Jump to content

Usr6

Active Members
  • Posts

    1337
  • Joined

  • Last visited

  • Days Won

    89

Everything posted by Usr6

  1. #!/usr/bin/env python import random N = 1147 e = 7 code = [780, 629, 1035, 82, 1003, 791, 277, 548, 562] prime = [2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137, 139, 149, 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227, 229, 233, 239, 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313, 317, 331, 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419, 421, 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509, 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601 ] while True : p = random.choice(prime) q = random.choice(prime) if p * q == 1147: print p, q break p = 31 q = 37 m = (p-1)*(q-1) print m m = 1080 for d in range(1, 10000): if (d*e) % m == 1: print d break d = 463 for i in code: dec = i**d %N print chr(dec)
  2. Usr6

    Udemy

    Intensive Ethical Hacking Series Section 1: Getting Started with the Course Section 2: Setting up the Hacking Lab Section 3: Our Favorite Networking Section 4: Cryptography & Network Security Section 5: Intermidary Nodes for Hacking Section 6: The Metasploit Module Section 7: Vulnerability, Exploit , Payload Section 8: Hail The Dangerous Viruses Section 9: Windows Hacking Section 10: Password Attacks Section 11: Firewall Section 12: Forensics Intensive Ethical Hacking Series - Udemy
  3. @Nytro torrent http://bitspyder.net/details.php?id=73641
  4. white paper - presentation - source https://www.blackhat.com/us-15/briefings.html
  5. Usr6

    Udemy

    Python 100% Hands-On What am I going to get from this course? Over 67 lectures and 7.5 hours of content! Master all the Python key concepts starting from scratch. Apply for a Junior Python Developer job. Work with the Python interpreter and Python scripts. Work with Python strings. Work with Python lists. Work with Python sets. Work with Python tuples. Work with Python dictionaries. Work with Python control flow structures (if, for, while, break, continue, pass, exceptions, try-except blocks) Work with Python functions, namespaces and modules. Work with Python file operations. Work with Python regular expressions. Work with Python classes. Work with advanced Python tools (comprehensions, lambda functions, threading basics, iterators, generators). Work with Python on a MySQL database. Instructed by Mihai Catalin Teodosiu Python 100% Hands-On - Udemy
  6. Nu trimiteti cv-uri pe pm/ email de yahoo/gmail etc
  7. Usr6

    Flare-on

    Download challenge-uri: flare-on.com/files/2015_FLAREOn_Challenges.zip ------ @giv pana la ce nivel ai ajuns?
  8. Book Description: Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker’s Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus’ line of defense. You’ll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software-all of which can help you strengthen your network and protect your data. While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. * Discover how to reverse engineer your antivirus software * Explore methods of antivirus software evasion * Consider different ways to attack and exploit antivirus software * Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software The Antivirus Hacker’s Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications. Download: http://file.allitebooks.com/20150910/The%20Antivirus%20Hacker-s%20Handbook.pdf Sursa: The Antivirus Hacker's Handbook - pdf - Free IT eBooks Download
  9. Usr6

