-
Posts
2099 -
Joined
-
Last visited
-
Days Won
17
Everything posted by pyth0n3
-
Hackers movie Hackers 2 Takedown Trailer http://www.youtube.com/watch?v=qvmlp26IYr8 Firewall Trailer Commedy Welcome to tha Hood trailer Soul Plane Trailer with Mehod ManThriller Juice Trailer with TupacDramma 8Mile Trailer with EminemHorror/Commedy Back 2 tha Hood Trailer
-
Old School Rap EX(2pac ,Notorius B.I.G, Eazy E ,Dr.Dre , Snoop Dogg , Eminem .Dmx ) In orice caz ei sunt the father of rap si nu se compara pt nimic in lume cu orice fel de hip-hop sau rap de acum orice ar zice oricine .Rap a fost o data , acum au ramas doar piesele lor , + rap comercial de acum
-
Dns-ul poate doar sa faca ca pointer pt o adressa ip din cate stiu eu nu si pt porturi . In acest caz trebuie doar configurat routerul ca sa faca routing de exemplu de pe portul 80 pe portul 8080 al unui alt host Dns-ul nu are nici o treaba ,el rezolva domain name in ip , aici totul depinde de routing
-
va trebuie sa configurezi /usr/share/ettercap/etter.dns Uite : microsoft.com A 198.182.196.56 *.microsoft.com A 198.182.196.56 www.linux.org PTR 198.182.196.56 . Nu iti ramane decat sa activezi pluginul dns_spoof in ettercap bineinteles dupa ce faci arp poisoning de exemplu cand deschizi microsoft.com va trebui sa se deschida linux.org daca vrei poti sa modifici ca orice query sa fie redirectionata la 192.168.1.1 de exemplu * A 192.168.1.1
-
ok perfect , desi nu cu toate snifferele se poate modifica orice fel de certificat ssl . Oricum eu cred ca mai rau e cu un browser firefox pt ca de exemplu uite aici ce se poate intampla daca e in limba italiana http://support.mozilla.com/img/wiki_up/8094ff1949ec887bc44ebf46098422c7-1256999617-140-1.jpg citez: "Allontanarsi da questo sito " unde ii spune userului ca sa se indeparteze de acest site . Ca sa accepte conexiunea va trebui in primul rand sa dea click pe ultima sageata din imagine unde scrie de ex:"Sono consapevole dei rischi " dupa care ii va aparea o noua fereastra in care il va intreba daca vrea sa accepte certificatul ssl .dupa ce il va accepta va reusi sa intre pe acea pagina . Problema e ca multi nu stiu ce sa faca in asemenea situatii si incearca sa apese pe primul buton pe care pot . deci victima in acest caz nu va merge sa dea click pe ultima sageata jos ci va apasa pe primul buton in care scrie sa paraseasca pagina . O alta imagine il limba engleza http://farm5.static.flickr.com/4035/4261768964_04255739b6.jpg unde e acelasi lucru , ca sa accepte conexiunea va trebui in primul rand sa dea clik pe sageata unde scrie "I Understand the Risks " dupa care ii va fi prezentata o alta pagina unde va accepta certificatul http://www.samecs.com/how_do_i/Rational%20Team%20Concert/Rational%20Team%20Concert%20how%20do%20I_files/image054.jpg Deci avand in vedere faptul ca sunt incepatori multi vor da oricum "Get me out of here" Facusem cateva teste cu firefox si din pacate multi useri nu acceptau certificatul in acest caz
-
numai ca si vecini citesc certificatele inainte sa accepte .Conversatiile pe yahoo messenger nu sunt criptate.Oricum in acest scop se foloseste bineinteles ,doar nu pe Lan privat .Daca mai pui si Driftnet reusesti sa vezi si pozele la tine pe desktop. Oricum cand intri intro retea wireless ai si routerul pt ca passwordurile sunt setate de default , si aici pot sa zic si eu ca 90% din nu schimba passwordul din router de default.O data ce esti in Lan cu ceva exploit reusesti sa intri in pc dupa care poti sa-i schimbi si sistemul operativ la router. Majoritatea au un sistem linux embended care poate fi modificat. de exemplu intrun Huawey am reusit sa instalez o imagine de o distro Debian modificata . Iti dai seama esti in router si poti instala ce vrei tu cu apt-get pe acel router din repository Debian , imi facusem un client torrent care descarca pt mine direct in router pe un usb extern , pacat ca nu are memorie multa routerul dar cu imaginatia se poate ajunge departe mult mai departe decat un client torrent
-
Esti sigur ca functioneaza cu toate certificatele ssl ? Fa o demostratie cu Facebook , Msn , Gmail , si de exemplu Hi5 pt ca vazusem multi il folosesc .Astept sa vad . Problema cu cititul e toti 90% citesc pt ca le spune mare si clar care e treaba cu certificatul , de exemplu daca folosesc firefox .(o fi si aia care nu citesc pt ca nu stiu sa citeasca )
-
Vroiam doar sa mai dau cateva exemple : chmod 400 -user-ul poate citi , nimeni altul nu poate face nimic chmod 644 -toti pot sa citeasca , proprietarul poate face edit chmod 660 -proprietarul si grupul pot sa citeasca si sa editeze , world (altii) nu pot face nimic chmod 700 -proprietarul poate sa citesca sa scrie si sa execute restul nu pot sa faca nimic chmod 774 -toti pot sa citeasca doar proprietarul poate sa modifice si sa execute chmod 775 -toti pot sa citeasca si sa execute , doar proprietarul poate modifica chmod 777 -toti pot face orice (nu cred ca e bine )erele Autorizatii folosind numerele vizualizate de comandul ls -l 0 --- 1 --x 2 -w- 3 -wx 4 r-- 5 r-x 6 rw- 7 rwx In orice caz autorizatiile pot fi folosite in mod numeric sau in mod alfabetic depinde cum sunteti obijnuiti Pt modul alfabetic exempluleste urmatorul : chmod [ugo] [+-=][rwx] ugo = user , group , others un simplu exemplu chmod go+r example.sh example.sh va putea fi citit de catre group si others
