Jump to content

co4ie

Active Members
  • Posts

    638
  • Joined

  • Last visited

  • Days Won

    6

Everything posted by co4ie

  1. Hacking Ebook`s and Learning Video 1. (ebook ) Hacking IIS Servers Download 2. (eBook ) Hacking Into Computer Systems A Beginners Guide Download 3. (Ebook Computer) Hacking The Windows Registry Download 4. (eBook PDF) Hugo Cornwall The Hacker's Handbook Download 5. Wiley The Database Hacker's Handbook Defending Database Servers Download 6. John Wiley &amp Sons Hacking GMail (ExtremeTech) Download 7. Hacking Guide V3 1 Download 8. A List Publishing Hacker Linux Uncovered Download 9. Hacker'S Delight Download 10. HackerHighSchool Download 11. Hacker's Desk Reference Download 12. Amazon Hacks Download 13. Anti Hacker ToolKit McGraw Hill 2E 2004 Download 14. Attacking The DNS Protocol Download 15. Auerbach Pub The Hackers Handbook The Strategy Behind Breaking Into And Defending Networks Nov 20 Download 16. A Beginners Guide To Hacking Computer Systems Download 17. Bsd Hacks Download 18. Ceh Official Certified Ethical Hacker Review Guide Exam 312 50 9780782144376 27422 Download 19. Certified Ethical Hacker (CEH) V3 0 Official Course Download 20. Computer Hackers Secrets E Book Download 21. Cracking Sql Passwords Download 22. Credit Card Visa Hack Ucam Cl Tr 560 [223 KB Www Netz Ru] Download 23. DangerousGoogle SearchingForSecrets Download 24. Database Hacker Handbook Download 25. Dummies Hack How To Create Keygens (1) Download 26. Ebay Hacks 100 Industrial Strength Tips And Tools Download 27. EBooks OReilly Wireless Hacks 100 Industrial Strength Tips And Tools Download 28. Ebook Oreilly Windows Xp Hacks Sharereactor Download 29. Ethical Hacking, Student Guide Download 30. Excel Hacks Download 31. For Dummies Hacking For Dummies Apr 2004 EBook DDU Download 32. For Dummies Hacking Wireless Networks For Dummies Sep 2005 EBook DDU Download 33. Google Hacks Download 34. Hacker'S Delight Download 35. Hackers, Heroes Of The Computer Revolution Download 36. Hackers Beware Download 37. Hackers Secrets Download 38. Hackers Secrets Revealed Download 39. Hacker Disassembling Uncovered Download 40. Hacker Disassembling Uncovered 9781931769228 20035 Download 41. Hacker Ethic Download 42. Hacker Linux Uncovered Download 43. Hacker S Guide Download 44. Hacker Web Exploitation Uncovered Download 45. Hacking Cisco Routers Download 46. Hacking Ebook CIA Book Of Dirty Tricks1 Download 47. Hacking Firewalls And Networks How To Hack Into Remote Computers Download 48. Hacking For Dummies Download 49. Hacking For Dummies 1 Download 50. Hacking For Dummies 2 Download 51. Hacking For Dummies Access To Other People's System Made Simple Download 52. Hacking GMail Download 53. Hacking Guide V3 1 Download 54. Hacking Hacker's Guide Download 55. Hacking Hugo Cornwall The Hacker's Handbook Download 56. Hacking IIS Servers Download 57. Hacking Into Computer Systems A Beginners Guide Download 58. Hacking The Art Of Exploitation Download 59. Hacking The Hacker Crackdown Download 60. Hacking The Windows Registry Download 61. Hacking Windows XP Download 62. Hackproofing Oracle Application Server Download 63. Hack Attacks Revealed A Complete Reference With Custom Security Hacking Toolkit Download 64. Hack IT Security Through Penetration Testing Download 65. Hack Proofing Linux A Guide To Open Source Security Stangler, Lane Syngress Plus Plus ISBN 1 928994 34 2 Download 66. Hack Proofing Sun Solaris 8 Download 67. Hack Proofing Your E Commerce Site Download 68. Hack Proofing Your Identity In The Information Age Download 69. Hack Proofing Your Network First Edition Download 70. Hack Proofing Your Network Internet Tradecraft Download 71. Hack Proofing Your Network Second Edition Download 72. Hack Proofing Your Web Applications Download 73. Halting The Hacker A Practical Guide To Computer Security Download 74. How To Crack CD Protections Download 75. John Wiley & Sons Hacking For Dummies Download 76. John Wiley And Sons Hacking Windows XP Jul 2004 EBook Download 77. John Wiley And Sons Hacking Windows XP Jul 2004 EBook DDU Download 78. John Wiley And Sons The Art Of Intrusion The Real Stories Behind The Exploits Of Hackers Intruders And Deceivers Feb 2005 ISBN0764569597 Download 79. Jon Erickson Hacking The Art Of Exploitation No Starch Press 2003 Download 80. Linux Server Hacks Download 81. Linux Server Hacks OReilly Download 82. Little Black Book Oc Computer Viruses Download 83. Mac Os Hacks Download 84. Mind Hacks Tips & Tricks For Using Your Brain Download 85. Network Security Hacks Download 86. No Starch Press Hacking The Art Of Exploitation Download 87. O'Reilly Online Investing Hacks Download 88. O'Reilly Windows Server Hack Download 89. O'Reilly Network Security Hacks Download 90. Online Investing Hacks Download 91. OReilly, Digital Video Hacks (2005) DDU LotB Download 92. OReilly, IRC Hacks (2004) DDU Download 93. Oreilly, Paypal Hacks (2004) Ddu Download 94. Oreilly, Visual Studio Hacks (2005) Ddu Lotb Download 95. Oreilly Access Hacks Apr 2005 Download 96. Oreilly Amazon Hacks EBook LiB Download 97. Oreilly Firefox Hacks Ebook Lib Download 98. OReilly Flickr Hacks Tips And Tools For Sharing Photos Online (Feb 2006) Download 99. OReilly Google Hacks Download 100. OReilly Google Hacks 2nd Edition Dec 2004 ISBN0596008570 Download 101. OReilly Google Maps Hacks Jan 2006 Download 102. Oreilly Linux Desktop Hacks Mar 2005 EBook LiB Download 103. OReilly Linux Server Hacks Volume Two Dec 2005 Download 104. OReilly Network Security Hacks Download 105. OReilly PayPal Hacks Sep 2004 EBook DDU Download 106. OReilly PC Hacks Oct 2004 EBook DDU Download 107. OReilly Perl Hacks Tips And Tools For Programming Debugging And Surviving May 2006 Download 108. OReilly Plus Plus Google Hacks, 1st