... neuere Einträge
Monday, 10. October 2011
Social Engineering with SET
Am Monday, 10. Oct 2011 im Topic 'Tutorials'
It is a useful social engineering tool by David (ReL1k). It can be used to perform a number of Social Engineering attacks with minimal effort. SET can be used with Metasploit to additionally perform metasploit's powerful post exploitation. This tool can be accessed through web interface or command line.
Download PDF
http://www.garage4hackers.com/attachment.php?attachmentid=97&d=1314862575
Download
http://securityxploit.blogger.de/stories/1864853/
Download PDF
http://www.garage4hackers.com/attachment.php?attachmentid=97&d=1314862575
Download
http://securityxploit.blogger.de/stories/1864853/
Macrium Reflect
Am Monday, 10. Oct 2011 im Topic 'Tools'
Features of Macrium Reflect
A free disaster recovery solution for your home computer
Protect your personal documents, photos, music and emails
Clone your hard disk and create disk images in the safe knowldge that
everything is securely saved in an easily recovered backup file
Simple and easy-to-use interface
Backup disk images
Clone disk images
Mount or open disk images in Windows Explorer
Create recovery media to boot and restore backup images
Download
http://www.macrium.com/reflectfree.aspx
A free disaster recovery solution for your home computer
Protect your personal documents, photos, music and emails
Clone your hard disk and create disk images in the safe knowldge that
everything is securely saved in an easily recovered backup file
Simple and easy-to-use interface
Backup disk images
Clone disk images
Mount or open disk images in Windows Explorer
Create recovery media to boot and restore backup images
Download
http://www.macrium.com/reflectfree.aspx
WebBackdoors
Am Monday, 10. Oct 2011 im Topic 'Tutorials'
This paper provides insight on common web back doors and how simple manipulations could make them undetectable by AV and other security suits. Paper explains few techniques that could be used to render undetectable and unnoticed backdoor inside web applications.
This paper is mainly an update for an old paper of ours Effectiveness of Antivirus in Detecting Web Application Backdoors, which mainly questioned the effectiveness of AV with respect to web shells and analysis of a couple of web shells. Current paper takes this topic further and explains a couple of methodologies that could be used to make stealth application layer backdoors using web scripting languages .This paper explains various Web Backdoor attacks and evasion techniques that could be used to stay undetected
Download PDF
http://www.garage4hackers.com/blogs/8/attachments/101d1318227327-webbackdoors-attack-evasion-detection-cocon_paper.pdf
This paper is mainly an update for an old paper of ours Effectiveness of Antivirus in Detecting Web Application Backdoors, which mainly questioned the effectiveness of AV with respect to web shells and analysis of a couple of web shells. Current paper takes this topic further and explains a couple of methodologies that could be used to make stealth application layer backdoors using web scripting languages .This paper explains various Web Backdoor attacks and evasion techniques that could be used to stay undetected
Download PDF
http://www.garage4hackers.com/blogs/8/attachments/101d1318227327-webbackdoors-attack-evasion-detection-cocon_paper.pdf
... ältere Einträge