-
Posts
18794 -
Joined
-
Last visited
-
Days Won
742
Everything posted by Nytro
-
Unde iti face asa mai exact?
-
[h=1]How to write a simple operating system[/h] [h=3]© 2011 Mike Saunders and MikeOS Developers[/h] This document shows you how to write and build your first operating system in x86 assembly language. It explains what you need, the fundamentals of the PC boot process and assembly language, and how to take it further. The resulting OS will be very small (fitting into a bootloader) and have very few features, but it's a starting point for you to explore further. After you have read the guide, see the MikeOS project for a bigger x86 assembly language OS that you can explore to expand your skills. [h=2]Requirements[/h] Prior programming experience is essential. If you've done some coding in a high-level language like PHP or Java, that's good, but ideally you'll have some knowledge of a lower-level language like C, especially on the subject of memory and pointers. For this guide we're using Linux. OS development is certainly possible on Windows, but it's so much easier on Linux as you can get a complete development toolchain in a few mouse-clicks/commands. Linux is also really good for making floppy disk and CD-ROM images - you don't need to install loads of fiddly programs. Installing Linux is very easy thesedays; grab Ubuntu and install it in VMware or VirtualBox if you don't want to dual-boot. When you're in Ubuntu, get all the tools you need to follow this guide by entering this in a terminal window: sudo apt-get install build-essential qemu nasm This gets you the development toolchain (compiler etc.), QEMU PC emulator and the NASM assembler, which converts assembly language into raw machine code executable files. Tutorial: http://mikeos.berlios.de/write-your-own-os.html
-
Nu, nu ma refeream la tine.
-
Nu ma refeream la tine, ci la toate persoanele care pleaca capul in fata rahaturilor injectate de mass-media, tu doar mi-ai dat ocazia de a-mi exprima opinia.
-
Eu MOR pentru ca erau in tribune muisti cu tricouri cu Barcelona. Sa-i fut in inima!
-
Si eu le-as spune ce am de spus, dar eu nu sunt om de media. Adica parerea lor o asculta ZECI/SUTE DE MII de oameni, OAMENI RATATI = INFLUENTABILI. Si plecand de la asta ajungeti voi sa credeti toate rahaturile ce vi le baga pe gat mass-media. Sunteti fanii un astfel de oameni? Sunteti pierduti, influentati, indoctrinati. GANDITI SINGURI SCLAVILOR.
-
Categoriile si topicurile sunt copiate de pe RST, cel putin o parte. Ban, trash.
-
Am mai facut (mici) modificari la template: - user profile - show forum leaders - members list - homepage - activity In fine, arata putin mai "clean". Nu va asteptati la prea mult, sunt bug fix-uri, modificari foarte mici, prostii care aratau urat scoase... Ideea e sa postati aici daca sunt probleme, daca se vede ceva urat... Thanks.
-
Gauss: Abnormal Distribution Introduction Executive Summary Infection stats Architecture Wmiqry32/Wmihlp32.dll aka ShellHW Dskapi.ocx Smdk.ocx McDmn.ocx Lanhlp32.ocx Devwiz.ocx Winshell.ocx Windig.ocx Gauss C&C Information Timeline Files list Conclusion You can download PDF version of this article here. Link: http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution
-
Decrypting RunPE malware
Nytro replied to ionut97's topic in Reverse engineering & exploit development
Da, asa da. Ceva asemanator ar trebui sa faca si antivirusii vietii, iar asta ar salva milioane de oameni de stealere sau programe infectate. Probabil nu ar proteja impotriva tuturor PELoadere-lor, dar ar putea face o treaba excelenta. -
[h=1]Algorithm problems for dummies[/h]Link: http://petr-mitrichev.blogspot.ro/ Cine-i autorul? El: In the Olympics of Algorithms, a Russian Keeps Winning Gold - Technology Review
-
http://cugiralba.wordpress.com/2012/08/06/pe-cine-intereseaza-am-luat-aur-la-olimpiada-internationala-de-mate/
-
Da, e si asta o idee...
- 1 reply
-
- directory listing
- git
-
(and 1 more)
Tagged with:
-
"4. Apoi conexiunea este ip to ip" -Naspa.
-
Buna treaba, sa speram ca sefii tai nu sunt membri RST
-
Concentreaza-te pe partea de comunicatie "secure" apoi contacteaza-ma.
