Quick Access

User login

Who's online

There are currently 0 users and 2 guests online.

Visitors Map

Site Counter

  • Site Counter: 466944
  • Registered Users: 57060
  • Published Nodes: 331
  • Your IP: 46.229.164.115
  • Since: 2008-09-09

Link Exchange

BlogCatalog Blog Directory
Technology Business Directory - BTS LocalTop stories
Click here
         SecGeeks
       Megapanzer

Live Traffic Info

A unique Site with Unique Contents!
Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:
  • Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
  • Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
  • Modular design. Each service module exists as an independent .mod file.Read more..
    Your rating: None Average: 3.6 (20 votes)

Going through the searches and links on the email, I came across this fantastic way of viewing content that requires registration, without actually registering for these sites.

Trick I use is to visit BugMeNot and in the search box, enter the webite you want to view content from, for exampleNyTimes. This will then give you a list of usernames and passwords that you can use to login to the website and view the content. Along with the username and passwords, it provides their accuracy percentage. This way, you dont have to go through the annoyance of registering yourself.
Read more..
Your rating: None Average: 3.6 (5 votes)

Intercepting keystrokes

Hooking Key Events

There are different ways to catch the keys as they are being typed, but one of the most efficient is to monitor system events for key events. This is done with a hook, which forces Windows to call your own functions when a certain type of event happens.

First, let's see how you can set a hook to catch keyboard events, with SetWindowsHookEx(): Read more..

Your rating: None Average: 4.6 (7 votes)


[Laurent Gaffi?] has discovered an exploit that effects Windows Vista, Windows 7, and possibly Windows Server 2008 (unconfirmed). This method attacks via the NEGOTIATE PROTOCOL REQUEST which is the first SMB query sent. The vulnerability is present only on Windows versions that include Server Message Block 2.0 and have the protocol enabled. A successful attack requires no local access to the machine and results in a Blue Screen of Death.

POC
==========================================================
Smb-Bsod.py:

#!/usr/bin/pythonRead more..
Your rating: None Average: 3 (2 votes)

                
                       Techmantras is one year old now and the way Techmantras has progressed over the past one year is nothing short of outstanding. On this memorable day I would like to tell about our past one year journey. We registered Techmantras in January 08 and came online in September 08.We had out fair share of difficulties in between. We being students found it difficult to come online regularly but we still continued with the same zeal and passion. We created the site framework quickly and started posting. But technical work was and is never finished. We make modifications every day. We also see to it that we maintain the quality of our content.
Read more..
Your rating: None Average: 3.5 (2 votes)


PERHAPS YOU HAVE BOUGHT A PHONE AND WANT TO CLONE IT WITH ANOTHER PHONE THAT YOU HAVE IN USE THAT IS OLDER OR SOMETHING. WE WILL GO OVER THE BASICS OF WHAT YOU NEED TO CLONE A CELL PHONE:

1) SYSTEM ID
2) AREA CODE
3) CELL PHONE NUMBER



1) SYSTEM IDRead more..
Your rating: None Average: 4 (3 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

The worth of shade is only known when the sun is beating down hot

Explore Tags

Follow Us

buy tablet pc