-
Monday, February 1, 2010 MOSCOW -- The Web site of Russia's highest-profile independent newspaper has been paralyzed for a week by a sustained attack from hackers, its deputy editor said Monday. Novaya Gazeta's Andrei Lipsky said Monday was the seventh day of a debilitating denial-of-service attack from an unknown source. The paper, which comes out three times a week, relentlessly criticizes the Kremlin, often detailing top-level corruption in embarrassing exposes and investigations. Its reporters have been harassed, attacked and even killed in crimes that police rarely solve. Lipsky refused to say who he suspected was behind the hacker attack. "Evidently it was not amateurs, not hooligans (that) did this. It is a deliberate act. We can only guess who stands behind this," he said. Then he added, ironically, "As you know, we have very many friends." A denial-of-service attack simulates millions of people visiting the Web site at the same time, overloading the server and causing it to crash. Novaya Gazeta routinely records 250,000 visits per week. Lipsky said the peak of the attack, last Thursday, saw 1.5 million visits per second. The site, Novayagazeta.ru, was still down as of late Monday. Lipsky said the newspaper has yet to hear from the Prosecutor General's Office, with which it lodged a complaint last week. The New York-based Committee to Protect Journalists said in a statement Monday that it was "deeply dismayed" by the attacks and called for a thorough investigation. Young reporter Anastasia Baburova was gunned down near the Kremlin last year. Anna Politkovskaya, an award-winning U.S.-born investigative journalist who detailed police abuses in the troubled North Caucasus and wrote books criticizing Prime Minister Vladimir Putin, was shot dead in October 2006. washingtonpost.com
-
De exemplu Realtek RTL8187L e compatibil .Trebuie doar sa decizi ce vrei sa faci pt ca antene sunt de mai multe tipuri: - directional -omnidirectional -multi directional Directional se pot utiliza de exemplu cand vrei sa comunici cu anumite specific area . Pot sa prinda pachete la o distanta foarte lunga pt ca undele sunt pt o singura directie Multi directional sunt la fel ca cele directional dar pot prinde de exemplu in doua directii (bidirectional) sunt putin mai slabe decat antenele directional si omnidirectional Omnidirectional trimite semnale si primeste in toate directiile dar e mai slaba decat directional antenna Daca te intereseaza sa prinzi unde la o distanta mare poti alege directional antenna, daca te intereseaza wardriving pe care il vei face cu masina poti alege o antenna omnidirectional Aici ai un productor din germania Negozio eBay - Wi-Fi-arturek: WiFi SETS, WiFi USB ADAPTERS, Sonstige Iar aici este antenna care am cumparato eu si functioneaza cu backtrack 4 , ubuntu , windows7 am testat MOBILE #ACTI-FLEX# 18dBi USB 2.0 5M WARDRIVING RTL8187L su eBay.it Wireless Networking, WiFi, Networking, Informatica e Palmari ca driver are r8187 Realtek Nu trebuie sa setezi nimic pt driver in backtrack 4 , va trebui doar sa vezi daca nu merge in conflict cu altele , pt asta poti merge sa vezi in /etc/modprobe.d/blacklist Pt windows 7 va descarca singur driverul de pe internet . Oricum pt a face wireless pentest trebuie sa folosesti linux pt ca nu prea vad eu compatibilitate cu windows pt diverse tool
-
27th January 2010 Some memory-bus corruption required On Monday, when we reported that the prolific hacker geohot had successfully penetrated the previously impervious PlayStation 3 gaming console, readers were understandably skeptical. After all, the 20-year-old readily admitted his hack wasn't reliable, and he provided no evidence he was able to do some of the things modders love to do most, such as run arbitrary code or peel open the device's synergistic processing elements to take a peak at its most prized internal elements. On Tuesday afternoon, geohot finally released his exploit On the PlayStation 3: Here's your silver platter so the world could see for itself exactly what the hack does and doesn't accomplish. According to the instructions, it involves compiling and running the kernel module and then pulsing a memory bus on the PS3's motherboard. "Try this multiple times," his instructions state. "I rigged an FPGA button to send the pulse. Sometimes it kernel panics, sometimes it lv1 panics, but sometimes you get the exploit!! If the module exits, you are now exploited." While the idea is sound, this hack is clearly not for the faint of heart. From there, PS3 users get full memory access, including ring 0 access from OtherOS, geohot, whose real name is George Hotz, said here. He's now turning follow-on work to the PS3 community, directing members to report their findings to the psDevWiki. His instructions conclude: "The PS3 is hacked, its your job to figure out something useful to do with it." ® theregister.co.uk
