Jump to content

Usr6

Active Members
  • Posts

    1337
  • Joined

  • Last visited

  • Days Won

    89

Everything posted by Usr6

  1. criptografie inca 2 locuri unde se gasesc cursuri universitare online moca Academic Earth(Harvard, Yale, UCLA, Princeton, etc ):Academic Earth | Online Courses | Academic Video Lectures MIT: Free Online Course Materials | Courses | MIT OpenCourseWare
  2. Part 2 Description: Continuing this Megaprime let's start with the modules, in this case Spear-Phishing Attack Vector and of course with the demos. We'll see how using this toolkit can perform an attack to get a remote shell via email Social Engineering Toolkit Megaprimer Part 2 on Vimeo Part 3 Description: Continuing with the modules, in this oportunity is the turn of Website Attack Vector. I used the Java Applet Attack in the demo to see how using this toolkit can perform an attack to get a remote shell just accesing in a web address in one machine updated, patched, with firewall and AV [ video=vimeo;34694155] Social Engineering Toolkit Megaprimer Part 3 on Vimeo Part 4 Description: In this video i'll continue talking about the Website attacks methods. In this demo i'll show how to phishing a website and obtain the credentials of any victim/user using the Credential Harvester Attack. [ video=vimeo;34742423] Social Engineering Toolkit Megaprimer Part 4 on Vimeo Part 5 Description: In this video i'll continue talking about the Website Attack methods and i'll show how to phishing a website and obtain the credentials of any victim/user using a new method named Tabnabbing Attack.. [ video=vimeo;35812399] Social Engineering Toolkit Megaprimer Part 5 on Vimeo sursa:securitytube.net /n-am voie decat un video pe post, daca se uita vreun admin pe aici si poate da un edit la post sa se vada toate video-urile...daca nu...sunt linkurile catre vimeo
  3. As commercial crimeware construction tools go, SpyEye has been king of the hill for the last year or so – with dozens of cybercrime organizations adopting it as their attack platform of choice. But has its time come to an end already? In the competitive ecosystem of crimeware construction tools and attack delivery platforms, to maintain a lead, the engineers behind the tools have to continuously innovate and roll out new features to their subscriber-base. In the case of SpyEye, it looks like they’re falling behind and their customers are already switching platforms and providers. Ever since the public leaking of the 1.3.45 SpyEye builder and some accompanying cracks, a menagerie of “unauthorized” SpyEye resellers and distributors have flooded the hacker forums with cut-price copies of the malware construction tool. As would-be SpyEye sellers tout their latest extensions, fake updates and fixes, the SpyEye original authors have bunkered down – focusing their attention upon only their most trusted customers, and not actively seeking more. As distrust spreads within the cybercrimal fraternity, a number of notable criminal operators have been moving to a new competitor on the block – “Ice IX”. Ice IX, like its competitors (SpyEye, Zeus, TDL, Hiloti, Carberp, etc.), offers the same core crimeware construction functionality – malware builders, an attack delivery platform, and a management console – and also makes extensive use of third-party developed Web Inject content to extract valuable data from its victims. What makes Ice IX so interesting to (former) SpyEye customers is that it’s being actively maintained and is proving to be a reliable attack platform against even newly patched victims – not to forget being much cheaper too. Over the last few months Damballa Labs have been tracking a number of criminal operators as they replace their SpyEye installations and migrate to the new Ice IX platform. It is only a trickle at the moment, but we can probably expect more SpyEye operators to transition to other better-supported crimeware construction platforms throughout the year. To understand why SpyEye is losing out to Ice IX, my colleague Sean Bodmer has pulled together a Research Note on the topic – where he details the crybercriminal migration between attack platforms and discusses the impact on some of the larger (former) SpyEye-based operators we’re tracking. The Research Note – “SpyEye, being kicked to the curb by its customers?” can be found at http://www.damballa.com/downloads/r_pubs/RN_SpyEye-Kicked-to-Curb_Bodmer.pdf sursa
  4. 111.90.139.16/~uswholes/reader.pif e un server rat (BlackShades cred) cu functia de keylogging activata (Application Data/Shared/x , x=logurile) restu dns-urilor unde se conecteaza in caz de pica unu: blacklover.no-ip.info 1blacklover.no-ip.info 2blacklover.no-ip.info 3blacklover.no-ip.info 4blacklover.no-ip.info 5blacklover.no-ip.info 6blacklover.no-ip.info 7blacklover.no-ip.info 8blacklover.no-ip.info 9blacklover.no-ip.info
