'Hacking'에 해당되는 글 266건

  1. 2009.02.06 Below is a list of resources you've selected: by CEOinIRVINE
  2. 2009.02.06 Security Metrics by CEOinIRVINE
  3. 2009.02.06 CIS BenchMark by CEOinIRVINE
  4. 2009.02.06 CIS BenchMark by CEOinIRVINE 3
  5. 2009.02.06 Security Checklists by CEOinIRVINE
  6. 2009.02.04 How to Make Sigs and finding packet id's to get Addresses by CEOinIRVINE
  7. 2009.01.30 maxmind.com : anti proxy , block proxy users by CEOinIRVINE
  8. 2009.01.29 How to block Proxy Servers by CEOinIRVINE
  9. 2009.01.28 Reverse Engineering Books by CEOinIRVINE 1
  10. 2009.01.28 Debugger by CEOinIRVINE

Below is a list of resources you've selected:

'Hacking' 카테고리의 다른 글

XSS Cheat Sheet  (0) 2009.02.06
CIS benchmarks  (0) 2009.02.06
Security Metrics  (0) 2009.02.06
CIS BenchMark  (0) 2009.02.06
CIS BenchMark  (3) 2009.02.06
Posted by CEOinIRVINE
l

Security Metrics

Hacking 2009. 2. 6. 05:53

Security Metrics Consensus Team Progress

A team of more than 100 government, private, and academic experts are working to reach consensus on a small initial set of security outcome and practice metrics. At present these security metrics are in final draft. They represent outcome and practice areas of security regarded by the consensus group as important, but they are subject to further refinement by the group.

Currently, the consensus group has developed metrics covering the following business functions:

  • Application Security
    • Number of Applications
    • Percentage of Critical Applications
    • Risk Assessment Coverage
    • Security Testing Coverage
  • Configuration Change Management
    • Mean-Time to Complete Changes
    • Percent of Changes with Security Review
    • Percent of Changes with Security Exceptions
  • Financial
    • Information Security Budget as % of IT Budget
    • Information Security Budget Allocation
  • Incident Management
    • Mean-Time to Incident Discovery
    • Number of Incidents
    • Percentage of Incidents Detected by Internal Controls
    • Mean-Time Between Security Incidents
    • Mean-Time to Recovery
  • Patch Management
    • Patch Policy Compliance
    • Patch Management Coverage
    • Mean-Time to Patch
    • Mean-Time to Patch Critical Patches
  • Vulnerability Management
    • Vulnerability Scan Coverage
    • Percent of Systems Without Known Severe Vulnerabilities
    • Number of Known Vulnerability Instances

Metrics Schema

A security metrics schema has been developed that will serve as a structure for the final definition of each metric so that terms, definitions, and computational aspects are unambiguous.

Future Benefits of the Planned CIS Information Security Metrics Service

'Hacking' 카테고리의 다른 글

CIS benchmarks  (0) 2009.02.06
Below is a list of resources you've selected:  (0) 2009.02.06
CIS BenchMark  (0) 2009.02.06
CIS BenchMark  (3) 2009.02.06
Security Checklists  (0) 2009.02.06
Posted by CEOinIRVINE
l

CIS BenchMark

Hacking 2009. 2. 6. 04:53

'Hacking' 카테고리의 다른 글

Below is a list of resources you've selected:  (0) 2009.02.06
Security Metrics  (0) 2009.02.06
CIS BenchMark  (3) 2009.02.06
Security Checklists  (0) 2009.02.06
How to Make Sigs and finding packet id's to get Addresses  (0) 2009.02.04
Posted by CEOinIRVINE
l

CIS BenchMark

Hacking 2009. 2. 6. 04:35

Below is a list of resources you've selected:

'Hacking' 카테고리의 다른 글

Security Metrics  (0) 2009.02.06
CIS BenchMark  (0) 2009.02.06
Security Checklists  (0) 2009.02.06
How to Make Sigs and finding packet id's to get Addresses  (0) 2009.02.04
maxmind.com : anti proxy , block proxy users  (0) 2009.01.30
Posted by CEOinIRVINE
l

Security Checklists

Hacking 2009. 2. 6. 04:11
Security Checklists
''''


Security Checklists | SRRs | STIGs | STIG Home Page | Whitepapers
 
Documents Date Size


'Hacking' 카테고리의 다른 글

CIS BenchMark  (0) 2009.02.06
CIS BenchMark  (3) 2009.02.06
How to Make Sigs and finding packet id's to get Addresses  (0) 2009.02.04
maxmind.com : anti proxy , block proxy users  (0) 2009.01.30
How to block Proxy Servers  (0) 2009.01.29
Posted by CEOinIRVINE
l

How to Make Sigs and finding packet id's to get Addresses
Olly > Load Unpacked Gunz > Search all referenced text strings > Search "melee" until you come across something like peer.shot.melee (Yeah i know probably incorrect but it looks like that) > At the top of that piece of code you'll find "PUSH #### (#### = numbers, The numbers are the packet ID) > Right click > Binary Copy > CTRL + B > @ Binary : SHIFT + INS > Leads you to new piece of code, go to the top of that block.

