-
Posts
638 -
Joined
-
Last visited
-
Days Won
6
Everything posted by co4ie
-
Vand Mouse Razer DeathAdder 3.5G 3500 DPI Produsul a fost cumparat in data de 8/12/2011. Garantia este valabila inca 20 Luni ! Mouse-ul a fost folosit foarte putin, vine in ambalajul original, desigilat, cu factura originala, bon fiscal si garantie. Pachetul contine: Mouse, Certificat Autenticitate, Instructiuni instalare si alte carticele ! Mouse-ul are urmatoarele caracteristici: Senzor Infrarosu 3500dpi Razer Precision 3.5G Design Ergonomic Pentru Mana Dreapta 1000Hz Ultrapolling / 1ms response Cinci Butoate Programabile Cu Hyperaspuns Ajustarea On-The-Fly A Sensibilitatii Mod Always-On Butoane Ultra-Large Non-Slip 60–120 Inchi/Secunda Si 15g Acceleratie Talpici Mouse Zero-Acoustic Ultraslick USB Connector Placat Cu Aur Cablu De 2.13 M , Foarte Usor, Din Fibra Optica Cu Protectie Textila Marimi Aproximative: 127 mm / 5.00” (Lungime) x 70 mm / 2.76” (Latime) x 44 mm / 1.73” (Innaltime) Greutate Aproximativa : 148 g Cerinte System: PC / Mac Cu Port USB Windows® 7 / Windows Vista® / Windows® XP Sau Mac OS X Conexiune Internet (Pentru Instalarea Driverelor) Cel Putin 35MB Spatiu Liber Pe HardDisk Pretul Este De 220 RON ! Si pentru 50 Ron in plus mai primiti si un mouse Razer DeathAdder STRICAT (Pentru piese in caz ca aveti nevoie) Detalii in PM si fara comentarii inutile !!
-
?unbatu? WTF? Si nu poti rula amandoua o data... poti face dual boot sau sa rulezi ubuntu in vm !! dar daca rulezi in vm iti garantez ca "NU" o sa inveti vreo data ! Eu si acum am cd-urile cu ubuntu 5.10 originale pierdute prin casa:)) @pyth0n3: PBX?? 99% din companiile mari (Mai mult de 25 angajati) plus companiile noi infiintate folosesc acum VoIP ... PBX nu am mai vazut de mult !! Nu vrei sa lucrezi intr-o companie multinationala ... si nici nu o sa lucrezi daca nu ai diplomele de la cisco (sau altele echivalente)... ca si sysadmin! In companiile mari sunt o gramada de sefi, sefuti si altii care o sa iti zica sa faci aia si aialalta chiar daca nu stiu despre ce vorbesc si de obicei sunt la pamant cu ultimele tehnologii !! Linux te ajuta enorm ... daca mai stii si altele pe langa !Sybase ... Tot ce poti afla sunt datele tranzactiilor ... cine si ce a cumparat si atat ... date care sunt de altfel publice pt cei care lucreaza in domeniu (vezi bloomberg pt cei care lucreaza cu tranzactii cu actiuni)! @Gecko "Nu" ... Tastatura isi bate joc de mine !!
-
pt servici un calendar comun in lan si pt timp personal calendarul din android sincronizat cu cel din lan !
-
HackForums Database!! Available for Download via user "tweb" Username:Omniscient UserID:1 password:58ee7638c57e783383b4be1b6afa51bc salt:lfr2JSV2 loginkey:by3IzRpuLcV9u746fITHdGkmJv2VMnW6UtjeB2OFbynzjaRZMr email:jesse@mghz.com Birthday:18-8-1970 If user changed info then the data presented may mismatch. Try with your ID if you have there. Download Sursa
-
Am nevoie de un cod de deblocare pt un Samsung Gt-E2600 ,telefonul este blocat in Vodafone ... cine ma poate ajuta pm va rog !!
