Sunday, May 27, 2007

Todya's Goodies

Security Videos - 24 videos - 310 mins
Basic Socket Programming: (4 videos - 65 mins); Packet Sniffing using Raw Sockets: (7 videos - 86 mins); Packet Injection using Raw Sockets: (6 videos - 75 mins); Architecture of a Proactive Security Tool: (4 videos - 43 mins); Encryption Basics using RC4: (3 videos - 38 mins).
Link
http://www.security-freak.net/videos.html
Added by
Dancho Danchev
Homepage
http://www.security-freak.net
===================================================================

Wednesday, May 23, 2007

Today I found a good duplicate file finder by MD5 hash

Name : dupFinder Ver 0.1
http://mwynwood.com/blog/?p=99
Source: Sourceforge.net

----Bioinformatics good bioinformatics tools

-Chromas Pro by Technilysium
-Mutation Surveyor 3.10 by Softgenetics

Monday, May 21, 2007

Todays Goodies

HITBSecConf2007 Videos
The videos from the first ever deep-knowledge security conference to be held in the UAE; HITBSecCoinf2007 - Dubai is now available for download.
Link
http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=23213
Added by
Dancho Danchev
=================================================================
Best of the Best Cyberpunk Movies by Decade Reviewed
Cyberpunk Movies prior to 1980; Cyberpunk Movies from 1980 - 1989; Cyberpunk Movies from 1990 - 1999; Cyberpunk Movies from 2000 to present.
Link
http://www.cyberpunkreview.com/cyberpunk-movies-by-decade/
Added by
Dancho Danchev
Homepage
http://www.cyberpunkreview.com
===================================================================
SQL Injection Cheat Sheet v1.4
Currently only for MySQL and Microsoft SQL Server, some ORACLE and some PostgreSQL. Most of samples are not correct for every single situation. Most of the real world environments may change because of parenthesis, different code bases and unexpected, strange SQL sentences.
Link
http://ferruh.mavituna.com/makale/sql-injection-cheatsheet/
Added by
Dancho Danchev
Homepage
http://ferruh.mavituna.com
===================================================================

Tuesday, May 08, 2007

Today's Goodies

TP Wire Service Technology RSS feed

http://tpwireservice.com/mt/archives/technology/index.html

=====================================================
Video: Exploring Metasploit 3 and the New and Improved Web Interface - Part 1
In this video we explore the revised MSFWeb interface for the Metasploit Framework 3.0. We specifically take a look at running auxiliary modules against a server running MSSQL, and then we'll take a look at using the MSFweb GUI to run the idq exploit with the meterpreter payload.
Link
http://www.ethicalhacker.net/content/view/137/24/
Added by
Dancho Danchev
==============================================================
Video: Exploring Metasploit 3 and the New and Improved Web Interface - Part 2
In this video we explore the revised MSFWeb interface for the Metasploit Framework 3.0. We specifically take a look at running "browser" exploits where you have to get the victim to connect back to your listening Metasploit instance. We'll use the ie_createobject exploit via the MSFweb GUI, and then we'll use the wmf_setabortproc exploit using the built in msfconsole (a new addition in MSFWeb 3.0).
Link
http://www.ethicalhacker.net/content/view/136/24/
Added by
Dancho Danchev

===================================================================
PhreakNic Videos

http://phreaknic.wilpig.org/PNX/

====================================================================
Secure Back Door (SBD)
Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. It is good if you don't want to have an SSH server running all the time, and only want to start it when needed. Because it is written in only a few lines of code, it is hoped that it will be less susceptible to security exploits than a program like SSH.
Link
http://sbd.sourceforge.net/
Platform
Linux
Added by
Dancho Danchev
===================================================================
Notacon 2007 - Video
Radar, full motion video on an 8088, a great Bluetooth discussion, shock sites, stun guns, Everclear, IPTV show hosts, Demoparty/Demoscene, hacker condoms, Ethernet alternatives, fire staffs, laser data links and more.
Link
http://www.irongeek.com/i.php?page=videos/notacon2007
Added by
Dancho Danchev
==================================================================
FakeChroot - a Fake Chroot Environment to Programs
A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.
Link
http://fakechroot.alioth.debian.org/
Platform
Linux
Added by
Dancho Danchev
==================================================================