    Flare-on

    Au fost postate rezolvarile chellenge-urilor: https://www.fireeye.com/blog/threat-research/2015/09/flare-on_challenges.html printre cei care au terminat challenge-ul, se afla si o persoana din Romania Felicitari celui/celei care a terminat challenge-ul.
  10. OverTheWire: Wargames via: @theeternalwanderer
  11. google: entropy of encrypted data
  12. (Reuters) - Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as malicious, according to two former employees. They said the secret campaign targeted Microsoft Corp (MSFT.O), AVG Technologies NV (AVG.N), Avast Software and other rivals, fooling some of them into deleting or disabling important files on their customers' PCs. Some of the attacks were ordered by Kaspersky Lab's co-founder, Eugene Kaspersky, in part to retaliate against smaller rivals that he felt were aping his software instead of developing their own technology, they said. "Eugene considered this stealing," said one of the former employees. Both sources requested anonymity and said they were among a small group of people who knew about the operation. Kaspersky Lab strongly denied that it had tricked competitors into categorizing clean files as malicious, so-called false positives. "Our company has never conducted any secret campaign to trick competitors into generating false positives to damage their market standing," Kaspersky said in a statement to Reuters. "Such actions are unethical, dishonest and their legality is at least questionable." Executives at Microsoft, AVG and Avast previously told Reuters that unknown parties had tried to induce false positives in recent years. When contacted this week, they had no comment on the allegation that Kaspersky Lab had targeted them. The Russian company is one of the most popular antivirus software makers, boasting 400 million users and 270,000 corporate clients. Kaspersky has won wide respect in the industry for its research on sophisticated Western spying programs and the Stuxnet computer worm that sabotaged Iran's nuclear program in 2009 and 2010. The two former Kaspersky Lab employees said the desire to build market share also factored into Kaspersky's selection of competitors to sabotage. "It was decided to provide some problems" for rivals, said one ex-employee. "It is not only damaging for a competing company but also damaging for users' computers." The former Kaspersky employees said company researchers were assigned to work for weeks or months at a time on the sabotage projects. Their chief task was to reverse-engineer competitors' virus detection software to figure out how to fool them into flagging good files as malicious, the former employees said. The opportunity for such trickery has increased over the past decade and a half as the soaring number of harmful computer programs have prompted security companies to share more information with each other, industry experts said. They licensed each other's virus-detection engines, swapped samples of malware, and sent suspicious files to third-party aggregators such as Google Inc's (GOOGL.O) VirusTotal. By sharing all this data, security companies could more quickly identify new viruses and other malicious content. But the collaboration also allowed companies to borrow heavily from each other's work instead of finding bad files on their own. Kaspersky Lab in 2010 complained openly about copycats, calling for greater respect for intellectual property as data-sharing became more prevalent. In an effort to prove that other companies were ripping off its work, Kaspersky said it ran an experiment: It created 10 harmless files and told VirusTotal that it regarded them as malicious. VirusTotal aggregates information on suspicious files and shares them with security companies. Within a week and a half, all 10 files were declared dangerous by as many as 14 security companies that had blindly followed Kaspersky's lead, according to a media presentation given by senior Kaspersky analyst Magnus Kalkuhl in Moscow in January 2010. When Kaspersky's complaints did not lead to significant change, the former employees said, it stepped up the sabotage. INJECTING BAD CODE In one technique, Kaspersky's engineers would take an important piece of software commonly found in PCs and inject bad code into it so that the file looked like it was infected, the ex-employees said. They would send the doctored file anonymously to VirusTotal. Then, when competitors ran this doctored file through their virus detection engines, the file would be flagged as potentially malicious. If