Un.Neuron
-
Posts
106 -
Joined
-
Last visited
-
Days Won
2
Posts posted by Un.Neuron
-
-
depanare: detectare si rezolvare probleme hardware + cele software( 99% windows), o experienta destul de mare....
acuma invat c++, f putin html....
office-- word, powerpoint --- f bine
excel--bine( am mai uitat din el)
putina editare video...
recuperare date, mentenanta sistem
deci nu stii nimic pe partea de programare...
spor la invatat!
-
Pai despre ce pot fi logurile ?
Date de logare pe diferite siteuri ..conturi si parole .
Din stealer .
intrebare fara raspuns:
de ce ar trebui sa platesti pt asa ceva ?!
-
Thx....
Edit:
spor la dwnld!
-
Dude, da-mi si mie pm cu loginul O-o, iti dadusi PM
Dude, nu...
LE: Ajuta si vei fi ajutat!
din cate vad, tu nu prea ai ajutat cu nimic pe aici.
-
Deschide-le cu ultima versiune de Adobe Reader si iti vor merge
nu are legatura cu versiunea de Adobe Reader, ci sunt encriptate de producator.
-
Aici era pasul gresit facut de paxnWo...
crezi ca e afectat paxnWo de treaba asta ?
il doare-n pl...
-
Plus o tzava decenta.
Ce ati face voi cu ei ?
Cum as putea ajuta comunitatea RST ?
Postati aici.
PS : nu ma intereseaza banii.
ce ai putea face cu hostingul ?
de pilda, ce a zis si Mr.Jan, adica un FTP pe care sa fie urcati giga de carti, softuri, tutoriale, samd, pe care sa le poti descarca mai usor, intr-o ora decat sa stai la free o saptamana pe rs, hotfile, fileserve, filesonic, megaupload...
cam ca aici>
http://rstcenter.com/forum/38795-pentru-cunoscatori-ceh-v7-sans-504-a.rst
astept sa-i dai drumul...
-
mi-a picat bine...
+1 rep
-
UPDATE
1. SANS SECURITY 517 - Cutting-Edge Hacking Techniques
SANS: Cutting-Edge Hacking Techniques
2. SANS SECURITY 560 - Network Penetration Testing and Ethical Hacking
SANS: Network Penetration Testing and Ethical Hacking
3. SANS SECURITY 617 - Wireless Ethical Hacking, Penetration Testing, and Defenses
SANS: Wireless Ethical Hacking, Penetration Testing, and Defenses
4. DEF CON 18 Archive
DEF CON® 18 Hacking Conference
5. Trainsignal CWNA PW0-104 Exam - Wireless Networking, Administration and Security
PM pt usr/psw
-
Cred ca saptamana viitoare se va face putina ordine intre VIPi.
Poate se pune in miscare si RST Court. Parea o idee buna.
-
Unauthorised Access: Physical Penetration Testing For IT Security Teams, 2009
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.
Free File Hosting, Online Storage & File Upload with FileServe
-
post dublu
a postat begood cu un an in urma>
http://rstcenter.com/forum/20626-w3af-web-application-attack-audit-framework.rst
-
-
Metasploit Framework 4.0.0
The Metasploit® Framework is a free, open source penetration testing solution developed by the open source community and Rapid7. It is the de-facto standard for penetration testing with more than one million unique downloads per year and the world’s largest, public database of quality assured exploits.
-
The University announced Friday that the names and Social Security numbers of 43,000 people affiliated with Yale have been available to Google search engine users for the past 10 months.
Though Information Technology Services Director Len Peters said there is no indication that the information has been exploited, Yale has established a response center to answer questions from affected students, faculty, staff and alumni — all of whom were affiliated with the University in 1999 — and is offering them two years of free credit monitoring and identity theft insurance.
Yale did not discover the breach until June 30, Peters said. While Google representatives told the University that the file is no longer available in searches, they would not say whether any Google users had actually accessed the file.
“We immediately blocked that server from the Internet, removed the file and did a complete scan of the server to make sure there were no additional at-risk files,” Peters said.
The information was stored on a file transfer protocol (FTP) server used primarily for open source materials. Peters said the file containing the names and Social Security numbers, mostly of people who worked for the University in 1999, was the only sensitive file to be made public. The file did not include addresses, birth dates or financial information.
In September 2010, Google modified its search engine to be capable of finding and indexing FTP servers, Peters said, but ITS was not aware of this change. He added that since discovering that the file was accessible, ITS has confirmed that other search engines, such as Yahoo!, do not index FTP servers.