  5. These next series of posts will focus on explaining a file infector/encrypter that I wrote a week ago or so. It works with any PE32 executable file, overcomes issues with randomized base addresses, and takes advantage of Visual Studio’s C++ compiler to generate the assembly code to inject into the target. This allows for large portions of the injected code to be written in C and greatly speeds up development time. Lastly, the target file is also encrypted by the infector and the decryption routine is written in to decrypt the file image at runtime. The series will be broken up into the four parts listed below: Background Online PDF PE file modification/section injection Online PDF Writing the compiled stub Online PDF Full source code and remarks Online PDF The source code and compiled sample can be found here A Visual Studio 2010 project can be found here
      • 1
      • Upvote
  6. Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick tests your browser to see how unique it is based on the information it will share with sites it visits. Click below and you will be given a uniqueness score, letting you see how easily identifiable you might be as you surf the web. Panopticlick // "Your browser fingerprint appears to be unique among the 1,991,340 tested so far. Currently, we estimate that your browser has a fingerprint that conveys at least 20.93 bits of identifying information."
  7. dllhost.exe e un server rat (dc cred) -->tebs01.sytes.net mai are ceva bindat, dar n-am apucat sa studiez prea bine ca mi-a crapat pc...bsod
  8. felicitari!
  9. September 7, 2011 Product Description Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker Exam inside this comprehensive resource. Written by an IT security expert, this authoritative Guide covers the vendor-neutral CEH Exam in full detail. You'll find learning objectives at the beginning of each chapter, Exam tips, practice Exam questions, and in-depth explanations. Designed to help you pass the Exam with ease, this definitive volume also serves as an essential on-the-job reference COVERS ALL Exam TOPICS, INCLUDING Introduction to Ethical hacking Cryptography Reconnaissance and footprinting Network scanning Enumeration System hacking Evasion techniques Social engineering and physical security Hacking web servers and applications SQL injection Viruses, trojans, and other attacks Wireless hacking Penetration testing CEHv7.rar"]Download pass:@CanavaroxuM sursa
      • 1
      • Upvote
  10. What it can do ? : Most of the part of HconSTF is semi-automated but you still need your brain to work it out. It can be use in all kind of security testing stages, it has tools for conducting tasks like, 1. Information gathering 2. Enumeration & Reconnaissance 3. Vulnerability assessment 4. Exploitation 5. Privilege escalation 6. Reporting also can be used for web debugging Is it useful for me ? : HconSTF is very flexible and good enough for any 1. IT Security Professionals 2. Web Developers 3. IT students or any one interested in IT security Some Highlight Features : Categorized and comprehensive toolset Contains hundreds of tools and features and script for different tasks like SQLi,XSS,Dorks,OSINT to name a few HconSTF webUI with online tools (same as the Aqua base version of HconSTF) Each and every option is configured for penetration testing and Vulnerability assessments Specially configured and enhanced for gaining easy & solid anonymity Works for web app testing assessments specially for owasp top 10 Easy to use & collaborative Operating System like interface Light on Hardware Resources Portable - no need to install, can work from any USB storage device Multi-Language support (feature in heavy development translators needed) Works side-by-side with your normal web browser without any conflict issues Works on both architectures x86 & x64 on windows XP, Vista, 7 (works with ubuntu linux using wine) Netbook compatible - User interface is designed for using framework on small screen sizes Free & Open source and always will be Categories of tools : Information gathering / Analysis Editors / Debuggers Exploitation / Auditing Anonymity Passwords Cryptography Database Scripting / Automation Network Utilities Reporting download: Downloads - poze: Hcon Security Testing Framework (HconSTF) [Fire base] -
  11. promotie oferita de: ????????? ???????????. ?????????? ???????? ? ??????-?????? download: http://download.yandex.ru/kaspersky/kav_yandex.exe pt utilizare in lb engleza: Shift+F12 cand este afisata fereastra programului sursa
  12. The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. * This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise * Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself Download Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of “botmasters”. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace – how criminals make money off of your computer – are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks. Download