-
Sandcat Browser is a freeware portable pen-test oriented multi-tabbed web browser with extensions support developed by the Syhunt team, the same creators of the Sandcat web application security scanner. The Sandcat Browser is built on top of Chromium, the same engine that powers the Google Chrome browser, and uses the Lua language to provide extensions and scripting support. Changelog 2.0 Sandcat Browser version 2.0 includes several user interface and experience improvements, an improved extension system, RudraScript support and new extensions. User Interface & Experience Enhancements New windows will now open in new Tabs. Navigation bar now behaves like Firefox’s or Opera’s. Improved multi-tab support. Improved source tab. Added a simple cookie logging extension. Sandcat Browser Extension Development Kit The Sandcat Browser Extension Development Kit is now available at this link. It also includes the source of all the Sandcat Browser extensions. Improved Extension System Fixed: crash when using the Run JavaScript option (when calling the sandcat.browser.log() function). sandcat.browser.log() function replaced by Sandcat.WriteLn() and Sandcat.Write(). Added RudraScript Syhunt RudraScript allows you to easily execute code in JavaScript, PascalScript, Perl, PHP, Python, Ruby & VBScript from within the browser and the browser extensions. Download Sursa
-
cauta wpscan ... daca o sa ai noroc o sa iti gaseasca vulnerabilitati in pluginurile folosite !
-
EXCLUSIVE: Law enforcement agents on two continents swooped in on top members of the infamous computer hacking group LulzSec early this morning, and acting largely on evidence gathered by the organization’s brazen leader -- who sources say has been secretly working for the government for months -- arrested three and charged two more with conspiracy. Charges against four of the five were based on a conspiracy case filed in New York federal court, FoxNews.com has learned. An indictment charging the suspects, who include two men from Great Britain, two from Ireland and an American in Chicago, is expected to be unsealed Tuesday morning in the Southern District of New York. “This is devastating to the organization,” said an FBI official involved with the investigation. “We’re chopping off the head of LulzSec.” This is devastating to the organization. - Senior FBI official The offshoot of the loose network of hackers, *********, believed to have caused billions of dollars in damage to governments, international banks and corporations, was allegedly led by a shadowy figure FoxNews.com has identified as Hector Xavier Monsegur. Working under the Internet alias “Sabu,” the unemployed, 28-year-old father of two allegedly commanded a loosely organized, international team of perhaps thousands of hackers from his nerve center in a public housing project on New York’s Lower East Side. After the FBI unmasked Monsegur last June, he became a cooperating witness, sources told FoxNews.com. “They caught him and he was secretly arrested and now works for the FBI,” a source close to Sabu told FoxNews.com. Monsegur pleaded guilty Aug. 15 to 12 hacking-related charges and information documenting his admissions is expected to be unsealed in Southern District Court on Tuesday. As a result of Monsegur’s cooperation, which was confirmed by numerous senior-level officials, the remaining top-ranking members of LulzSec were arrested or hit with additional charges Tuesday morning. The five charged in the LulzSec conspiracy indictment expected to be unsealed were identified by sources as: Ryan Ackroyd, aka “Kayla” and Jake Davis, aka “Topiary,” both of London; Darren Martyn, aka “pwnsauce” and Donncha O’Cearrbhail, aka “palladium,” both of Ireland; and Jeremy Hammond aka “Anarchaos,” of Chicago. Hammond was arrested on access device fraud and hacking charges and is believed to have been the main person behind the devastating December hack on U.S. security company Stratfor. Millions of emails were stolen and then published on Wikileaks; credit card numbers and other confidential information were also stolen, law enforcement sources told FoxNews.com. The sources said Hammond will be charged in a separate indictment, and they described him as a member of *********. The others are all suspected members of LulzSec, the group that has wreaked havoc on U.S. and foreign government agencies, including the CIA and FBI, numerous defense contractors, financial and governmental entities and corporations including Fox and Sony. Ackroyd, who is suspected of using the online handle “Kayla,” is alleged to be Monsegur’s top deputy. Among other things, Kayla identified vulnerabilities in the U.S. Senate’s computer systems and passed the information on to Sabu. Kayla was expected to be taken into custody on Tuesday. A spokeswoman for the Southern District and U.S. Attorney Preet Bharara declined comment. Monsegur’s attorney did not return FoxNews.com’s repeated requests for comment. Sursa
-
BackTrack 5 R2 Released! Mar 1st, 2012 BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community. Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs. Download Sursa
-
RDP > citeste si invata! SMTP > citeste si invata! Off: Ai 274 posturi si nu stii ce e un rdp/smtp sau ce sa faci cu ele? Damn...