Grats. You've just found ZPostShotMelee.


 

'Hacking' 카테고리의 다른 글

CIS BenchMark  (3) 2009.02.06
Security Checklists  (0) 2009.02.06
maxmind.com : anti proxy , block proxy users  (0) 2009.01.30
How to block Proxy Servers  (0) 2009.01.29
Reverse Engineering Books  (1) 2009.01.28
Posted by CEOinIRVINE
l
Proxy Detection Web Service: Usage from Perl, ASP and PHP

Examples below show how to use the MaxMind Proxy Detection web service API from server-side scripts in Perl, ASP and PHP. These can be adapted for other web services.

Any programming language that supports HTTP client calls should be able to use MaxMind web services.

Perl Example

#!/usr/bin/perl

use strict;
use LWP::UserAgent;
use HTTP::Request qw(GET POST);
use HTTP::Headers;

# replace this value with license key
my $license_key = "LICENSE_KEY_HERE";

my $ua = LWP::UserAgent->new(timeout => 2);
my $h = HTTP::Headers->new;
$h->content_type('application/x-www-form-urlencoded');
my $request = HTTP::Request->new('POST','https://minfraud3.maxmind.com/app/ipauth_http',
$h,"l=$license_key&ipaddr=80.24.24.24");
my $res = $ua->request($request);
my $content = $res->content;
print "content = $content\n"
Active Server Pages (ASP) Example
Dim objHttp, strQuery
strQuery = "https://minfraud3.maxmind.com/app/ipauth_http?l=" & license_key & _
"&ipaddr=" & ipaddress
set objHttp = Server.CreateObject("Msxml2.ServerXMLHTTP")
objHttp.open "GET", strQuery, false
objHttp.send
Response.Write objHttp.ResponseText
Set objHttp = Nothing
Requirements:

  1. ASP 3.0+
  2. Microsoft® XML 3.0 Component
Microsoft XML 3.0 Component can be downloaded for free from here. PHP Example
#!/usr/bin/php -q
<?php
$license_key = 'LICENSE_KEY_HERE';
$ipaddress = 'IP_ADDRESS_HERE';
$query = "https://minfraud3.maxmind.com/app/ipauth_http?l=" . $license_key
. "&ipaddr=" . $ipaddress;
$score = file_get_contents($query);
echo $score;
?>

'Hacking' 카테고리의 다른 글

Security Checklists  (0) 2009.02.06
How to Make Sigs and finding packet id's to get Addresses  (0) 2009.02.04
How to block Proxy Servers  (0) 2009.01.29
Reverse Engineering Books  (1) 2009.01.28
Debugger  (0) 2009.01.28
Posted by CEOinIRVINE
l

How to block Proxy Servers

Hacking 2009. 1. 29. 12:14

How to Block Proxy Servers via htaccess

Published Sunday, April 20, 2008 @ 4:38 pm • 18 Responses

Not too long ago, a reader going by the name of bjarbj78 asked about how to block proxy servers from accessing her website. Apparently, bjarbj78 had taken the time to compile a proxy blacklist of over 9,000 domains, only to discover afterwards that the formulated htaccess blacklisting strategy didn’t work as expected:

deny from proxydomain.com proxydomain2.com

Blacklisting proxy servers by blocking individual domains seems like a futile exercise. Although there are a good number of reliable, consistent proxy domains that could be blocked directly, the vast majority of such sites are constantly changing. It would take a team of professionals working around the clock just to keep up with them all.

As explained in my reply to bjarbj78’s comment, requiring Apache to process over 9,000 htaccess entries for every request could prove disastrous:

The question is, even if you could use htaccess to block over 9,000 domains, would you really want to? If you consider the potential performance hit and excessive load on server resources associated with the perpetual processing of such a monstrous list, it may inspire you to seek a healthier, perhaps more effective alternative..