-
Probabil ati folosit John The Ripper , e un tool pentru crak de password. In Linux /Unix password-urile se gasesc in /etc/shadow (criptate cu diverse tipuri de algoritme),iar in cateva distro de default sunt criptate cu un algoritm SHA si (Salt folosit si in alte distro) ,pentru a citi mai mult despre acest algoritm va rog sa folositi google.Aici voi explica cum sa instalati john the ripper si sa aplicati o patch pt acest tool pentru a putea cracka passwor-ul in distro care folosesc SHA ,fara acest patch nu functioneaza sa crackezi passwordul in distro cu algoritm SHA .O distro care foloseste SHA de default e Ubuntu 9.04 , 9.10 ,dar sunt si multe altele. diff -urpN john-1.7.3.1/src/Makefile john-1.7.3.1-gencrypt/src/Makefile --- john-1.7.3.1/src/Makefile 2008-07-18 01:28:55 +0000 +++ john-1.7.3.1-gencrypt/src/Makefile 2009-09-02 11:50:28 +0000 @@ -17,7 +17,7 @@ NULL = /dev/null CPPFLAGS = -E CFLAGS = -c -Wall -O2 -fomit-frame-pointer ASFLAGS = -c -LDFLAGS = -s +LDFLAGS = -s -lcrypt OPT_NORMAL = -funroll-loops OPT_INLINE = -finline-functions @@ -28,6 +28,7 @@ JOHN_OBJS_MINIMAL = \ BF_fmt.o BF_std.o \ AFS_fmt.o \ LM_fmt.o \ + crypt_fmt.o \ batch.o bench.o charset.o common.o compiler.o config.o cracker.o \ crc32.o external.o formats.o getopt.o idle.o inc.o john.o list.o \ loader.o logger.o math.o memory.o misc.o options.o params.o path.o \ diff -urpN john-1.7.3.1/src/crypt_fmt.c john-1.7.3.1-gencrypt/src/crypt_fmt.c --- john-1.7.3.1/src/crypt_fmt.c 1970-01-01 00:00:00 +0000 +++ john-1.7.3.1-gencrypt/src/crypt_fmt.c 2009-09-02 13:01:34 +0000 @@ -0,0 +1,216 @@ +/* public domain proof-of-concept code by Solar Designer */ + +#define _XOPEN_SOURCE /* for crypt(3) */ +#include <string.h> +#include <unistd.h> + +#include "arch.h" +#include "params.h" +#include "formats.h" + +#define FORMAT_LABEL "crypt" +#define FORMAT_NAME "generic crypt(3)" +#define ALGORITHM_NAME "?/" ARCH_BITS_STR + +#define BENCHMARK_COMMENT "" +#define BENCHMARK_LENGTH 0 + +#define PLAINTEXT_LENGTH 72 + +#define BINARY_SIZE 128 +#define SALT_SIZE BINARY_SIZE + +#define MIN_KEYS_PER_CRYPT 1 +#define MAX_KEYS_PER_CRYPT 1 + +static struct fmt_tests tests[] = { + {"CCNf8Sbh3HDfQ", "U*U*U*U*"}, + {"CCX.K.MFy4Ois", "U*U***U"}, + {"CC4rMpbg9AMZ.", "U*U***U*"}, + {"XXxzOu6maQKqQ", "*U*U*U*U"}, + {"SDbsugeBiC58A", ""}, + {NULL} +}; + +static char saved_key[PLAINTEXT_LENGTH + 1]; +static char saved_salt[SALT_SIZE]; +static char *crypt_out; + +static int valid(char *ciphertext) +{ +#if 1 + int l = strlen(ciphertext); + return l >= 13 && l < BINARY_SIZE; +#else +/* Poor load time, but more effective at rejecting bad/unsupported hashes */ + char *r = crypt("", ciphertext); + int l = strlen(r); + return + !strncmp(r, ciphertext, 2) && + l == strlen(ciphertext) && + l >= 13 && l < BINARY_SIZE; +#endif +} + +static void *binary(char *ciphertext) +{ + static char out[BINARY_SIZE]; + strncpy(out, ciphertext, sizeof(out)); /* NUL padding is required */ + return out; +} + +static void *salt(char *ciphertext) +{ + static char out[SALT_SIZE]; + int cut = sizeof(out); + +#if 1 +/* This piece is optional, but matching salts are not detected without it */ + switch (strlen(ciphertext)) { + case 13: + case 24: + cut = 2; + break; + + case 20: + if (ciphertext[0] == '_') cut = 9; + break; + + case 34: + if (!strncmp(ciphertext, "$1$", 3)) { + char *p = strchr(ciphertext + 3, '$'); + if (p) cut = p - ciphertext; + } + break; + + case 59: + if (!strncmp(ciphertext, "$2$", 3)) cut = 28; + break; + + case 60: + if (!strncmp(ciphertext, "$2a$", 4)) cut = 29; + break; + } +#endif + + /* NUL padding is required */ + memset(out, 0, sizeof(out)); + memcpy(out, ciphertext, cut); + + return out; +} + +static int binary_hash_0(void *binary) +{ + return ((unsigned char *)binary)[12] & 0xF; +} + +static int binary_hash_1(void *binary) +{ + return ((unsigned char *)binary)[12] & 0xFF; +} + +static int binary_hash_2(void *binary) +{ + return + (((unsigned char *)binary)[12] & 0xFF) | + ((int)(((unsigned char *)binary)[11] & 0xF) << 8); +} + +static int get_hash_0(int index) +{ + return (unsigned char)crypt_out[12] & 0xF; +} + +static int get_hash_1(int index) +{ + return (unsigned char)crypt_out[12] & 0xFF; +} + +static int get_hash_2(int index) +{ + return + ((unsigned char)crypt_out[12] & 0xFF) | + ((int)((unsigned char)crypt_out[11] & 0xF) << 8); +} + +static int salt_hash(void *salt) +{ + int pos = strlen((char *)salt) - 2; + + return + (((unsigned char *)salt)[pos] & 0xFF) | + ((int)(((unsigned char *)salt)[pos + 1] & 3) << 8); +} + +static void set_salt(void *salt) +{ + strcpy(saved_salt, salt); +} + +static void set_key(char *key, int index) +{ + strcpy(saved_key, key); +} + +static char *get_key(int index) +{ + return saved_key; +} + +static