среда, 16 января 2013 г.

nmap part1pyccku

nmap [Метод(ы) сканирования] [Опции] <Хост или сеть #1,[#N]>ОПИСАНИЕ Программа Nmap предназначена для сканирования сетей с любым количеством объектов, определения состояния объектов сканируемой сети а также портов и соответствующих им служб. Для этого Nmap использует много различных методов сканирования, таких, как

вторник, 15 января 2013 г.

Real Onliine Security by Smash

First of all I?d like to say it?s not step by step guide. It?s just some security tips. I hope it will help you to be secure.

So lets start building your safe castle

1) Installing Windows

Wardriving To Stay Anonymous


Contents
1. Introduction
2. Equipment
3. Setup
4. Conclusion
5. Resources

Gnupg PGP encryption for XXXXS


I think its pretty important that we all wise up to security now that we time and time again are betrayed by such services such as hushmail. Bellow is a tutorial Ive written on how to use gnupg, it is meant to be understood by anyone from 12 year olds to 70 year olds so if anyone has any ideas on how to improve it to make more easily understood or if Ive missed something please contact me.

BulletProof FTP Server Tutorial

This is for the BulletProof FTP Server 2.10. However, It should work fine on most following versions as well.

Le faq


For many of you this article will be a redundancy. For others, I hope, it will inspire some sort of foundation. I did not create this nor do I wish take any credit for the following, it is simply being passed on from a friend to my friends. Cheers.

how 2 use Proxy



Firefox:

1. Go to Tools->Options in your Firefox menu.

NDC system. Icq traffic encoding, crypto-mail. Carder's ICQ-client.



Forum administration, with the cooperation of encoding software developers, brings to your attention a number of products providing a reliable security of Internet-correspondence.

How to use SIMP

SIMP (Secway`s Instant Messenger Privacy) - its Encrypts software for ICQ and some other online messengers 

Simp works by encrypting messages before they are sent over the Internet and decrypting them when they arrive at your contacts.

MAC-address and geolocation


Google - the good corporation. Therefore, Google collects information about the physical location of devices through which people surf the Internet. That's all from a great love for humanity, obviously.

Rootkits and backdoors 101

I. What is a rootkit?

A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications(backdoor). - WIkipedia

Mass checking of webshells on valid.

1. If you need to check a lot of webshells on valid first you need to check them on http-code – we need to receive an answer if there are any page on this url. For doing this tasks we use bash,.c Php of course has more universal but it would take more time and you won’t be able to use it on hosting as time of script working os limited.
Here is listing of ready script:

Mikrotik Router Remote Denial Of Service attack

#!/usr/bin/python
# Exploit Title: Mikrotik Router Remote Denial Of Service attack
# Date: 19/4/2012
# Author: PoURaN @ 133tsec.com
# Software Link: http://www.mikrotik.com
# Version: All mikrotik routers with winbox service enabled are affected (still a 0day 30/5/2012)
# Tested on: Mikrotis RouterOS 2.9.6 up to 5.15
#

понедельник, 14 января 2013 г.

воскресенье, 13 января 2013 г.

Create your own botnet

Security systems are constantly improving, programmers will melt more skilled. Now it is supposed ever less widely known errors.

[Prologue]
The Internet grows with great force. It becomes more difficult for hacker to search for vulnerabilities. Administrators use for working developments of best security experts. See your thoughts? Actually on the Internet a lot of bags, but usually it�s useless. Here, imagine a situation, you were got by any network mongrel, you wish him to be punished. Today we will talk about creation own botnet.

Open remote access with software

Hello everyone, i got in shape of writing those small articles-tutorials. I can remember myself searching for source code, examples and stuff like that. It wasnt easy, so im trying to help you now...

Some time before I searched information how on delphi open port 3389, and control remote desktop of the victim. I couldn't find any information about it, so I decided to write an article about it. We will work with registry, because it contains the information about remote connection.

BandWidth Explained

This is well written explanation about bandwidth, very useful info.
BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.

About Hackers


How to Detect a Hacker Attack

Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.

Key loggers

What are Key loggers?

Imagine if somebody installs a software on your computer without your knowledge that lets them steal your bank account log-in ID and password. Scared to imagine the results?

Pwning SpyEye 1.2.X and 1.3.X

I. Introduction
“Pwning SpyEye” – I wrote this paper after the release of 1.2.X on underground forums but i have seen it under other names. That's why the scene is so fag - because there is plagiarism and it's unpunished.

XSS 101

I. What is XSS?
Cross-site scripting (XSS), it should have been CSS but that name is already taken by Cascade-Style Sheets so it became XSS, is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side script into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls, steal cookies or other types of malicious activities. They are very common nowadays. - Wikipedia (http://en.wikipedia.org/wiki/Cross-site_scripting)

using trojans for real profit

This tutorial based on theory what you already have a trojan for grabbing accounts and other private info of victim for you.

Script-kiddies

I. What are script-kiddies and how do they hack(deface)? 

A script kiddie or skiddie, occasionally skid, script bunny, script kitty, script-running juvenile (SRJ) or similar, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks and deface websites. – Wikipedia (http://en.wikipedia.org/wiki/Script_kiddie)
This article explains the various methods through which script-kiddies and black hat wannabes deface websites in 2011. I have aimed at security awareness for site owners, hosting administrators and the public of carder.pro. How did your website get defaced? Keep on reading and you will find out.
This is for educational purposes only. You may re-distribute freely without changing my name or the content.

пятница, 11 января 2013 г.

TOYUDesign SQL Injection Vulnerability

# Exploit Title: TOYUDesign SQL Injection Vulnerability
# Date: 03/02/2012 - 02.49
# Author: 3spi0n
# Software Website: www.toyudesign.com
# Tested On: BackTrack 5 - Win7 Ultimate
# Platform: Php
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>