Edition2003 Download 109. OReilly Skype Hacks Tips And Tools For Cheap Fun Innovative Phone Service Dec 2005 Download 110. OReilly SQL Hacks Nov 2006 Download 111. OReilly Statistics Hacks May 2006 Download 112. OReilly Ubuntu Hacks Tips And Tools For Exploring Using And Tuning Linux Jun 2006 Download 113. OReilly VoIP Hacks Tips And Tools For Internet Telephony Dec 2005 Download 114. Oreilly Windows Xp Hacks 2nd Edition Feb 2005 Lib Download 115. OReilly Word Hacks Oct 2004 EBook DDU Download 116. OSB Ethical Hacking And Countermeasures EC Council Exam 312 50 Student Courseware EBook LiB Download 117. O Reilly Windows XP Hacks Download 118. PC Games How To Crack CD Protection Download 119. Security And Hacking Anti Hacker Tool Kit Second Edition Download 120. SoTayHacker1 0 Download 121. Spidering Hacks Download 122. SQLInjectionWhitePaper Download 123. SQL Hacks Download 124. Syngress Buffer Overflow Attacks Dec 2004 EBook DDU Download 125. Syngress Hacking A Terror Network Nov 2004 ISBN1928994989 Download 126. Syngress Hacking A Terror Network The Silent Threat Of Covert Channels Download 127. Syngress Hack Proofing Linux (2001) Download 128. Syngress Hack Proofing Your Identity In The Information Age Download 129. Syngress Hack Proofing Your Identity In The Information Age 2002 Download 130. Syngress Hack Proofing Your Wireless Network Download 131. Syngress Hack The Stack Oct 2006 Download 132. The 20Little 20Black 20Book 20of 20Computer 20Viruses Download 133. The Database Hackers Handbook Defending Database Servers 9780764578014 25524 Download 134. The Little Black Book Of Computer Virus Download
  2. Nu trebuie decat sa fii conectat la retea.. tit ce faci e sa te dai drept dns... practic cel mai simplu de demonstrat asta e cu o retea mica si un router! poti folosi ettercap,squid,sslstrip.. si mai sunt cateva!cu ettercap iti poti face propriile filtre si e f usor sa te joci cu traficul!!
  3. Fara sa ai acces la retea nu se poate!!totusi poti face minuni cu ettercap!!
  4. Tempting, no? All that data, flowing freely in open space, back and forth to the ground — anyone with a radio should be able to pick it up and start decoding. Of course, cheapskates have been stealing satellite TV for decades. When I was a teenager, those big backyard dishes seemed to be everywhere, swiping free programming; nowadays it’s all about receiver decoding. That’s illegal, by the way, and also increasingly difficult; check out this video to see just how technical it’s become. Military satellites are simply too powerfully encrypted. That doesn’t stop people from paying very close, even obsessive attention to them: Interested in joining that kind of fun? N2YO is a hobbyist site that lets you track satellites of all kind in real time, as they fly right over your head. Their database is impressively detailed. If you want to actually capture signals, NOAA weather satellites are the way to go. Here’s an explanation of how to grab your own imagery and decode it directly. Finally, the real frontier: hacking the downloads and uploads. “It’s like a very big Wi-Fi network that’s easy to access,” says a security expert, in Forbes: And once they start messing with GPS — that’s when things will get serious. Welcome to hacking’s High Frontier. SURSA Now That`s A Fucking Challenge !!
  5. #!/usr/bin/env python # encoding: utf-8 # Hash Identifier v1.1 # By Zion3R # www.Blackploit.com # Root@Blackploit.com logo=''' ######################################################################### # __ __ __ ______ _____ # # /\ \/\ \ /\ \ /\__ _\ /\ _ `\ # # \ \ \_\ \ __ ____ \ \ \___ \/_/\ \/ \ \ \/\ \ # # \ \ _ \ /'__`\ / ,__\ \ \ _ `\ \ \ \ \ \ \ \ \ # # \ \ \ \ \/\ \_\ \_/\__, `\ \ \ \ \ \ \_\ \__ \ \ \_\ \ # # \ \_\ \_\ \___ \_\/\____/ \ \_\ \_\ /\_____\ \ \____/ # # \/_/\/_/\/__/\/_/\/___/ \/_/\/_/ \/_____/ \/___/ v1.1 # # By Zion3R # # www.Blackploit.com # # Root@Blackploit.com # #########################################################################''' algorithms={"102020":"ADLER-32", "102040":"CRC-32", "102060":"CRC-32B", "101020":"CRC-16", "101040":"CRC-16-CCITT", "104020":"DES(Unix)", "101060":"FCS-16", "103040":"GHash-32-3", "103020":"GHash-32-5", "115060":"GOST R 34.11-94", "109100":"Haval-160", "109200":"Haval-160(HMAC)", "110040":"Haval-192", "110080":"Haval-192(HMAC)", "114040":"Haval-224", "114080":"Haval-224(HMAC)", "115040":"Haval-256", "115140":"Haval-256(HMAC)", "107080":"Lineage II C4", "106025":"Domain Cached Credentials - MD4(MD4(($pass)).(strtolower($username)))", "102080":"XOR-32", "105060":"MD5(Half)", "105040":"MD5(Middle)", "105020":"MySQL", "107040":"MD5(phpBB3)", "107060":"MD5(Unix)", "107020":"MD5(Wordpress)", "108020":"MD5(APR)", "106160":"Haval-128", "106165":"Haval-128(HMAC)", "106060":"MD2", "106120":"MD2(HMAC)", "106040":"MD4", "106100":"MD4(HMAC)", "106020":"MD5", "106080":"MD5(HMAC)", "106140":"MD5(HMAC(Wordpress))", "106029":"NTLM", "106027":"RAdmin v2.x", "106180":"RipeMD-128", "106185":"RipeMD-128(HMAC)", "106200":"SNEFRU-128", "106205":"SNEFRU-128(HMAC)", "106220":"Tiger-128", "106225":"Tiger-128(HMAC)", "106240":"md5($pass.$salt)", "106260":"md5($salt.'-'.md5($pass))", "106280":"md5($salt.$pass)", "106300":"md5($salt.$pass.$salt)", "106320":"md5($salt.$pass.$username)", "106340":"md5($salt.md5($pass))", "106360":"md5($salt.md5($pass).$salt)", "106380":"md5($salt.md5($pass.$salt))", "106400":"md5($salt.md5($salt.$pass))", "106420":"md5($salt.md5(md5($pass).$salt))", "106440":"md5($username.0.$pass)", "106460":"md5($username.LF.$pass)", "106480":"md5($username.md5($pass).$salt)", "106500":"md5(md5($pass))", "106520":"md5(md5($pass).$salt)", "106540":"md5(md5($pass).md5($salt))", "106560":"md5(md5($salt).$pass)", "106580":"md5(md5($salt).md5($pass))", "106600":"md5(md5($username.$pass).