifica un mod recursiv (poate fi folosita in cazul in care file1 este un director in care exista alte fisiere ) Optiunea -f obliga comandul rm sa fie executat (in cazul in care fisierul nu exista nu va da nici un output, va fi executat ) Nefolosind optiunea -f in cazul in care fisierul nu exista va da un output de tipul " No such file or directory" Comandul rm va face acelasi lucru asupra unui fisier cu sau fara optiunea -f Ce spune autorul comandului rm ? Note: Retineti ca daca utilizati rm pentru a elimina un fisier, de obicei este posibil recuperarea continutului din acel fisier Daca vreti sa fiti mult mai siguri , ca acel continut este irecuperabil luati in considerare SHRED Un alt tool pt a sterge date intrun sistem Unix/Linux este shred In cazul in care vine folosit shred pt a sterge un fisier va face urmatorul lucru: Va rescrie spatiul in care se afla acel fisier de 25 de ori (de default) In cazul in care va fi folosita optiunea -u fisierul va fi sters dupa ce va fi rescris Folosind optiunea -n urmata de o cifra , va rescrie fisierul care vine sters in baza cifrei specificate Optiunea -v vine folosita pt verbose , va arata in output progresul Ok, cineva va spune ca shred este mult mai bun decat comandul rm care nu prea face nimic special Note: Un filesystem modern de tipul ext3 are o functie de journalig(jurnalizare) Acet tip de filesystem va pastra un jurnal pt modificarile efectuate inainte de operarea modificarilor asupra unui fisier Deci va crea un log asupra unui fisier inainte de a modifica fisierul shred nu va putea sterge amprentele unui fisier in acest caz In manualul acestui tool vin scrise urmatoarele : Retineti, shred se bazeaza pe un lucru important, ca sistemul de fisiere rescrie datele in loc Multe tipuri de sistem de fisiere moderne nu indeplinesc acest lucru In acest caz shred nu garnteaza in mod eficient stergerea fisierelor Un exemplu poate fi un filesystem de tipul ext3,jfs,reiserfs,xfs si altele Secure-delete , acest tool include mai multe srm -> va face un secure overwrite/rename/delete asupre unui fisier De default va rescrie un fisier de 38 de ori Are diverse optiuni care pot fi specificate sswap -> va face un secure overwrite asupra spatiului (memoriei) swap De default va resrie de 38 de ori Are diverse alte optiuni care pot fi specificate Note: Inainte de a rula sswap va trebui facut un swapoff la memorie sfill -> va face un secure overvrite asupra unei partitii sau a unui hard disk De default va rescrie de 38 de ori Are diverse alte optiuni care pot fi specificate THC-SecureDelete poate fi gasit la urmatoarea adresa #!/bin/releases - THC Fiecare distributie linux ar trebui sa contina acest pachet in repository ____________________________________________________________ wget http://sprunge.us/jdFV -O secure_delete_file.txt
-
Summary: The /proc filesystem is a virtual filesystem that permits a novel approach for communication between the Linux® kernel and user space. In the /proc filesystem, virtual files can be read from or written to as a means of communicating with entities in the kernel, but unlike regular files, the content of these virtual files is dynamically created. This article introduces you to the /proc virtual filesystem and demonstrates its use. Source: Access the Linux kernel using the /proc filesystem
-
Review: Hackerstorm.com has put together a tool to allow users of the Nessus scanner to view their scan jobs without the need for the nessus client. Its purpose is to allow you to quickly and easily browse and view your scan jobs without the need to run up a nessus session. Some features include; Our tool is completely free to use and released under the GNU General Public License Nessus v3 required & OpenVas v2. Simply export scan jobs into XML format and copy to the XML folder View by Risk View by Severity Executive summary as well as detailed reports Ports and services report Vulnerability categoy report Export scan jobs to Excel (very useful with autofilter enabled). Save report as html and send as an offline copy in html. Easy installation, just extract the zip file to your web server! View demo online (Nessus) View demo online (OpenVas) View demo with charts online (demo only) The tool runs on linux laptops, workstations or server and requires; Apache webserver PHP 5 enabled Reporter Download Download (Nessus) Download (openVas) Documentation : Here Source:IT & Internet Security, Hacking and Vulnerability Research, Penetration Testing, Ethical Hacking, Blackhat, Securityfocus, CERT, OSVDB, Secunia
-
@MadBadSad e tare si One Loaf of Bread
-
Download:here Source: SANS: Computer Security Training, Network Security Research, InfoSec Resources
-
A white paper on topic: Evading AV Signature--Derailing the Anti-virus Download:Here Source:Full Disclosure: Evading AV Signature--Derailing the Anti virus
-
Folks, Chengyu Song has been busy the last few weeks and made some upgrades to the honeypot monitoring tool Qebek. He has ported it from QEMU 0.9.1 to QEMU 0.13.0. As a result, Qebek's performance (boot time) is better and it no longer requires gcc 3.4. You can check it out svn co https://projects.honeynet.org/svn/sebek/virtualization/qebek/trunk/ If you don't know what Qebek is or how to use it, take a look at our whitepaper at Know Your Tools: Qebek ? Conceal the Monitoring | The Honeynet Project. Source:https://www.honeynet.org/node/595
-
Fiagaro's Password Manager Gpass Gpassword Manager Gringotts KeePassX MyPasswords PasswordSafe Revelation How we tested... The verdict
-
@adi003user , orice client de email ar trebui sa permit? acest lucru Outlook suporta acest lucru , ar trebui sa cau?i pe google un tutorial