... neuere Einträge
Friday, 2. March 2012
Ocster Backup Pro 7
Am Friday, 2. Mar 2012 im Topic 'Tools'
Ocster Backup Pro is a fully automatic backup solution that supports full PC backup (image backup), file backup, email backup (Outlook, Thunderbird), browser backup (Firefox, Chrome, Internet Explorer), contacts backup. The application is very easy-to-use and includes wizard that guides users with no knowledge or new to backup programs to perform the desired tasks effectively. Backup performed by Ocster Backup pro can be stored on local drives, removable drives or on secure Ocster backup servers.
Info:
Visit promo page
https://www.ocster.com/unlock/obp7/en?edt=cbde11a
Enter your details
You will receive a confirmation mail
Info:
Visit promo page
https://www.ocster.com/unlock/obp7/en?edt=cbde11a
Enter your details
You will receive a confirmation mail
Thursday, 1. March 2012
Windows 8 Preview - ISO-Images
Am Thursday, 1. Mar 2012 im Topic 'Tools'
Download ISO-Images
Englisch
64-Bit (x64) (3,1 GB) Sha 1 Hash – 1288519C5035BCAC83CBFA23A33038CCF5522749
http://iso.esd.microsoft.com/WCPDL/BD1B8A49393E30CC9C4E5C88457D73E964F1F3B18/Windows8-ConsumerPreview-64bit-English.iso
32-Bit (x86) (2,3 GB) Sha 1 Mash – E91ED665B01A46F4344C36D9D88C8BF78E9A1B39
http://iso.esd.microsoft.com/WCPDL/BD1B8A49393E30CC9C4E5C88457D73E964F1F3B18/Windows8-ConsumerPreview-32bit-English.iso
Product Key: DNJXJ-7XBW8-2378T-X22TX-BKG7J
Englisch
64-Bit (x64) (3,1 GB) Sha 1 Hash – 1288519C5035BCAC83CBFA23A33038CCF5522749
http://iso.esd.microsoft.com/WCPDL/BD1B8A49393E30CC9C4E5C88457D73E964F1F3B18/Windows8-ConsumerPreview-64bit-English.iso
32-Bit (x86) (2,3 GB) Sha 1 Mash – E91ED665B01A46F4344C36D9D88C8BF78E9A1B39
http://iso.esd.microsoft.com/WCPDL/BD1B8A49393E30CC9C4E5C88457D73E964F1F3B18/Windows8-ConsumerPreview-32bit-English.iso
Product Key: DNJXJ-7XBW8-2378T-X22TX-BKG7J
Wednesday, 29. February 2012
sslyze - SSL Scanner - Linux
Am Wednesday, 29. Feb 2012 im Topic 'Tools'
Cross-platform tool to analyze the configuration of SSL servers.
Supports cipher suites scanning, insecure renegotiation verification, session resumption testing, client certificates, and more...
Tested on Python 2.6 & 2.7, and Ubuntu and Windows 7, both 32 and 64 bits. Based on OpenSSL and a custom Python wrapper.
Contact: sslyze /at/ isecpartners \dot\ com
Download
http://code.google.com/p/sslyze/downloads/list
Supports cipher suites scanning, insecure renegotiation verification, session resumption testing, client certificates, and more...
Tested on Python 2.6 & 2.7, and Ubuntu and Windows 7, both 32 and 64 bits. Based on OpenSSL and a custom Python wrapper.
Contact: sslyze /at/ isecpartners \dot\ com
Download
http://code.google.com/p/sslyze/downloads/list
mimikatz - Recover Passwords
Am Wednesday, 29. Feb 2012 im Topic 'Tools'
Tool To Recover Cleartext Passwords From Lsass. It was possible to recover the cleartext passwords of logged on windows users.
Download
http://blog.gentilkiwi.com/downloads/mimikatz_trunk.7z
http://blog.gentilkiwi.com/downloads/mimikatz_trunk.zip
Download
http://blog.gentilkiwi.com/downloads/mimikatz_trunk.7z
http://blog.gentilkiwi.com/downloads/mimikatz_trunk.zip
Saturday, 25. February 2012
SIPVicious tool suite
Am Saturday, 25. Feb 2012 im Topic 'Tools'
SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. It currently consists of four tools:
svmap - this is a sip scanner. Lists SIP devices found on an IP range
svwar - identifies active extensions on a PBX
svcrack - an online password cracker for SIP PBX
svreport - manages sessions and exports reports to various formats
svcrash - attempts to stop unauthorized svwar and svcrack scans
Download
http://code.google.com/p/sipvicious/downloads/list
svmap - this is a sip scanner. Lists SIP devices found on an IP range
svwar - identifies active extensions on a PBX
svcrack - an online password cracker for SIP PBX
svreport - manages sessions and exports reports to various formats
svcrash - attempts to stop unauthorized svwar and svcrack scans
Download
http://code.google.com/p/sipvicious/downloads/list
PacketFence - network access control system - Linux
Am Saturday, 25. Feb 2012 im Topic 'Tools'
The PacketFence development team has published version 3.2.0 of its open source network access control (NAC) system. PacketFence allows organisations to increase control over their network by enforcing authentication and registration for newly connected devices. It also enables abnormal network activity detection and the isolation of troublesome devices.