void crypt_all(int count) +{ + crypt_out = crypt(saved_key, saved_salt); +} + +static int cmp_all(void *binary, int count) +{ + return !strcmp((char *)binary, crypt_out); +} + +static int cmp_exact(char *source, int index) +{ + return 1; +} + +struct fmt_main fmt_crypt = { + { + FORMAT_LABEL, + FORMAT_NAME, + ALGORITHM_NAME, + BENCHMARK_COMMENT, + BENCHMARK_LENGTH, + PLAINTEXT_LENGTH, + BINARY_SIZE, + SALT_SIZE, + MIN_KEYS_PER_CRYPT, + MAX_KEYS_PER_CRYPT, + FMT_CASE | FMT_8_BIT, + tests + }, { + fmt_default_init, + valid, + fmt_default_split, + binary, + salt, + { + binary_hash_0, + binary_hash_1, + binary_hash_2 + }, + salt_hash, + set_salt, + set_key, + get_key, + fmt_default_clear_keys, + crypt_all, + { + get_hash_0, + get_hash_1, + get_hash_2 + }, + cmp_all, + cmp_all, + cmp_exact + } +}; diff -urpN john-1.7.3.1/src/john.c john-1.7.3.1-gencrypt/src/john.c --- john-1.7.3.1/src/john.c 2006-05-08 14:49:28 +0000 +++ john-1.7.3.1-gencrypt/src/john.c 2009-09-02 11:50:11 +0000 @@ -38,6 +38,7 @@ extern int CPU_detect(void); extern struct fmt_main fmt_DES, fmt_BSDI, fmt_MD5, fmt_BF; extern struct fmt_main fmt_AFS, fmt_LM; +extern struct fmt_main fmt_crypt; extern int unshadow(int argc, char **argv); extern int unafs(int argc, char **argv); @@ -64,6 +65,7 @@ static void john_register_all(void) john_register_one(&fmt_BF); john_register_one(&fmt_AFS); john_register_one(&fmt_LM); + john_register_one(&fmt_crypt); if (!fmt_list) { fprintf(stderr, "Unknown ciphertext format name requested\n"); Copiati codul intrun file cu numele john.patch Descarcati John The Ripper de aici http://www.openwall.com/john/g/john-1.7.3.4.tar.gz Intrati cu cd in directory unde ati descarcat john Decomprimati archiva john-1.7.3.4.tar.gz tar -zxvf john-1.7.3.4.tar.gz Copiati file john.patch in directory ce ati decomprimat john-1.7.3.4 Cu cd intrati in directory john-1.7.3.4 Scrieti: sudo patch -Np1 -i john.patch Acesta e un exemplu de output: pyth0n3@pyth0n3:~/john-1.7.3.4$ sudo patch -Np1 -i john.patch patching file src/Makefile patching file src/crypt_fmt.c patching file src/john.c Hunk #2 succeeded at 67 (offset 2 lines). Dupa care va duceti in src/ cd src/ si dati comandul sudo make Acesta e un exemplu de output: pyth0n3@pyth0n3:~/john-1.7.3.4/src$ sudo make To build John the Ripper, type: make clean SYSTEM where SYSTEM can be one of the following: linux-x86-64 Linux, x86-64 with SSE2 (best) linux-x86-sse2 Linux, x86 with SSE2 (best if 32-bit) linux-x86-mmx Linux, x86 with MMX linux-x86-any Linux, x86 linux-alpha Linux, Alpha linux-sparc Linux, SPARC 32-bit linux-ppc32-altivec Linux, PowerPC w/AltiVec (best) linux-ppc32 Linux, PowerPC 32-bit linux-ppc64 Linux, PowerPC 64-bit linux-ia64 Linux, IA-64 freebsd-x86-64 FreeBSD, x86-64 with SSE2 (best) freebsd-x86-sse2 FreeBSD, x86 with SSE2 (best if 32-bit) freebsd-x86-mmx FreeBSD, x86 with MMX freebsd-x86-any FreeBSD, x86 freebsd-alpha FreeBSD, Alpha openbsd-x86-64 OpenBSD, x86-64 with SSE2 (best) openbsd-x86-sse2 OpenBSD, x86 with SSE2 (best if 32-bit) openbsd-x86-mmx OpenBSD, x86 with MMX openbsd-x86-any OpenBSD, x86 openbsd-alpha OpenBSD, Alpha openbsd-sparc64 OpenBSD, SPARC 64-bit (best) openbsd-sparc OpenBSD, SPARC 32-bit openbsd-ppc32 OpenBSD, PowerPC 32-bit openbsd-ppc64 OpenBSD, PowerPC 64-bit openbsd-pa-risc OpenBSD, PA-RISC openbsd-vax OpenBSD, VAX netbsd-sparc64 NetBSD, SPARC 64-bit netbsd-vax NetBSD, VAX solaris-sparc64-cc Solaris, SPARC V9 64-bit, cc (best) solaris-sparc64-gcc Solaris, SPARC V9 64-bit, gcc solaris-sparcv9-cc Solaris, SPARC V9 32-bit, cc solaris-sparcv8-cc Solaris, SPARC V8 32-bit, cc solaris-sparc-gcc Solaris, SPARC 32-bit, gcc solaris-x86-64-cc Solaris, x86-64 with SSE2, cc (best) solaris-x86-64-gcc Solaris, x86-64 with SSE2, gcc solaris-x86-sse2-cc Solaris 9 4/04+, x86 with SSE2, cc solaris-x86-sse2-gcc Solaris 9 4/04+, x86 with SSE2, gcc solaris-x86-mmx-cc Solaris, x86 with MMX, cc solaris-x86-mmx-gcc Solaris, x86 with MMX, gcc solaris-x86-any-cc Solaris, x86, cc solaris-x86-any-gcc Solaris, x86, gcc sco-x86-any-gcc SCO, x86, gcc sco-x86-any-cc SCO, x86, cc tru64-alpha Tru64 (Digital UNIX, OSF/1), Alpha aix-ppc32 AIX, PowerPC 32-bit macosx-x86-64 Mac OS X 10.5+, Xcode 3.0+, x86-64 with SSE2 (best) macosx-x86-sse2 Mac OS X, x86 with SSE2 macosx-ppc32-altivec Mac OS X, PowerPC w/AltiVec (best) macosx-ppc32 Mac OS X, PowerPC 32-bit macosx-ppc64 Mac OS X 10.4+, PowerPC 64-bit macosx-universal Mac OS X, Universal Binary (x86 + x86-64 + PPC) hpux-pa-risc-gcc HP-UX, PA-RISC, gcc hpux-pa-risc-cc HP-UX, PA-RISC, ANSI cc irix-mips64-r10k IRIX, MIPS 64-bit (R10K) (best) irix-mips64 IRIX, MIPS 64-bit irix-mips32 IRIX, MIPS 32-bit dos-djgpp-x86-mmx DOS, DJGPP, x86 with MMX dos-djgpp-x86-any DOS, DJGPP, x86 win32-cygwin-x86-sse2 Win32, Cygwin, x86 with SSE2 (best) win32-cygwin-x86-mmx Win32, Cygwin, x86 with MMX win32-cygwin-x86-any Win32, Cygwin, x86 beos-x86-sse2 BeOS, x86 with SSE2 (best) beos-x86-mmx BeOS, x86 with MMX beos-x86-any BeOS, x86 generic Any other Unix-like system with gcc Aici va trebui sa alegeti sistemul operativ pe care il aveti , daca folositi linux i86 32 bit ceea ce multi il folosesc alegeti linux-x86-sse2 Dati comandul sudo make linux-x86-sse2 Pentru a vedea daca functioneaza mergeti in directory run care se afla in john-1.7.3.4si dati comandul sudo ./john /etc/shadow L'output exemplu: pyth0n3@pyth0n3:~/john-1.7.3.4/run$ sudo ./john /etc/shadow Loaded 1 password hash (generic crypt(3) [?