Jump to content

Un.Neuron

Active Members
  • Posts

    106
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Un.Neuron

  1. Un.Neuron

    salut

    deci nu stii nimic pe partea de programare... spor la invatat!
  2. intrebare fara raspuns: de ce ar trebui sa platesti pt asa ceva ?!
  3. Dude, nu... LE: Ajuta si vei fi ajutat! din cate vad, tu nu prea ai ajutat cu nimic pe aici.
  4. nu are legatura cu versiunea de Adobe Reader, ci sunt encriptate de producator.
  5. crezi ca e afectat paxnWo de treaba asta ? il doare-n pl...
  6. ce ai putea face cu hostingul ? de pilda, ce a zis si Mr.Jan, adica un FTP pe care sa fie urcati giga de carti, softuri, tutoriale, samd, pe care sa le poti descarca mai usor, intr-o ora decat sa stai la free o saptamana pe rs, hotfile, fileserve, filesonic, megaupload... cam ca aici> http://rstcenter.com/forum/38795-pentru-cunoscatori-ceh-v7-sans-504-a.rst astept sa-i dai drumul...
  7. UPDATE 1. SANS SECURITY 517 - Cutting-Edge Hacking Techniques SANS: Cutting-Edge Hacking Techniques 2. SANS SECURITY 560 - Network Penetration Testing and Ethical Hacking SANS: Network Penetration Testing and Ethical Hacking 3. SANS SECURITY 617 - Wireless Ethical Hacking, Penetration Testing, and Defenses SANS: Wireless Ethical Hacking, Penetration Testing, and Defenses 4. DEF CON 18 Archive DEF CON® 18 Hacking Conference 5. Trainsignal CWNA PW0-104 Exam - Wireless Networking, Administration and Security Certified Wireless Network Administrator (CWNA) Training, PW0-104 Exam, MOS Certification | Train Signal PM pt usr/psw
  8. Poate se pune in miscare si RST Court. Parea o idee buna.
  9. Unauthorised Access: Physical Penetration Testing For IT Security Teams, 2009 Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security. Free File Hosting, Online Storage &amp File Upload with FileServe
  10. Un.Neuron

    w3af

    post dublu a postat begood cu un an in urma> http://rstcenter.com/forum/20626-w3af-web-application-attack-audit-framework.rst
  11. update> Samurai-0.9.9 update> Download Samurai from SourceForge.net
  12. Metasploit Framework 4.0.0 The Metasploit® Framework is a free, open source penetration testing solution developed by the open source community and Rapid7. It is the de-facto standard for penetration testing with more than one million unique downloads per year and the world’s largest, public database of quality assured exploits. Download Metasploit Framework | Metasploit Project
  13. The University announced Friday that the names and Social Security numbers of 43,000 people affiliated with Yale have been available to Google search engine users for the past 10 months. Though Information Technology Services Director Len Peters said there is no indication that the information has been exploited, Yale has established a response center to answer questions from affected students, faculty, staff and alumni — all of whom were affiliated with the University in 1999 — and is offering them two years of free credit monitoring and identity theft insurance. Yale did not discover the breach until June 30, Peters said. While Google representatives told the University that the file is no longer available in searches, they would not say whether any Google users had actually accessed the file. “We immediately blocked that server from the Internet, removed the file and did a complete scan of the server to make sure there were no additional at-risk files,” Peters said. The information was stored on a file transfer protocol (FTP) server used primarily for open source materials. Peters said the file containing the names and Social Security numbers, mostly of people who worked for the University in 1999, was the only sensitive file to be made public. The file did not include addresses, birth dates or financial information. In September 2010, Google modified its search engine to be capable of finding and indexing FTP servers, Peters said, but ITS was not aware of this change. He added that since discovering that the file was accessible, ITS has confirmed that other search engines, such as Yahoo!, do not index FTP servers. Peters said that both file and the directory in which it was contained had innocuous names. A user who encountered the file in a Google search would not be able to determine what information the file held unless he or she opened it, he said. “It was pretty well-hidden, with a very inconspicuous file name,” Peters said. Google would not release information on how many times files have been accessed from its search engine, he added. Peters, who came to ITS from Columbia Business School at the end of last year, said he will take steps to improve information security during his first year as Yale’s Chief Information Officer. These measures will include better communication with Google, he said. Starting in September, Yale will outsource University e-mail to Google. sursa> Yale affiliates' SSNs were searchable on Google | Yale Daily News cine gaseste dbul sa posteze link aici.
  14. We've had reports of a new worm in the wild and that generates increased RDP traffic for our users on port 3389. Although the overall numbers of computers reporting detections are low in comparison to more established malware families, the traffic it generates is noticeable. The worm is detected as Worm:Win32/Morto.A and you can see a detailed description of it at Worm:Win32/Morto.A. Morto attempts to compromise Remote Desktop connections in order to penetrate remote systems, by exploiting weak administrator passwords. Once a new system is compromised, it connects to a remote server in order to download additional information and update its components. It also terminates processes for locally running security applications in order to ensure its activity continues uninterrupted. Affected users should note that a reboot may be required in order to complete the cleaning process. This particular worm highlights the importance of setting strong system passwords. Using strong passwords can go a long way towards protecting your environment -- and the ability of attackers to exploit weak passwords shouldn't be underestimated. For example, Morto tries the following passwords: *1234 0 111 123 369 1111 12345 111111 123123 123321 123456 168168 520520 654321 666666 888888 1234567 12345678 123456789 1234567890 %u% %u%12 1234qwer 1q2w3e 1qaz2wsx aaa abc123 abcd1234 admin admin123 letmein pass password server test user sursa> New worm targeting weak passwords on Remote Desktop connections (port 3389) - Microsoft Malware Protection Center - Site Home - TechNet Blogs
  15. Invalid or Deleted File. link nou: MEGAUPLOAD - The leading online storage and file delivery service psw: ebooksclub.org
  16. mai traiesti ?

    vezi ca ti-am dat mail

  17. Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition, 2009 MEGAUPLOAD - The leading online storage and file delivery service pass: "ebooksclub . org" (fara spatii si ghilimele)
  18. linkul nu mai merge. Acest fi?ier a fost ?ters fie datorit? dreptului de autor sau a fost ?ters de c?tre Uploader. link nou: MEGAUPLOAD - The leading online storage and file delivery service pass: "ebooksclub . org"(fara spatii si ghilimele)
  19. A Guide to Kernel Exploitation: Attacking the Core, 2010 Product Description The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks link: MEGAUPLOAD - The leading online storage and file delivery service pass: "ebooksclub . org"(fara spatii si ghilimele)
  20. Counter Hack Reloaded, Second Edition, 2005 link: MEGAUPLOAD - The leading online storage and file delivery service pass: "ebooksclub . org"(fara spatii si ghilimele)
  21. Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition, 2011 eBook Description: Use packet analysis to identify and resolve common network problems like loss of connectivity, DNS issues, sluggish speeds, and malware infections Build customized capture and display filters Monitor your network in real-time and tap live network communications Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing captures Build statistics and reports to help you better explain technical network information to non-techies With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition will teach you how to make sense of your PCAP data. You’ll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you’re on your way to packet analysis proficiency. Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition is a must for any network technician, administrator, or engineer. Stop guessing and start troubleshooting the problems on your network. This significantly revised and expanded second edition of Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition shows you how to use Wireshark to capture raw network traffic, filter and analyze packets, and diagnose common network problems. It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network? link- MEGAUPLOAD - The leading online storage and file delivery service pass: "ebooksclub . org"(fara spatii si ghilimele)
×
×
  • Create New...