A better way to block proxy servers

Rather than attempt to block proxy servers by who they are (i.e., via their specified domain identity), it is far more expedient and effective to block proxy servers by what they do. By simply blacklisting the various HTTP protocols employed by proxy servers, it is possible to block virtually all proxy connections. Here is the code that I use for stopping 99% of the proxies that attempt to access certain sites:

# block proxy servers from site access
# http://perishablepress.com/press/2008/04/20/how-to-block-proxy-servers-via-htaccess/

RewriteEngine on
RewriteCond %{HTTP:VIA}                 !^$ [OR]
RewriteCond %{HTTP:FORWARDED}           !^$ [OR]
RewriteCond %{HTTP:USERAGENT_VIA}       !^$ [OR]
RewriteCond %{HTTP:X_FORWARDED_FOR}     !^$ [OR]
RewriteCond %{HTTP:PROXY_CONNECTION}    !^$ [OR]
RewriteCond %{HTTP:XPROXY_CONNECTION}   !^$ [OR]
RewriteCond %{HTTP:HTTP_PC_REMOTE_ADDR} !^$ [OR]
RewriteCond %{HTTP:HTTP_CLIENT_IP}      !^$
RewriteRule ^(.*)$ - [F]

To use this code, copy & paste into your site’s root htaccess file. Upload to your server, and test it’s effectiveness via the proxy service(s) of your choice. It may not be perfect, but compared to blacklisting a million proxy domains, it’s lightweight, concise, and very effective ;)


Dialogue

18 Responses Jump to comment form

1Gabry

April 21, 2008 at 8:37 am

Hello was reading your page about the htaccess file to block proxy servers from surfing my site, very interesting, but my host said that since I use FrontPage editor it might block me from editing my site, is there a way to avoid this? Thank you in advance

2H5N1

April 21, 2008 at 10:20 am

Is this already effective? :)
I tried to read this arcticle via web-proxy without problem! :D
I thought this limitation was already implemented here for web-proxy…

3Perishable

April 21, 2008 at 10:48 am

Hi H5N1 :)

No, I do not block proxy servers from Perishable Press. There are a number of readers who (for whatever reason) visit this site via proxy. It is important to me to facilitate site access for this select group of individuals, even at the expense of malicious spam and other attacks. Maybe someday I will change this policy, but for now, it is my hope that the code provided in this article will prove useful to other site owners and webmasters.

4Willard

April 21, 2008 at 10:55 am

I was hoping you’d eventually create an article by itself on this subject! Good advice I must say. =)

I do have one question though.. there seems to be a small difference between what you posted the other day, and what you posted here.. specifically:

RewriteCond %{HTTP:XROXY_CONNECTION} !^$ [OR]

vs.

RewriteCond %{HTTP:XPROXY_CONNECTION} !^$ [OR]

Notice the additional P? I’m just wondering if that was added on purpose.

Thanks for the input if you have any!

5Perishable

April 21, 2008 at 4:57 pm

@Gabry: I am unfamiliar with FrontPage protocols, however you could always try uploading the code and checking for access. Then, if FrontPage is blocked, try removing one line at a time until access is achieved. If successful, this method of removing a line (or two) will reduce the overall effectiveness of the htaccess blocking rules to some degree, but should still provide a significant amount of protection. Also, a cursory search of the required FrontPage protocol indicates that the required header may in fact be X_FORWARDED_FOR or even X-FORWARDED-FOR, which isn’t on the list. So, try the code as-is first and if you are blocked, then try removing the X_FORWARDED_FOR first. Finally, if that fails, try removing different lines one at a time and checking the results. Sorry I couldn’t provide more specific advice, but hopefully these clues will help get you going in the right direction.

6Perishable

April 21, 2008 at 5:15 pm

@Willard: The reason for the change is based on research that suggests that XPROXY is the correct protocol for this purpose. However, after reading your comment and looking into it further, it seems that XROXY is also a commonly employed protocol/header for proxy servers. So, to be honest, I am considering adding the XROXY condition to the htaccess code just to be safe. Further, I am also considering adding three more common proxy protocols to the list as well, which, when added to the XROXY case, would give the following four additions:

RewriteCond %{HTTP:XROXY_CONNECTION} !^$ [OR]
RewriteCond %{HTTP:X-FORWARDED-FOR} !^$ [OR]
RewriteCond %{HTTP:FORWARDED-FOR} !^$ [OR]
RewriteCond %{HTTP:X-FORWARDED} !^$ [OR]

I am thinking that these additional directives will help improve the overall effectiveness of this proxy-blocking technique. I am not going to edit the article just yet, however, as I am hoping that someone with some deeper knowledge of the subject will chime in with some definite information on the topic. I apologize for any confusion in the matter. Thanks for sharing your concerns with us! :)

7prislea

April 23, 2008 at 4:04 am

how I can exclude some ip’s/proxy’s from the filter?

tks.