/32]) in cazul in care aveti mai multe password vor aparea mai multe . Daca utilizati john the ripper fara acest patch nu veti putea cracka password criptate cu algoritmul SHA SHA1 SHA512 Cateva distro Linux folosesc acest algoritm combinat cu (Salt ) Salt (cryptography) - Wikipedia, the free encyclopedia Printre care Ubuntu 9.04 9.10 Pentru documentation john the ripper John the Ripper documentation
-
Must download all files, put them in one directory and extract the first file with 7zip ,put the pass and then wait, it will extract all the files
-
Jan. 25, 2010 Even though passwords are critical to keeping prying eyes out of our computers, many people pick passwords that are very basic and hence, way too easy to crack, according to new data. A recent analysis by computer security company Imperva showed one-out-of-five people choosing the simplest of passwords, such as 123456 or abc123 to protect their computers. But, on "The Early Show" Monday, Consumer Correspondent Susan Koeppen offered easy tips on selecting better passwords. USE CATCHPHRASES Use first letters of catch phrases. For example: WALIAYS -- "We all live in a yellow submarine" USE NUMB3RS @ND $YMBOLS Strengthen your password by using numbers, uppercase letters and symbols, and uncommon words. For instance: Applesauce could be @pple$@uce, Use the @ for you're A's, the $ symbol for you S's, and exclamation points for your I's. DO NOT AUTO-SAVE Log in manually every time. Many Web sites offer the option of saving your password so you can automatically log-in the next time you visit. As tempting as that is, you should take the extra 10 seconds to log in manually. There's no telling who might access your computer while you're away. Do you really want your e-mail exposed to anyone who uses your computer? USE PASSWORDMETER.COM Test it on PasswordMeter.com. It's fun to play around with, but it's a very technical Web site that measures how good your password is, and deducts or adds to your total score based on how many capital letters, consecutive letters, numbers, etc. you use. DON'T CHANGE THEM BECAUSE AN E-MAILER TELLS YOU TO This is spam or a hacker. DISGUISE ANSWERS TO SECURITY QUESTIONS Use punctuation, etc. Anyone who knows anything about you can probably figure out your mom's maiden name or what high school you went to. CHANGE PASSWORDS OFTEN It's very important that you do this every couple of months. Also, always keep more than one password going at the same time. You don't need 20 different ones, but at least two would be advisable. DON'T TELL OTHERS HOW YOU CHOOSE YOUR PASSWORDS For instance, don't mention that all your passwords are different childhood nicknames with your birthday attached! As soon as this story came up, two of Koeppen's producers were lightheartedly talking about it, and told each other their passwords. One uses the college she went to, and the other uses different kinds of hotdog toppings. Don't do that!! Don't get into the details! cbsnews.com
-
Deoarece nu te lasa sa descarci tot timpul fiind un free user ,din pacate asta am gasit pe internet si nu stiu cat vor mai fii valabile aceste link-uri asa ca cine are posibilitatea sa le descarce si sa le puna in alta parte sa o faca ca sa poata descarca si altii . Modificati numele si criptati arhiva cand incarcati asa nu o sa va puna jos link-ul decat dupa 30 de zile daca sunteti free user, de obicei asa functioneaza. Uite aici http://www.edu-books.org/index.php/2009/10/cbt-nuggets-security/ dar nu stiu daca sunt toate alive
-
Here is the source : 1000 Bestever Great Hacking tutorials 2010 » Most Active Hotfile Rapidshare & Megaupload Downloads by PD Nu pot sa garantez cat de autentica este imaginea dar pe google image am gasit si 2008 scris pe imagine , nu ramane de vazut decat daca exista o copie din 2008 a acestor tutoriale care poate fi pusa in confront cu astea. Ramane doar de vazut ...
-
Cast: Kevin Mitnick, Captain Crunch, Steve Wozniak and other hacker / phreak Language: English Download: http://www.filefactory.com/file/aha58gb/n/Discovery_Channel_-_The_Secret_History_Of_Hacking_part1_rar http://www.filefactory.com/file/aha58f5/n/Discovery_Channel_-_The_Secret_History_Of_Hacking_part2_rar http://www.filefactory.com/file/aha58e4/n/Discovery_Channel_-_The_Secret_History_Of_Hacking_part3_rar Password default booktraining.org
-
Asta am gasit pe un site , o fi asa ...
-
Download: http://hotfile.com/dl/24871182/8780dfd/AVG_Internet_Security_9.0.730.1834_Keygen-EMBRACE.rar.html pass: booktraining.org Tested on windows 7 , works !