  13. This book provides an in-depth analysis of how today's malware works, and how it has evolved to outpace traditional approaches to security. It examines the evolution of modern malware, a review of modern malware strategies and even outlines the specific actions and technologies needed in order to regain control over today's malware. Get the "Modern Malware for Dummies" book to find out: How modern malware is used in the lifecycle of an attack Why traditional solutions have failed to control this new breed of malware Policies enterprises can implement today to reduce their exposure to modern malware Why the next-generation firewall is required in order to see, detect and remediate malware in the network download gratuit: Palo Alto Networks: Network Security – Next Generation Firewalls, IPS, Application Visibility
  14. This is the course website for Penetration Testing and Vulnerability Analysis currently taught at the Polytechnic Institute of New York University. This course introduces the fundamental technical skills required to identify, analyze, and exploit software vulnerabilities. Taught by a team of security industry experts, we cover the following topics: Introduction to Penetration Testing, taught by Dan Guido Where the industry is now, where it's going, and how these skills fit in Operational Reviews and Code Audits, taught by Brandon Edwards Identify vulnerabilities and programmer errors by auditing source code Reverse Engineering, taught by Alex Sotirov and Aaron Portnoy Understand, modify, and analyze compiled applications and systems to identify vulnerabilities Exploitation, taught by Dino Dai Zovi Take advantage of vulnerabilities to gain access to restricted data and break security policies Web Hacking, taught by Joe Hemler and Marcin Wielgoszewski Vulnerability discovery and exploitation on the web Network Pentests: Post exploitation, persistence and exfiltration, taught by Colin Ames Expanding access, maintaining persistence, and evading detection Sursa
      • 1
      • Upvote
  15. acelasi virus ca cel de aici :https://rstcenter.com/forum/46864-virus-florin-salam-fost-impuscat-cap.rst click dr->>extract to... , si apar toate fisierele (binarelele +config file) cine foloseste irc-ul poate ii face o vizita sa vedem cati boti are pe canal...
  16. http://media.realitatea.ro/multimedia/image/201201/full/mail_fals_24959600.jpg Drama in lumea manelelor. Florin Salam a fost impuscat in cap! este tiltlu emailului pe care multi l-ati primit noaptea trecuta pentru a va pacali sa va infectati calculatoarele cu un virus periculos. "Artistul in varsta de 32 de ani a fost impuscat in cap ieri in jurul orei 11 p.m., in timp ce se afla intr-un club al unui prieten, relateaza HotNews. Atacatorul se pare ca este unul dintre interlopii cu care Florin Salam a avut un conflict in urma cu 5 zile, in una din locatiile patronate de acesta. Cantaretul se afla in coma profunda la Sectia de Terapie Intensiva a Spitalului Universitar de Urgenta, din capitala. Doctorii spun ca acesta are sanse minime de supravietuire si doar o minune il poate salva. Pentru mai multe detalii, click aici ." surse :1 , 2 // nota personala: virusul e atat de periculos incat poate fi eliminat prin simpla golire a temp-ului din windows sau mai precis a directorului Cookies din temp C:\WINDOWS\Temp\Cookies\ *pentru a fi vizibil directorul Cookies si continutul sau bifati show hidden files and folders in explorer autoruns C:\WINDOWS\Temp\Cookies\daemon.exe este un botnet de irc, in principiu e un client portabil de mirc + executabilele pe care le executa la comanda nu l-am luat la puricat prea mult dar seamana extrem de mult daca nu e cumva acelasi cu cel de acu cateva luni "okazii.ro"
  17. daca te intrebi de ce nu primesti loguri e pt ca ai pus o virgula in plus la adresa cpanelului blackhat.hi2,.ro/index.php p.s.infectat ca si http://rstcenter.com/forum/46597-chrome-crypter-v3-1-a.rst da macar acolo a configurat bine serverul de stealer
  18. cine a rulat fisierul de mai sus sa-si schimbe parolele repede :)a fost bindat cu un stealer cpanelul il gasiti la adresa: http://blackhat.hi2.ro/ //l.e. daca aveti nevoie de crypterul nebindat il gasiti in /Documents and Settings/user/Application Data/
  19. sistemele *nix au existat cu mult inaintea windowsului si vor exista mult timp dupa ce Microshiftul va deveni istorie. restul... e can can
  20. ...improved cele de mai sus+ IV Real Scenario 75 8 Attacks and memory corruption 75 9 Memory corruption in practice 76 10 Examples of real attacks 77 10.1 Theory: Heap Spraying . . . . . . . . . . . . . . . . . 77 10.2 CVE-2010-0249 – Internet Explorer 6, 2010 – Graziano. . 78 10.3 CVE-2010-2883 – Adobe Acrobat Reader, 2010 – Graziano . 84 http://www.mgraziano.info/docs/stsi2010.pdf