$salt)", "106620":"md5(md5(md5($pass)))", "106640":"md5(md5(md5(md5($pass))))", "106660":"md5(md5(md5(md5(md5($pass)))))", "106680":"md5(sha1($pass))", "106700":"md5(sha1(md5($pass)))", "106720":"md5(sha1(md5(sha1($pass))))", "106740":"md5(strtoupper(md5($pass)))", "109040":"MySQL5 - SHA-1(SHA-1($pass))", "109060":"MySQL 160bit - SHA-1(SHA-1($pass))", "109180":"RipeMD-160(HMAC)", "109120":"RipeMD-160", "109020":"SHA-1", "109140":"SHA-1(HMAC)", "109220":"SHA-1(MaNGOS)", "109240":"SHA-1(MaNGOS2)", "109080":"Tiger-160", "109160":"Tiger-160(HMAC)", "109260":"sha1($pass.$salt)", "109280":"sha1($salt.$pass)", "109300":"sha1($salt.md5($pass))", "109320":"sha1($salt.md5($pass).$salt)", "109340":"sha1($salt.sha1($pass))", "109360":"sha1($salt.sha1($salt.sha1($pass)))", "109380":"sha1($username.$pass)", "109400":"sha1($username.$pass.$salt)", "1094202":"sha1(md5($pass))", "109440":"sha1(md5($pass).$salt)", "109460":"sha1(md5(sha1($pass)))", "109480":"sha1(sha1($pass))", "109500":"sha1(sha1($pass).$salt)", "109520":"sha1(sha1($pass).substr($pass,0,3))", "109540":"sha1(sha1($salt.$pass))", "109560":"sha1(sha1(sha1($pass)))", "109580":"sha1(strtolower($username).$pass)", "110020":"Tiger-192", "110060":"Tiger-192(HMAC)", "112020":"md5($pass.$salt) - Joomla", "113020":"SHA-1(Django)", "114020":"SHA-224", "114060":"SHA-224(HMAC)", "115080":"RipeMD-256", "115160":"RipeMD-256(HMAC)", "115100":"SNEFRU-256", "115180":"SNEFRU-256(HMAC)", "115200":"SHA-256(md5($pass))", "115220":"SHA-256(sha1($pass))", "115020":"SHA-256", "115120":"SHA-256(HMAC)", "116020":"md5($pass.$salt) - Joomla", "116040":"SAM - (LM_hash:NT_hash)", "117020":"SHA-256(Django)", "118020":"RipeMD-320", "118040":"RipeMD-320(HMAC)", "119020":"SHA-384", "119040":"SHA-384(HMAC)", "120020":"SHA-256", "121020":"SHA-384(Django)", "122020":"SHA-512", "122060":"SHA-512(HMAC)", "122040":"Whirlpool", "122080":"Whirlpool(HMAC)"} # hash.islower() minusculas # hash.isdigit() numerico # hash.isalpha() letras # hash.isalnum() alfanumerico def CRC16(): hs='4607' if len(hash)==len(hs) and hash.isalpha()==False and hash.isalnum()==True: jerar.append("101020") def CRC16CCITT(): hs='3d08' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("101040") def FCS16(): hs='0e5b' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("101060") def CRC32(): hs='b33fd057' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("102040") def ADLER32(): hs='0607cb42' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("102020") def CRC32B(): hs='b764a0d9' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("102060") def XOR32(): hs='0000003f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("102080") def GHash323(): hs='80000000' if len(hash)==len(hs) and hash.isdigit()==True and hash.isalpha()==False and hash.isalnum()==True: jerar.append("103040") def GHash325(): hs='85318985' if len(hash)==len(hs) and hash.isdigit()==True and hash.isalpha()==False and hash.isalnum()==True: jerar.append("103020") def DESUnix(): hs='ZiY8YtDKXJwYQ' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False: jerar.append("104020") def MD5Half(): hs='ae11fd697ec92c7c' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("105060") def MD5Middle(): hs='7ec92c7c98de3fac' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("105040") def MySQL(): hs='63cea4673fd25f46' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("105020") def DomainCachedCredentials(): hs='f42005ec1afe77967cbc83dce1b4d714' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106025") def Haval128(): hs='d6e3ec49aa0f138a619f27609022df10' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106160") def Haval128HMAC(): hs='3ce8b0ffd75bc240fc7d967729cd6637' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106165") def MD2(): hs='08bbef4754d98806c373f2cd7d9a43c4' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106060") def MD2HMAC(): hs='4b61b72ead2b0eb0fa3b8a56556a6dca' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106120") def MD4(): hs='a2acde400e61410e79dacbdfc3413151' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106040") def MD4HMAC(): hs='6be20b66f2211fe937294c1c95d1cd4f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106100") def MD5(): hs='ae11fd697ec92c7c98de3fac23aba525' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106020") def MD5HMAC(): hs='d57e43d2c7e397bf788f66541d6fdef9' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106080") def MD5HMACWordpress(): hs='3f47886719268dfa83468630948228f6' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106140") def NTLM(): hs='cc348bace876ea440a28ddaeb9fd3550' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106029") def RAdminv2x(): hs='baea31c728cbf0cd548476aa687add4b' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106027") def RipeMD128(): hs='4985351cd74aff0abc5a75a0c8a54115' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106180") def RipeMD128HMAC(): hs='ae1995b931cf4cbcf1ac6fbf1a83d1d3' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106185") def SNEFRU128(): hs='4fb58702b617ac4f7ca87ec77b93da8a' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106200") def SNEFRU128HMAC(): hs='59b2b9dcc7a9a7d089cecf1b83520350' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106205") def Tiger128(): hs='c086184486ec6388ff81ec9f23528727' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106220") def Tiger128HMAC(): hs='c87032009e7c4b2ea27eb6f99723454b' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106225") def md5passsalt(): hs='5634cc3b922578434d6e9342ff5913f7' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106240") def md5saltmd5pass(): hs='245c5763b95ba42d4b02d44bbcd916f1' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106260") def md5saltpass(): hs='22cc5ce1a1ef747cd3fa06106c148dfa' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106280") def