-
Blogul lui Mircea Badea a fost spart de hackeri justiţiari
Nytro replied to Nytro's topic in Stiri securitate
Trebuiau sa isi bata joc de ratatu asta... -
[h=2]Blogul lui Mircea Badea a fost spart de hackeri justi?iari[/h]Ce-ati facut ma? 6 august 2012, 12:54 | Autor: Cristian Predoi Blogul lui Mircea a intrat ast?zi pe mâna hackerilor, care au publicat un articol în care o acuz? pe Laura Codru?a Kovesi c?-l protejeaz? pe Emanoil Savin, primarul ora?ului Bu?teni. Autorii demersului i-au cerut, la final, scuze lui Badea pentru deranj. „În timp ce autorit??ile române sesizate fiind, refuz? s? se implice în cercetarea f?r?delegilor, motivând ca fiind o chestiune personal? a peti?ionarului ?i ignorând aspectul ilicit al faptelor de corup?ie crim? organizat?, sp?lare de bani, ?antaj, deturnare de fonduri, atribuire selectiv? a contractelor cu statul firmelor de „buzunar” ?i multe alte infrac?iuni foarte grave.., Parlamentul României a devenit cel mai luxos penitenciar, cu cei mai boga?i de?inu?i liberi. Procurorul General C. Covesi nu face decât s? confunde justi?ia cu sportul, aruncând suli?a în trinubne în loc s?-l arunce la ?inta, inclusiv în ograda justi?iei unde zeci de „dalma?ieni” p?streaz? dosarele penale ale marilor corup?i, de peste 10 ani“, au scris hackerii justi?iari pe blogul lui Mircea Badea. Postarea cuprinde, totodat?, cinci clipuri de pe YouTube, care în acuz? pe Emanoil Savin, „Regele Mafiei Prahovene“. La final, cel care i-a spart blogul lui Badea, îi cere scuze pentru deranj. „PS:Nu va suparati domnule’ Mircea Badea. Sper ca imi ve-ti acorda atentie! Imi cer scuze daca v-am creat neplaceri!“, scrie la finalul post?rii. Dup? ce a aflat c? pe blogul s?u se afl? o postare care nu-i apar?ine, realizatorul TV a dat alarma pe Twitter. „ATEN?IE !!!!!! Blogul meu a fost spart. Nu mai pot intra pe el. Ultimul articol cel referitor la Kovesi nu-mi apar?ine. Încerc s? iau m?suri“, a scris Badea pe Twitter. Totodat?, n-a acceptat scuzele celor care i-au spart blogul. „V?d c? ?stora care sparg bloguri le place pârnaia. Au uitat cand au intrat masca?ii peste ?la al lui Ciutacu. Pârnaie vor, sa le dam. Îi rezolv repede. To?i analfabe?ii au senza?ia c? sunt mari hackeri. Vai de curva de mama lor“, a mai scris Badea pe Twitter. Sursa: Blogul lui Mircea Badea a fost spart de hackeri justi?iari
-
Posteaza un screenshot demonstrativ, nu stiu, ceva acolo. Iar voi, restul, abtineti-va de la comentarii idioate si inutile.
-
Ma refeream la prostia de a "crypoui" parolele... Puneti parola in plain text.
-
Terminati ba cu cacaturile astea de parole.
-
Owasp - Old Webshells, New Tricks With Ryan Kazanciyan, Mandiant Description: The Presentation Web shells _ malicious scripts that provide an attacker with the ability to upload files, execute commands, conduct reconnaissance, and perform other command-and-control activities on a compromised web server _ are nothing new. They've been in the wild ever since the first web server and application exploits reared their ugly heads over a decade ago. Modern application security and server hardening processes have rendered them all but obsolete tools for desperate script-kiddies, right? Wrong. In this presentation we will discuss how web-based backdoors continue to be leveraged by sophisticated, targeted attackers and the challenges that they pose to forensic analysts conducting large-scale investigations. In particular, we will focus on the usage of web shells as a post-exploitation mechanism for maintaining persistence in an environment _ a backup method of remote access _ rather than a tool utilized in the initial entry vector. We will focus on the forensic artifacts that usage of such malware leaves behind on the host and on the network, and discuss techniques for rapidly identifying unknown web-based malware across servers. The Speakers Ryan Kazanciyan Ryan Kazanciyan is a Principal Consultant with Mandiant and has ten years of experience specializing in incident response, forensic analysis, penetration testing, and web application security. He has spent the past four years leading investigation and remediation efforts for highly-targeted attacks affecting organizations in the defense, technology, utilities, government, and financial services sectors. Mr. Kazanciyan has experience with analysis of host and network-based indicators of compromise, disk and memory forensics, and malware identification and triage. He also has an extensive background managing and executing large penetration testing and application security assessments. Mr. Kazanciyan has leveraged his consulting experience to lead training sessions for a variety of audiences in law enforcement, the federal government, and corporate security groups. He has taught courses on incident response, forensic analysis, penetration testing, and web application security. He has also presented at industry and security conferences including Black Hat, DoD CyberCrime, ShmooCon, Infragard, and ISACA. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Old Webshells, New Tricks with Ryan Kazanciyan, Mandiant on Vimeo Sursa: Owasp - Old Webshells, New Tricks With Ryan Kazanciyan, Mandiant