Pages

Monday, June 20, 2011

THC Hydra v.6.4 released | network logon cracker





If you want to crack password of various networking protocols to access remote logon, Hydra is the best tool for that. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. Version 6 was tested to compile cleanly on Linux, windows/Cygwin, Solaris 11, FreeBSD 8.1 and OSX.

Currently this tool supports:
TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, AFP, Subversion/SVN, Firebird, LDAP2, Cisco AAA (incorporated in telnet module). For HTTP, POP3, IMAP and SMTP, several login mechanisms like plain and MD5 digest are supported.



This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system.


Disclaimer
1. This tool is for legal purposes only!
2. The GPLv3 applies to this code.
3. A special license expansion for OpenSSL is included which is required for the debian people


Changelog:

  •  Update SIP module to extract and use external IP addr return from server error to bypass NAT
  •  Update SIP module to use SASL lib
  •  Update email modules to check clear mode when TLS mode failed
  •  Update Oracle Listener module to work with Oracle DB 9.2
  •  Update LDAP module to support Windows 2008 active directory simple auth
  •  Fix to the connection adaptation engine which would loose planned attempts
  •  Fix make script for CentOS, reported by ya0wei
  •  Print error when a service limits connections and few pairs have to be tested
  •  Improved Mysql module to only init/close when needed
  •  Added patch from the FreeBSD maintainers
  •  Module usage help does not need a target to be specified anymore
  •  configure script now honors /etc/ld.so.conf.d/ directory 
 
Download Here
 
 
TECHNO TITANS !!!!!

How to Easily Backup All Your Google Docs Documents with GDocBackup

If you have many documents hosted in Google Docs, it is recommended that you create a backup copy of these files on your computer. You can do this manually via the home page of your Google Docs account, or simply use a tool called GDocBackup to easily download all your files on your computer.

GDocBackup Use

1. Download and install GDocBackup from here.

2. Launch the application and under the Main tab, submit your username and password you use to sign in to your Google Account, then select a backup directory where you want to store your files.

3. Open now the Export format tab, check on Enable multi-export, then check on all available extensions. When done, click Save.

4. In the main interface of GDocBackup, click Exec to start the backup process.

5. Wait now while the application downloads all your Google Docs files, click OK when the backup is completed.

6. The downloaded files will be now accessible in the selected backup directory. To sign in using a different username and password, then open Action > Config.




TECHNO TITANS !!!!!!!




Friday, June 17, 2011

Make Pen drive bootable. free download FlashBoot 2.0b

                                                                    FlashBoot 2.0b
                                         FlashBoot is a tool to make USB disks bootable.

Its primary focus is USB Flash disks, but other types of USB devices are supported as well. Making disk bootable involves formatting and copying operating system files to it. Different operating systems are supported: Windows 7/ Vista, Windows XP, SysLinux-based disks, GRUB4DOS disks, Linux kernel etc.

You may create blank bootable USB flash with minimal set of system files and then manually tune it for your needs, or convert a full-featured bootable CD-ROM or floppy disk to bootableUSB Flash keeping all functionality.

FlashBoot can either format physical disk or write an image file. So you may create customized USB disk manually or with another tool and use FlashBoot to create image out of it and redistribute it in local network or online.

FlashBoot 2.0 is a major step forward towards improvement of the software and satisfying user needs. Its code was rewritten from the ground up since old version 1.4 released in 2006.

Download Here:
 
 
TECHNO TITANS !!!! 

Saturday, June 11, 2011

Web camera software detects motion, triggers alarm, captures snapshots, records video, and sends captured images by e-mail

Web camera software senses activity, sounds
alarm, captures images, records video, and sends captured images by email


Webcam software detects movement, triggers alarm, captures images, records video, and sends captured images by email
Web cameras
are perfect for more than just making ip communications
more practical. They can in addition be
an enormously functional device
for use in home or corporation protection.

Application

is now available that can sense movement and use
it as a trigger for various procedures.


The way that
it works is to analyze the image sent by a camera that is either attached using USB
or through a video capture device for movement. While it picks up
that motion, it can afterward acquire any number of actions,
including triggering an alarm.

An other popular software, though, is to either
send live pictures of what is happening in the field that is covered by the camera
or to even broadcast using online streaming accurately what is
happening with both audio and picture. If installed furtively,
this software could even be used for covert surveillance.

Given the
large quantity of systems that either have a webcam attached
or can support one, this is an excellent way to inexpensively and effortlessly protect
the zone around that pc
from infringement or theft.

New professional security software works with
any webcamera, Internet cameras, and major capture cards.


Web camera software detects activity, triggers siren, captures images, records video, and sends captured images by email


Security software

has become so complicated that the average
user who has been busy minding his store instead of pouring over electronics and ip
know-how articles can be easily overwhelmed when it comes time to install or renew his surveillance system.


Luckily, there is modern professional surveillance application that simplifies much of the decision making.
You don't necessarily have to get rid of a working analog closed circuit TV system in order to update to a streaming
video that can be watched from any internet connected station or 3G phone. Video capture cards can digitally convert the
pictures for broadcast. Until yesterday, there had been no real attempts to regulate the new Internet
cameras; every make and manufacturer functioned a tiny differently. And when you throw webcams into the
join, finding one application to control them all was unwieldy.



Professional security application

is now available that will work for any webcam
or IP webcam and for most capture cards as well. You can monitor anything your activity
sensors are picking up at your house or business while you can be half a world away.
The application itself may not be easy, but it can make life simpler for you.

Broadcasting online video and audio from capture device
through camera computer application


Streaming live video and sound from capture card through web camera server application


Surveillance application

If you find yourself with a need to record security video with a webcam over an area,

camera
computer application

may be the right choice for you. Using this software, it is possible to set up a
camera to detect movement and begin recording when it does.

Depending on your needs, the sights and sounds that are picked up by the webcam may be stored on a hard drive, or if the captured video
needs to be accessible off-site, can be webcast using the server's broadcasting
feature to a website.

Depending on the quality of the webcam and the viewer's video card, the picture that is recorded may be as clear as a high-definition television signal.
Using a install like this, it is possible to provide a measure of security for an area when
the economics of the situation do not justify hiring a security business or setting up a professional monitoring system.

This

do-it-yourself approach

can save money while not compromising on security.


Friday, June 3, 2011

Protect against Cookiejacking | suggestion from microsoft

Protect against Cookie-jacking | suggestion from Microsoft

Some days ago, a security researcher found a microsoft's latest security risk named cookiejacking which allows cookiestealing. Microsoft is doing all it's research to patch this vulnerability of internet explore. This bug is in all versions of internet explorer. Clickjacking and social engineering techniques are then used to trick users into dragging the contents of the rogue iframes to containers on the same page controlled by the attackers. Read more about cookiejacking attack
Microsoft's Brandon LeBlanc say that the company is working on a patch. He also suggested to use  browser's InPrivate Browsing feature. The private browsing mode prevents access to cookie files already saved on the disk, but more importantly, it stores cookies for the active session in memory. This means that a page crafted for cookiejacking cannot access neither older cookies nor active ones, because there is no path to them

TECHNO TITANS !!!!!

share