Jump to content

io.kent

Active Members
  • Posts

    2325
  • Joined

  • Last visited

  • Days Won

    21

Everything posted by io.kent

  1. daca sti sa dai attack, sau sti ceva in baza internetului, lectia nr 1, acoperati spatele, dupa aia implicate in asemenea lucruri, deci gresala lor, pacat!
  2. problema e ca nui in enleza, e in spaniola, pola mea, ps-axl cu google:)) acceptabil a?
  3. Subterfugiu , un cadru la fel de simplu ca punct ?i trage, o interfata frumoasa si usor de utilizat, care produce un atac mult mai transparent ?i eficient este ceea ce distinge subterfugii în afar? de alte programe de atac. subterfugii demonstreaz? vulnerabilit??ile din protocolul ARP colectarea prerogativelor care trec prin re?ea, ?i chiar utilizarea de ma?ini prin intermediul condi?iilor de curs?. subterfugii este un mic, dar eficient de colectare devastator program de acreditare, care exploateaz? o vulnerabilitate în Protocolul Address Resolution . Ea face acest lucru într-un mod care un utilizator non-tehnic, care are capacitatea, de la simpla ap?sare a unui buton, pentru a profita de numele utilizator ?i parolele de victime din re?ea conectat? . Instalare: 1) Descarca Tool Downloads - subterfuge - Automated Man-in-the-Middle Attack Framework - Google Project Hosting descomprimim si instalam codul: root@TioSam:~# cd /root root@TioSam:~# tar xfvz SubterfugePublicBeta1.1.tar.gz root@TioSam:~# cd /root root@TioSam:~# cd subterfuge root@TioSam:~/subterfuge# ls bin doc README twisted build INSTALL scapy-2.2.0 Twisted-12.0.0 dependencies install.py setup.py Twisted.egg-info dist LICENSE sqlite3 Django-1.3.1 NEWS subterfuge_packages.tar.gz root@TioSam:~/subterfuge# python install.py -i deschidem un terminal, si scriem : code: root@TioSam:subterfuge Validating models... 0 errors found Django version 1.3.1, using settings 'subterfuge.settings' Development server is running at http://127.0.0.1:80/ Quit the server with CONTROL-C. deschidem browser si scriem asa, 127.0.0.1 & si se va deschide tool. programele incluse..
  4. Ei bine, am sa va explic în aceast? lucrare modul în care putem crea un script malware nedetectabil cel pu?in posibil? pân? în prezent ?i va r?mâne în vigoare pentru noi s? mergem s? facem intruziuni, aceast? prezentare a di hackmeeting dezv?luite în trecut, care a dat de 29.30 septembrie luna trecut?, dar am sa-l postez pentru voi to?i, în cazul în care cineva este interesat de acest subiect, nu mai multe de spus aici este link-ul de download direct : generando script malicioso con metasploit framework.pdf - 4shared.com - document sharing - download
  5. edit.. SurfJack este un program programat în Python demonstreaza siguran?a deficien?ei HTTP si HTTPS. Cu acest program pute?i fura cookie-uri pe site-uri care folosesc aceste protocoale, ?i nu asigura în mod corespunz?tor cookie-urile lor. Necesar: - Python 2.4 - Scapy Download: download : surfjack-0.2b.zip - surfjack - Minor changes - added contact information - A tool which allows one to hijack HTTP connections to steal cookies - Google Project Hosting cartea : https://resources.enablesecurity.com/resources/Surf%20Jacking.pdf videotutorial Surf Jacking Gmail demonstration on Vimeo
  6. Închiderea Megaupload, rezultatul unei anchete FBI, a condus la alte servicii de file hosting o mare teama de a fi într-o situa?ie similar?, în care, de la o zi la alta, afacerea dvs. se pr?bu?e?te. Servicii cum ar fi Rapidshare a început s? se schimbe de-a treia ?i au anun?at c? vor lua m?suri pentru a combate pirateria (de fapt, în Germania exist? o hot?râre de declarare juridic de serviciu, dar sunt îndemnate s? monitorizeze con?inutul), care a început s? se materializeze într-un sc?derea semnificativ? a vitezei de download-uri de serviciu justificate, ca o m?sur? de combatere a pirateriei. Luni mai târziu, RapidShare întoarce s? dea o alt? întors?tur? în serviciu ?i, la sfarsitul acestei luni, va impune limit?ri privind desc?rcarea de fi?iere. M?sura, care va intra în vigoare din 27 noiembrie, va afecta ambii utilizatori gratuite cum ar fi plat?. în ambele cazuri, s? impun? rate maxime de transfer. Ratele maxime de transfer? Ideea este de a reduce la minimum posibilitatea de a împ?r?i cu drepturi de autor ! con?inutul, ?i ideea, incarcate de c?tre utilizatori gratuite distribuite public ?i nu va genera trafic de peste 1 GB de desc?rcare pe zi (?i, în cazul utilizatorii de rata de prim? va fi de 30 GB pe zi). Deci, ce are aceast? m?sur?? Imagina?i-v? c? ave?i