... neuere Einträge
Sunday, 24. July 2011
Ani Shell - PHP
Am Sunday, 24. Jul 2011 im Topic 'Source Code'
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization.
Download
http://sourceforge.net/projects/ani-shell/
Default Login
Username : lionaneesh
Password : lionaneesh
Download
http://sourceforge.net/projects/ani-shell/
Default Login
Username : lionaneesh
Password : lionaneesh
Comodo Internet Security Pro - "free"
Am Sunday, 24. Jul 2011 im Topic 'Malware Search'
Features
Antivirus, Anti-Spyware, Anti-Rootkit & Bot protection
Defends your PC from Internet attacks
Detects and eliminates viruses
Prevents malware from being installed
Auto Sandbox Technology™
Easy to install, configure and use
Free to both business and home users
60 Days of FREE GeekBuddy live remote PC support
Try Pro FREE for 1 year
Download
http://download.comodo.com/cis/download/installs/1000/partners/cispro_1year_installer_1221.exe
Antivirus, Anti-Spyware, Anti-Rootkit & Bot protection
Defends your PC from Internet attacks
Detects and eliminates viruses
Prevents malware from being installed
Auto Sandbox Technology™
Easy to install, configure and use
Free to both business and home users
60 Days of FREE GeekBuddy live remote PC support
Try Pro FREE for 1 year
Download
http://download.comodo.com/cis/download/installs/1000/partners/cispro_1year_installer_1221.exe
Web Browser Security
Am Sunday, 24. Jul 2011 im Topic 'Malware Search'
Web Browser Security Socially-Engineered Malware Protection Comparative Test Results. Surprising Results!
Browsers used
Apple Safari 5
Google Chrome 10
Windows Internet explorer 8
Windows Internet explorer 9
Mozilla Firefox 4
Opera 11
TABLE OF CONTENTS
Introduction………………………………………… 1
1.1 The Socially-Engineered Malware Threat ……………….1
1.2 Web Browser Security………………………………..1
Effectiveness Results …………………………………. 4
2.1 Test Composition: Malicious URLs …………………….4
2.2 Blocking URLs with Socially-Engineered Malware ………..4
2.3 Blocking URLs with Socially-Engineered Malware Over Time ….6
2.4 Safe Browsing Products ………………………….7
2.5 Microsoft’s IE9 and Application Reputation………..7
Conclusions…………………………………………. 9
Test Environment…………………………….. 11
4.1 Client Host Description ……………………11
4.2 The Tested Browsers……………………….12
4.3 Network Description ……………………12
4.4 About this Test…………………………..12
Appendix A: Test Procedures …………………….. 12
4.5 Test Duration …………………………..13
4.6 Sample Sets for Malware URLs………………13
4.7 Catalog URLs………………………………14
4.8 Confirm Sample Presence of URLs …………..14
4.9 Dynamically Execute Each URL ……………….14
4.10 Pruning…………………………………….15
4.11 Post-Test Validation……………………….15
Appendix B: Test Infrastructure …………………… 16
Download PDF
https://www.nsslabs.com/assets/noreg-reports/2011/nss%20labs_q2_2011_browsersem_FINAL.pdf
Browsers used
Apple Safari 5
Google Chrome 10
Windows Internet explorer 8
Windows Internet explorer 9
Mozilla Firefox 4
Opera 11
TABLE OF CONTENTS
Introduction………………………………………… 1
1.1 The Socially-Engineered Malware Threat ……………….1
1.2 Web Browser Security………………………………..1
Effectiveness Results …………………………………. 4
2.1 Test Composition: Malicious URLs …………………….4
2.2 Blocking URLs with Socially-Engineered Malware ………..4
2.3 Blocking URLs with Socially-Engineered Malware Over Time ….6
2.4 Safe Browsing Products ………………………….7
2.5 Microsoft’s IE9 and Application Reputation………..7
Conclusions…………………………………………. 9
Test Environment…………………………….. 11
4.1 Client Host Description ……………………11
4.2 The Tested Browsers……………………….12
4.3 Network Description ……………………12
4.4 About this Test…………………………..12
Appendix A: Test Procedures …………………….. 12
4.5 Test Duration …………………………..13
4.6 Sample Sets for Malware URLs………………13
4.7 Catalog URLs………………………………14
4.8 Confirm Sample Presence of URLs …………..14
4.9 Dynamically Execute Each URL ……………….14
4.10 Pruning…………………………………….15
4.11 Post-Test Validation……………………….15
Appendix B: Test Infrastructure …………………… 16
Download PDF
https://www.nsslabs.com/assets/noreg-reports/2011/nss%20labs_q2_2011_browsersem_FINAL.pdf
Memory forensics DumpIt
Am Sunday, 24. Jul 2011 im Topic 'Computer Forensics'
DumpIt provides an easy way of obtaining a memory image of a Windows system even if the investigator is not physically sitting in front of the target computer. It’s so easy to use, even a naive user can do it. It’s not appropriate for all scenarios, but it will definitely make memory acquisition easier in many situations.
To see DumpIt in action
http://www.youtube.com/watch?v=SEs4ZAolED0
Download
http://www.moonsols.com/wp-content/plugins/download-monitor/download.php?id=7
To see DumpIt in action
http://www.youtube.com/watch?v=SEs4ZAolED0
Download
http://www.moonsols.com/wp-content/plugins/download-monitor/download.php?id=7
Creating a 13 line backdoor - Python
Am Sunday, 24. Jul 2011 im Topic 'Source Code'
... ältere Einträge