-
Forensic FOCA is a tool for forensic analysts focused on the use of metadata files to generate a forensic case. The tool is capable of analyzing the metadata of a different document formats that are presented below: Microsoft Office 2007and later (.docx, .xlsx, .pptx, .ppsx) Microsoft Office 97 to 2003 (.doc, .xls, .ppt, .pps) OpenOffice (.odt, .ods, .odg, .odp, .sxw, .sxc, .sxi) PDF documents EXIF information in JPG WordPerfect (.wpd) SVG images InDesign documents (.indd) Once the automatic process of extraction of metadata has finished, you can display information extracted in two ways: Document view and Timeline view. One of those ways is the display of documents (Document view), where you can view files with metadata that have been analyzed. On the left side of this document view, the files are grouped by size and in the central part can be obtained a list of files with hashes. In the screenshot you can see this view. In the tree or files explorer (on the left side of Document view) it appears a summary of the users, folders, email and other information found in the metadata of the documents. This quick overview can be seen from the information extracted from the documents and come to where you extracted. Forensic FOCA allows you to view the metadata for each document analyzed, ideal for an analysis of an interest document. The other type of display data is with a timeline showing the events related to files organized by date. This makes it possible to quickly view the events of a certain date. The different events that exist are creating, modifying and printing documents. To be comfortable moving between the whole list of information has added a filtering system by date, document type or by users. This system makes it is enough to click a user to will access the timeline of this one person. Finally Forensic FOCA allows you to export all information obtained in XML or HTML to use this information as more appropriate, and print this data. Sursa Interesant tool... in weekend trec la teste ..
- 1 reply
-
- 1
-
The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating systems, providingcentralized logging and maintenance, although it can also be used as standalone application on a single host. Samhain is an open-source multiplatform application for POSIX systems (Unix, Linux, Cygwin/Windows). Changelog v3.0.2a 3.0.2a: Fix compile error on Solaris 10 3.0.2: change sql init scripts to make bigint fields unsigned (problem reported by A. Sabitov) patch by Andy Jack for issue with the –with-gpg option (hangs with high cpu load at startup) call ./samhain-install.sh as /bin/sh ./samhain-install.sh in the RPM spec file, because /var might be mounted noexec (reported by GC) fixed configure.ac for the case that –with-gpg and –enable-nocl are used (./samhain for gpg checksum; problem report by Andy Jack) fixed a potential NULL pointer dereference in sh_inotify.c on systems where inotify is not available (reported by <*********>) fixed: the config file template mentions (in a comment) the non-existent directive SetLockPath instead of the correct SetLockfilePath (reported by Curtis). fixed: the definition of O_NOATIME isn’t seen in sh_files.c. Download Sursa
-
Security+ Guide To Network Security Fundamentals 4th Edition
co4ie replied to Usr6's topic in Tutoriale in engleza
Merci mult !! Am urcat cartea si AICI ... intradevar se descarca greu de pe site-ul ala !! -
uuuuu da ... astea ar trebui puse intr-un topic ... ce tampenii mai scriu/trimit/cauta hackerii !!
-
@olimpus veziti de lungul nasului !! @shyfty Daca vrei sa inveti sa faci ceva ... cauta tutoriale, informeazate, incearca si abia dupa ce nu reusesti sau daca mai ai vreo nelamurire suplimentara cere ajutorul si atunci nimeni nu te va mai lua la misto !! Cat despre problema ta ... intra pe aircrack-ng.org si vezi ce poti rezolva singur ... uitate la tutoriale pe youtube , prietenul google o sa iti dea multe rezultate daca o sa cauti !! Si nu incerca sa spargi vreo ceva din windows...ca nu o sa reusesti!!
-
Crack wpa/wpa2 whit gerix ad rainbow tb
co4ie replied to bajetzashu89's topic in Wireless Pentesting
fii dragut si da mai multe detalii... de unde ai luat RT? stii pe ce sunt (ma refer pt ce fel de hash)? Cele facute pt LM/sha/altele nu o sa iti mearga niciodata pt wpa... -
Martorul de la tine din masina , ca si martorii de la el din masina nu se iau in calcul !! Nu ai altceva de facut decat sa ii dai asigurarea... de asta a fost facuta si asigurarea si de asta s-a introdus constatarea amiabila !!Niciodata sa nu alegi sa te intelegi cu el mai tarziu sau sa va intalniti dupa undeva sa faceti actele !! Bunul simt s-ar zice ca iti lipseste si ca tu vrei sa fii magar ... ai facut o dauna (oricat de mica are fi ea)... plateste!!