mai multe fi?iere înc?rcate la cota RapidShare ?i public, din 27 noiembrie RapidShare preia controlul de desc?rc?ri de fi?iere noastre ?i atunci când ave?i de 1 GB de date transferate (sau 30 GB pentru Utilizatorii premium) va reduce de desc?rcare, ?i peste noapte, nu po?i desc?rca înapoi (cu aceea?i rezerv?). Dac? am ad?uga RapidShare încet impuse la începutul acestui an (care, întâmpl?tor, va fi desfiin?ate la data intr?rii în vigoare a acestui model nou), "protec?ia drepturilor de autor" înseamn? o pierdere imens? de executare a serviciului. Aceast? reducere nu afecteaz? fi?ierele care sunt partajate cu grupuri închise de utilizatori, adic? fi?ierele private, care nu sunt disponibile pentru publicul larg (probabil, aceasta poate fi o evadare.) sursa: ALT1040
  7. YouTube.com script-ul clona youtube 2012, cu un design personalizat . Acest script v? permite s? crea?i un portal de filme on-line cu u?urin?? ca YouTube.com, Metacafe, DailyMotion, Google Video, Yahoo Video ?i altele. Permite vizitatorii dvs. pentru a înc?rca, vizualiza, clipuri video, parts, clipuri video, este un script complet personalizabil open source, cu multe caracteristici. link-ul: DepositFiles
  8. a fost pusa sursa, si parola, dar teai trezit tarziu, miau cerut sa cryptez pass. si parola e sursa!
  9. nu cred ca e devarat, de unde ai scos asa ceva? e confidential..
  10. An anonymous system provides the ability for individuals to reveal his identity only when they want, this is the essence of privacy. Likewise privacy in an open society requires cryptography. - A Cypherpunk's Manifesto In a society like ours, transformed into a quasi-infinite network of communicating entities, where privacy and anonymity are hidden behind illusory cloud computing, cryptography is the only sure way. Unfortunately, the topic remains obscure to most network users: do not know why it is important to have privacy and anonymity, and ignore that there are tools-many of them free-that give us those rights. do not have to be experts in algebra top of cryptography to help because every time we have more and better tools that provide. Here are some of them; recommend combining two or more of them depending on the context. Obviously, there are other tools: recommend or discuss your experience with them. Tor Browser Bundle Tor is the ultimate tool for network anonymity. The simple installation of Tor Browser Bundle lets you surf the web anonymously, although at the cost of performance. In Android can use Orbot. Cryptocat install the plugin for your favorite browser and you can take private conversations (because communication is encrypted) and now anonymous (OTR protocol used). Pidgin with OTR will serve you well for all chat protocols (including Messenger). N-1 where traditional social networks (say Facebook) are true surveillance machines explicit (user data) and implicit (all connections) free social networking and decentralized as N-1 arrives to save the day. Among other features, it is possible to send encrypted messages. Ubuntu 12.10: Full Disk Encryption The latest version of Ubuntu to easily encrypt an entire hard disk from the main installer (previously did from the alternative installer). This is protection from the same base. Meanwhile, TrueCrypt is an option on all operating systems. Thunderbird + Enigmail is a Thunderbird email client Mozilla family. Enigmail, the plug that allows sending encrypted emails, emails that should only be seen by the recipient. On computers both tools provide a high level of security. OpenVPN A VPN is encrypted over the Internet network. Typically used to create tunnels in the network that provide access to services denied by the current network while offering a degree of privacy. There are many VPN services on the net, mostly paid, including Hamachi is very easy to use. OpenVPN is free and allows us to create our own home VPN service albeit with some difficulty. Spotflux want to change this paradigm to be in the cloud, but you have to trust them. HTTPS Everywhere HTTPS encrypted data can be transmitted between your browser and the web server. HTTPS Everywhere forces the server, if any, to offer the safest option (though not infallible). darknets When all else fails, when private and anonymous communication is vital, there are only darknets, these hidden networks, parallel or independent internet. The Tor network is one of them. Freenet is a pioneer among anti-censorship darknets. But there are others who seek to be alternatives to Internet, truly independent and decentralized as Meshnet Project, in turn based on dozens of open source projects. The Serval Project Mobile goes down that road, and in combination with projects like CSipSimple can become a network of independent mobile and safe. Source: ALT1040