  21. Tutorialul Android acopera toate conceptele importante ce permit unui programator nou sa invete sa dezvolte aplicatii mobile pentru platforma Android. Tutorialul este scris din perspectiva unui programator ?i intra dup? pu?ine subiecte ce descriu platforma Android, în aplicatii simple, de tipul “Cum se face …” , care sunt usor de urmat. În ciuda simplita?ii aparente, fiecare parte a tutorialului eviden?iaz? elementele importante ale platformei Android ?i sintetizeaza aspecte descrise în detaliu pe portalul developer.android.com. Tutorial Android (01) – Instrumente necesare si configurare mediu de lucru Tutorial Android (02) – Concepte, activitati si resurse ale unei aplicatii Android Tutorial Android (03) – Cum sa dezvolti, testezi si sa intelegi o aplicatie de tip Hello World Tutorial Android (04) – Design procedural vs declarativ de interefete si formulare Tutorial Android (05) – Cum se defineste o clasa de tip Activity cu editorul vizual Android Manifest sau fara Tutorial Android (06) – Cum sa construiesti si sa afisezi o noua activitate, fereastra sau formular Android Tutorial (07) – How to debug the Android mobile application with LogCat (En) Android Tutorial (08) – How to add a menu, programmatic vs. declarative solution (En) Sursa
  22. Acest tutorial are ca scop descrierea cunostintelor teoretice si practice cu privire la programarea in limbaj de asamblare pentru procesoarele din familia Intel 8086 pe 16 biti. Folosind aceste elemente de baza se poate trece cu usurinta la o arhitectura superioara, 32 sau 64 de biti. Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 1 – Elemente de baza Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 2 – Prima aplicatie Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 3 – Moduri de adresare Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 4 – Structuri de control Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 5 – Proceduri Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 6 – Lucru cu fisiere Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 7 – Lucru cu segmente Tutorial Limbaj de Asamblare (Assembler) Intel 8086 – Partea 8 – Lucru in virgula mobila (valori reale) Sursa p.s. La multi ani
      • 1
      • Thanks
  23. in ida :http://photoupload.org/uploads/13246374241.jpg in ollydbg presupun ca ar merge sa cauti functia "MessageBoxA" sau mesajul care apare in Nag programul:Multiupload.com //l.e am inteles eu aiurea, nu bagati postu asta in seama
  24. We are the first one to offer the most detailed, interesting and entertaining interactive video tutorials on software cracking. Experienced crackers will demonstrate and comment each step of software cracking. You will study a detailed, step by step lessons created by a real practicing cracker. You don’t need to be a PC guru and don’t even have to master any software programming languages. We will show you how to crack software with both the most simple and the most sophisticated protection systems. This is the valuable part of our training program. At the date, we have done 36 interactive video lessons, that will let you know all the ins and outs of software cracking. We will add new videos per our members’ requests! Videos are 20-30 mins each. Every action, every click and every event is commented. We give an explanation of what we do and why we do it like that. List of videos: Windows cracking [ready to watch and learn!]: Intro for noobs, asm basics, simple patching — 2 videos Debugging, tracing, analyzing — 2 videos Making keyfiles — 1 video Different methods of patching — 4 videos Finding serial numbers — 1 video Removing “nag” screens — 1 video Cracking Visual Basic software — 2 videos Cracking Delphi software — 2 videos Making a “self-keygen” — 1 video Cracking using resources — 1 video Introto packers and protectors — 1 video Unpacking ASProtect, Armadillo, tElock — 5 videos “Inline” patching — 2 videos; Killing online servers check — 2 videos; Creating loaders — 2 videos Cracking tricks, anti-debugging, rebuilding PE — 3 videos Creating a keygen — 1 video …and more — total 36 videos on Windows cracking! .NET cracking [in process, coming soon to members area]: Patching .NET applications — 1 video Making a keygen on .NET — 1 video Mobile cracking [in process, coming soon to members area]: Cracking Windows Mobile software — 2 videos Cracking Symbian software — 1 video Cracking iPhone/iPod software — 1 video Scripts crakcing [in process, coming soon to members area]: Nulling a simple PHP script — 1 video Nulling Zended and Ioncubed PHP scripts — 1 video ..and more, per our members’ requests! Download: http://www.multiupload.com/2ZQXZNBFKB Pass: imglory.com sursa @paul:alea clasice imbunatatite
  25. 1PetaByte=1024 TerraByte 1TerraByte=1024 GigaByte PetaNDrive Upload manager with resume support. Extract archives on the server in a rapid speed, all archive formats supported Access ftp Play videos directly from your virtual drive. Leech program to download files from other servers directly to your virtual using our server bandwidth at 100mb/s etc... Limitare: download 2GB /zi //L.E. 19.11: cu softul lor merge ok, din browser asemenea, ftp nu vrea nici la mine 20.26: merge ftp
×
×
  • Create New...