md5saltpasssalt(): hs='469e9cdcaff745460595a7a386c4db0c' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106300") def md5saltpassusername(): hs='9ae20f88189f6e3a62711608ddb6f5fd' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106320") def md5saltmd5pass(): hs='aca2a052962b2564027ee62933d2382f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106340") def md5saltmd5passsalt(): hs='de0237dc03a8efdf6552fbe7788b2fdd' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106360") def md5saltmd5passsalt(): hs='5b8b12ca69d3e7b2a3e2308e7bef3e6f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106380") def md5saltmd5saltpass(): hs='d8f3b3f004d387086aae24326b575b23' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106400") def md5saltmd5md5passsalt(): hs='81f181454e23319779b03d74d062b1a2' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106420") def md5username0pass(): hs='e44a60f8f2106492ae16581c91edb3ba' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106440") def md5usernameLFpass(): hs='654741780db415732eaee12b1b909119' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106460") def md5usernamemd5passsalt(): hs='954ac5505fd1843bbb97d1b2cda0b98f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106480") def md5md5pass(): hs='a96103d267d024583d5565436e52dfb3' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106500") def md5md5passsalt(): hs='5848c73c2482d3c2c7b6af134ed8dd89' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106520") def md5md5passmd5salt(): hs='8dc71ef37197b2edba02d48c30217b32' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106540") def md5md5saltpass(): hs='9032fabd905e273b9ceb1e124631bd67' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106560") def md5md5saltmd5pass(): hs='8966f37dbb4aca377a71a9d3d09cd1ac' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106580") def md5md5usernamepasssalt(): hs='4319a3befce729b34c3105dbc29d0c40' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106600") def md5md5md5pass(): hs='ea086739755920e732d0f4d8c1b6ad8d' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106620") def md5md5md5md5pass(): hs='02528c1f2ed8ac7d83fe76f3cf1c133f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106640") def md5md5md5md5md5pass(): hs='4548d2c062933dff53928fd4ae427fc0' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106660") def md5sha1pass(): hs='cb4ebaaedfd536d965c452d9569a6b1e' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106680") def md5sha1md5pass(): hs='099b8a59795e07c334a696a10c0ebce0' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106700") def md5sha1md5sha1pass(): hs='06e4af76833da7cc138d90602ef80070' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106720") def md5strtouppermd5pass(): hs='519de146f1a658ab5e5e2aa9b7d2eec8' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("106740") def LineageIIC4(): hs='0x49a57f66bd3d5ba6abda5579c264a0e4' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True and hash[0:2].find('0x')==0: jerar.append("107080") def MD5phpBB3(): hs='$H$9kyOtE8CDqMJ44yfn9PFz2E.L2oVzL1' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:3].find('$H$')==0: jerar.append("107040") def MD5Unix(): hs='$1$cTuJH0Ju$1J8rI.mJReeMvpKUZbSlY/' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:3].find('$1$')==0: jerar.append("107060") def MD5Wordpress(): hs='$P$BiTOhOj3ukMgCci2juN0HRbCdDRqeh.' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:3].find('$P$')==0: jerar.append("107020") def MD5APR(): hs='$apr1$qAUKoKlG$3LuCncByN76eLxZAh/Ldr1' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash[0:4].find('$apr')==0: jerar.append("108020") def Haval160(): hs='a106e921284dd69dad06192a4411ec32fce83dbb' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109100") def Haval160HMAC(): hs='29206f83edc1d6c3f680ff11276ec20642881243' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109200") def MySQL5(): hs='9bb2fb57063821c762cc009f7584ddae9da431ff' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109040") def MySQL160bit(): hs='*2470c0c06dee42fd1618bb99005adca2ec9d1e19' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:1].find('*')==0: jerar.append("109060") def RipeMD160(): hs='dc65552812c66997ea7320ddfb51f5625d74721b' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109120") def RipeMD160HMAC(): hs='ca28af47653b4f21e96c1235984cb50229331359' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109180") def SHA1(): hs='4a1d4dbc1e193ec3ab2e9213876ceb8f4db72333' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109020") def SHA1HMAC(): hs='6f5daac3fee96ba1382a09b1ba326ca73dccf9e7' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109140") def SHA1MaNGOS(): hs='a2c0cdb6d1ebd1b9f85c6e25e0f8732e88f02f96' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109220") def SHA1MaNGOS2(): hs='644a29679136e09d0bd99dfd9e8c5be84108b5fd' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109240") def Tiger160(): hs='c086184486ec6388ff81ec9f235287270429b225' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109080") def Tiger160HMAC(): hs='6603161719da5e56e1866e4f61f79496334e6a10' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109160") def sha1passsalt(): hs='f006a1863663c21c541c8d600355abfeeaadb5e4' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109260") def sha1saltpass(): hs='299c3d65a0dcab1fc38421783d64d0ecf4113448' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109280") def sha1saltmd5pass(): hs='860465ede0625deebb4fbbedcb0db9dc65faec30' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109300") def sha1saltmd5passsalt(): hs='6716d047c98c25a9c2cc54ee6134c73e6315a0ff' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109320") def sha1saltsha1pass(): hs='58714327f9407097c64032a2fd5bff3a260cb85f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109340") def