8Perishable

April 23, 2008 at 8:58 am

Hi prislea, have you tried including an additional rewrite condition targeting the specific domain, for example:

RewriteCond %{HTTP_REFERER} !.*allowedproxydomain.com.*

I haven’t tried this yet, but it may help you to get going in the right direction :)

9sam

April 24, 2008 at 12:33 am

are these conditions suppose to block sites like hidemyass.com or similar sites?
because I tried and its not blocking it.

10David

April 24, 2008 at 8:45 am

I’m looking at this page on blocking proxy servers, using a proxy server.

I tried the code, it doesn’t seem to work for proxylord.com.

11Jeff Starr

April 24, 2008 at 9:56 am

@David: see comment #3 for an explanation as to why you are able to surf this site while using a proxy. Also, this code blocks proxies by targeting associated HTTP protocols. The block list is not comprehensive, so proxies using unlisted methods will not be blocked.

12David

April 24, 2008 at 10:38 am

Yes, I see #3.
Is there a way to block the anonymous proxy server with the .htaccess codes?

Maybe it’s a go Daddy thing.

13Perishable

April 27, 2008 at 9:07 am

Hi David, it should be easy to block the anonymous proxy server via htaccess. Add the following code to your root htaccess file:

# deny domain access
RewriteEngine on
RewriteBase /
RewriteCond %{HTTP_USER_AGENT} anonymous [NC]
RewriteRule ^.* - [F,L]

..of course, this method blocks by targeting the user agent, which may or may not be the same as the domain name. Another way to block a specific proxy is to target the domain itself, as identified via referrer:

RewriteCond %{HTTP_REFERER} ^http://.*anonymous.*$ [NC]

This line should replace the RewriteCond line in the previous code. Remember to test thoroughly!

14Eric

May 2, 2008 at 3:59 pm

Will this also block Paypal IPN? Untested on my end.. waiting for a payment to come through rather than converting all my ipn stuff to sandbox.

15Perishable

May 4, 2008 at 7:23 am

Thanks for the feedback, Eric — keep us updated on the results..

16air force ones

May 22, 2008 at 2:43 am

Hey Perishable。 I have a good idea about how to block proxy server. Cause the operation system of most proxy server are Linux but the operation system of most visitor are windows. So If we can block Linux, maybe can block most proxy server.

17Perishable

May 25, 2008 at 6:31 am

Are you kidding? A good number of my visitors are Linux users. I definitely do not want to block them. I appreciate the idea, but think it would be an unwise move. The last thing I want to do is cater specifically to Windows users..

Subscribe to comments on this post


[ Comments are closed for this post. ]

If you have additional information, contact me.

'Hacking' 카테고리의 다른 글

How to Make Sigs and finding packet id's to get Addresses  (0) 2009.02.04
maxmind.com : anti proxy , block proxy users  (0) 2009.01.30
Reverse Engineering Books  (1) 2009.01.28
Debugger  (0) 2009.01.28
Wark/WPE  (0) 2009.01.27
Posted by CEOinIRVINE
l

Reverse Engineering Books

Hacking 2009. 1. 28. 11:03

Shellcoder’s Programming Uncovered September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Shellcoder’s Programming Uncovered
Author(s):  Kris Kaspersky
Publisher: A-List Publishing
Date     : 2005
Pages    : 500
Format   : CHM
OCR      : Yes
Quality  :
Language : English
ISBN     : 193176946X
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software’s effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.

About the Author

Kris Kaspersky is a technical writer and the author of CD Cracking Uncovered, Code Optimization, and Hacker Disassembling Uncovered.

Table of Contents

Shellcoder’s Programming Uncovered
Introduction

Part I - Introduction to Shellcoding
Chapter 1 - Required Tools
Chapter 2 - Assembly Language - Quick Start
Chapter 3 - Hacking Using GPRS Uncovered

Part II - Overflow Errors
Chapter 4 - Buffers Subject to Overflow (Lane of Monsters)
Chapter 5 - Exploiting SEH
Chapter 6 - Specifiers Under Control
Chapter 7 - Practical Overflow Example
Chapter 8 - Searching for Overflowing Buffers
Chapter 9 - Methods of Protecting Buffers Against Overflow

Part III - Secrets of Designing Shellcode
Chapter 10 - Shellcoding Problems
Chapter 11 - The Technique of Writing Portable Shellcode
Chapter 12 - Self-Modification Basics
Chapter 13 - Playing Hide-and-Seek Under Linux
Chapter 14 - Capturing Ring 0 Under Linux
Chapter 15 - Compiling and Decompiling Shellcode