Peters said that both file and the directory in which it was contained had innocuous names. A user who encountered the file in a Google search would not be able to determine what information the file held unless he or she opened it, he said.
“It was pretty well-hidden, with a very inconspicuous file name,” Peters said.
Google would not release information on how many times files have been accessed from its search engine, he added.
Peters, who came to ITS from Columbia Business School at the end of last year, said he will take steps to improve information security during his first year as Yale’s Chief Information Officer. These measures will include better communication with Google, he said.
Starting in September, Yale will outsource University e-mail to Google.
sursa> Yale affiliates' SSNs were searchable on Google | Yale Daily News
cine gaseste dbul sa posteze link aici.
- 1
-
We've had reports of a new worm in the wild and that generates increased RDP traffic for our users on port 3389. Although the overall numbers of computers reporting detections are low in comparison to more established malware families, the traffic it generates is noticeable. The worm is detected as Worm:Win32/Morto.A and you can see a detailed description of it at Worm:Win32/Morto.A.
Morto attempts to compromise Remote Desktop connections in order to penetrate remote systems, by exploiting weak administrator passwords. Once a new system is compromised, it connects to a remote server in order to download additional information and update its components. It also terminates processes for locally running security applications in order to ensure its activity continues uninterrupted. Affected users should note that a reboot may be required in order to complete the cleaning process.
This particular worm highlights the importance of setting strong system passwords. Using strong passwords can go a long way towards protecting your environment -- and the ability of attackers to exploit weak passwords shouldn't be underestimated. For example, Morto tries the following passwords:
*1234
0
111
123
369
1111
12345
111111
123123
123321
123456
168168
520520
654321
666666
888888
1234567
12345678
123456789
1234567890
%u%
%u%12
1234qwer
1q2w3e
1qaz2wsx
aaa
abc123
abcd1234
admin
admin123
letmein
pass
password
server
test
user
-
Rootkit arsenal, o carte serioasa pentru oameni seriosi : ) daca cineva are o copie mai buna din punct de vedere calitativ, va rog mult sa o posteze in acest topic :3
PS: Merita luata, sper ca nu am stat sa uploadez 81 de mega degeaba : (
Invalid or Deleted File.
link nou:
MEGAUPLOAD - The leading online storage and file delivery service
psw: ebooksclub.org
-
Blackshades Remote Controller (R.A.T.) e cu bani si costa 40$ , eu unu il am
cum e vazut de antivirusi ?
-
Nimic doar apare bila aia in bara, am dat click dreapta pe ea si apar doar 2 optiuni "Exit" si "Script pause"
o fi un bootnet
-
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition, 2009
MEGAUPLOAD - The leading online storage and file delivery service
pass: "ebooksclub . org" (fara spatii si ghilimele)
-
linkul nu mai merge.
Acest fi?ier a fost ?ters fie datorit? dreptului de autor sau a fost ?ters de c?tre Uploader.
link nou:
MEGAUPLOAD - The leading online storage and file delivery service
pass: "ebooksclub . org"(fara spatii si ghilimele)
- 1
-
A Guide to Kernel Exploitation: Attacking the Core, 2010
Product Description
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows
Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions
Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
link: MEGAUPLOAD - The leading online storage and file delivery service
pass: "ebooksclub . org"(fara spatii si ghilimele)
- 1
-
Counter Hack Reloaded, Second Edition, 2005
link: MEGAUPLOAD - The leading online storage and file delivery service
pass: "ebooksclub . org"(fara spatii si ghilimele)
-
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition, 2011
eBook Description:
Use packet analysis to identify and resolve common network problems like loss of connectivity, DNS issues, sluggish speeds, and malware infections
Build customized capture and display filters
Monitor your network in real-time and tap live network communications
Graph traffic patterns to visualize the data flowing across your network
Use advanced Wireshark features to understand confusing captures
Build statistics and reports to help you better explain technical network information to non-techies
With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition will teach you how to make sense of your PCAP data. You’ll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you’re on your way to packet analysis proficiency.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition is a must for any network technician, administrator, or engineer. Stop guessing and start troubleshooting the problems on your network.
This significantly revised and expanded second edition of Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd Edition shows you how to use Wireshark to capture raw network traffic, filter and analyze packets, and diagnose common network problems.
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network?
link- MEGAUPLOAD - The leading online storage and file delivery service
pass: "ebooksclub . org"(fara spatii si ghilimele)
Anonymous avertizeaza NATO: Aceasta nu mai este lumea voastra
in Stiri securitate
Posted
De la vorbe la fapte e o cale lungaaaaaaaa...