Your Ad Here



Portable Windows XP Hidden App Launcher (AIO 23 in 1) By Rizla+ l 1.4 MB

Includes:
1) Character Map = charmap.exe
2) Disk Cleanup = cleanmgr.exe
3) Clipboard Viewer = clipbrd.exe (view contents of Windows clipboard)
4) Dr Watson = drwtsn32.exe (Troubleshooting tool)
5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)
6) Private character editor = eudcedit.exe ( creation or modification of characters)
7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)Microsoft Synchronization Manager = mobsync.exe ( allows synchronization of files on the network for working offline. UNDOCUMENTED).
9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).
10) ODBC Data Source Administrator = odbcad32.exe
11) Object Packager = packager.exe ( packaging objects for insertion in files, has comprehensive help files).
12) System Monitor = perfmon.exe ( Everything you ever wanted to know about any aspect of PC performance )
13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell, I use this when I don't want other people messing with my machine...).
14) Remote Access phone book = rasphone.exe
15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).
16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).
17) File siganture verification tool = sigverif.exe
18) Volume Contro = sndvol32.exe (Just in case you've lost it from your tray).
19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).
20) Syskey = syskey.exe (Secures XP Account database - BE CAREFUL.. appears to encrypt all passwords...UNDOCUMENTED).
21) Microsoft Telnet Client = telnet.exe
22) Driver Verifier Manager = verifier.exe ( utility for monitoring the actions of drivers ?( useful if having driver problems? UNDOCUMENTED).
23) Windows for Workgroups Chat = winchat.exe ( old NT utility to allow chat sessions over a LAN, some help files available).
24) "Microsoft System Configuration Utility" or simply "MSCONFIG." Designed to help you troubleshoot problems with your computer, MSCONFIG can also be used to ensure that your computer boots faster and crashes less.

Download:

http://depositfiles.com/files/5995649
http://letitbit.net/download/a8142240162/Portable-xp-app-launcher-1-.rar.html
http://vip-file.com/download/a81422923098/Portable-xp-app-launcher-1-.rar.html

Posted by Cyber Trunks

A Buffer Overflow Study - Attacks and Defenses (2002)

Advanced Buffer Overflow Methods

Altering ARP Tables v1.00

Analysis of the WinZip Encryption Method

Attacking and Repairing the WinZip Encryption Scheme

Anti-honeypot technology

ARP Spoofing in switched LANs

Attacking WiFi with traffic injection - Cedric Blancher

Beyond stack smashing

Binary Protection Schemes - Andrew Griffiths

Blocking Skype Using Squid and OpenBSD

Buffer Overflow - hackaholic

Bypassing Windows Hardware-enforced DEP

Bypassing Windows heap protections

Concepts for the Stealth Windows Rootkit

Detecting Worm Propagation Using Traffic Concentration Analysis and
Inductive Learning

DNS Amplification Attacks

eEye Whitepaper_Generic Anti Exploitation Technology for Windows

egghunt shellcode

Exploiting Windows Device Drivers Whitepaper

Exploiting Freelist[0] on Mic*ft Windows XP SP2

Exploring Mic*ft Windows CE shellcode

Google Hacking for Penetration Tester (Syngress-2005)

Google Hacking BH_EU_05 - Johnny Long

Host Fingerprinting

HTTP Request Smuggling

ICMP attacks against TCP

IE file downloading security warnings bypass

Intro to shellcoding

Introduction to Reverse Engineering Win32 Applications

Kimmo Kasslin VB2005 proceedings

kmalloc exploitation

Lotus passwords disclosures

Lynn Cisco

Malicious SMTP-based Mass-Mailing Activity

Man In The Middle - MITM attacks

MetaSploit Beyond EIP BlacHat 2005

Moving towards the Artificial Hacker - Ashley Fox

Mic*ft Bug Paper

NetCat Swiss Army Knife

Post-exploitation on Windows using ActiveX Controls

Real Server Exploit Analysis

remote library injection

ret onto vsyscall

Return to libc

Savant Buffer Overflow tutorial

Shellcode advances

SIP Security

Smack The Stack

SMS analysis

Spyware Survival ToolKit

stack overflow win XP sp2

Stack Based Overflows Windows Part1

Stack Based Overflows Windows Part2

Stealing passwords via browser refresh

The Voyage To 0-Day Using the Metasploit Framework

The Basics of Shellcoding

unicode BoF

vmware machines detection

WarDriving and detecting wardrivers

whitepaper HTTP response

whitepaper shellcode

win32 shellcode

win32 simple shellcoding

Windows Access Control Demystified

Windows XP Security Guide

worm propagation

Writing Stack Based Overflows On Windows Examples

Writing Small Shellcode

x86-64 Buffer Overflow Exploits and the borrowed code chunks
exploitation technique