Part IV - Network Worms and Local Viruses
Chapter 16 - Life Cycle of a Worm
Chapter 17 - Local Viruses in the UNIX World
Chapter 18 - Viruses in Scripts
Chapter 19 - ELF Files
Chapter 20 - Method of Capturing Control
Chapter 21 - Main Symptoms of Virus Infection
Chapter 22 - Simplest Windows NT Virus

Part V - Firewalls, Honeypots, and Other Protection Systems
Chapter 23 - Bypassing Firewalls
Chapter 24 - Escaping through the Firewall
Chapter 25 - Organizing a Remote Shell Under UNIX and Windows NT
Chapter 26 - Hackerz Love Honey
Chapter 27 - Sniffing a LAN
Chapter 28 - Databases Under Attack

Part VI - Exotic Objects for Insertion
Chapter 29 - Attacking Bluetooth
Chapter 30 - Economizing on GPRS
Chapter 31 - Legends and Myths about Flashing BIOS
Chapter 32 - Viruses Infecting BIOS
CD Description
List of Figures
List of Tables
List of Listings

http://rapidshare.com/files/145479299/193176946X.chm

if u like all this book buy it.

Reverse Engineering September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Reverse Engineering
Author(s): Linda M. Wills (Editor), Philip Newcomb
Publisher: Springer
Date     : 1996
Pages    : 188
Format   : PDF
OCR      : Y
Quality  :
Language :
ISBN     : 0792397568
Product Description
Reverse Engineering brings together in one place important contributions and up-to-date research results in this important area.
Reverse Engineering serves as an excellent reference, providing insight into some of the most important issues in the field.
Product Details

* Hardcover: 188 pages
* Publisher: Springer (July 31, 1996)
* Language: English
* ISBN-10: 0792397568
* ISBN-13: 978-0792397564
http://rapidshare.com/files/145476429/RevEngin.pdf

Reverse Engineering: An Industrial Perspective September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Reverse Engineering: An Industrial Perspective
Author(s): Vinesh Raja (Editor), Kiran J. Fernandes
Publisher: Springer
Date     : 2007
Pages    : 242
Format   : PDF
OCR      : Y
Quality  :
Language :
ISBN     : 184628855X

Product Description

Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the needs of a particular customer. This way of working has huge benefits of speed and flexibility over traditional mass-production-based design and manufacturing processes.

This edited collection of essays from world-leading academic and industrial authors yields insight into all aspects of reverse engineering:

The methods of reverse engineering analysis are covered, with special emphasis on the investigation of surface and internal structures.

Frequently-used hardware and software are assessed and advice given on the most suitable choice of system.

Rapid prototyping is introduced and its relationship with successful reverse engineering is discussed.

Importantly, legal matters surrounding reverse engineering are addressed as are other barriers to the adoption of these techniques.

Applications of reverse engineering in three significant areas: automotive, aerospace, and medical engineering are reported in depth.

Reverse Engineering is a “must have” title for anyone working with advanced modern manufacturing technologies, either with a view to researching and improving them further or to making their company leaner and more agile in a competitive manufacturing marketplace.

About the Author

Professor Vinesh Raja is a Professorial Fellow in Informatics at the University of Warwick. He is in-charge of the Informatics Group, which encompasses the Virtual Reality Center (VRC) and the Collaborative Product Commerce Center (CPC) at the Warwick Manufacturing Group. He focuses on augmenting and extending everyday, learning and work activities with interactive technologies that move beyond the desktop. This involves designing enhanced user experiences through appropriating and assembling a diversity of technologies including haptics, handheld and pervasive computing. The main focus of his research is not the technology per se but the design and integration of the digital representations that are presented via them to support social and cognitive activities in ways that extend current capabilities.

Dr. Kiran Jude Fernandes is the 40th Anniversary Research Lecturer in Management at the University of York. He has been a pioneer in the systematic study of Information Modelling Techniques and Tools and has studied their evolution using techniques from the Biological Sciences Domain. His research and teaching interests include strategic uses of information systems, information management, and the impact of information technology on the risks and benefits of outsourcing and strategic alliances. Prior to joining the University of York, Kiran worked at the University of Warwick and the NASA John C. Stennis Space Center.
Product Details

* Hardcover: 242 pages
* Publisher: Springer; 1 edition (December 6, 2007)
* Language: English
* ISBN-10: 184628855X
* ISBN-13: 978-1846288555
http://rapidshare.com/files/145474936/Fring.pdf

Exploiting Software_ How to Break Code September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Author(s):  Greg Hoglund, Gary McGraw
Publisher: Addison-Wesley Professional
Date     : 2004
Pages    : 512
Format   : PDF
OCR      : Yes
Quality  :
Language : English
ISBN     : 0201786958

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?  What tools can be used to break software? This book provides the answers.  Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and  techniques used by bad guys to break software. If you want to protect your software from  attack, you must first learn how real attacks are really carried out.  This must-have book may shock you-and it will certainly educate you. Getting beyond the script kiddie treatment found in many hacking books, you will learn about

* Why software exploit will continue to be a serious problem.
* When network security mechanisms do not work
* Attack patterns
* Reverse engineering
* Classic attacks against server software
* Surprising attacks against client software
* Techniques for crafting malicious input
* The technical details of buffer overflows
* Rootkits

Exploiting Software is filled with the tools, concepts, and knowledge necessary to break
software.