-
Download Timeframes Dual Boot After The Fact Dvd Copying-ripping Definitions DVD Regions Information Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies Easily Disconnect-reconnect From Broadband Easily Find Serial Numbers On Google, easy to do and works like a charm Ebay Hack*****tip General Keyboard Shortcuts Get In Windows 2000 As Administrator Get the Most Out of Your DVD Recorder Get The Music You Want To Hear Get unlimited bandwidth from your host for free Getting A 1gb China Account Getting Counter-strike Source To Work getting movies, mp3,games using google Getting older programs to run on Windows XP Getting started with Linux for nOObs! Go to Windows updates anonymously Google ***** Search Google secrets Google Tips & Tricks, (utilizing search engine) Graffiti On Walls 4 Adobe Photoshop Cs 8.0 Guide For Getting Free Stuff Guide to IIS Exploitation Guide to Slipstreaming Service Pack 2 Hard drive Gone Bad Hardware Firewall How To Add An Option To Print, the Contents of a Folder! How To Add Your Own Windows Tips How to Back Up the Registry How To Backup Ps2 Games HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING How To Block Websties Without Software, block websites How To Boot Xp Faster (updated) How to build a black box how to burn quicker in windows xp How to Bypass BIOS Passwords How To Bypass Web Filters, tutorial HOW TO CAPTURE STREAMING MEDIA How To Change A Cmos Battery How to change the serial number used in Windows XP, Valid for XP Corporate How To Change Thumbnail Size And Quality How to clear Bios info 2 How to clear Bios info How To Convert File System, fat - fat32 to ntfs How To Copy A Dvd Which Will Play On A X Box How to copy songs from your iPod to your PC How To Customise Your start Button How To Delete Those Persistent Nasty Files How To Directly Go To Inbox, Write Msg, w , no need for How to find MP3's real quickly How To Find Serial Numbers On Google How to fix corrupted files in XP How to fix Windows Installer problem How To Get A Free I-pod Or Flat Screen Tv, check it out HOW TO GET ANY WINDOWS PASSWORD How to Get someones ISP password, Get free internet How To Get Top Ranking, Search Engines How To Hack Windows Xp Admin Passwords How to hack-change your Windows XP Boot Screen how To Hide Yourself From Network Users, and give access to only specific users! How To Make An Animted Logo How To Make Free Phone Calls How to make key generators How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style! How To Make XP Go Faster How To make your own Radio Station 2 How To Make Your Own Radio Station How to Remove DRM Protection for Video Files How To Remove Ms Java Vm And Install Sun Java How To Remove Signin Details Of Msn Passport How To Remove The Default Admin$ Shares How to remove the Links folder in IE Favorites How to Remove WinXP Splash and See Operations How To Rename Extensions With Ease, with a Renamer.bat file! How to Rename File Extensions How To Rename Multiple Files In Winxp How To Restrict Login Hours Allowed How to safeguard your files when computer crashes How to save Windows xp updates how to search google forlinks How To See Hidden Files, Using Dos How To Set search For All Files In Winxp How to set up a http server running from you computer How To Set Up A Proxy In get, As Requested How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin How To Set Up Direct Connect HOW TO SET UP FTP SERVER How To Set Up Proxies In Your Browser How To Set Zone Alarm Settings!, Fix for ZA ports How To Setup Your Own Dns (Domain Name Server) How To Speed Up A Slow Computer How To Speed Up Http Requests On Internet Explorer, as above How To Stop Spam How to swear in all languages How To Unload Cached Dll Files To Free Memory How to Use and How to Chain Multiple Proxies! How To Use File Compression In Windows Xp How To Use Google To Download Mp3's, and applications..... How To Use Newsgroups How To Use You Gmail With Msn Messenger How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free HOWTO Change Windows XP Home to Windows XP Pro Important Faqs For Sp2 Improve Doom 3's Performances!!, simple but efficient trick for every1 Improve your dialup modem preformance Increase XP Folder Settings Insert Your Serial For Office 2k, auto install office Install A New Hard-disk Install Xp From Dos Installing Apache on Windows Installing Gentoo Linux, Amazing step by step tutorial Installing IIS On Windows Xp Pro Installing Slackware Linux Instructions For Removal Of Advertising In Msn Messenger Ip Address Structure, Expilinatin OF IP Address {A short way} Irc How To Downlaod From, How to downlaod from IRC Irc Servers On nix, For people who want to start own IRC net Keep Files Private Keep Folders Hidden Keyboard Shortcuts Result in Excel 2000 - Movement Keyboard Shortcuts, Microsoft Word Keyboard Shortcuts, must read Kill Microsoft Instant Messenger Lamination Tips, Its a Fast TUT...... Leet Way To Get Your Ip In Windows Xp Linking Your Xbox To Your Computer Linux Howto's List Of Sites Not To Go To Little help for anonymous mailer Lots Of Windows Xp Tips, Take A Look! Lyrics With Google Make A Autorun File For Ur Cd Make A Batch File To Clean UR PC!!, All In One!! Make A Roughly 16 Hour Video Dvd Make Acrobat Reader 6 load faster.txt 0.42 kB Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation Make Mp3 Files Smaller Without Losing Quality Make Your Own Ringtones For Phone, also logos, wallpaper, etc Make Your Pc Faster, Guaranteed MakeXPgoFaster making a .cue file, in notepad Making A .txt Executable Server Making Bootable Floppy Disk to Boot into Windows Making Cd Version Of Doom3 Into Dvd Version Making Web Page Fonts Consistent and Uniform Manage Saved Ie Passwords Mastering The Windows XP Registry Maximize Dial-up Modem Settings Microsoft's Really Hidden Files, Reveled Hidden files mIRC Not Just Another Chat Client, Download Anything You Want Almost mIRCcommands Misc Linux Tips & Tricks Missing Administrator Account Secret Codes Modify .exe Files And ***** A Program More Hacking/A beginners guide to Hacking UNIX More Hacking/A *****ing Tutorial/C101-90.000 More Hacking/A *****ing Tutorial/C101-90.001 More Hacking/A *****ing Tutorial/C101-90.002 More Hacking/A *****ing Tutorial/C101-90.003 More Hacking/A *****ing Tutorial/C101-90.004 More Hacking/A *****ing Tutorial/ED!SON.NFO More Hacking/A Guide to Internet Security- Becoming an Ueber*****er More Hacking/A Guide to the Easiest Hacking there is More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands More Hacking/A Small Guide to Hacking More Hacking/A UNIX Hacking Tutorial More Hacking/Almost Everything You Ever Wanted To Know