sha1saltsha1saltsha1pass(): hs='cc600a2903130c945aa178396910135cc7f93c63' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109360") def sha1usernamepass(): hs='3de3d8093bf04b8eb5f595bc2da3f37358522c9f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109380") def sha1usernamepasssalt(): hs='00025111b3c4d0ac1635558ce2393f77e94770c5' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109400") def sha1md5pass(): hs='fa960056c0dea57de94776d3759fb555a15cae87' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("1094202") def sha1md5passsalt(): hs='1dad2b71432d83312e61d25aeb627593295bcc9a' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109440") def sha1md5sha1pass(): hs='8bceaeed74c17571c15cdb9494e992db3c263695' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109460") def sha1sha1pass(): hs='3109b810188fcde0900f9907d2ebcaa10277d10e' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109480") def sha1sha1passsalt(): hs='780d43fa11693b61875321b6b54905ee488d7760' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109500") def sha1sha1passsubstrpass03(): hs='5ed6bc680b59c580db4a38df307bd4621759324e' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109520") def sha1sha1saltpass(): hs='70506bac605485b4143ca114cbd4a3580d76a413' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109540") def sha1sha1sha1pass(): hs='3328ee2a3b4bf41805bd6aab8e894a992fa91549' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109560") def sha1strtolowerusernamepass(): hs='79f575543061e158c2da3799f999eb7c95261f07' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("109580") def Haval192(): hs='cd3a90a3bebd3fa6b6797eba5dab8441f16a7dfa96c6e641' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("110040") def Haval192HMAC(): hs='39b4d8ecf70534e2fd86bb04a877d01dbf9387e640366029' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("110080") def Tiger192(): hs='c086184486ec6388ff81ec9f235287270429b2253b248a70' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("110020") def Tiger192HMAC(): hs='8e914bb64353d4d29ab680e693272d0bd38023afa3943a41' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("110060") def MD5passsaltjoomla1(): hs='35d1c0d69a2df62be2df13b087343dc9:BeKMviAfcXeTPTlX' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[32:33].find(':')==0: jerar.append("112020") def SHA1Django(): hs='sha1$Zion3R$299c3d65a0dcab1fc38421783d64d0ecf4113448' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:5].find('sha1$')==0: jerar.append("113020") def Haval224(): hs='f65d3c0ef6c56f4c74ea884815414c24dbf0195635b550f47eac651a' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("114040") def Haval224HMAC(): hs='f10de2518a9f7aed5cf09b455112114d18487f0c894e349c3c76a681' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("114080") def SHA224(): hs='e301f414993d5ec2bd1d780688d37fe41512f8b57f6923d054ef8e59' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("114020") def SHA224HMAC(): hs='c15ff86a859892b5e95cdfd50af17d05268824a6c9caaa54e4bf1514' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("114060") def SHA256(): hs='2c740d20dab7f14ec30510a11f8fd78b82bc3a711abe8a993acdb323e78e6d5e' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115020") def SHA256HMAC(): hs='d3dd251b7668b8b6c12e639c681e88f2c9b81105ef41caccb25fcde7673a1132' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115120") def Haval256(): hs='7169ecae19a5cd729f6e9574228b8b3c91699175324e6222dec569d4281d4a4a' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115040") def Haval256HMAC(): hs='6aa856a2cfd349fb4ee781749d2d92a1ba2d38866e337a4a1db907654d4d4d7a' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115140") def GOSTR341194(): hs='ab709d384cce5fda0793becd3da0cb6a926c86a8f3460efb471adddee1c63793' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115060") def RipeMD256(): hs='5fcbe06df20ce8ee16e92542e591bdea706fbdc2442aecbf42c223f4461a12af' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115080") def RipeMD256HMAC(): hs='43227322be1b8d743e004c628e0042184f1288f27c13155412f08beeee0e54bf' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115160") def SNEFRU256(): hs='3a654de48e8d6b669258b2d33fe6fb179356083eed6ff67e27c5ebfa4d9732bb' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115100") def SNEFRU256HMAC(): hs='4e9418436e301a488f675c9508a2d518d8f8f99e966136f2dd7e308b194d74f9' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115180") def SHA256md5pass(): hs='b419557099cfa18a86d1d693e2b3b3e979e7a5aba361d9c4ec585a1a70c7bde4' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115200") def SHA256sha1pass(): hs='afbed6e0c79338dbfe0000efe6b8e74e3b7121fe73c383ae22f5b505cb39c886' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("115220") def MD5passsaltjoomla2(): hs='fb33e01e4f8787dc8beb93dac4107209:fxJUXVjYRafVauT77Cze8XwFrWaeAYB2' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[32:33].find(':')==0: jerar.append("116020") def SAM(): hs='4318B176C3D8E3DEAAD3B435B51404EE:B7C899154197E8A2A33121D76A240AB5' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash.islower()==False and hash[32:33].find(':')==0: jerar.append("116040") def SHA256Django(): hs='sha256$Zion3R$9e1a08aa28a22dfff722fad7517bae68a55444bb5e2f909d340767cec9acf2c3' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:6].find('sha256')==0: jerar.append("117020") def RipeMD320(): hs='b4f7c8993a389eac4f421b9b3b2bfb3a241d05949324a8dab1286069a18de69aaf5ecc3c2009d8ef' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("118020") def RipeMD320HMAC(): hs='244516688f8ad7dd625836c0d0bfc3a888854f7c0161f01de81351f61e98807dcd55b39ffe5d7a78' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("118040") def SHA384(): hs='3b21c44f8d830fa55ee9328a7713c6aad548fe6d7a4a438723a0da67c48c485220081a2fbc3e8c17fd9bd65f8d4b4e6b' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("119020") def SHA384HMAC(): hs='bef0dd791e814d28b4115eb6924a10beb53da47d463171fe8e63f68207521a4171219bb91d0580bca37b0f96fddeeb8b' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("119040") def SHA256s(): hs='$6$g4TpUQzk$OmsZBJFwvy6MwZckPvVYfDnwsgktm2CckOlNJGy9HNwHSuHFvywGIuwkJ6Bjn3kKbB6zoyEjIYNMpHWBNxJ6g.' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:3].find('$6$')==0: jerar.append("120020") def SHA384Django(): hs='sha384$Zion3R$88cfd5bc332a4af9f09aa33a1593f24eddc01de00b84395765193c3887f4deac46dc723ac14ddeb4d3a9b958816b7bba' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==False and hash[0:6].find('sha384')==0: print " [+] SHA-384(Django)" jerar.append("121020") def SHA512(): hs='ea8e6f0935b34e2e6573b89c0856c81b831ef2cadfdee9f44eb9aa0955155ba5e8dd97f85c73f030666846773c91404fb0e12fb38936c56f8cf38a33ac89a24e' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("122020") def SHA512HMAC(): hs='dd0ada8693250b31d9f44f3ec2d4a106003a6ce67eaa92e384b356d1b4ef6d66a818d47c1f3a2c6e8a9a9b9bdbd28d485e06161ccd0f528c8bbb5541c3fef36f' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("122060") def Whirlpool(): hs='76df96157e632410998ad7f823d82930f79a96578acc8ac5ce1bfc34346cf64b4610aefa8a549da3f0c1da36dad314927cebf8ca6f3fcd0649d363c5a370dddb' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("122040") def WhirlpoolHMAC(): hs='77996016cf6111e97d6ad31484bab1bf7de7b7ee64aebbc243e650a75a2f9256cef104e504d3cf29405888fca5a231fcac85d36cd614b1d52fce850b53ddf7f9' if len(hash)==len(hs) and hash.isdigit()==False and hash.isalpha()==False and hash.isalnum()==True: jerar.append("122080") print logo while True: jerar=[] print """ -------------------------------------------------------------------------""" hash = raw_input(" HASH: ") ADLER32(); CRC16(); CRC16CCITT(); CRC32(); CRC32B(); DESUnix(); DomainCachedCredentials(); FCS16(); GHash323(); GHash325(); GOSTR341194(); Haval128(); Haval128HMAC(); Haval160(); Haval160HMAC(); Haval192(); Haval192HMAC(); Haval224(); Haval224HMAC(); Haval256(); Haval256HMAC(); LineageIIC4(); MD2(); MD2HMAC(); MD4(); MD4HMAC(); MD5(); MD5APR(); MD5HMAC(); MD5HMACWordpress(); MD5phpBB3(); MD5Unix(); MD5Wordpress(); MD5Half(); MD5Middle(); MD5passsaltjoomla1(); MD5passsaltjoomla2(); MySQL(); MySQL5(); MySQL160bit(); NTLM(); RAdminv2x(); RipeMD128(); RipeMD128HMAC(); RipeMD160(); RipeMD160HMAC(); RipeMD256(); RipeMD256HMAC(); RipeMD320(); RipeMD320HMAC(); SAM(); SHA1(); SHA1Django(); SHA1HMAC(); SHA1MaNGOS(); SHA1MaNGOS2(); SHA224(); SHA224HMAC(); SHA256(); SHA256s(); SHA256Django(); SHA256HMAC(); SHA256md5pass(); SHA256sha1pass(); SHA384(); SHA384Django(); SHA384HMAC(); SHA512(); SHA512HMAC(); SNEFRU128(); SNEFRU128HMAC(); SNEFRU256(); SNEFRU256HMAC(); Tiger128(); Tiger128HMAC(); Tiger160(); Tiger160HMAC(); Tiger192(); Tiger192HMAC(); Whirlpool(); WhirlpoolHMAC(); XOR32(); md5passsalt(); md5saltmd5pass(); md5saltpass(); md5saltpasssalt(); md5saltpassusername(); md5saltmd5pass(); md5saltmd5passsalt(); md5saltmd5passsalt(); md5saltmd5saltpass(); md5saltmd5md5passsalt(); md5username0pass(); md5usernameLFpass(); md5usernamemd5passsalt(); md5md5pass(); md5md5passsalt(); md5md5passmd5salt(); md5md5saltpass(); md5md5saltmd5pass(); md5md5usernamepasssalt(); md5md5md5pass(); md5md5md5md5pass(); md5md5md5md5md5pass(); md5sha1pass(); md5sha1md5pass(); md5sha1md5sha1pass(); md5strtouppermd5pass(); sha1passsalt(); sha1saltpass(); sha1saltmd5pass(); sha1saltmd5passsalt(); sha1saltsha1pass(); sha1saltsha1saltsha1pass(); sha1usernamepass(); sha1usernamepasssalt(); sha1md5pass(); sha1md5passsalt(); sha1md5sha1pass(); sha1sha1pass(); sha1sha1passsalt(); sha1sha1passsubstrpass03(); sha1sha1saltpass(); sha1sha1sha1pass(); sha1strtolowerusernamepass() if len(jerar)==0: print "" print " Not Found." elif len(jerar)>2: jerar.sort() print "" print "Possible Hashs:" print "[+] ",algorithms[jerar[0]] print "[+] ",algorithms[jerar[1]] print "" print "Least Possible Hashs:" for a in range(int(len(jerar))-2): print "[+] ",algorithms[jerar[a+2]] else: jerar.sort() print "" print "Possible Hashs:" for a in range(len(jerar)): print "[+] ",algorithms[jerar[a]] Salvati ca hashid.py Rulati cu : python hashid.py SURSA
  6. Double Post ... Sorry Again
  7. Recently on twitter we told already some information about the Galaxy S III. We told on twitter to wait on the Galaxy S III and do not buy the Nexus Prime Today a insider of Androidandme post some information about the SGS3 see here: Sursa Oricat de fan Samsung as fi...ecranul e prea mare:|
  8. dami si mie pm cu site-ul...
  9. Syngress - A Guide To Kernel Exploitation Attacking The Core 2010.rar Syngress - Digital Forensics For Legal Professionals 2011 rar Syngress - Digital Forensics For Network Internet And Cloud Computing A Forensic Evidence Guide For Moving Targets And Data 2010.rar Syngress - Dissecting The Hack The F0rb1dd3n Network Revised Edition 2010.rar Syngress - Penetration Testers Open Source Toolkit Third Edition 2011.rar Syngress - SQL Injection Attacks And Defense 2009.rar Syngress - The Basics Of Hacking And Penetration Testing Ethical Hacking And Penetration Testing Made Easy 2011.rar Syngress - Thors Microsoft Security Bible A Collection Of Practical Security Techniques 2011rar Syngress - Virtualization And Forensics A Digital Forensic Investigators Guide To Virtual Environments 2010.rar SURSA
      • 1
      • Upvote
  10. Pai daca stii de unde sa il iei sgs2 te ajunge la 15-16 milioane... si pt un telefon cu procesor de 1.2 caruia ii poti face overclock super stabil al 1.6 ghz camera de 8mp hd blitz si tot ce vri pe el , 1gb ram ecran mare , incredibil de luminos ! Eu cred ca este telefonul perfect pt cei care au ce face cu el ... ca mesaje si telefoane poti da si de pe nokia 1100..