Amazon.com
Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it’s as resistant as possible to attack. Sure, everything’s phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen). Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons learned by others. It depends on your situation.
PHP programmers will take issue with the authors’ blanket assessment of their language (”PHP is a study in bad security”), much of which seems based on older versions of the language that had some risky default behaviors–but those programmers will also double-check their servers’ register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers’ rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. –David Wall

Topics covered: How to make software fail, either by doing something it wasn’t designed to do, or by denying its use to its rightful users. Techniques–including reverse engineering, buffer overflow, and particularly provision of unexpected input–are covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.
http://rapidshare.com/files/145477603/Exploiting_Software_How_to_Break_Code.pdf

Dictionary of Computing September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Dictionary of Computing

Simon Collin, “Dictionary of Computing”
Bloomsbury Reference l PDF l 385 Pages l 5 MB

Book Description :

The more than 10,000 entries in this computer reference provide comprehensive coverage of computer terms, including those related to hardware and software applications, programming languages, networks and communications, the Internet, and e-commerce. Quotations from computer magazines and newspapers offer examples of usage in this updated edition.

DownloadLink: http://rapidshare.com/files/145481220/dictionary_of_computing.rar

using softice September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

http://letitbit.net/download/716607626683/usingice.pdf.html

'Hacking' 카테고리의 다른 글

maxmind.com : anti proxy , block proxy users  (0) 2009.01.30
How to block Proxy Servers  (0) 2009.01.29
Debugger  (0) 2009.01.28
Wark/WPE  (0) 2009.01.27
Ollydbg Nonameo Bookmarks Plugins  (0) 2009.01.27
Posted by CEOinIRVINE
l

Debugger

Hacking 2009. 1. 28. 07:41

OllyDbg - BoomBox

http://rapidshare.com/files/25394210/request.php_3

OllyDbg - Chinese
http://rapidshare.com/files/25394358/request.php_554

OllyDbg - CiM’s
http://rapidshare.com/files/25394505/request.php_1206

OllyDbg - Diablo’s

http://rapidshare.com/files/25395171/request.php_2

http://letitbit.net/download/6bb575376676/d2k2.ollydbg.public2008-updated.rar.html ==new==

OllyDbg - ExeCryptor
http://rapidshare.com/files/25395311/request.php_553

OllyDbg - Hacnho’s
http://rapidshare.com/files/25395639/request.php_4

OllyDbg - OllyICE

http://rapidshare.com/files/25395646/request.php_5

ollyice 2007.9.21

http://rapidshare.com/files/60720683/OlyICE2007.9.21.rar

bigice 5
http://rapidshare.com/files/26791856/bigice5.zip

ollyice 2008.1.1

OllyICE v1.10

http://rapidshare.com/files/132790837/odbg110_OllyICE_v1.10_update.rar

OllyICE TheMida MOD. By EvOlUtIoN==new==
http://letitbit.net/download/90b2a3913809/OllyICE-TheMida-By-EvOlUtIoN.rar.html
http://rapidshare.com/files/138149196/OllyICE_TheMida_By_EvOlUtIoN.rar

OllyDbg - Shadow
http://rapidshare.com/files/25395640/request.php_6

OllyDbg - Unmodified!
http://rapidshare.com/files/25395641/request.php_1

OllyDbg-flyODBG

http://rapidshare.com/files/26789936/flyjnop790.zip

ollydbg - ricardo nar.

http://rapidshare.com/files/26791858/ricarcdon.zip

OllyDbg_SLV edition
http://rapidshare.com/files/26791862/slv.zip

OllyDbg -Arabic
http://rapidshare.com/files/26791864/ice1_3.zip

Ollydbg - xp
http://rapidshare.com/files/26771160/ollydbg_110_xp.rar

Ollydbg - greenstyle

http://rapidshare.com/files/26436069/ollydbg_Green_Style_20by_20jnop790.rar

OllyDbg - armadillo
http://rapidshare.com/files/34817803/odbg_204_20armadillo_20with_20tools.zip

