-
Posts
18734 -
Joined
-
Last visited
-
Days Won
710
Everything posted by Nytro
-
Ce tare, redirect catre un executabil. Sa ma uit putin peste el, poate gasesc ceva interesant.
-
Întreb?ri de la cititorii ?i r?spunsuri de la autorii MalwareCity 1. De ce toat? lumea recomand? folosirea cript?rii de tip WPA sau WPA2, în locul celei WEP? Protocolul de criptare WEP (Wired Equivalent Privacy - „Confiden?ialitate echivalent? cu cea a unei conexiuni standard prin fir”) dateaz? din 1997. De-a lungul timpului, s-a demonstrat c? acest protocol are câteva erori de proiectare, care permit unui atacator s?-l sparg? în doar câteva minute. WPA ?i WPA2 (Wi-Fi Protected Access - „Acces Wi-Fi protejat”) sunt mult mai sigure decât protocolul WEP, care, de?i dep??it din punct de vedere tehnologic, este p?strat din cauza problemelor de compatibilitate cu echipamentele hardware mai vechi. În concluzie, dac? echipamentele dumneavoastr? suport? WPA sau WPA2, folosi?i-le pe acestea. De asemenea, v? sugerez s? arunca?i o privire ?i peste ghidul pe care l-am scris despre securizarea re?elelor wireless, pentru detalii suplimentare. 2. Cât de multe re?ele wireless pot exista într-o înc?pere ?i câte dintre ele pot fi securizate? Comunicarea wireless func?ioneaz? dup? acelea?i principii pe care le utilizeaz? ?i re?elele cu fir, cu singura excep?ie c? informa?ia circul? prin intermediul undelor radio în loc de fire de cupru. Astfel, pentru a comunica între ele, dispozitivele trebuie s? fac? parte dintr-o re?ea, pas ce este condi?ionat de nivelul de autentificare al re?elei. Ceea ce vede?i afi?at în gestionarul de conexiuni în re?ea este numele respectivei re?ele sau SSID-ul ei (Service Set IDentifier – „Identificatorul Setului de Serviciu”), care emite un semnal prin care avertizeaz? utilizatorii de existen?a unei re?ele la care se pot conecta. Totu?i, faptul c? vede?i re?eaua nu înseamn? neap?rat c? ve?i putea transmite ?i recep?iona date prin respectiva re?ea, decât dup? ce v-a?i conectat la ea. Celelalte re?ele wireless vor fi în continuare vizibile pentru calculator, cât? vreme se g?se?te în acela?i spa?iu fizic în care re?elele emit ?i calculatorul le poate „detecta”. Altfel spus, dac? sistemul dumneavoastr? nu se g?se?te în raza de ac?iune a celorlalte routere care emit semnal, el nu va putea s? „detecteze” celelalte re?ele. Ceea ce face ca informa?ia care circul? într-o re?ea s? r?mân? în interiorul acelei re?ele ?i s? nu fie interceptat? se nume?te criptare. De fapt, cheia de criptare este cea care nu v? permite s? intercepta?i traficul de date dintre doi clien?i legitimi (cum ar fi cel dintre router-ul ?i calculatorul vecinului dumneavoastr?). Chiar dac? pute?i s?-l intercepta?i fizic, el nu v? va spune nimic, fiindc? este protejat prin criptare de „privirile indiscrete”. 3. Cum pot s?-mi p?strez sistemul în siguran?? atunci când m? conectez la o re?ea wireless nesecurizat?? Dac? folosi?i o re?ea nesecurizat?, precum cea din c?min, bibliotec? sau dintr-o cafenea, v-a? recomanda s? evita?i pe cât posibil s? v? accesa?i conturile de e-mail, bancare etc. Un firewall bun v? ajut? s? restric?iona?i accesul la calculatorul dumneavoastr?, refuzând comunicarea pe anumite porturi considerate nesigure. Firewall-ul BitDefender are un mod Public, care nu numai c? v? filtreaz? comunicarea, dar v? ?i deconecteaz? resursele partajate în mod normal într-o re?ea, astfel încât s? nu v? expun? datele unui atacator conectat la aceea?i re?ea nesecurizat?. 4. Care este cea mai bun? modalitate de a ?ine al?i utilizatori la distan?? de propria mea re?ea wireless? Cel mai simplu mod este s? folosi?i criptarea WPA/WPA2 ?i s? v? securiza?i sec?iunea administrativ? a router-ului cu o parol? complex?. Ghidul de securitate pentru re?ele wireless pe care l-am publicat s?pt?mâna trecut? e un bun pas de pornire dac? inten?iona?i s? v? instala?i ?i s? configura?i propria re?ea sau dac? ave?i de gând s? spori?i gradul de securitate al celei existente. Cam atât pentru azi. Dac? dori?i s? primi?i un r?spuns la întreb?rile sau nel?muririle pe teme de securitate informatic?, nu ezita?i s?-mi scrie?i, folosind formularul de sub acest articol. Autor: Bogdan Botezatu Sursa: Po?ta redac?iei ? Episodul 1 - MalwareCity România : Blog de Securitate
