... neuere Einträge
Wednesday, 19. October 2011
How to Poison Ivy server compatible with Win-7 32bit
Am Wednesday, 19. Oct 2011 im Topic 'Tutorials'
Load server Poison Ivy in OllyDBG, go to the address 401200, and do as follows.
Before

After

by
qolyx
Poison Ivy 2.3.2
http://securityxploit.blogger.de/stories/1852045/
Before

After

by
qolyx
Poison Ivy 2.3.2
http://securityxploit.blogger.de/stories/1852045/
DNS poisoning via Port Exhaustion
Am Wednesday, 19. Oct 2011 im Topic 'Vulnerabilities'
A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.
Download PDF
http://blog.watchfire.com/files/dnsp_port_exhaustion.pdf
Download PDF
http://blog.watchfire.com/files/dnsp_port_exhaustion.pdf
Zexplo - Linux
Am Wednesday, 19. Oct 2011 im Topic 'Pentest'
Zexplo is a python based Penetration Testing toolkit with simple and cool interface.
This first version of Zexplo has 6 enumeration modules for various network scanning operations such as zping, zarpcache, ztcpscan, znmapport etc and 1 exploit (filecopa). In addition to this it also has some exciting modules for man in the middle (MITM) attack and autopwn. You will also see tools such as Injector (inject modules into running process)and Encoder (with triple layer of XOR).
Download
http://securityxploded.net/getfile.php?file=Zexplo.zip
This first version of Zexplo has 6 enumeration modules for various network scanning operations such as zping, zarpcache, ztcpscan, znmapport etc and 1 exploit (filecopa). In addition to this it also has some exciting modules for man in the middle (MITM) attack and autopwn. You will also see tools such as Injector (inject modules into running process)and Encoder (with triple layer of XOR).
Download
http://securityxploded.net/getfile.php?file=Zexplo.zip
Tuesday, 18. October 2011
Jynx-Kit LD_PRELOAD Rootkit - Linux
Am Tuesday, 18. Oct 2011 im Topic 'Tools'
Fully undetectable from chkrootkit and rootkithunter. Includes magic packet SSL reverse back connect shell based on SEQ/ACK numbers in a single packet. Solid building block for further LD_PRELOAD rootkits.
Download incl. ReadMe
http://www.blackhatacademy.org/releases/Jynx-Kit-Pub.tar.gz
Download incl. ReadMe
http://www.blackhatacademy.org/releases/Jynx-Kit-Pub.tar.gz
Monday, 17. October 2011
BlueStacks - Android
Am Monday, 17. Oct 2011 im Topic 'Android'
BlueStacks allows users to run Android OS apps on Windows PCs with instant switching between the two.
Features of BlueStacks
Play Android apps fast and full-screen
Push your favorite apps from your Android phone to your PC using BlueStacks Cloud Connect
Run 10 pre-loaded apps “out of the box”
Install up to 26 more of your favorite apps
May not work fast on older netbooks and tablets
Available now for Win7, and it’s Free
Download
http://cdn.bluestacks.com/public/2002/BlueStacks_AppPlayer_Alpha.msi
Features of BlueStacks
Play Android apps fast and full-screen
Push your favorite apps from your Android phone to your PC using BlueStacks Cloud Connect
Run 10 pre-loaded apps “out of the box”
Install up to 26 more of your favorite apps
May not work fast on older netbooks and tablets
Available now for Win7, and it’s Free
Download
http://cdn.bluestacks.com/public/2002/BlueStacks_AppPlayer_Alpha.msi
Friday, 14. October 2011
Hcon’s Security Testing Framework
Am Friday, 14. Oct 2011 im Topic 'Pentest'
Specification :
1. Based on Chromium Source (iron build) version 14
2. more secure and Tracking free from Google & Stable then other Chromium based builds
3. Over 100 tools integration with very easy use interface
4. Tested and heavily modified tools suggestions contributed by professional pentesters , web developers , Security researchers
5. Free and open source
6. Totally Portable (no need to install) , you can carry it around in your usb , memory card etc.
7. Runs on all windows including windows - XP , VISTA , 7
Download
http://www.hcon.in/u...stf_0.1beta.exe
1. Based on Chromium Source (iron build) version 14
2. more secure and Tracking free from Google & Stable then other Chromium based builds
3. Over 100 tools integration with very easy use interface
4. Tested and heavily modified tools suggestions contributed by professional pentesters , web developers , Security researchers
5. Free and open source
6. Totally Portable (no need to install) , you can carry it around in your usb , memory card etc.
7. Runs on all windows including windows - XP , VISTA , 7
Download
http://www.hcon.in/u...stf_0.1beta.exe
Qustodio
Am Friday, 14. Oct 2011 im Topic 'Tools'
Key benefits
Follow them wherever they go
Monitor social networking behaviors
Manage and limit online access
Protect against tampering
See how your kids use the Internet
Know who they talk to online
Block dangerous websites
Protect kids from bullying and predators
Manage your kids’ Internet time
Download
http://www.qustodio.com/download.php
Follow them wherever they go
Monitor social networking behaviors
Manage and limit online access
Protect against tampering
See how your kids use the Internet
Know who they talk to online
Block dangerous websites
Protect kids from bullying and predators
Manage your kids’ Internet time
Download
http://www.qustodio.com/download.php
Thursday, 13. October 2011
German Governmental Backdoor ("R2D2")
Am Thursday, 13. Oct 2011 im Topic 'News'
The announcment was made public on ccc.de with a
detailed 20-page analysis of the functionality of the malware. Download the
report in PDF
http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf
(in
German)
According to CCC Germany the backdoor could also be exploited by third
parties. You can download it from
http://www.ccc.de/system/uploads/77/original/0zapftis-release.tgz . You'll
need gzip and tar to get the .dll and the .sys file.
The backdoor includes a keylogger that targets certain applications. These
applications include *Firefox, Skype, MSN Messenger, ICQ* and others.
The backdoor also contains code intended to take screenshots and record
audio, including recording Skype calls.
detailed 20-page analysis of the functionality of the malware. Download the
report in PDF
http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf
(in
German)
According to CCC Germany the backdoor could also be exploited by third
parties. You can download it from
http://www.ccc.de/system/uploads/77/original/0zapftis-release.tgz . You'll
need gzip and tar to get the .dll and the .sys file.
The backdoor includes a keylogger that targets certain applications. These
applications include *Firefox, Skype, MSN Messenger, ICQ* and others.
The backdoor also contains code intended to take screenshots and record
audio, including recording Skype calls.
Norman Security Suite 9 - Free
Am Thursday, 13. Oct 2011 im Topic 'News'
Click here to visit promo page
http://www.norman.com/support/auth
Enter our details and Use OEM code: PCP-NSS12-DE
You will receive an email from info@mail.norman.no with your free license key.
http://www.norman.com/support/auth
Enter our details and Use OEM code: PCP-NSS12-DE
You will receive an email from info@mail.norman.no with your free license key.
Your Browser Matters
Am Thursday, 13. Oct 2011 im Topic 'News'
Microsoft launched a website today designed to give users a detailed look at how secure their browser is. The site, called Your Browser Matters, automatically detects the visitor's browser and returns a browser security score on a scale of four points.
Source
http://yourbrowsermatters.org/
Source
http://yourbrowsermatters.org/
... ältere Einträge