XSS attacks

XSS Attack FAQ


Code:
https://www.securinfos.info/english/security_papers_hacking_whitepapers.php

Posted by Cyber Trunks

The registry contains many many Windows settings (and changes continuously), which can be viewed with the Registry Editor. Because many pages on this site (and other websites) contain registry tweaks, you need the Registry Editor to apply those registry tweaks. The Registry Editor is started with the command REGEDIT (Start, Run..., create a shortcut if you use Registry Editor frequently). Welcome in the world of the registry entries!

Most important to remember using the Registry Editor: there is NO WAY back. If you change something, it is permanent unless you have made a (partly) registry backup (File, Export). Worst case scenario: your Windows doesn't boot anymore! However, this is not a reason to leave the Registry Editor for what it is, frightened to do something wrong. If you carefully follow the instructions and ensure yourself you are making the right changes, nothing will go wrong. Before you make permanent major changes, it's wise first to make a system backup, to repair any damage.


Making changes to the registry

As shown below, the registry (Start, Run, REGEDIT) contains 5 basic keys: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS and HKEY_CURRENT_CONFIG. Most suggested registry tweaks will be suggested for the HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE keys. The first key contains settings for the current user account while the second key contains settings for the Windows system.



Tweaks for the HKEY_CURRENT_USER keys can be safely tested by creating an extra user account (Control Panel, User accounts). Within the new test user account you can test those tweaks and remove the user account afterwards. Before you make essential changes to the registry, you can export the keys first to a *.REG file by File, Export within the Registry Editor. Later you can import those registry files by File, Import or by double clicking on them in the Windows Explorer. This way it's easy to export registry settings from one computer to the other.

An important function within the Registry Editor is the search function (Edit, Search). Using the F3 key makes it easy to find next items in the registry.

TRACKING CHANGES IN THE WINDOWS REGISTRY :
Most tools make changes in the registry keys. If you would like to know which changes take place, you can find them with a realtime monitoring tool like Process Monitor (download: www.microsoft.com/technet/sysinternals/ProcessesAndThreads/processmonitor.mspx). If you would like to compare the difference before and after a change, you can create snapshots and calculate the changes. You can do this with trialsoftware like Advanced Registry Tracer (download: www.elcomsoft.com/art.html) or Tracker (download: www.evansprogramming.com/tracker.asp).

Posted by Cyber Trunks

This article has every possible method on how you can reset an XP password.

Recovering lost administrator windows N4/XP/Vista isn’t a complicated task and I know several easy ways to do so. Which method you’d use it’s up to you, but I usually try ERD first. But first things first – let’s present the options:


Option #1

ERD – Emergency recovery disk. Using this method you need to prepare ahead, by downloading one of FREE ERD tools and burning it onto CD.



ERDs are Free Windows password-cracking tools are usually Linux boot disks that have NT file system (NTFS) drivers and software that will read the registry and rewrite the password hashes for any account including the Administrators. This process requires physical access to the console but it works like a charm! I've done it myself several times with no glitch or problem whatsoever.



Caution: If used on users that have EFS encrypted files, and the system is XP or later service packs on W2K, all encrypted files for that user will be UNREADABLE! And cannot be recovered unless you remember the old password again!



Pros: Quick, Works in 99% of cases.

Cons: Might seem complicated for notice user, doesn’t work with certain SATA disk and/or Raid controllers



Here are my favorite tools:

Petter Nordahl-Hagen's Offline NT Password & Registry Editor
- A great boot CD/Floppy that can reset the local administrator's password. (The only tool for Windows VISTA)

EBCD – Emergency Boot CD - Bootable CD, intended for system recovery in the case of software or hardware faults.

Offline NT Password & Registry Editor (v060213 - February 2006)

Petter Nordahl-Hagen has written a Windows NT/2000/XP/Vista offline password editor:

http://home.eunet.no/~pnordahl/ntpasswd

· This is a utility to (re)set the password of any user that has a valid (local) account on your Windows NT/2000/XP/2003/Vista system, by modifying the encrypted password in the registry's SAM file.

· You do not need to know the old password to set a new one.

· It works offline, that is, you have to shutdown your computer and boot off a floppy disk or CD. The boot-disk includes stuff to access NTFS partitions and scripts to glue the whole thing together.