-
How a Remote Town in Romania Has Become Cybercrime Central
Nytro replied to a topic in Stiri securitate
Interesant, mai ales ca eu sunt din Valcea. Cica "Hackerville" Si cei de acolo nu stiu sa faca o pagina de scam, puneau adresa de mail la care se duceau datele ca <input type="hidden" />, dadeau mancare la boschetari si le plateau orele la Internet Cafe ca sa stea sa Copy-Paste-uiasca manual adrese de mail, cei mai multi erau paraleli cu calculatoarele si se mai mira lumea cum de sunt prinsi... Chiar vorbeam cu cineva despre asta, cred ca foarte putini s-au gandit sa porneasca o afacere in loc sa ia un Audi, foarte putini s-au gandit sa spele banii... Dar na, si asta a contribuit la semnificatia mass-media a cuvantului "hacker", si cica suntem o tara de "hackeri", nu o tara de hoti, cand de fapt asta au fost si ei. Dar e bine, e loc pentru toata lumea la puscarie, acolo sa stea. -
Hai sa discutam pe aceasta tema interesanta, sa dezbatem daca banul a fost meritat, sa clasificam limbajul victimei intr-unul adecvat sau unul potrivit coeficientului mediu de inteligenta de aici, sa aducem afirmatii pe care sa le sustinem cu dovezi concludente, stiti voi, ca in celelalte astfel de discutii de pe aici in care se implica numai persoane cu capabilitati intelectuale deosebite...
-
Iar ne-am adunat ca mustele la cacat. Felicitari.
-
Bun asa, mai scapam de ratati. Hai, aratati cat va duce capul.
-
As putea sa ii sterg posturile, dar face reclama negativa, bun baiat, ne arati cat de "smecher" e acel forum.
-
S-a inchis proiectul. S-au strans foarte putine articole. Poate se va redeschide ideea dupa ce termin cu sesiunea, cand voi termina un articol deja inceput si poate voi mai scrie unul.
-
Inca o "chestie" aniversara. Multumim pentru activitate, sper ca veti fi activi si pe viitor, dar sper sa va mai si maturizati si sa va ganditi si la lucruri mai serioase cum ar fi temele acestui forum. PS: Daca vreti un viitor in domeniul informaticii, ar trebui sa va ganditi mai profund la ce am spus mai sus, aici va puteti forma o baza solida, dar totul depinde de voi. La cat mai multe posturi (de o calitate mai ridicata)!
-
Cred ca Viz0n. La profil scrie ca e o fata de 15 ani dar nu prea cred. Oricum, nu asta conteaza, conteaza ca se ocupa de problemele site-ului. Au fost niste probleme cu inregistrarile, cu DNS-ul pentru IRC si altele si au fost remediate foarte repede. Se ocupa de site.
-
Tampenie veche si inutile. Topic inchis.
-
E un forum mai serios, cateva persoane care posteaza, le pasa de forum si de informatiile care se posteaza, nu prea am vazut aberatii sau intrebari stupide. Imi place, cel putin momentan. Stiu ca probabil ati auzit de el. http://r00tsecurity.org/forums/
-
Si pe ce criterii se vor alege utilizatorii? Zicem ca imi fac contul "x". Cont care nu il am si pe alte site-uri, deci nu vei putea stii cine sunt. Cine va fi ales, si cine nu? Se pot face neaprobari pentru useri ca "HackerCracker1337", dar cred ca numele de utilizator nu este de ajuns.
-
"Security Stuff" este o arie vasta. Pe langa un numar limitat de utilizatori care vor fi alesi de tine si de membrii alesi de tine, care ar fi noutatile? Va fi strict tehnic si nu se vor permite aberatiile?