-
Nmap Iptables Shell Script #!/bin/bash # To run this file, first give the permission +x and execute this program # --# chmod +x blocknmap.sh # --# ./blocknmap.sh echo "1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1" echo "3 3" echo "3 ________ .__ ________ 3" echo "7 \______ \ |__| ______/ __ \ ____ ____ _____ 7" echo "1 | | \ | | / ___/\____ / _/ ___\ / _ \ / \ 1" echo "3 | \| | \___ \ / / \ \___ ( <_> )| Y Y \ 3" echo "3 /_______ /|__|/____ > /____/ /\ \___ > \____/ |__|_| / 3" echo "7 \/ \/ \/ \/ \/ 7" echo "1 1" echo "3 >> The Underground Exploitation Team 3" echo "3 3" echo "7 7" echo "1 [+] Site : http://www.Dis9.com 1" echo "3 3" echo "3 3" echo "7 ############################################### 7" echo "1 I'm Liyan Oz Leader of Underground Exploitation 1" echo "3 ############################################### 3" echo "3 3" echo "7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-7" echo "========================================================================" echo "= Block Nmap Scanning using iptables =" echo "= C0ded by Liyan Oz =" echo "= http://0nto.wordpress.com =" echo "========================================================================" echo "" echo "" #===================== # Enable IP Forward #--------------------- echo 1 > /proc/sys/net/ipv4/ip_forward #===================== # Flush semua rules #--------------------- /sbin/iptables -F /sbin/iptables -t nat -F #===================== # Block #--------------------- /sbin/iptables -t filter -A INPUT -p TCP -m state --state RELATED,ESTABLISHED -j ACCEPT /sbin/iptables -t filter -A INPUT -p UDP -m state --state RELATED,ESTABLISHED -j ACCEPT /sbin/iptables -t filter -A INPUT -p ICMP -m state --state RELATED,ESTABLISHED -j ACCEPT /sbin/iptables -t filter -A INPUT -m state --state INVALID -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j LOG --log-prefix "FIN: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ACK,PSH PSH -j LOG --log-prefix "PSH: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ACK,PSH PSH -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ACK,URG URG -j LOG --log-prefix "URG: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ACK,URG URG -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL ALL -j LOG --log-prefix "XMAS scan: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL ALL -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL NONE -j LOG --log-prefix "NULL scan: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL NONE -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j LOG --log-prefix "pscan: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j LOG --log-prefix "pscan 2: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags FIN,RST FIN,RST -j LOG --log-prefix "pscan 2: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags FIN,RST FIN,RST -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL SYN,FIN -j LOG --log-prefix "SYNFIN-SCAN: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL SYN,FIN -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL URG,PSH,FIN -j LOG --log-prefix "NMAP-XMAS-SCAN: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL URG,PSH,FIN -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL FIN -j LOG --log-prefix "FIN-SCAN: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL FIN -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL URG,PSH,SYN,FIN -j LOG --log-prefix "NMAP-ID: " /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags ALL URG,PSH,SYN,FIN -j DROP /sbin/iptables -t filter -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j LOG --log-prefix "SYN-RST: " Sursa
-
Intersect: Automated post-exploitation tool for Linux Intersect 2.0 is a Python script written to perform automated Post-Exploitation information gathering and reporting. The general idea is that after you have exploited a target, you run this script and it performs a variety of tasks that you would normally need to perform manually. Intersect will collect password files, copy SSH keys, enumerate processes and installed applications, gather detailed network information, map the hosts internal network (for pivoting),locate and identify common anti-virus and firewall applications and much more. Features of Intersect General Run application as background process Generate report text files for each section of features Create archive containing final reports (tar.gz) Send individual reports and/or archive to remote host (upcoming) Operating System & User Information OS, Distro, Kernel Info. Running Processes List Of Installed Applications Scheduled Tasks/Cronjobs Mounts and Attached Devices Listings of Home Directories File System & Memory Information Passwords & Credentials Password files(passwd, shadow, gshadow, master.passwd) SSH Keys (private and public) Sudoers list SSH Known Hosts SSH Authorized Keys GNUPG/PGP Keys (private and public) Mail Aliases Bash Histories User Groups Last Logs SSHD Config DB Enumeration & Passwords (upcoming feature) Download Intersect: Intersect v.2.0 – Intersect2-Beta.py Si cu el o sa adunati ceva de genul asta : credentials/ credentials/bash_history.txt credentials/gshadow credentials/secring.gpg credentials/mail_aliases.txt credentials/passwd.txt credentials/known_hosts credentials/sudoers.txt credentials/shadow.txt credentials/sshd_config credentials/SSH_Locations.txt credentials/last.txt credentials/lastlog.txt network/ network/hosts.allow network/Connections.txt network/iptables_save.txt network/NetworkInfo.txt network/iptablesLN.txt network/hosts.deny network/inetd.conf protection/ protection/FullList configs/ osinfo/ osinfo/cronjobs.txt osinfo/loglist.txt osinfo/HistoryList.txt osinfo/sbin.txt osinfo/media.txt osinfo/SysInfo.txt osinfo/bin.txt osinfo/ps_aux.txt osinfo/users/ osinfo/users/CurrentUser.txt osinfo/users/allusers.txt osinfo/users/userhome.txt osinfo/sysctl.txt osinfo/mount.txt osinfo/SQL_locations.txt hosts/ hosts/livehosts.txt
-
Dupa cum am zis metoda functioneaza pe Xp , pe vista trebuie sa ai cont de admin ca sa modifici fisierul ... sunt multe de care trebuie sa tii cont iar acest "hack" este pt calculatoarele la care ai acces fizic si putin timp la dispozitie ... calculatoarele de la laboratoarele de informatica si calculatoarele amicilor sunt numai bune de incercat metoda asta ... si asa poti instala lejer un backdoor , keylogger sau alte prostii !!