About Security More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic More Hacking/An Introduction to Denial of Service More Hacking/An Introduction to the Computer Underground More Hacking/Basic Networking More Hacking/BBS Crashing Techniques More Hacking/BRUTE- A brute approach to hacking Unix passwords More Hacking/Closing the Net More Hacking/Compression and *****s for Dummies More Hacking/Computer Bulliten Boards and the Law More Hacking/Computer Chrime - Current Practices, Problems and Proposed So More Hacking/Computer eMail and Privacy More Hacking/Computer Hackers News Articles More Hacking/Computer Rights vs First and Forth Amentment Right More Hacking/Computer Security More Hacking/Computer Security_2 More Hacking/Computer Viruii More Hacking/Computerized Governmental Database Systems Containing Persona More Hacking/COPS and Robbers-Unix System Security More Hacking/Copyright Guides for Photographers More Hacking/Crash Course in X Windows Security More Hacking/Crime and Puzzlement More Hacking/Cultural Formations in Text-Based Virtual Realties More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion More Hacking/Dark Angel's Phunky Virus Writing Guide More Hacking/Defamation Liability of Computerized Bulliten Board Operators More Hacking/Dept of Treasury Letter More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations More Hacking/Electropolos - Communication and Comunity on IRC More Hacking/Ethload User's Guide More Hacking/Formulating A Company Policy on Access to and Use and Disclos More Hacking/Free Speech in Cyberspace More Hacking/Gender Issues in Communications More Hacking/Government Computer Security Techniques More Hacking/HACKDICT More Hacking/Hacker Test More Hacking/Hackers A-Z More Hacking/Hackers Who Break into Computer Systems More Hacking/Hacking Bank Of America's Home Banking System More Hacking/Hacking Compuserve Infomation Service More Hacking/Hacking Faq More Hacking/Hacking GTE Telemail More Hacking/Hacking IRC - The Definitive Guide More Hacking/Hacking PC-Pursuit Codes More Hacking/Hacking Techniques More Hacking/Hacking TRW More Hacking/Hacking TYMNET More Hacking/Hacking Unix System V's More Hacking/Hacking Wal-Mart Computers More Hacking/Hacking Webpages More Hacking/How the Traditional Media Clasifications Fail to Protect More Hacking/How to crash AOL More Hacking/How to dial out of a UNIX System More Hacking/How to find Security Holes More Hacking/How to get a Shell in 24 hours More Hacking/How to Hack UNIX System V More Hacking/How to login to a C.B.I. System More Hacking/How to send ICQ Bombs More Hacking/Information of Hacking AngelFire Websites More Hacking/Introduction to Denail of Service More Hacking/IP addressing, and gaining IP's More Hacking/IP Addressing More Hacking/ISSN Numbers- An Introduction More Hacking/Junk Mail- How Did They All Get My Address More Hacking/LENROS~1 More Hacking/LENROS~2 More Hacking/MEMETICS More Hacking/MINDVOX More Hacking/MORRIS~1 More Hacking/NEIDOR~1 More Hacking/NFS Tracing More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation More Hacking/NY_2'S Guide to Obtaining An IP Address More Hacking/Organizational Analysis in Computer Science More Hacking/PGP Startup Guide More Hacking/Presumed Guilty More Hacking/Raising Hell with Unix More Hacking/Remarks of the President and Vice President to Silicon Valley More Hacking/RIGGSB~1 More Hacking/RIGGS_~1 More Hacking/RIGHTS~1 More Hacking/RIVERA More Hacking/Security holes More Hacking/Seisure Warrent Documents for Ripco BBS More Hacking/Site Security Handbook More Hacking/SJ-DEC~1 More Hacking/SJ-RESP More Hacking/SMTP-Simple Mail Transfer Protocol More Hacking/Summary of FBI Computer Systems More Hacking/SUNDEVIL More Hacking/SUPREM~1 More Hacking/TCP packet fragment attacks against firewalls and filters More Hacking/Telenet-The Secret Exposed More Hacking/The Basics of Hacking- Introduction More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpretation More Hacking/The Constitution in Cyberspace More Hacking/The *****ing Manual More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans More Hacking/The Greatest Hacker of all time More Hacking/The Hacker's League More Hacking/The Inner Circle Book's Hacking Techniques More Hacking/The Lamahs-Guide to Pirating Software on the Internet More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding More Hacking/The National Information Infrastructure-Agenda for Action More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking More Hacking/The Newbies-User's Guide to Hacking More Hacking/The Pre-History of Cyberspace More Hacking/The Price of Copyright Violation More Hacking/The REAL way to hack RemoteAccess More Hacking/The Secret Service, UUCP,and The Legion of Doom More Hacking/the UNIX operating system (Berkley 4.2) More Hacking/Theft of Computer Software-A National Security Threat More Hacking/Thoughts on the National Research and Education Network More Hacking/Tips on Starting Your Own BBS.1 More Hacking/undocumented DOS commands More Hacking/UNIX Computer Security Checklist More Hacking/UNIX Use and Security - By the Prophet More Hacking/UNIX Use and Security From The Ground Up More Hacking/UNIX- A Hacking Tutorial.SIR More Hacking/Viruii FAQ More Hacking/Virus-Trojan FAQ More Hacking/What Files are Legal for Distribution on a BBS More Hacking/What To Look For In A Code Hacking Program More Hacking/What To Look For In A Code Hacking Program More Hacking/What You Should Know About Computer Viruses More Xp Tips and tricks make your computer more faster Moving and Removing the Start Button Msn Messenger & Gmail My Bookmarks, long list of tutorials Myth about WPA ( How it is done ), Windows Product Activation Technique Your Own Home Server - Introduction Download: http://hotfile.com/dl/25078231/f0036d0/1000_Hacking_Tutorials_01.rar.html Pass: irfree.com
-
CD1 http://rapidshare.com/files/174658769/booktraining.net_Cbt_Nuggets_Security__CD1.part1.rar http://rapidshare.com/files/174658754/booktraining.net_Cbt_Nuggets_Security__CD1.part2.rar http://rapidshare.com/files/174658696/booktraining.net_Cbt_Nuggets_Security__CD1.part3.rar http://rapidshare.com/files/174658112/booktraining.net_Cbt_Nuggets_Security__CD1.part4.rar CD2 http://rapidshare.com/files/174658859/booktraining.net_Cbt_Nuggets_Security__CD2.part1.rar http://rapidshare.com/files/174658467/booktraining.net_Cbt_Nuggets_Security__CD2.part2.rar http://rapidshare.com/files/174658335/booktraining.net_Cbt_Nuggets_Security__CD2.part3.rar http://rapidshare.com/files/174658112/booktraining.net_Cbt_Nuggets_Security__CD1.part4.rar Password default: netbks.com
-
