Τετάρτη, 13 Απριλίου 2011

SIMPLE LINUX Ubuntu Eee 8.04.1

FOR ASUS EEE-PC
DOWNLOAD LINK TORRENT  :  http://www.kickasstorrents.com/ubuntu-eee-8-04-1-t1733854.html

ALL live cd list

Universal USB Installer

FIND LOST PASSWORDS

1. Burn the iso on a CD.
2. Insert the CD into your first CD/DVD-drive.
3. Reboot your machine, enter BIOS and boot from CD.
4. Start SLAX, and wait a few minutes.
5. Note the cracked password and boot Windows.
NOTE: The batch file is just for changing the admin password to a random one! You don't need this step! Be sure you have another admin account if you use this file!

DOWNLOAD LINK : http://ophcrack.sourceforge.net/

LINUX HACKING LIVE CD - DVD

The evolution of BackTrack spans many years of development, penetration tests, and unprecedented help from the security community. BackTrack originally started with earlier versions of live Linux distributions called Whoppix, IWHAX, and Auditor. When BackTrack was developed, it was designed to be an all in one live cd used on security audits and was specifically crafted to not leave any remnants of itself on the laptop. It has since expanded to being the most widely adopted penetration testing framework in existence and is used by the security community all over the world.


DOWNLOAD LINKS : http://www.backtrack-linux.org/downloads/

DOWN OF THE WEB HAVE YOUTUBE VIDEOS JUST SEE ;)

Winrtgen

Winrtgen is a graphical Rainbow Tables Generator that supports LM, FastLM, NTLM, LMCHALL, HalfLMCHALL, NTLMCHALL, MSCACHE, MD2, MD4, MD5, SHA1, RIPEMD160, MySQL323, MySQLSHA1, CiscoPIX, ORACLE, SHA-2 (256), SHA-2 (384) and SHA-2 (512) hashes.
 

Credential Manager

Credential Manager is a new SSO solution that Microsoft offers in Windows Server 2003 and Windows XP to provide a secured store for credential information. It allows you to input user name and passwords for various network resources and applications once, and then have the system automatically supply that information for subsequent visits to those resources without your intervention.
One example is the command:
net use * \\computer_name\share_name /user:user_name password /savecred
Credential Manager stores user's credentials in the following files:
- Enterprise Credential Set:
\Documents and Settings\%Username%\Application Data\Microsoft\Credentials\%UserSID%\Credentials
- Local Credential Set:
\Documents and Settings\%Username%\Local Settings\Application Data\Microsoft\Credentials\%UserSID%\Credentials
On WindowsXP, the application "Stored User Names and Passwords", that can be found under Start-> Settings-> Control Panel-> User Accounts-> %Account% -> Manage my network passwords, allows you to manage this kind of credentials.
This program dumps passwords from user's credential files and shows them in they're cleartext form.
HOW IT WORKS:
The program follows the same methodology used by Todd Sabin in his PWDUMP2 program to decrypt credential files. It uses the "DLL injection" technique to run a thread in the same security context of the Local Security Authority Subsystem process. The thread's executable code must first be copied to the address space of LSASS process and this requires an account with the SeDebugPrivilege user right. By default only Administrators have this right. Once injected and executed, the thread will run with the same access privileges of the Local Security Authority Subsystem and will use the native undocumented LsaICryptUnprotectData API from LSASRV.DLL to decrypt the credentials file. The thread stores the output of this API in a temporary file named cred.txt located in the same directory of the program. Finally, user's credentials are dumped and put ont the screen. Credential Manager can store various kind of passwords, they can be saved as MultiByte or WideChar strings, security BLOBS and certificates too. The choice of the final encryption method is left to the user. The program will try to recognize plaintext passwords stored as MultiByte strings or WideChar strings, and will also decode Passport and Standard (no entropy) credential BLOBS originally stored using the CryptProtectData API.


DOWNLOAD LINK source code only :  http://www.oxid.it/downloads/creddump.zip
DOWNLOAD LINK binaries and source code : http://www.oxid.it/downloads/creddump_bin.zip
 

ArpWorks

ArpWorks is an utility for sending customized "ARP announce" packets over the network. All ARP and Ethernet parameters, can be changed as you like. Manipulation of ARP tables is only possible inside your "Broadcast Domain", ARP packets doesn't cross routers or VLANs.
ARPWORKS FEATURES:
- IP-MAC Discovery
- Host Isolation
- Packets Redirection
- General IP Confict, DoS...
DOWNLOAD LINK : http://www.oxid.it/downloads/arpworks10.exe

ArpWorks

ArpWorks is an utility for sending customized "ARP announce" packets over the network. All ARP and Ethernet parameters, can be changed as you like. Manipulation of ARP tables is only possible inside your "Broadcast Domain", ARP packets doesn't cross routers or VLANs.
ARPWORKS FEATURES:
- IP-MAC Discovery
- Host Isolation
- Packets Redirection
- General IP Confict, DoS...
DOWNLOAD LINK : http://www.oxid.it/downloads/arpworks10.exe

Cisco PIX

Cisco PIX firewalls, as every other Cisco device, let you insert the password for the enable mode and telnet access directly in their encrypted form using the commands:
- enable password **************** encrypted
- passwd **************** encrypted
where the string **************** is the encrypted form of a known cleartext password.
This program produces the encrypted form of PIX passwords without the need to access the device.
Networks and security administrators can use it to write authentication informations in the firewall's configuration files completely off-line

DOWNLOAD LINK : http://www.oxid.it/downloads/cpfpc.zip

IRS2

Many servers and network devices like routers and switches provides features like ACLs, IP Filters, Firewall rules and so on to give access to their Services only to particular network addresses (usually Administrator's workstations).The main purpose of this program is to scan for IP restrictions set for a particular service on a host. It combines "ARP Poisoning" and "Half-Scan" techniques and tries totally spoofed TCP connections to the selected port of the target. IRS is not a port scanner but a "valid source IP address" scanner for a given service


DOWNLOAD LINK : http://www.oxid.it/downloads/irs20.exe

Cain & Abel

Many servers and network devices like routers and switches provides features like ACLs, IP Filters, Firewall rules and so on to give access to their Services only to particular network addresses (usually Administrator's workstations).The main purpose of this program is to scan for IP restrictions set for a particular service on a host. It combines "ARP Poisoning" and "Half-Scan" techniques and tries totally spoofed TCP connections to the selected port of the target. IRS is not a port scanner but a "valid source IP address" scanner for a given service

DOWNLOAD LINK : http://www.oxid.it/downloads/irs20.exe

sTerm

sTerm is a Telnet client with a unique feature. It can establish an entire bi-directional Telnet session to a target host never sending your real IP and MAC addresses in any packet. Using "ARP Poisoning", "MAC Spoofing" and "IP Spoofing" techniques sTerm can effectively bypass ACLs, Firewall rules and IP restrictions on servers and network devices. The connection will be done impersonating a Trusted Host.


DOWNLOAD LINK : http://www.oxid.it/downloads/sterm17.exe