  11. "doamne d?-ne droguri, vodca ?i? curve toate celelalte le dobandim si singuri" "??????? ???? ??? ?????????, ????? ? ???? ??? ????????? ?? ??????????? ? ???????????"
  12. Over the past few months I’ve been working on a side project when I had some spare time. I’m releasing the 0.1 alpha pre-release edition of Artillery. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. It’s extremely light weight, has multiple different methods for detecting specific attacks and eventually will also notify you of insecure nix configurations. secmaniac It’s written in Python, its completely open-source and free as all the stuff I write is. You can download Artillery here: svn co http://svn.secmaniac.com/artillery artillery/ To install, simply run ./install.py. This will add artillery to bootup and start Artillery. To give a run down of some of the features. Here is a netstat before: root@bt:~/Desktop/dev# netstat -antp | grep LISTEN root@bt:~/Desktop/dev# Here is a netstat after running Artillery: root@bt:~# netstat -antp | grep LISTEN tcp 0 0 0.0.0.0:135 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:5800 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:5900 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:8080 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:1433 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:1337 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:44443 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:1723 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:3389 0.0.0.0:* LISTEN 29310/python tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 29310/python root@bt:~# If anyone decides to port scan or touch those ports, they are blacklisted immediately and permanently. It’s multi-threaded and can handle as many connections thrown at it. I did some extensive testing under heavy traffic loads on secmaniac.com and derbycon.com. In the first 3 days, it blocked over 387 individuals. In addition to the monitoring, it will also monitor file integrity leveraging sha-512 database where it keeps track of all system files and if anything changes, will email you with the change. By default it monitors /etc/ and /var/www. Artillery also monitors the SSH logs, and the event of a brute force attack, blacklists the host forever. All of this is configurable through the Artillery config. By default artillery installs in /var/artillery and the config file is located at /var/artillery/config: ############################################################################################# # # This is the Artillery configuration file. Change these variables and flags to change how # this behaves. # ############################################################################################# # # DETERMINE IF YOU WANT TO MONITOR OR NOT MONITOR=YES # # THESE ARE THE FOLDERS TO MONITOR, TO ADD MORE, JUST DO “/root”,”/var/”, etc. MONITOR_FOLDERS=”/var/www”,”/etc/” # # BASED ON SECONDS, 2 = 2 seconds. MONITOR_FREQUENCY=10 # # PORTS TO SPAWN HONEYPOT FOR PORTS=”135,445,22,1433,3389,8080,21,5900,25,53,110,3306,1723,1337,10000,5800,44443? # EMAIL_ALERTS=OFF # # CURRENT SUPPORT IS FOR GMAIL ONLY, ENTER YOUR GMAIL USERNAME AND PASSWORD HERE GMAIL_USERNAME=”thisisjustatest@gmail.com” # # ENTER THE GMAIL PASSWORD HERE GMAIL_PASSWORD=”SETHERE” # # ENTER THE EMAIL ADDRESS TO RECEIVE THE ALERT ALERT_USER_EMAIL=”user@whatever.com” # # DO YOU WANT TO MONITOR SSH BRUTE FORCE ATTEMPTS SSH_BRUTE_MONITOR=ON # # HOW MANY ATTEMPTS BEFORE YOU BAN SSH_BRUTE_ATTEMPTS=4 Why write this? I looked at a lot of the honeypot/monitoring tools out there and they are extremely complex to learn. I wanted to write something simple that I know does a good job of weeding out some of the simplistic attacks and keep it very light weight. No external third party modules were used in developing Artillery. It is written purely in Python. Enjoy, much more to come on this. SURSA
  13. Eu merg la WorldClass ... imi plateste firma deci nu ma intereseaza pretul si nici nu pot face mofturi... nu merge acolo ca este extrem de aglomerat nici locuri de parcare nu gasesti ... nici nimic ... o gramada de prosti si "antrenorii" niste mucosi cu muschi ! Daca vrei bodybuilding poti merge la orice sala .. daca vrei cardio ia si alearga !! Nimic nu e mai sfant decat alergatul !!
  14. Mc... Chiar ma gandeam la o specializare de genul ...
  15. Cu spatiu?? toate programele de bruteforce pe care le stiu folosesc cate o parola pe linie... daca insisti cu spatiu intre parole foloseste in linux kate sau kwrite... ctrl+r si inlocuieste o linie cu spatiu... dai replace all si ai rezolvat problema!!
  16. uuuu:D abia astept update-ul pt sgs...
  17. "Just because you're in the spotlight or just because you're an actor or make films doesn't mean that you're not entitled to your own personal privacy," Johansson told CNN after the incident where nude photos of the actress were hacked from her PHONE and posted online. EMPHASIS on PHONE!! Macar citeste si tu stirea inainte de a posta!! On: Daca nu era vb de persoane publine nu se aplica nici un cacat nici la ei!! 121 de ani pt toate capetele de acuzare in conditia in care tipul a "spart" 50 mailuri..2ani/cap nu mi se pare mult!!