the doctored file looked close enough to the original, Kaspersky could fool rival companies into thinking the clean file was problematic as well. VirusTotal had no immediate comment. In its response to written questions from Reuters, Kaspersky denied using this technique. It said it too had been a victim of such an attack in November 2012, when an "unknown third party" manipulated Kaspersky into misclassifying files from Tencent (0700.HK), Mail.ru (MAILRq.L) and the Steam gaming platform as malicious. The extent of the damage from such attacks is hard to assess because antivirus software can throw off false positives for a variety of reasons, and many incidents get caught after a small number of customers are affected, security executives said. The former Kaspersky employees said Microsoft was one of the rivals that were targeted because many smaller security companies followed the Redmond, Washington-based company's lead in detecting malicious files. They declined to give a detailed account of any specific attack. Microsoft's antimalware research director, Dennis Batchelder, told Reuters in April that he recalled a time in March 2013 when many customers called to complain that a printer code had been deemed dangerous by its antivirus program and placed in "quarantine." Batchelder said it took him roughly six hours to figure out that the printer code looked a lot like another piece of code that Microsoft had previously ruled malicious. Someone had taken a legitimate file and jammed a wad of bad code into it, he said. Because the normal printer code looked so much like the altered code, the antivirus program quarantined that as well. Over the next few months, Batchelder's team found hundreds, and eventually thousands, of good files that had been altered to look bad. Batchelder told his staff not to try to identify the culprit. "It doesn't really matter who it was," he said. "All of us in the industry had a vulnerability, in that our systems were based on trust. We wanted to get that fixed." In a subsequent interview on Wednesday, Batchelder declined to comment on any role Kaspersky may have played in the 2013 printer code problems or any other attacks. Reuters has no evidence linking Kaspersky to the printer code attack. As word spread in the security industry about the induced false positives found by Microsoft, other companies said they tried to figure out what went wrong in their own systems and what to do differently, but no one identified those responsible. At Avast, a largely free antivirus software maker with the biggest market share in many European and South American countries, employees found a large range of doctored network drivers, duplicated for different language versions. Avast Chief Operating Officer Ondrej Vlcek told Reuters in April that he suspected the offenders were well-equipped malware writers and "wanted to have some fun" at the industry's expense. He did not respond to a request on Thursday for comment on the allegation that Kaspersky had induced false positives. WAVES OF ATTACKS The former employees said Kaspersky Lab manipulated false positives off and on for more than 10 years, with the peak period between 2009 and 2013. It is not clear if the attacks have ended, though security executives say false positives are much less of a problem today. That is in part because security companies have grown less likely to accept a competitor's determinations as gospel and are spending more to weed out false positives. AVG's former chief technology officer, Yuval Ben-Itzhak, said the company suffered from troves of bad samples that stopped after it set up special filters to screen for them and improved its detection engine. "There were several waves of these samples, usually four times per year. This crippled-sample generation lasted for about four years. The last wave was received at the beginning of the year 2013," he told Reuters in April. AVG's chief strategy officer, Todd Simpson, declined to comment on Wednesday. Kaspersky said it had also improved its algorithms to defend against false virus samples. It added that it believed no antivirus company conducted the attacks "as it would have a very bad effect on the whole industry." "Although the security market is very competitive, trusted threat-data exchange is definitely part of the overall security of the entire IT ecosystem, and this exchange must not be compromised or corrupted," Kaspersky said. Sursa: Exclusive: Russian antivirus firm faked malware to harm rivals - Ex-employees | Reuters
  13. Usr6

