Monday, 10. October 2011
Social Engineering with SET
It is a useful social engineering tool by David (ReL1k). It can be used to perform a number of Social Engineering attacks with minimal effort. SET can be used with Metasploit to additionally perform metasploit's powerful post exploitation. This tool can be accessed through web interface or command line.

Download PDF
http://www.garage4hackers.com/attachment.php?attachmentid=97&d=1314862575

Download
http://securityxploit.blogger.de/stories/1864853/

Permalink

 


Macrium Reflect
Features of Macrium Reflect

A free disaster recovery solution for your home computer
Protect your personal documents, photos, music and emails
Clone your hard disk and create disk images in the safe knowldge that
everything is securely saved in an easily recovered backup file
Simple and easy-to-use interface
Backup disk images
Clone disk images
Mount or open disk images in Windows Explorer
Create recovery media to boot and restore backup images

Download
http://www.macrium.com/reflectfree.aspx

Permalink

 


WebBackdoors
This paper provides insight on common web back doors and how simple manipulations could make them undetectable by AV and other security suits. Paper explains few techniques that could be used to render undetectable and unnoticed backdoor inside web applications.
This paper is mainly an update for an old paper of ours Effectiveness of Antivirus in Detecting Web Application Backdoors, which mainly questioned the effectiveness of AV with respect to web shells and analysis of a couple of web shells. Current paper takes this topic further and explains a couple of methodologies that could be used to make stealth application layer backdoors using web scripting languages .This paper explains various Web Backdoor attacks and evasion techniques that could be used to stay undetected

Download PDF
http://www.garage4hackers.com/blogs/8/attachments/101d1318227327-webbackdoors-attack-evasion-detection-cocon_paper.pdf

Permalink