· Works with syskey (no need to turn it off, but you can if you have lost the key)

· Will detect and offer to unlock locked or disabled out user accounts!

Download links:

· cd060213.zip (~3MB) - Bootable CD image with newer drivers

· bd050303.zip (~1.1MB) - Bootdisk image, date 050303.

· sc050303.zip(~1.4MB) - SCSI-drivers (050303) (only use newest drivers with newest bootdisk, this one works with bd050303)

To write these images to a floppy disk you'll need RawWrite2 which is included in the Bootdisk image download. To create the CD you just need to use your favorite CD burning program and burn the .ISO file to CD. I personally prefer CD option since I don’t have to fiddle around with antique technology like floppy drives, besides most of new pc don’t have floppy drive at all.

Support and Problems? Good FAQ set up covering most of the day-to-day questions. Read it right HERE

Author claims that this tool was successfully tested on NT 3.51, NT 4, Windows 2000 (except datacenter), Windows XP (all versions) and Window Server 2003. Notice that it is NOT compatible with Active Directory. To work around this limitations please read the Forgot the Administrator's Password? - Reset Domain Admin Password in Windows Server 2003 AD page.


EBCD – Emergency Boot CD (v0.61 - October 2004)


EBCD is a bootable CD, intended for system recovery in the case of software or hardware faults. It is able to create backup copies of normally working system and restore system to saved state. It contains the best system software ever created, properly compiled and configured for the maximum efficient use.

EBCD will be very useful when you need to:

· Copy/move files (with long names, not necessary in CP437 encoding) from/to the disk but OS which can handle them (windows, Linux...) cannot boot. In particular, you may create a backup copy of normally installed and configured Windows and later restore Windows from such backup copy. So, in the case of fault OS itself and all software and its settings can be restored in 5-10 minutes.

· Perform emergency boot of Windows NT / 2000 / XP. When the loader of this OS on the hard disk is damaged or misconfigured, you are able to load OS using another, standalone loader from this CD.

· Recover master boot record of HDD. This allows to boot OS after incorrect uninstallation of custom loader (LILO, for example), which made all OS on your PC not bootable.

· Delete, move, copy to file (image) and re-create partition from file. Image transfer over network is also supported: so you may configure one PC and then make contents of hard disks of other PCs same as contents of the hard disk of the first one.

· Change password of any user, including administrator of Windows NT/2000/XP OS. You do not need to know the old password.

· Recover deleted file, even file re-deleted from Windows Recycle Bin, and, in contrast, wipe single file or a whole disk so that it will be impossible to recover it in any way.

· Recover data from accidentally formatted disk. Sometimes it helps to recover data from the disk, damaged by a virus.

· Recover data from a floppy disk, which is not readable by OS. Format 3.5" disk for 1.7 Mb size.

Also the disk includes full set of external DOS commands, console versions of the most popular archivers/compressors.

Moreover, emergency boot CD includes minimal Linux distribution (Rescue Linux distribution) which may be very useful to a professional user.

Download links:

EBCD Pro distribution (18mb)


Option #2

Lets say, worst happened – its past 11pm, you are still at work, accidentally forgot admin password and ALL ERD tools don’t work, since the pc you are working on have non-standard disk controller. What to do???

Luckily for us, Microsoft left loophole, big enough to do the task relatively easy:



1. Place in windows XP CD and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)

2. Keep your eye on the screen messages for booting to your cd usually it will be “Press any key to boot from cd”

3. Begin windows Repair process.

4. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again!

5. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

From here you can run any windows command and you’ll have full administrator access. To reset password you can use ether of two ways:



1) Run NUSRMGR.CPL to get graphical interface

2) Run Compmgmt.msc to get Computer Management console. From there use Local User and Groups->Users




Posted by Cyber Trunks

ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from important]devices[.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the important harddisk
running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMMAND Opens the command interpreter.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a file back to it's original format.
EXTRACT Extract files from the Microsoft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to drive
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation. <<<<<<<<<<<<<<<<
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early Microsoft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
RECOVER Recovers readable information from a bad or defective disk.
REM Records comments (remarks) in batch files or CONFIG.SYS.
REN Renames a file or directory.
RENAME Renames a file or directory.
REPLACE Replaces files.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.

Posted by Cyber Trunks
9:10 PM

Angry IP Scanner

What is Angry IP Scanner?

Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other features.

It is widely used by network administrators and just curious users around the world, including large and small enterprises, banks, and government agencies.