  11. lam incercat in windows xp, si windows 7 64 bit.. scan : novirusthanks: Report date: 2012-11-09 09:38:37 (GMT 1) File name: xstubx-exe File size: 552960 bytes MD5 hash: 9a0b9712c55eaa49b5ae7d751c3650e0 SHA1 hash: c9038de87af3ecd12d17eb94c8f5fcd47240b3c6 Detection rate: 0 on 14 (0%) Status: CLEAN Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Report date: 2012-11-09 09:38:37 (GMT 1) File name: small-download-exe File size: 458752 bytes MD5 hash: b439755ea00f7ef09202a6451fcea28a SHA1 hash: a46f25619920efee056126ad40608d023baf887f Detection rate: 0 on 14 (0%) Status: CLEAN Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org download: Download Small Download.rar from Sendspace.com - send big files the easy way pass: ÊÓÖÓÑÅÐÛÅÖÉÍÒÈÉØÉÇØÅÆÐÉ×ÑÅרÉÖ×ÌÅÇÏÉÖ×ÙÈØÓÓÐ× cryptat cu VELTROZ CRYPTER
  12. Scylla este un program de audit pentru diverse protocoale on-line ?i configura?ii, construit pe un bruteforce motor. Acest program ac?ioneaz? pentru unificarea unor tehnici de audit diferite, ceea ce face oscanner, winfingerprint, Hydra, DirBuster, aceste PROGRAME fac lucruri, dar, de asemenea, unele lucruri pe care le fac. Scylla este, f?r? îndoial?, primul program hacking / audit gratuite protocoale open-source, cum ar fi LDAP, DB2, PostgreSQL, MSSQL ?i terminal; Scylla include de tone de caracteristici pe care alte programe au, dar cu o singur? diferen?? cheie: ruleaz? mai rapid ?i mai "inteligent". Protocoale suportate: Terminal (Telnet, SSH, telnets) FTP (FTPS, FTP, SFTP) SMB (de asemenea, Windows RPC) LDAP POP3 (POP3S) SMTP (SMTPS) IMAP MySql MSSQL Oracle (DB ?i TNS Ascult?tor) DB2 (DB ?i DAS) HTTP (HTTPS, Basic Auth Brute Force, Brute Force AUTH Digest, Brute Force Forma, fi?iere ?i directoare Brute Force) DNS (DNS IGMP) Postgres SQL 3 etape bázice: - Etapa Pre-Hack, etapa Brute Force y etapa Post-Hack. Características básicas: - User, password list based Brute force - Multiple hosts support - Multiple session support - Nmap integration - Non-synchronized threads (proof to be a bit faster) - Ability to restore sessions - Session auto-saving (based on SQL Server CE) - Easy to use - Auto configured options - Hacker oriented - Free, and always free - Database browser (who have hacked a DB and don’t have a DB client to connect to it? And worse if you don’t have internet) - Open source tool download: Downloads - scylla-v1 - Because there's no patch for human stupidity - Google Project Hosting SURSA: Security-Shell: Scylla v.1.0 - Advanced Audit Tool ENJOY..
  13. as avea nevoie istoria maramuresului, o carte despre PINTEA DOBOS, ceva ceea ce e greu de gasit, as fi recunoscator pentru asemenea carte..
  14. luana nu vrei sa castigi si la euromilion? numai vrei config de la A la Z.. carte luana carte citeste, invata studiaza, si vei sti fara sa ceri source de la altcineva,.!
  15. nu vad nimic gratis aici.. undei licienta?
  16. Mozilla follows the footsteps of Google Chrome, and is testing the beta version of its Firefox browser 17, a security feature that requires the use of HSTS security protocol in a series of websites included in a pre-defined list. Basically, HSTS is a safety feature designed to protect Internet users from attacks such as hijackings (in this case hijacking network connections) and other, forcing to make sure access websites using HTTPS and in its subdomains. HSTS, the security protocol HTTP Strict Transport Security, has been proposed to become an Internet standard by the technical group of the International Organization for Standardization IETF. The protocol requires a secure connection but browser to connect the first time need to know. This first 'visit' is crucial and a potential attack vector. 's new is that Firefox 17 beta uses a list of pre-defined sites which must be accessed using secure connections compulsorily Hypertext Transfer Protocol (HTTPS) without the user need to type in the address bar this protocol that uses SSL / TLS to create an encrypted channel. The list is the same as used in Google's Chrome security feature is interesting. Source: MuySeguridad