-
Hashcat v.0.35 - Hash Password Recovery * Free * Multi-Threaded * Multi-Hash * Linux & Windows native binaries * quickest cpu-based multihash cracker * SSE2 accelerated * All Attack-Modes except Brute-Force and Permutation can be extended by rules * quick Rule-engine * Rules mostly compatible with JTR and PasswordsPro * feasible to resume or limit session * Automatically recognizes recovered hashes from outfile at startup * Can automatically generate random rules * Load hashlist with over 3 million hashes of any type at once * Load saltlist from external file and then use them in a Brute-Force Attack variant * Able to work in an distributed environment * Specify multiple wordlists and also multiple directories of wordlists * Number of threads can be configured * Threads run on lowest priority * 30+ Algorithms implemented with performance in mind * and more Source: hashcat - advanced password recovery Download: http://hashcat.net/files/hashcat-0.35.rar Hashcat GUI: http://hashcat.net/files/hashcat-gui-0.2.453.rar Read more: MD5 Crackers | Password Recovery | Wordlist Downloads
-
Whitepixel - ATI MD5 BruteForcer Whitepixel is an open source (GPLv3) GPU-accelerated password hash auditing software for AMD/ATI graphics cards. It is currently the world's fastest single-hash MD5 brute forcer. * For AMD Radeon HD 5000 series and above * Multi-GPU support (tested with 8 GPUs) * Best MD5 implementation: uses bitalign IL instruction, BFI_INT native instruction, reversing * Open source: GPLv3 * Basic configurable charsets Download: http://whitepixel.zorinaq.com/files/whitepixel-2.tar.bz2 Source: whitepixel - GPU-accelerated password hash auditing Read more: MD5 Crackers | Password Recovery | Wordlist Downloads
-
oclHashCat v.0.24 - Multi Hash GPU Cracker Features: * Free * Multi-GPU (up to 16 gpus) * Multi-Hash (up to 24 million hashes) * Multi-OS (Linux & Windows native binaries) * Multi-Platform (OpenCL & CUDA support) * Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...) * Fastest multihash MD5 cracker on NVidia cards * Fastest multihash MD5 cracker on ATI 5xxx cards * Supports wordlists (not limited to Brute-Force / Mask-Attack) * Combines Dictionary-Attack with Mask-Attack to launch a Hybrid-Attack * Runs very cautious, you can still watch movies or play games while cracking * Supports pause / resume * The first and only GPU-based Fingerprint-Attack engine * Includes hashcats entire rule engine to modify wordlists on start * ... and much more Algorithms: * MD5 * md5($pass.$salt) * md5($salt.$pass) * md5(md5($pass)) * md5(md5($pass).$salt) * SHA1 * sha1($pass.$salt) * sha1($salt.$pass) * MySQL * MySQL4.1/MySQL5 * MD4 * NTLM * Domain Cached Credentials Huge improvement on multi-hash cracking - see the details here: oclHashcat v0.24 Download: http://hashcat.net/files/oclHashcat-0.24.7z Source: oclHashcat - advanced password recovery Read more: MD5 Crackers | Password Recovery | Wordlist Downloads
-
Unrarhp - RAR -hp Password Cracker Unrarhp is a Unix command line brute forcer to recover the passwords of RAR archives encrypted with the RAR 3.x "-hp" option. This option, contrary to "-p", also encrypts the block headers & protects metadata such as filenames, etc. As of June 2010, unrarhp is the only RAR "-hp" brute forcer that is open source & free. Download: http://www.zorinaq.com/unrarhp/unrarhp-1.tar.gz Source: http://www.zorinaq.com/projs.html Read more: MD5 Crackers | Password Recovery | Wordlist Downloads
-
Si da si nu. Tu decizi. Il poti cumpara daca doresti: Purchase
-
Anti-Trojan Elite 5.3.2 + Patch Anti-Trojan Elite™ (ATE) is a malware remover, it can detect and clean malware in disk or memory. Malware is software designed specifically to damage or disrupt a system, such as a trojan horse, a spyware or a keylogger. ATE contains a Real-Time File Firewall, it monitor system and clean malwares immediately. It is also a system security tools, you can view and control processes and TCP/IP network connections. Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time. The ATE can detect more than 35000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time. Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system priviage, even it has the ability to unload suspicious modules in all processes; The registry repair utility can been used to repair registry altered by malware; The registry monitor utility can been used to repair any change of important registry keys and values with real time. THE REASONS CHOOSE ANTI TROJAN ELITE: • Real-time malware firewall, protecting user's computer in real-time. • Detecting and cleaning binded malware, doesn't hurt normal file and clean the malware. • Detecting and cleaning no process malware, some malware don't have a EXE file, they are only some DLL files and running as some threads in other process, ATE can detect and clean this type of malware even it's running. • Free tools. View the information of Tcp/Ip states and processes informations. FEATURES: • Disk and memory scan supported. • Real-time malware firewall. • Compressed files (RAR ZIP CAB) scan supported. • Backup module: Backup trojan files before killing. • Network Manager. View the tcp/udp states and the processes they belonged to. User can disconnect any tcp connection and stop the opposite process. • Process manager. View the processes and its DLL modules' information. User can terminate any process and unload any DLL module. • Internet Explorer and registry repair utility. • Updating online supported, and auto check updates when ATE starts. • Real-time registry monitor utility. Supported OS: Windows 98 ME 2000 XP 2003 Vista 7 Homepage: http://www.remove-trojan.com Download: http://hotfile.com/dl/100276873/c5e28a0/ATE5.3.2.rar.html Sursa: http://r00tsecurity.org/forums/topic/12447-anti-trojan-elite-532patch/page__pid__38367#entry38367
-
Yersinia: Network Exploition Tool Screenshot: http://www.yersinia.net/img/gui.png Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. This is not any other network scanning and analysis tool like Nmap. This is a real hacking tool already loaded with exploits including the latest VTP(VLAN Trunking Protocol) DoS exploit. Attacks for the following network protocols are implemented: * Spanning Tree Protocol (STP) * Cisco Discovery Protocol (CDP) * Dynamic Trunking Protocol (DTP) * Dynamic Host Configuration Protocol (DHCP) * Hot Standby Router Protocol (HSRP) * IEEE 802.1Q * IEEE 802.1X * Inter-Switch Link Protocol (ISL) * VLAN Trunking Protocol (VTP) Attacks pertaining to specific network protocols: Spanning Tree Protocol 1. Sending RAW Configuration BPDU 2. Sending RAW TCN BPDU 3. DoS sending RAW Configuration BPDU 4. DoS sending RAW TCN BPDU 5. Claiming Root Role 6. Claiming Other Role 7. Claiming Root Role dual home (MITM) Cisco Discovery Protocol 1. Sending RAW CDP packet 2. DoS flooding CDP neighbors table 3. Setting up a virtual device Dynamic Host Configuration Protocol 1. Sending RAW DHCP packet 2. DoS sending DISCOVER packet (exhausting ip pool) 3. Setting up rogue DHCP server 4. DoS sending RELEASE packet (releasing assigned ip) Hot Standby Router Protocol 1. Sending RAW HSRP packet 2. Becoming active router 3. Becoming active router (MITM) Dynamic Trunking Protocol 1. Sending RAW DTP packet 2. Enabling trunking 802.1Q 1. Sending RAW 802.1Q packet 2. Sending double encapsulated 802.1Q packet 3. Sending 802.1Q ARP Poisoning 802.1X 1. Sending RAW 802.1X packet 2. Mitm 802.1X with 2 interfaces VLAN Trunking Protocol 1. Sending RAW VTP packet 2. Deleting ALL VLANs 3. Deleting selected VLAN 4. Adding one VLAN 5. Catalyst crash Download and homepage: http://www.yersinia.net/
-
De ce /9? 700 Mbps = 700 Mega BITI pe secunda x MBps = x Mega BYTES pe secunda 1 BYTE = 8 BITI Deci, impartirea se face la 13, nu?
-
Let's Build a Compiler Author: Jack Crenshaw This fifteen-part series, written from 1988 to 1995, is a non-technical introduction to compiler construction. * Part 1: INTRODUCTION * Part 2: EXPRESSION PARSING * Part 3: MORE EXPRESSIONS * Part 4 INTERPRETERS * Part 5: CONTROL CONSTRUCTS * Part 6: BOOLEAN EXPRESSIONS * Part 7: LEXICAL SCANNING * Part 8: A LITTLE PHILOSOPHY * Part 9: A TOP VIEW * Part 10: INTRODUCING "TINY" * Part 11: LEXICAL SCAN REVISITED * Part 12: MISCELLANY * Part 13: PROCEDURES * Part 14: TYPES * Part 15: BACK TO THE FUTURE * Part 16: UNIT CONSTRUCTION Download the tutorial It's available in two formats, plain text, and with printer control characters so it will print reasonably on an Epson printer. * ZIP file of plain text files (212K) * ZIP file of DOS text files (214K) * ZIP file of plain formatted files (193K) * PDF of plain formatted files (581K) Download PDF: http://compilers.iecc.com/crenshaw/tutorfinal.pdf
-
Compiler Construction Author: Niklaus Wirth Download: http://www-old.oberon.ethz.ch/WirthPubl/CBEAll.pdf