... neuere Einträge
Monday, 15. August 2011
Send Free SMS
Am Monday, 15. Aug 2011 im Topic 'Tutorials'
http://smsti.in/send-free-sms/
http://seasms.com/#type
http://spicesms.com/sendsms.php
http://www.bollywoodmotion.com/free-long-sms-india.html
http://seasms.com/#type
http://spicesms.com/sendsms.php
http://www.bollywoodmotion.com/free-long-sms-india.html
Send Free Fax
Am Monday, 15. Aug 2011 im Topic 'Tutorials'
http://sendfreefax.net
http://www.freefax.com/ff_snd.html
http://www.eztel.com/freefax/sendfax.html
http://www.popfax.com
http://www.freefax.com/ff_snd.html
http://www.eztel.com/freefax/sendfax.html
http://www.popfax.com
How to make a QR code
Am Monday, 15. Aug 2011 im Topic 'Tutorials'
Goto http://qrcode.kaywa.com
Select the content type as you wish . if you want to add a Url on QR code select url and add your URL
and Press on the size if you want to make Size Small , medium or Large then Press the Generate Button. Download the QR code image on Computer.
Decrypt a QR Code:
Goto http://zxing.org/w/decode.jspx
Click Browse and Uplod the picture to the website and you can decrypt it and there are many other methods to decrypt QR code .The Device which to Decrypt QR code are QR barcode readers and camera phones with QR CODE Reader Application on it .
Select the content type as you wish . if you want to add a Url on QR code select url and add your URL
and Press on the size if you want to make Size Small , medium or Large then Press the Generate Button. Download the QR code image on Computer.
Decrypt a QR Code:
Goto http://zxing.org/w/decode.jspx
Click Browse and Uplod the picture to the website and you can decrypt it and there are many other methods to decrypt QR code .The Device which to Decrypt QR code are QR barcode readers and camera phones with QR CODE Reader Application on it .
Thursday, 4. August 2011
malware analysis - eset.com PDF
Am Thursday, 4. Aug 2011 im Topic 'Tutorials'
Wednesday, 3. August 2011
Practical C++ Decompilation
Am Wednesday, 3. Aug 2011 im Topic 'Tutorials'
C++ decompilation how to handle it in IDA and Hex-Rays decompiler. You can get the slides here
http://www.hexblog.com/wp-content/uploads/2011/08/Recon-2011-Skochinsky.pdf
and download the recorded talk here.
http://www.archive.org/details/Recon_2011_Practical_Cpp_decompilation
http://www.hexblog.com/wp-content/uploads/2011/08/Recon-2011-Skochinsky.pdf
and download the recorded talk here.
http://www.archive.org/details/Recon_2011_Practical_Cpp_decompilation
Sunday, 31. July 2011
Cross Site Scripting "XSS" - Dokumentation, Analyse & Techniken "German"
Am Sunday, 31. Jul 2011 im Topic 'Tutorials'
Thursday, 28. July 2011
Beginner SQL tutorial
Am Thursday, 28. Jul 2011 im Topic 'Tutorials'
#1.Finding vulnerable sites
#2.Finding amount of columns
#3.Getting mysql version current user
#4.Getting Databases
#5.Getting Tables
#6.Getting Columns
#7.Getting Usernames and Passwords
Source
http://pastebin.com/bQBnkmXY
#2.Finding amount of columns
#3.Getting mysql version current user
#4.Getting Databases
#5.Getting Tables
#6.Getting Columns
#7.Getting Usernames and Passwords
Source
http://pastebin.com/bQBnkmXY
Monday, 25. July 2011
Xss Attack
Am Monday, 25. Jul 2011 im Topic 'Tutorials'
This video will demonstrate how a simple XSS vulnerability can be leveraged to gain complete control of your web-browser and eventually lead to a complete system compromise.
1) We will use a cross-site scripting vulnerability as the initial attack vector
2) Exploit XSS by redirecting the user’s browser to the Evil_IP with a JavaScript loop (every 2 secs)
3) Exploit the victim’s browser to gain system ‘root’ or ‘shell’ access
4) Elevate our privileges to system-level
5) Dump the memory contents from an active SSH session and steal the SSH password from the victim’s computer
1) We will use a cross-site scripting vulnerability as the initial attack vector
2) Exploit XSS by redirecting the user’s browser to the Evil_IP with a JavaScript loop (every 2 secs)
3) Exploit the victim’s browser to gain system ‘root’ or ‘shell’ access
4) Elevate our privileges to system-level
5) Dump the memory contents from an active SSH session and steal the SSH password from the victim’s computer
Hacking a security program
Am Monday, 25. Jul 2011 im Topic 'Tutorials'
This article is a video demonstration about Penetration Testing Execution Standard. David goes in-depth on the future of penetration testing through the Penetration Testing Execution Standard (PTES) and what it takes in order to elevate your security posture.
Video is all about technical talk which offers direction on where we need to head in the security industry. We know many of us like to create our own path. But known strategies will not harm.
Video is all about technical talk which offers direction on where we need to head in the security industry. We know many of us like to create our own path. But known strategies will not harm.
Saturday, 23. July 2011
Password Cracking Guide
Am Saturday, 23. Jul 2011 im Topic 'Tutorials'
Here is the table of contents:
http://pastebin.com/EtHsJr4B
Download PDF:
http://tools.question-defense.com/Cracking_Passwords_Guide.pdf
http://pastebin.com/EtHsJr4B
Download PDF:
http://tools.question-defense.com/Cracking_Passwords_Guide.pdf
... ältere Einträge