  18. co4ie

    Smart IT

    Smart IT, cea mai ampla competitie de aplicatii web & mobile din Romania, ii provoaca pe tinerii dezvoltatori la o mega sesiune de talent si pricepere in software-ul aplicat. Competitia va include si alte concursuri-surpriza si va avea premii in valoare de peste 7.000 euro. Playtech.ro va apasa butonul START la data de 17 octombrie 2011, iar participantii isi vor putea inscrie aplicatiile pe www.playtech.ro/smartit pana la data de 10 noiembrie 2011. Cele mai bune 10 aplicatii vor intra in finala si vor fi prezentate juriului si publicului cu ocazia Mesei rotunde Smart IT, care se va desfasura pe 16 noiembrie, in club Tribute din Bucuresti. In competitia Smart IT vor fi acceptate aplicatii dezvoltate de echipe de pana la 5 membri. Nu exista limitare privind suportul, orice platforma web & mobile fiind admisa in concurs. Conditia principala pentru intrarea in Smart IT este ca aplicatiile sa nu fi fost facute publice pana la data de 17 octombrie 2011. Aplicatiile software vor fi analizate in functie de originalitatea ideii, creativitate, modalitate de implementare (design, performanta, experienta in utilizare), utilitate practica, impact potential. Companii de top jurizeaza si premiaza! Smart IT va reuni specialisti din diverse domenii si companii de prestigiu pentru analizarea lucrarilor. Din juriul tehnic vor face parte experti din cadrul Microsoft, Kolectiv Studio, Research In Motion (RIM), TotalSoft, Nokia, iar jurizarea non-tehnica va fi asigurata de talentatii bloggeri Cristi China Birta (Chinezu.eu), Cristi Dorombach (Piticu.ro), Dan Dragomir. Smart IT reprezinta un complex de provocari adresate tinerilor softisti si onlineri. Competitiei centrale de aplicatii web & mobile i se vor adauga concursuri-surpriza pe diverse teme propuse de companii de renume. Sponsorii si partenerii Smart IT sunt: EuroGSM, TotalSoft, Asus, Kolectiv Studio, Research In Motion (RIM) si Tribute. Evenimentul se bucura de sustinerea bloggerilor Cristian China-Birta (chinezu.eu), Cristi Dorombach (piticu.ro), Dan Dragomir (dandragomir.biz), Bogdan Petre (Imidoresc.ro), Vali Birzoi (valiq.ro) si Sorin Rusi (sorin.rusi.ro). Parteneri media: Realitatea.net, Chip, Paginademedia.ro, Lab501.ro, Regie Live, Stiinta si Tehnica, 9am.ro, Wall-Street.ro, Yuppy.ro, AdEvolution, Money.ro, Radio Lynx, Mobilissimo.ro, Money Express, Business Cover, LaptopNews.ro, ArenaIT.net, Ziua Veche, PCMHZ.ro, Cariereonline.ro, WASD.ro, Puterea, Organizatia Colegiul Studentesc din Electronicaƒ (OCSE), Liga Studentilor Facultatii de Automatica si Calculatoare (LSAC), Inventeaza.ro, Gadget.ro, PCnews, PC World, Computer World, PCforum.ro, AndroidLive.ro si PHPRomania.net. Merge ... facusem postul din masina... cand ma plictiseam in trafic... firar Bucurestiul a dreaq!!
  19. Majoritatea hotelurilor au wifi moka sau daca nu parola este numele hotelului... la 85% din ele asa e ... credeti-ma pe cuvant ! La celelalte cu plata (cand intri te redirectioneaza catre pagina lor unde bagi nr camerei si pass sau platesti cu CC): 1. Puteti face o scanare in retea sa vezi un MAC al unuia care e conectat si sa incerci sa te conectezi 2. Puteti folosi una din metodele astea: ICMPTX sau NSTX 3. Cautati salile de conferinta,piscinile,salile de forta... de obicei alea nu sunt parolate 4. O retea ne parolata din vecinatate... La Radisson Blu Bucuresti daca vreti net moka conectati-va , alegeti meeting delegate , alegeti una din delegatiile din lista (de obicei enumai una)si parola este : 123456 !! Merge sigur ... descoperita testata de mine
  20. Pai ... sa o luam cu inceputul... Pentru rezolutie : Modifica /etc/default/grub si seteaza rezolutia pe care o doresti, si xorg.conf care il gasesti in /usr/share/xresprobe/xorg.conf (sau cel putin aici e la mine) si modifica toate rezolutiile de acolo cu ce rezolutie vrei ! nu am lucrat cu WW... dar presupun ca foloseste tot aircrack impreuna cu alte tool-uri de automatizare ... nu prea pot sa te ajut ca nu stiu despre ce vb dar o sa incerc sa ma documentez in masura timpului de care dispun ! Poti incerca sa instalezi pe WW wicd network manager (sau poate preferi altul..) si sa incerci asa , sau poti incerca ifconfig wlan0 up iwlist wlan0 scan ifconfig wlan0 iwconfig wlan0 essid "nume retea" channel 6 key parola dhclient wlan0 Direct din consola...
  21. pai arp poisoning se refera numai la traficul de date...si orice echipament conectat la acea retea va fi afectat!! La android am facut un test dar parolele nu apar in schimb id`urile da... chiar daca am folosit sslstrip/etercap/squid si tot ce am mai avut in arsenal!! La symbian nu stiu..nu am pus mana pe nici un telefon pt teste !!
  22. WW e windows? right click pe toolbar, add applet, non-KDE application launcher, executable: /sbin/poweroff Poti folosi si /sbin/init arguments: 0 dar o sa iti omoare totul cam brusc.. Totusi nu inteleg de ce ai avea nevoie de asa ceva .. deschizi un terminal si scrii poweroff.. Si nu inteleg ce vrei sa zici cu rezolutia..ce butoane??rezolutie la ce?? Daca nu stii ceva intreaba .. de asta suntem aici!!
  23. wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py chmod +x wifite.py python wifite.py Pentru a vedea lista de comenzi : ./wifite.py -help Wifite este un script de automatizare a procesului... foloseste tot aircrack ca baza... nu ai ce instala !!
  24. Singura problema e ca toti taticii informaticii cad unul dupa altul !! Si da... e mult mai important decat SJ.. fara el nu exista programare sau cine stie in ce directie se ducea !! RIP !
  25. Pai cei care sunt cu lupa ... nu prea se baga in seama ... ca ti-ai seama imediat care sunt! Daca ai timp si binevoiesti ... stiu ca voi (avocatii) aveti acces la aplicatiile alea cu legislatia in vigoare si metodologia de aplicare... poate reusesti sa scoate articolele cu referire la hacking,creacking,carding,DoS si alte subiente de genul!! Ai fi uimit cati intreaba ce se intampla daca au facut si ei o scanare in retea sau altele...!!
×
×
  • Create New...