It runs on Linux, Windows, and Mac OS X, possibly supporting other platforms as well.


There are currently two different versions available:

  • New cross-platform version, 3.x - still in beta
  • Old Windows-only version, 2.x - stable and widely used

It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere.

It can scan IPs in any range, even 1.1.1.1 to 255.255.255.255. Its binary file size is very small compared to other IP scanners. Angry IP scanner simply pings each IP address to check if it's alive, then optionally it is resolving hostname and tries to connect at specified in Options dialog box TCP port.
It also has additional features, like NetBIOS information (computer name, workgroup name, currently logged in user and MAC address), results saving to CSV or TXT file, can be used as a command-line utility in a batch file, etc.

Pros: TINY program. Easy to use interface. No installation required. Freeware. Does any more need be said?

Cons: Till Date none :)

Overall: Its a swissknife as compared to others,small,free and deadly.Its an very highly recommended for network admins and apprentice hackers and computer nerds. get it,and get it fast

download from here

Posted by Cyber Trunks

What is Nmap?: Nmap, short for "network mapper", is a free utility which can quickly scan broad ranges of devices and provide valuable information about the devices on your network. It can be used for IT auditing and asset discovery as well as for security profiling of the network.
What Does Nmap Do?: Nmap uses raw IP packets to determine what hosts are available on the network, the services that are enabled, the operating system and version of the host, what sort of firewall or packet filters are in place and many other aspects of the network. The information can be used to proactively identify and correct security holes. The tool can also be used by attackers to scan a network and perform reconnaisance about the types and quantities of targets available and what weaknesses exist.
Running Nmap: Nmap is available for a wide range of operating system platforms. The standard download is a compressed file containing the UNIX version (which runs on Linux, Solaris, Free/Net/OpenBSD, and Mac OS X) and the Windows version as well as NmapFE, the X-Windows front end for UNIX, and NmapWIN, the recommended Windows GUI for Nmap.

You can download the latest version of Nmap, as well as many previous stable versions, at Nmap Downloads

NMap Scans: NMap can perform a wide range of scans. Some are more aggressive and blatant, while some are designed to be stealthy and scan undetected. Depending on the type of scan performed, different information can be discovered as well.

Some of the scan types are:

  • Connect
  • SYN Stealth
  • FIN, Xmas, Null
  • Ping
  • UDP Scan
  • IP Protocol Scan
  • ACK Scan
  • Window Scan
  • RPC Scan
  • List Scan
  • FTP Bounce
Nmap Resources: The best source of Nmap information is the official home of Nmap, Insecure.org. On that site you can find all of the details and information including:

Posted by Cyber Trunks
9:08 PM

Foundstone Vision

What Is Vision?: Vision is a GUI (graphical user interface) version of the popular freeware tool FPort, also from Foundstone. Vision provides a comprehensive and in-depth port scanning functionality with additional features to help identify and eradicate issues.
What Can Vision Do?: The Foundstone Vision utility can display all open TCP and UDP ports on a machine, the service that is active on each port, and it maps the ports to their respective applications. Vision can help determine host status by displaying detailed system information, applications running, and processes and ports in use.
System Requirements: NT 4/ Win 2000
Note: Vision will not work on Windows 9x or Me, but may operate on Windows XP or Windows Server 2003
Note: NT 4 needs psapi.dll
800x600 resolution minimum
256 colors minimum
32MB of RAM minimum
Download Vision: To download your free copy of the Foundstone Vision utility, click here:

Foundstone Vision

Posted by Cyber Trunks
9:07 PM

Foundstone FPort

What Is FPort?:
FPort is a free utility available from Foundstone, a division of McAfee, which you can use to identify unknown, open ports and their associated applications
What Does FPort Do?:
An FPort scan reports all open TCP/IP and UDP ports and maps them to the owning application. Similar information can be gathered using the 'netstat -an' command, but FPort also maps the ports to running processes with the PID, process name and path. Fport can be used to quickly identify unknown, open ports and their associated applications for troubleshooting or forensic investigations.
What Are The Operating System Requirements?:
Fport requires Windows NT4, Windows 2000 or Windows XP to run.
Command Line Parameter Switches:
To fine-tune or filter the FPort scan results, there are a few command line switches that can be used:

  • /? usage help
  • /p sort by port
  • /a sort by application
  • /i sort by pid
  • /ap sort by application path
Download FPort: You can download a copy of this free utility from Foundstone at this link:

Posted by Cyber Trunks
Your Ad Here