OllyDbg - xp+ dct
http://rapidshare.com/files/34821367/ODbg_20xp_20DCT.zip

OllyDbg - ADO
http://rapidshare.com/files/34821368/ODbgADO.zip

OllyDbg - SND
http://rapidshare.com/files/34821374/ODbgSnD.zip

OllyDbg -D2K2
http://rapidshare.com/files/34821377/ODbgD2k2.zip

OllyDbg - DeFixed

http://rapidshare.com/files/39044055/DeFixed_Edition.rar

OllyDbg - DeFixed v2 (foff)

http://rapidshare.com/files/60718378/DeFixed_Edition_v2.rar

OllyDbg - ExeCryptor

http://rapidshare.com/files/39851301/exec.olly.zip

olly bronco (mod. for execryptor )

http://rapidshare.com/files/66345462/OllyDbg_v1.10_Bronco.rar

olly YPOGEiOS DOX DiViSiON

http://rapidshare.com/files/66345700/YGS-DOX_OllyDBG.v1.10.Mod-YPOGEiOS.rar

OllyDbg’ - Snd version all plugins and olly patched :

http://rapidshare.com/files/44123914/0_1_1_YDbg_Beta_Full.7z

the 0dbg for Themida/WinLicense V1.9.3.0

http://rapidshare.com/files/50611549/The0DBG.exe

HanOlly

http://rapidshare.com/files/64369450/odbg110__HanOlly_edition_for_themida_1.9.rar

ollydbg modified for themida 1.9.5

http://rapidshare.com/files/65716863/O_ll_y_Dbg_modify_for_themida1.9.5.EXE

ollydbg modified for themida and execryptor

http://letitbit.net/download/d35cd7115999/RAMODBG.rar.html

ollydng Sabre Gold

DarkOlly

http://rapidshare.com/files/137296680/DarkOlly.7z

OllyDbg 1.10 - kamal

http://letitbit.net/download/9e844d493204/OllyDbg-1.10-by-kamal.rar.html

OllyDbg v1.10 LifeODBG v1.4

http://letitbit.net/download/686a95302760/OllyDbg-v1.10-LifeODBG-v1.4.rar.html

OllyDBG The_Best_version==new==

http://rapidshare.com/files/142544485/OllyDBG_The_Best_version.rar

http://letitbit.net/download/ffb745506367/OllyDBG-The-Best-version.rar.html

ollydbg moded by DeRoX  ==new==19 nov 2008

http://letitbit.net/download/9cde79762956/odbg110-Olly-DRX-Lite.rar.html

OllyDbg 2

OllyDbg 2 2a 20 oct 2007

http://rapidshare.com/files/64369705/ollydbg_2a-_20_oct07.exe

OllyDbg v2.00 Alpha 4

http://letitbit.net/download/a51bdc740372/OllyDbg-v2.00-Alpha-4.zip.html

OllyDbg v2.00 Alpha Sabre-Gold==new==

http://letitbit.net/download/357163436792/OllyDbg-v2.00-Alpha-Sabre-Gold.rar.html

oLLYdbg 2.00 g==new==

http://letitbit.net/download/0768f7669997/odbg200g.zip.html

ollydbg1.1 BY INREv team==new==

http://letitbit.net/download/fc3c1941207/ollydbg1.1-beta2-INRev.rar.html

http://letitbit.net/download/6faed3180832/odbg1.10-beta1–INRev.rar.html

> all patches for OllyDbg 1.x<

http://rapidshare.com/files/35977772/OLLYDBG_1.10_all_patches_.rar

note:
AFTER DOWNLOAD CHANGE NAME TO*.RAR OR *.ZIP

=================

Debugging Tools for Windows

dbg X86

http://www.microsoft.com/whdc/devtools/debugging/installx86.mspx

=================

SoftIce

98

http://rapidshare.com/files/50615930/Sic_v4.2.7_RC1_9x__IceExt_v0.7.part1.rar

http://rapidshare.com/files/50615933/Sic_v4.2.7_RC1_9x__IceExt_v0.7.part2.rar

http://rapidshare.com/files/50615934/SoftICE_20v4.3.2.2485.rar

xp

http://rapidshare.com/files/50615935/SoftIce_20v4.2.7_20RC1_20XP.exe

=================

Syser Debugger

Syser Debugger 1.92

http://rapidshare.com/files/42710603/download.php

Syser Debugger 1.93

http://rapidshare.com/files/48708302/download.php

Syser DebuggeR 1.97.1900.1016

http://rapidshare.com/files/119028937/Sys.Debug.v1.97.1900.1016.zip

Syser.Debugger.v1.97.1900.1038

http://rapidshare.com/files/131394971/Syser.Debugger.v1.97.1900.1038.zip

Syser Debugger 1.99.1900.1095 ==new==

http://letitbit.net/download/2f637f902443/SYSKERNDEBUG.1.99.1900.1095.rar.html

=================

Immunity Debugger

ImmunityDebugger v 1.0


http://debugger.immunityinc.com/download/ImmunityDebugger_setup.exe

or

http://rapidshare.com/files/47096385/ImmunityDebugger_setup.exe

ImmunityDebugger v 1.5 FULL (SCRIPT+PLUGIN)