    Udemy

    Wireshark Tutorial - Get Wireshark Certification Learn Wireshark, the World's Most Popular Network Analyzer! Become Wireshark certified for great paying Wireshark jobs! Lectures 20 Video 4 Hours Skill level beginner level Languages English https://www.udemy.com/wireshark-tutorial/
  14. Usr6

    Flare-on

    The FireEye Labs Advanced Reverse Engineering (FLARE) team is an elite technical group of malware analysts, researchers, and hackers. We are looking to hire smart individuals interested in reverse engineering. We have created this series of binary challenges to test your skills. We encourage anyone to participate and practice their skills while having fun! It’s simple: Analyze the sample, find the key. Each key is an email address. Send an email to the address for the next puzzle. Complete all the puzzles and win a prize. To start The FLARE On Challenge 2015 download the first binary here. The password for each challenge that is a .zip archive is "flare". Site: http://flare-on.com/
  15. Usr6

    Udemy

    Become an Algorithm Master &Create SuperFast Smooth Software Learn How to be a World Class Programmer by Solving Algorithmic Mathematical Problems Most Efficiently in Your Software https://www.anonymiz.com/?https://www.udemy.com/the-art-craft-of-mathematical-problem-solving/?couponCode=free0000000
  16. Hackeri au preluat online, de la distan?a de 15 kilometri, controlul asupra unui vehicul de teren, în Statele Unite, r?sturnând ma?ina într-un ?an?, în cadrul unui test menit s? demonstreze vulnerabilitatea actualelor tehnologii auto, informeaz? cotidianul The Telegraph. Hackerii au preluat online controlul asupra unui vehicul marca Jeep Cherokee în timp ce st?teau comod pe o canapea, la distan?a de 15 kilometri de ma?in?. Au oprit motorul ma?inii, au activat frâna de serviciu ?i au condus ma?ina spre marginea ?oselei pe care circula. ?oferul nu a mai putut controla vehiculul, care s-a r?sturnat în ?an?ul de la marginea drumului. Hackerii au explicat c? au folosit un computer ?i un telefon mobil pentru a accesa sistemele vehiculului de teren prin intermediul conexiunii de Internet. Potrivit exper?ilor, aproximativ 470.000 de ma?ini fabricate de compania Fiat Chrysler risc? s? fie atacate de hackeri prin modalit??i similare. Deficien?ele au fost dezv?luite de doi exper?i americani, Charlie Miller, fost angajat al Agen?iei pentru Securitate Na?ional? (NSA), ?i Chris Valasek. În cadrul testului, efectuat pe o ?osea din Saint Louis (statul Missouri), vehiculul marca Jeep Cherokee a fost condus de Andy Greenberg, analist al site-ului Wired.com. "Ma?ina poate fi localizat? prin coordonatele GPS, i se poate m?sura viteza ?i poate fi adus? total sub control", a afirmat Greenberg, explicând c? sistemul vehiculului poate fi accesat prin facilitatea Uconnect, instalat? de grupul Fiat Chrysler începând din anul 2013. Recent, Biroul Federal american de Investiga?ii (FBI) a admis c? un hacker a preluat de la distan?? controlul asupra unui avion de pasageri, în cadrul unui test. Sursa: Hackeri au preluat de la distan?? controlul asupra unui vehicul de teren în SUA, în cadrul unui test - VIDEO - Mediafax
  17. Un robot al Institutului de Politehnic? din New York a rezolvat un puzzle similar cu cel numit “În?elep?ii împ?ratului”, demonstrând c? de?ine con?tiin?? de sine, scrie independent.co.uk. Puzzle-ul sun? în felul urm?tor: Împ?ratul chem? la curtea sa 3 cei mai în?elep?i oameni din lume pentru un test în urma c?ruia unul va fi ales în?eleptul împ?ratului. Acesta a ordonat ca fiecare dintre în?elep?i s? poarte o p?larie pe cap, alb? sau albastr?, astfel încât fiecare dintre ei s? poat? vedea p?l?riile celorlal?i, dar nu ?i pe a sa. De asemenea, regele a mai spus c? trebuie s? fie cel pu?in un în?elept ce poart? o p?larie albastr?, a?a încât puteau fi una, dou? sau trei p?l?rii albastre. Imp?ratul a declarat c? cel ce se va ridica primul ?i î?i va anun?a culoarea p?l?riei pe care o poart? va deveni noul s?u sf?tuitor. Speciali?tii în ?tiin?a robotic? de la Institutul de Politehnic? Ransselaer din New York au adaptat puzzle-ul de mai sus pentru testarea a trei robo?i. La doi dintre ace?tia li s-a spus c? le-a fost administrat? o pastil? care îi împiedic? s? vorbeasc?, înainte ca to?i trei s? fie întreba?i care dintre ei poate vorbi. Prima dat? ace?tia au r?spuns "Nu ?tiu", îns? ulterior, când numai unul dintre ei a f?cut un zgomot, robotul în cauz? ?i-a auzit propria voce ?i a spus "Acum ?tiu". Oamenii de ?tiin?? au declarat c? trecerea acestui test simplu este cu greu un semn al prezen?ei con?tiin?ei de sine, îns? rezolvarea testelor de acest fel îi va ajuta pe robo?i s? deprind?, de-a lungul timpului, abilit??i prin care se pot diferen?ia de restul robo?ilor ?i datorit? c?rora vor fi din ce în ce mai utili omenirii. “Ce încearc? oamenii de ?tiin?? s? fac? este s? g?seasc? probleme filosofice interesante ?i s? dezvolte robo?ii ce pot rezolva astfel de probleme,” a declarat John Sullins, profesor de filosofia tehnologiei la Universitatea Sonoma State din California. Sursa:Un robot a trecut testul constiintei de sine pentru prima data in istorie - Magazin - HotNews.ro Alte surse: Uh-oh, a robot just passed the self-awareness test | TechRadar
  18. Usr6

