Monday, 15. August 2011
Send Free SMS
http://smsti.in/send-free-sms/
http://seasms.com/#type
http://spicesms.com/sendsms.php
http://www.bollywoodmotion.com/free-long-sms-india.html

Permalink

 


Send Free Fax
http://sendfreefax.net
http://www.freefax.com/ff_snd.html
http://www.eztel.com/freefax/sendfax.html
http://www.popfax.com

Permalink

 


How to make a QR code
Goto http://qrcode.kaywa.com
Select the content type as you wish . if you want to add a Url on QR code select url and add your URL
and Press on the size if you want to make Size Small , medium or Large then Press the Generate Button. Download the QR code image on Computer.

Decrypt a QR Code:
Goto http://zxing.org/w/decode.jspx
Click Browse and Uplod the picture to the website and you can decrypt it and there are many other methods to decrypt QR code .The Device which to Decrypt QR code are QR barcode readers and camera phones with QR CODE Reader Application on it .

Permalink

 


Thursday, 4. August 2011
malware analysis - eset.com PDF
Download PDF
http://www.eset.com/us/resources/white-papers/Hodprot-Report.pdf

Permalink

 


Wednesday, 3. August 2011
Practical C++ Decompilation
C++ decompilation how to handle it in IDA and Hex-Rays decompiler. You can get the slides here
http://www.hexblog.com/wp-content/uploads/2011/08/Recon-2011-Skochinsky.pdf
and download the recorded talk here.
http://www.archive.org/details/Recon_2011_Practical_Cpp_decompilation

Permalink

 


Sunday, 31. July 2011
Cross Site Scripting "XSS" - Dokumentation, Analyse & Techniken "German"
Downoad PDF
http://www.vulnerability-lab.com/resources/documents/198.pdf

Permalink

 


Thursday, 28. July 2011
Beginner SQL tutorial
#1.Finding vulnerable sites
#2.Finding amount of columns
#3.Getting mysql version current user
#4.Getting Databases
#5.Getting Tables
#6.Getting Columns
#7.Getting Usernames and Passwords

Source
http://pastebin.com/bQBnkmXY

Permalink

 


Monday, 25. July 2011
Xss Attack
This video will demonstrate how a simple XSS vulnerability can be leveraged to gain complete control of your web-browser and eventually lead to a complete system compromise.
1) We will use a cross-site scripting vulnerability as the initial attack vector
2) Exploit XSS by redirecting the user’s browser to the Evil_IP with a JavaScript loop (every 2 secs)
3) Exploit the victim’s browser to gain system ‘root’ or ‘shell’ access
4) Elevate our privileges to system-level
5) Dump the memory contents from an active SSH session and steal the SSH password from the victim’s computer

XSS Attack - Busting Browsers to Root! from Qjax on Vimeo.

Permalink

 


Hacking a security program
This article is a video demonstration about Penetration Testing Execution Standard. David goes in-depth on the future of penetration testing through the Penetration Testing Execution Standard (PTES) and what it takes in order to elevate your security posture.

Video is all about technical talk which offers direction on where we need to head in the security industry. We know many of us like to create our own path. But known strategies will not harm.

Permalink

 


Saturday, 23. July 2011
Password Cracking Guide
Here is the table of contents:
http://pastebin.com/EtHsJr4B

Download PDF:
http://tools.question-defense.com/Cracking_Passwords_Guide.pdf

Permalink