-
Desi este foarte veche, metoda nu este foarte cunoscuta si functioneaza pe majoritatea versiunilor de Windows (eu am testat pe Xp (acum ceva timp) si Vista)!! Trebuie sa aveti acces fizic la calculator ... deci poate fi folosita in laboratoarele de informatica si in salile de net ,dar cu ultimele update-uri de la Microsoft este posibil sa nu mai functioneze ! Vulnerabilitatea consta in faptul ca Windows-ul nu verifica integritatea fisierului "c:/windows/system32/sethc.exe" inainte de a fi executat , ceea ce inseamna ca poate fi inlocuit cu orice alt executabil , iar pentru asta o sa folosim celebrul "cmd.exe" ! Schimbam numele fisierului "sethc.exe" in orice altceva , facem o copie la fisierul "c:/windows/system32/cmd.exe" si ii dam numele "sethc.exe" ! Se restarteaza calculatorul iar la login screen se apasa de 5 ori shift, alt sau ctrl ceea ce va deschide "sethc.exe" (actualul "cmd.exe") ca NT Authority\system ... iar de aici este simplu : Putem folosi urmatoarele comenzi : net user USERNAME /add net localgroup administrators USERNAME //pentru a adauga un nou administrator explorer.exe pentru a avea acces la Desktop ca NT Authority\system Sa rulam alte tool-uri de pe stick sau cd ca: Pwdump, Fgdump, sau altele (trebuie sa aveti si voi imaginatie)!
-
Acum ceva timp la Shmoocon a fost prezentat un POC despre cardurile care au tehnologia RFID ... se pare ca a fost gasita o solutie la aceasta problema ! Innovative design allows cards to turn 'on' and 'off,' making them unreadable by thieves with portable scanners With technology has come ease. These days, thanks to near-field communications (NFC) and radio frequency identification (RFID), consumers no longer have to swipe credit cards through an interrogative machine—they are able to simply wave their credit cards to make purchases or withdraw money from their bank accounts. Such ease, however, also has brought with it theft and fraud. Researchers at the University of Pittsburgh Swanson School of Engineering have come up with a method to improve security through a new credit card design that allows a card to turn "on" and "off." RFID tags and NFC credit cards are currently enabled to operate any time they're placed in an electromagnetic field. However, that can be dangerous, says Marlin Mickle, the Nickolas A. DeCecco Professor of Engineering and executive director of the RFID Center for Excellence in the Swanson School. That's because portable readers are now available for less than several hundred dollars, making it possible for thieves to simply pass a reader near an NFC credit card and charge purchases to it or extract cash from a bank account. "Our new design integrates an antenna and other electrical circuitry that can be interrupted by a simple switch, like turning off the lights in the home or office," says Mickle. "The RFID or NFC credit card is disabled if left in a pocket or lying on a surface and unreadable by thieves using portable scanners." With this new technology, consumers would simply hold RFID or NFC credit cards in a specified area—for example, on an emblem or some other identifying mark—when making a transaction. As long as the "switch" is held, the card is turned "on." When returned to a wallet or purse and tactile contact is discontinued, the card automatically turns "off." "This solution is simple and very inexpensive to integrate into the RFID and NFC credit card manufacturing process," Mickle says. "We have filed a patent application and hope to see the technology quickly adopted, once approved." Sursa