22nd January 2010 Privacy-conscious users of the Tor anonymiser network have been urged to upgrade their software, following the discovery of a security breach. Two of seven directory authorities and a metrics data server were compromised in a hack discovered earlier this month, Tor developer Roger Dingledine explains. The three servers were taken offline and refurbished following the hack. Fresh identity keys for the two directory authorities hit by the hack were created during the refurbishment process. Users should therefore update to either Tor version 0.2.1.22 or 0.2.2.7-alpha, so that they can use the refurbished servers as conduits for sensitive traffic. Project volunteers have taken steps to harden systems and prevent a repetition of the hack, the significance of which has been downplayed. Attackers reportedly used Tor's systems solely as a launchpad for other attacks, without realising that the same servers also hosted Tor code depositories. These were left unaffected by the breach. "It appears the attackers didn't realize what they broke into - just that they had found some servers with lots of bandwidth," Dingledine explains. "The attackers set up some ssh keys and proceeded to use the three servers for launching other attacks." Neither was the attack severe enough for the unidentified attackers to match up users to their destinations. Nor did it affect the Tor source code. More details on the attack can be found in an FAQ posted by Dingledine Tor Project infrastructure updates in response to security breach Posted in Enterprise Security
-
Aici voi descrie cu sa instalati nessus 4.2 in backtrack 4 final . In primul rand trebuie sa vedeti daca aveti instalate urmatoarele pachete ,in acest caz veti folosi comandul apt pt a controla apt-get install libqt4-core libqt4-gui libqtcore4 libqt4-network libqt4-script libqt4-xml libqt4-dbus libqt4-test libqtgui4 libqt4-svg libqt4-opengl libqt4-designer libqt4-assistant Dupa cere descarcati ultima versiune de nessus de aici http://downloads.nessus.org/nessus3dl.php?file=Nessus-4.2.0-ubuntu810_i386.deb&licence_accept=yes&t=166fd3aa3fa737ed39be146edeb4f0e3 Pentru al instala efectuati urmatorul comand : sudo dpkg -i Nessus-4.2.0-ubuntu810_i386.deb Acum va trebui sa-i puneti un user : [ sudo /opt/nessus/sbin/nessus-adduser O data instalat va trebui sa instalati si plugin-urile , aici voi descrie cum sa faceti acest lucru in mod manual . Mergeti la acest link pt a avea registration key Tenable Network Security Dupa ce va inscrieti veti primi un mail cu registration key Va trebui sa dati acest comand in terminal sudo /opt/nessus/bin/nessus-fetch --challenge Acest comand va produce un cod care se chiama challenge ,ceva asemanator cu: Challenge code: 98ba159380358e2cac1ab4951004332564f39d4e Dupa care mergeti la acest url https://plugins.nessus.org/offline.php In care va trebui sa puneti ambele coduri ,primul challenge code , iar al doilea registration key ,dupa care va va aparea un link de unde puteti descarca plugin-urile. Le salvati oriunde momentan dupa care va trebui sa le copiati in /opt/nessus/etc/nessus/ Dupa care dati comandul sudo /opt/nessus/sbin/nessus-update-plugins all-2.0.tar.gz Pt a da start serverului dati comandul sudo /opt/nessus/sbin/nessus-services -D Pt a opri serverul dati comandul sudo /etc/init.d/nessusd stop Dupa ce ati dat start la server mergeti in browser la acest url https://127.0.0.1:8834 In caz ca nu va lasa sa intrati ,daca folositi firefox va trebui doar sa acceptati certificatul dupa care veti intra cu user si password pe care le-ati ales pt a face login pt nessus . Pt a face updating pt plugins va trebui sa dati comandul sudo /opt/nessus/sbin/nessus-update-plugins Sau veti putea descarca manual de fiecare data toate pluginurile cum am descris in mai sus
-
Probabil dupa ce ati instalat backtack 4 final ati vazut ca nu puteti intra pe Yahoo messenger cu Kopete , clientul predefinit , din cate am inteles are un bug care nu-i permite sa se conecteze la serverul de messenger pt Yahoo .Chiar daca veti descarca orice alt clent nu va functiona cu yahoo ,va trebui sa modificati cateva lucruri.Aici voi descrie cum sa descarcati si sa configurati clientul Pidgin pt a putea folosi yahoo messenger deoarece nu va merge de default (pt celelalte tipuri de messenger functioneaza). Primul lucru care trebuie sa il faceti e sa intrati in System > Software Sources , mergeti la rubrica Third-Party Software unde dati +Add si adaugati : deb http://ppa.launchpad.net/pidgin-developers/ppa/ubuntu intrepid main Dupa care descarcati de aici http://news.softpedia.com/images/extra/LINUX/small/pidgin_key un key file pgp public si il salvati in pc . Mergeti in System > Software Sources la sectiunea Authentication si dati +Import Key File ,aici va trebui sa puneti file pgp pe care lati descarcat in computer . Dupa care dati un simplu apt-get update in cazul in care sunteti root sau sudo apt-get update daca sunteti user normal . Acum puteti sa instalati pidgin .Mergeti in System > Synaptic Package Manager iar in sectiunea Quick Search scrieti Pidgin si punetti x in casuta corespunzatoare a pachetului dupa care dati Aplly. Se va instala clientul Pidgin ,dupa care dati apt-get update in terminal .
-
Probabil dupa ce ati instalat backtack 4 final ati vazut ca nu puteti intra pe Yahoo messenger cu Kopete , clientul predefinit , din cate am inteles are un bug care nu-i permite sa se conecteze la serverul de messenger pt Yahoo .Chiar daca veti descarca orice alt clent nu va functiona cu yahoo ,va trebui sa modificati cateva lucruri.Aici voi descrie cum sa descarcati si sa configurati clientul Pidgin pt a putea folosi yahoo messenger deoarece nu va merge de default (pt celelalte tipuri de messenger functioneaza). Primul lucru care trebuie sa il faceti e sa intrati in System > Software Sources , mergeti la rubrica Third-Party Software unde dati +Add si adaugati : deb http://ppa.launchpad.net/pidgin-developers/ppa/ubuntu intrepid main Dupa care descarcati de aici http://news.softpedia.com/images/extra/LINUX/small/pidgin_key un key file pgp public si il salvati in pc . Mergeti in System > Software Sources la sectiunea Authentication si dati +Import Key File ,aici va trebui sa puneti file pgp pe care lati descarcat in computer . Dupa care dati un simplu apt-get update in cazul in care sunteti root sau sudo apt-get update daca sunteti user normal . Acum puteti sa instalati pidgin .Mergeti in System > Synaptic Package Manager iar in sectiunea Quick Search scrieti Pidgin si punetti x in casuta corespunzatoare a pachetului dupa care dati Aplly. Se va instala clientul Pidgin ,dupa care dati apt-get update in terminal .