Astalavista Security Newsletter - Issue 23 - Featured articles include - Breaking through security myths Part 1 and Managing the threats posed by stolen laptops - Tips as well as an interview with David Endler, TippingPoint.com.
e2b3b7d1424c28b027898642d1641da6afd325a7adb28344e2f941be113a7ea5
This archive holds mobile phone ROM images for the Nokia 6630, Nokia n70, Nokia N-GAGE, and the Sony-Ericsson P900. THC has launched the Mobile Phone ROM Image and Reverse Engineering Invitation. Their intention with this release is to motivate other reverse engineers to take a look at the images and to discover other hidden secrets.
bc4fb590e0a44fadd491f26c30c08691e07b7d46405ffc3de2c0f1f3862b4128
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
cd64dd23e6f5e21fe3cffbbeefeb7f4f6fd5ac8339add63fd102886694e7028a
Silent web CGI shell that passes all data between the client and server via cookies.
a410047e3049f504fb0a4cf57d0b03e0efbaf0c47007216944d2cb36be40092d
Simple CGI scanner for doing large scans.
6daa6a8d4611c642c1065b8be83dbf13b7d9cbb1c5fa825a76911e1bd4c10ed2
Phearless Serbian/Croatian Security Magazine Issue #05 - In this issue: Writing Basic Symbian Application, Loader From ring0, PariteB Reversing, Advanced Shellcoding, Elf Series - The Beginning (Code Dump), Uncovering Translated Environments, Symlink Attacks, LamerBuster v1.0, SI2000 Exposed, L00k Inside Registry Base.
1c35b76b1800a99433c0896e984352830576df1c3acad698de5042eba2ab4c7b
THC is proud to be the first who are releasing an comprehensive attack toolkit for the IPv6 protocol suite. It comprises of state-of-the-art tools for alive scanning, man-in-the-middle attacks, denial-of-service etc. which exploits inherent vulnerabilities in IPv6. Included is a fast and easy to use packet crafting library to create your own attack tools.
577fb708c202a62615c74e3fff77c90277801dc6ef131673f0b978d0059a198d
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
a3793901ab06ebc896a9cb28db9a4da122515151f2227f4e16921d446a5cffe2
TSNG is another excellent release from THC. It is just your normal plain text mode wardialer without a GUI, but with the ability to scan with as many modems as you want. The only limits are your bandwidth, RAM and CPU power. So in theory, up to 65000 modems can be used in parallel to scan a large range of numbers. The modems can be in any area of the world, as long as you have network connectivity to the systems to which the modems are connected.
507bafc71c2cda7abc5b5ef9e08d09c37dbfcfb1829b0270db30b21988eef784
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
d3dc9646807a7074bac799b74b68808f2805d59a216fe04671c418cd476230e0
Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.
a3705619eead095f15725a9ff0cc415932e6aad1a65535e4764adf693624bfa2
Phearless Serbian/Croatian Security Magazine Issue #04 - In this issue: Symbian C++ Reference - Part 1, Symbian OS - Polymorphic MDL, TINY phile about SQL injections, Developing Network Security Tool(s), The Art of Reversing, Open Your Windows (OS), Malloc Demistified - Part 1, Bypass DEP on Heap, Client/Server Systems, Uncommon Tribute to Practical Switching, and Cisco Routers Exposed.
b634f2e77c076277b403bb426d794f0d510f0896671f284697e51fbc7662ab26
Phearless Serbian/Croatian Security Magazine Issue #03 - In this issue: Injecting Malware: Symbian Micro Kernel, Smart EPO Techniques, Debugging Programs On Win32, Nanomites And Misc Stuff, Full Reverse(Target: tElock), Full Reverse(Target: MrStop's Crackme #1), Full Reverse(Target: Inline patching nSPack 2.x), Xtreem Exploiting Steps, Exploiting Non-Exec Stack, Exploiting Stack BOf Over SEH, Security Of Web Pages, How To Stay OUT Of JAIL, Secret Of BSOD, and Recent Computer Networks.
0653aa8d59a2f78b768ce89d9d41080d267b31367784382e3afa5cdfa2cd4f1a
Phearless Serbian/Croatian Security Magazine Issue #02 - In this issue: Symbian OS - Under the Hood, Runtime Decryption and Meta Swap Engine, BlackHand.w32(DeadCode.a/b) Analysys, prc-ko - the 4th Native API virus, NT Startup Methods Exposed, Phearless Challenge #2: Reversme, Full Reverse(Target VCT #1), Full Reverse(Target VCT #2), Full Reverse(Target VCT #3), Writing Linux Shellcode - Basics, Hiding Behind Firewall, Phreaking in Serbia, Cryptology 101, Win Hacks and Tips #2, and Security from iso/osi Reference Model Perspective.
5b695bbfb1af3f17c951a82f36b8ef214aee01652b0531371fbebff525d4532b
Phearless Serbian/Croatian Security Magazine Issue #01 - In this issue: The Art of Sniffing, The Art of Footprinting, SQL Injection Techniques, Wireless - Under the hood, Cross Site Scripting with examples, VX Coding - New ideas, Win Hack and Tweak, Samba Lin and Win Dance, Exploiting ShopAdmin, CGI Exploiting, and Mirc Scripting Basics. Note: All articles are in Serbian/Croatian.
667c8c8ad2e789a3b6b7c451991dfb87400bbd7db568da9276d836ec71ab233e
Phearless Group Logo
687e4d09dcf869779d098b6768593aa39fa80f365840e6d1a92c87f8709c29d2
Astalavista Security Newsletter - Issue 22 - Featured articles include - Things to consider when developing your early-stage security policy ; and Antivirus software - so what?! as well as an interview with Daniel Brandt, Google-Watch.org.
a7278b95685fd44c892a083a6c300a4c6170bdbab6fb8d585444a5fe69bb8287
Astalavista Security Newsletter - Issue 21 - Featured articles include - What else should I worry about besides the encryption length of our VPN solution? ; and Tips for enhancing your online privacy as well as an interview with Johannes B. Ullrich, CTO of the Sans Internet Storm Center, and the main developer behind the Dshield.org project
8ba66c707aa903e96ddabd065c7d527d2729e1ed43e05700bab667e21d239aba
Graphic for unl0ck section.
b8c34b57b3ddd1209783ce0ccb4c8fc2583ca7e6cf898bd979f33c4b39cc1d0c
3CDaemon remote root exploit.
658be6711b3c4ab25d876b5aeda1635694af0554b4763b808488c3832356dbd5
Mac OS X.
c446553f4f3166b6eb2e42c816e8b5f650b517abc11872daf2276db5d0338396
Exploits for WinRAR versions 3.4x and below, possibly 3.5x.
321977b4c6611a137dee4e707f96acbc2b75443b57c3581fec815f9e2657831e
Mozilla FireFox remote GIF heap overflow exploit for versions 1.0.1 and below.
f6bf1f16b4c69ffd0c96d7def4314b0449714708db73bda0548a476c1dc053fd
Access Administrator Pro 3.4 crack.
a5c07367b11fed965aa1ff1c0a0e80de8a106edffa1cd1b6bbc4a9b109d607a7
Advanced Security Level 5.3 crack.
952f7478a3fb46842af7d8c366d459815b3db633b87c058c4ece4092ec607c69