part 1 & 2:

http://rapidshare.com/files/138160039/ImDbg.v1.5.7z.001

http://rapidshare.com/files/138158243/ImDbg.v1.5.7z.002

PASS:http://reversengineering.wordpress.com/debuggers/

ImmunityDebugger 1.73 RemoveAD KuNgBiM ==new 19 nov 2008 added== hot

http://rapidshare.com/files/165317164/ImmunityDebugger_1.73_RemoveAD_KuNgBiM.7z.002
http://rapidshare.com/files/165319412/ImmunityDebugger_1.73_RemoveAD_KuNgBiM.7z.001

=================

IDA Pro

IDA Pro Advanced v5.1.0.899

http://letitbit.net/download/555d66375926/IDAProAdvancedv5.1.0.899.rar.html

Fix

http://letitbit.net/download/3df899307180/IDAProAdvancedv5.1.0.899Fix.rar.html

DataRescue IDA Pro Advanced v5.1.0.899  + SDK + FiX

http://letitbit.net/download/077cd4773868/DataRescue.IDA.Pro.Advanced.v5.1.0.899.rar.html

IDA PRO 5.1 SDK

http://letitbit.net/download/a91b81999543/IDA-5.1-SDK.part02.rar.html

http://letitbit.net/download/e5e2e4967183/IDA-5.1-SDK.part01.rar.html
Datarescue ida pro advanced  v5.1 windows patch

LAN patch
Key blacklist patch
Russian IDA data file read patch

http://letitbit.net/download/9a8fec832094/datarescue.ida.pro.advanced.v5.1.windows-patch.rar.html

IDA Pro v5.20 Advanced Full MegaPack

by cracklab

http://letitbit.net/download/b96428300403/download.php-action-get-n-MjE1.html

after download rename it to “IDA Pro v5.20 Advanced Full MegaPack.rar”

IDA Pro 5.2 addons

idsutil5.20

Flair5.10

http://letitbit.net/download/f09e75790522/IdaPro5.2-addons.rar.html

DataRescue IDA Pro Advanced v5.2 SDK

http://letitbit.net/download/85acc3208403/idapro52sdk.part02.rar.html

http://letitbit.net/download/307d35980633/idapro52sdk.part01.rar.html

=================

Zeta Debugger

Zeta Debugger v1.4

http://letitbit.net/download/b06dd5445683/Zeta.Debugger.v1.4-full.zip.html

Zeta Debugger v1.5==new==

http://letitbit.net/download/e0881a39387/zd1.5-setup.zip.html

=================

Linux Debugger

EDB Linux Debugger 0.8.12

http://www.codef00.com/projects/debugger-0.8.12.tgz

0.9.1

http://www.codef00.com/projects/debugger-0.9.1.tgz

0.9.2 released 2008-07-29
http://www.codef00.com/projects.php#Debugger

0.9.4 2008-08-12==new==

http://www.codef00.com/projects/debugger-0.9.4.tgz

=================

java Debugger

JDebugTool Pro v4.1.1==new==

http://letitbit.net/download/baf0a2105543/JDebugTool-Pro-v4.1.1.rar.html

http://rapidshare.com/files/137998716/JDebugTool_Pro_v4.1.1.rar

pass:http://reversengineering.wordpress.com

=================

other debuggers

Obsidian - Non-intrusive Debugger + src ==new==

http://letitbit.net/download/e7fa3b610314/Obsidian–src.rar.html

VB Debugger [source code] + compiled with VB 6==new==

http://letitbit.net/download/f2e228167354/vb-debug-src.7z.html

MiniDBG with source==new==

http://letitbit.net/download/5731ca759728/debugger.rar.html

'Hacking' 카테고리의 다른 글

How to block Proxy Servers  (0) 2009.01.29
Reverse Engineering Books  (1) 2009.01.28
Wark/WPE  (0) 2009.01.27
Ollydbg Nonameo Bookmarks Plugins  (0) 2009.01.27
Detector  (1) 2009.01.27
Posted by CEOinIRVINE
l