    Udemy

    R Programming - Learn R from Scratch Free €220 100% off https://www.udemy.com/r-programming-learn-r-from-scratch/?couponCode=FREEDEMY
  19. Hackeri au reu?it s? sustrag? informa?ii sensibile, între care coduri de securitate social?, privind 21,5 milioane de americani care erau stocate în baze de date ale unor institu?ii publice, a anun?at joi Biroul de Management al Personalului (OPM), relateaz? Reuters. Dintre cele 21,5 milioane de persoane, 19,7 milioane au f?cut o cerere de a avea acces la informa?ii protejate, care a permis efectuarea unei anchete ce a condus la colectarea acestor date, precizeaz? OPM. Alte date privind 4,2 milioane de func?ionari afla?i în activitate sau nu au fost furate de asemenea în cadrul unui atac cibernetic "distinct, dar legat" de primul, continu? OPM, precizând c? multe dintre persoanele vizate fac parte din cele dou? grupuri. Orice persoan? care a fost supus? unei verific?ri a antecedentelor sale, începând din anul 2000, a fost foarte probabil afectat? de aceast? piraterie, anun?? OPM. Biroul american de Management al Personalului afirm? c? nu dispune "în acest stadiu de nicio informa?ie" care s?-i indice c? aceste informa?ii au fost r?spândite sau utilizate în scopuri frauduloase. Sursa: Datele a peste 21 de milioane de americani, piratate de hackeri - Mediafax
  20. Usr6

    Udemy

    JavaScript for Beginners - Start to Finish, Quick and Easy €219 100% off https://www.udemy.com/javascript-for-dummies-and-newbies/?couponCode=frompromoan
  21. Usr6

    Udemy

    Introduction to Arduino https://www.udemy.com/introduction-to-arduino/?couponCode=july3 ICND1 Course https://www.udemy.com/networkingstepbystep-icnd1/?couponCode=ICND1Free
  22. The Internet is full of pioneers and cowboys. It’s also got its fair share of pirates and trolls. Some of those bad guys may have duped you into purchasing a counterfeit version of Malwarebytes Anti-Malware. Or perhaps we’ve simply detected a problem with your key. Not to worry. We’re here to help. Malwarebytes is offering a free replacement key for Malwarebytes Anti-Malware Premium customers who have been inconvenienced by piracy or abuse. This new key will be exclusive to you going forward. What do I need to do? Select the option below (in your Malwarebytes Anti-Malware Premium product) that describes how you originally received your Malwarebytes Anti-Malware Pro or Premium license. We’ll assign you a new key, and you’ll be good to go. I’m not sure where I got my key, or I downloaded it from the Internet Select this option and we will issue you a brand-new key with 12 free months of Malwarebytes Anti-Malware Premium. I purchased my key Select this option and we will issue you a replacement key with the same license to Malwarebytes Anti-Malware as your original key. Please make note of the new key you are assigned. You can view it in My Account on Malwarebytes Anti-Malware. Your old key will cease to work after a period of time. Sursa: https://www.malwarebytes.org/lp/amnesty/
  23. Update Skynet samples: https://www.sendspace.com/file/9yqort pass: infected @dancingriver
  24. @alecseu a devenit V.I.P. Aplauze!
  25. Usr6

    Udemy

    Learn Python and Automate Network Tasks: Build Your Own Apps Go from zero programming experience to building great apps for your network using video lectures and hands-on scenarios. https://www.udemy.com/python-programming-for-real-life-networking-use/?couponCode=STUDIO4FREE Instructed by Mihai Catalin Teodosiu
×
×
  • Create New...