Download
http://www.packetfence.org/download/releases.html
Download
http://www.packetfence.org/download/releases.html
Thursday, 23. February 2012
Mirage Anti-Bot
Am Thursday, 23. Feb 2012 im Topic 'Tools'
Jean-Pierre aka DarkCoderSc and Fred De Vries Develop and Release the second version of Another great security tool named "Mirage Anti-Bot 2.0". Zeus and SpyEye were the two main families of botnet software. These types of malware are spread mainly through drive-by downloads and phishing schemes.
Download
http://unremote.org/downloads/Mirage2/Setup.exe
Download
http://unremote.org/downloads/Mirage2/Setup.exe
Patator - brute-forcing tool - Linux
Am Thursday, 23. Feb 2012 im Topic 'Tools'
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Currently it supports the following modules:
* ftp_login : Brute-force FTP
* ssh_login : Brute-force SSH
* telnet_login : Brute-force Telnet
* smtp_login : Brute-force SMTP
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
* http_fuzz : Brute-force HTTP/HTTPS
* pop_passd : Brute-force poppassd (not POP3)
* ldap_login : Brute-force LDAP
* smb_login : Brute-force SMB
* mssql_login : Brute-force MSSQL
* oracle_login : Brute-force Oracle
* mysql_login : Brute-force MySQL
* pgsql_login : Brute-force PostgreSQL
* vnc_login : Brute-force VNC
* dns_forward : Forward lookup subdomains
* dns_reverse : Reverse lookup subnets
* snmp_login : Brute-force SNMPv1/2 and SNMPv3
* unzip_pass : Brute-force the password of encrypted ZIP files
* keystore_pass : Brute-force the password of Java keystore files
Download
http://code.google.com/p/patator/downloads/list
Currently it supports the following modules:
* ftp_login : Brute-force FTP
* ssh_login : Brute-force SSH
* telnet_login : Brute-force Telnet
* smtp_login : Brute-force SMTP
* smtp_vrfy : Enumerate valid users using the SMTP VRFY command
* smtp_rcpt : Enumerate valid users using the SMTP RCPT TO command
* http_fuzz : Brute-force HTTP/HTTPS
* pop_passd : Brute-force poppassd (not POP3)
* ldap_login : Brute-force LDAP
* smb_login : Brute-force SMB
* mssql_login : Brute-force MSSQL
* oracle_login : Brute-force Oracle
* mysql_login : Brute-force MySQL
* pgsql_login : Brute-force PostgreSQL
* vnc_login : Brute-force VNC
* dns_forward : Forward lookup subdomains
* dns_reverse : Reverse lookup subnets
* snmp_login : Brute-force SNMPv1/2 and SNMPv3
* unzip_pass : Brute-force the password of encrypted ZIP files
* keystore_pass : Brute-force the password of Java keystore files
Download
http://code.google.com/p/patator/downloads/list
Saturday, 18. February 2012
What Is A Rootkit?
Am Saturday, 18. Feb 2012 im Topic 'Tools'
At the core of the term "rootkit" are two words- "root" and "kit". Root refers to the all-powerful, "Administrator" account on Unix and Linux systems, and kit refers to a set of programs or utilities that allow someone to maintain root-level access to a computer. However, one other aspect of a rootkit, beyond maintaining root-level access, is that the presence of the rootkit should be undetectable.
Dowload BootRoot
http://www.eeye.com/Resources/Security-Center/Research/Tools/BootRoot
Download Jynx
http://www.blackhatacademy.org/security101/index.php?title=Jynx
Dowload BootRoot
http://www.eeye.com/Resources/Security-Center/Research/Tools/BootRoot
Download Jynx
http://www.blackhatacademy.org/security101/index.php?title=Jynx
Intersect 2.0 - Post Exploitation Automation - Linux
Am Saturday, 18. Feb 2012 im Topic 'Tools'
Intersect 2.0 is a Python script written to perform automated Post-Exploitation information gathering and reporting.
The general idea is that after you have exploited a target, you run this script and it performs a variety of tasks
that you would normally need to perform manually. Intersect will collect password files, copy SSH keys, enumerate
processes and installed applications, gather detailed network information, map the hosts internal network (for pivoting),
locate and identify common anti-virus and firewall applications and much more.
Download
https://github.com/ohdae/Intersect-2.0/
The general idea is that after you have exploited a target, you run this script and it performs a variety of tasks
that you would normally need to perform manually. Intersect will collect password files, copy SSH keys, enumerate
processes and installed applications, gather detailed network information, map the hosts internal network (for pivoting),
locate and identify common anti-virus and firewall applications and much more.
Download
https://github.com/ohdae/Intersect-2.0/
... ältere Einträge