  17. It seems that German security firm Avira 'did not have time' to test and update their security solutions providing them with support for the new operating system Microsoft Windows 8. Not only that, but the upgrade from Windows 7 to Windows 8 with Avira installed solutions will result in a system hang and the dreaded "blue screen of death" popular on Windows systems. "Windows 8 introduces significant changes to the operating system. As with any new operating system, it is possible that some existing software is not compatible ", indicated from Avira has tried to explain what little explanation since Windows 8 uses the same kernel as Windows 7 and their differences are more for their Metro interface and its touchscreen support than anything else. Avira says it is working with Microsoft to ensure compatibility of the products as soon as possible, something that will not happen until the first quarter of 2013. topic rare when other security providers for weeks that announced their support for Windows 8 and there are already more than 30 solutions that support both 32 and 64 bit Windows 8. Source: MuySeguridad
  18. Since the launch of the new operating system Windows 8 many hardware manufacturers are honing their drivers for the proper functioning of its products, and following the example of Creative Labs, C-Media readies new drivers also support Windows 8 for some of its chips Audio. since Necacom bring us new audio drivers for Windows 8 compatible sound card (integrated and dedicated) chips based on C-Media CMI 8738, WCC 8768, WCC 8770, WCC 8787 (driver version 8.17.43) , and the USB audio chip CM-106 (driver version 8.0.8.2158), controllers are also compatible with Windows XP and above in their editions of 32 and 64 bits. Unfortunately C-Media has not yet published these drivers in their web, so its characteristics are unknown, but can be downloaded from the website of Necacom. download : CMedia CMI8738/CMI8768/CMI8770/CMI8787, drivers, Version 8.17.43 CMedia CM-106 USB Like Sound serie, Version 8.0.8.2158
  19. scan Novirusthanks Report date: 2012-11-06 16:56:03 (GMT 1) File name: buldier-exe File size: 258048 bytes MD5 hash: 87ed9e122f75144fba6aba1f9789275a SHA1 hash: df382265463cf5cd54e80791269866fd37adf8a0 Detection rate: 0 on 14 (0%) Status: CLEAN Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Report date: 2012-11-06 16:12:24 (GMT 1) File name: stub-exe File size: 64374 bytes MD5 hash: dde42e145c8cbd836727332fa753ca56 SHA1 hash: 4b44dad003352e3233ead8e479983354ca2e5064 Detection rate: 2 on 14 (14%) Status: INFECTED Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Report date: 2012-11-05 21:18:41 (GMT 1) File name: stubb-exe File size: 86016 bytes MD5 hash: 5cf76eabcd2459fa654a0a82f7c366e5 SHA1 hash: 172da5651929fb9eb73fe4c103f9c18dbb809179 Detection rate: 0 on 14 (0%) Status: CLEAN Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Report date: 2012-11-06 16:58:46 (GMT 1) File name: cliente-exe File size: 61440 bytes MD5 hash: 3c94779ea2de51b3b7f5884a939cfb0f SHA1 hash: 099067c16a27b9b29969722dbf66c85826f11538 Detection rate: 2 on 14 (14%) Status: INFECTED Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org download: Download Nueva carpeta ().rar from Sendspace.com - send big files the easy way pass crypter pass2 downlaoder
  20. daca iar fi pus un skin mai bun posibil ar fii avut mai multe sanse de prostie, dar asa e omul nai ce face, la cee mai important o lasa balta:)))
  21. The firm Trend Micro has warned of the arrival of the first developments malicious exploit the pull of the recent launch of the new operating system Windows 8. This is an infection by a Trojan called scareware TROJ_FAKEAV.EHM camouflaging techniques employing an antivirus and showing fake security messages. The Trojan performs a system scan course showing an exaggerated amount of threats and offering himself as the savior solution under the usual economic payment characterizes these scareware attacks. This program 'Win 8 Security System' is not original software has nothing to do with a reliable and effective antivirus tool. TROJ_FAKEAV.EHM extends to execute malicious links in e-mails and downloads Free software allegedly trading as the same Windows 8. sursa : MuySeguridad
  22. bine ai venit vlad, speram sa inveti cat mai mult!
  23. descarcati de aici Dec0der_23-9-2012.rar parola level-23.biz
  24. parola e buna nu-i dati copy paste!
  25. sensi, daca nu-l testez inainte nu-l postez, si mie imi merge, pe wind, xp.. acum ce stiu eu ce faci tu?
×
×
  • Create New...