Jump to content
xisto Community

RemoteConnection

Members
  • Content Count

    109
  • Joined

  • Last visited

About RemoteConnection

  • Rank
    Advanced Member
  1. Hi all, I hope that I posted in related forum, Here u'll find lots of websites that offer Fonts ! hope to enjoy Notice from cmatcmextra: Plagerized from here, quote tags added. Various urls and descriptions are the same. So that's it RemoteConnection, I warned you if you broke a rule once more you'd be banned. So guess what?
  2. Dear alexia, Really Thanks . You sent really wondeful collection, but did u have them or obtained it from somewhere?
  3. Hi all, I prefer to create a post here and send exploits all here, not in different posts ... Hope to enjoy :: ProZilla "ftpsearch" Results Handling Client-Side Buffer Overflow Exploit snipped
  4. hi all, In this topic I'm gonna start explain about windows security scanners , leave your comments and hope to enjoy :: Nsauditor Network Security Auditor Nauditor is a network security scanner that allows to audit and monitor network computers for possible vulnerabilities , to see all open ports and owner program names, including the process loaded modules, kernel objects, memory details, remote address and state of connections, dns name, country where from, service associated with connection, possible trojans associated with port and service description. also Nsauditor can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios, RPC, SQL and SNMP information, open ports. URL : http://www.nsauditor.com/ :: Shadow Web Analyzer assist you in analysing your own web site in search of potential errors. Link : http://www.safety-lab.com/en/ :: Shadow Security Scanner Shadow Security Scanner has been developed to provide a secure, prompt and reliable detection of a vast range of security system holes. this scanner supports : FTP, SSH, Telnet, SMTP, DNS, Finger, HTTP, POP3, IMAP, NetBIOS, NFS, NNTP, SNMP, Squid (Shadow Security Scanner is the only scanner to audit proxy servers - other scanners just verify ports availability) Link : http://www.safety-lab.com/en/products/securityscanner.htm
  5. :: Mastering FreeBSD and OpenBSD Security ::Yanek Korff, Paco Hope, Bruce PotterPaperback, 350 pagesISBN 0-596-00626-8Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure most critical systems.:: Windows Server 2003 Security: A Technical Reference ::Roberta BraggPaperback, 1176 pagesISBN 0-321-30501-9with this book you'll learn Secure remote access using VPNs via IPSec, SSL, SMB signing, LDAP signing, and more ...:: Apache Security ::Ivan RisticPaperback, 280 pagesISBN 0-596-00724-8you'll learn install and configure Apache * prevent denial of service (DoS) and other attacks * securely share servers * control logging and monitoring * secure custom-written web applications and so on
  6. well, I'm gonna tell more books, but they're in network security section .:: Hacking Exposed: Network Security Secrets & Solutions, 5th Edition ::Stuart McClure, Joel Scambray, George KurtzPaperback, 750 pagesISBN 0-072-26081-5Topics :Security vulnerabilities of operating systems, applications, and network devices; * Administrative procedures that will help defeat them; * Techniques for hacking Windows 95, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Novell NetWare, and Unix; * Strategies for breaking into (or bringing down) telephony devices, routers, and firewalls.:: Stealing the Network: How to Own a Continent ::FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay BealePaperback, 432 pagesISBN 1-931-83605-1Combines a fictional story with real-world technology.::Wi-Foo: The Secrets of Wireless Hacking ::Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. MikhailovskyPaperback, 608 pagesISBN 0-321-20217-1If you're a hacker or security auditor, this book will get you in. If you're a netadmin, sysadmin, consultant, or home user, it'll keep everyone else out.:: Network Security Hacks ::Andrew LockhartPaperback, 304 pagesISBN 0-596-00643-8network security hacks is not a longwinded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make Linux, UNIX, or Windows networks more secure today.:: The Art of Computer Virus Research and Defense ::Peter SzorPaperback, 744 pagesISBN 0-321-30454-3 Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. this list will update soon.
  7. Well, Thanks dexter , let's update the list . here's the list of AVs in linux : # F-Secure.com - Anti-Virus for Linux firewalls https://www.f-secure.com/en/web/home_global/products - Anti-Virus for File Servers https://www.f-secure.com/en/web/home_global/products - Anti-Virus for Desktops and Laptops https://www.f-secure.com/en/web/home_global/products # Kaspersky Lab - Workstation/Server/eMail gateway protection http://usa.kaspersky.com/?tgroup=4&pgroup=11 # Sophos.com - Anti-Virus for Unix/Linux https://www.sophos.com/products/software/anus/savunix.html - SOPHOS - Sophos Anti-Virus Interface for Linux https://www.sophos.com/en-us.aspx - MailMonitor for SMTP https://www.sophos.com/products/software/mator/mmsmtp.html # Symantec.com - I-Gear: Web and FTP filtering (also a version for ISP's) http://forums.xisto.com/no_longer_exists/ - Mail-Gear: (up to and including version 1.2.x) # TrendMicro.com - Interscan VirusWall - Internet Gateway - detect/scan SMTP, HTTP and FTP http://www.antivirus.com/security-software/index.html - InterScan eManager - plug-in for Interscan to manage spam and message content, blocking file attachments, greeting cards, melissa or variants, ... http://www.antivirus.com/security-software/index.html - ScanMail for HP/OpenMail http://forums.xisto.com/no_longer_exists/ - ServerProtect http://forums.xisto.com/no_longer_exists/ # ClamAv.net - Clam anti-virus. Open source virus protection for mail servers. http://www.clamav.net/
  8. Hi, I've posted some security tools and links in my last posts,I preferd to post new topic and send he extra here : Network Sniffers # DSniff https://www.monkey.org/~dugsong/dsniff/ # Ethereal - full network protocol sniffer/analyzer http://forums.xisto.com/no_longer_exists/ # IPTraf - curses based IP LAN monitor http://iptraf.seul.org/ # TcpDump - network monitor and data acquisition http://www.tcpdump.org/ # KISMET - 802.11 wireless network detector, sniffer and intrusion detection system http://www.kismetwireless.net/ Online Tools # AutomatedScanning.com - commercial service # Anonymizer.com - Anonymous surfing Port scanners # nmap - Port scanner and security scanning and investigation tool https://nmap.org/index.html # NmapFe - GUI front-end to NMAP http://www.advogato.org/proj/NmapFE/ # ndiff - Compares nmap scans to detect network changes to port states. http://www.vinecorp.com/ndiff/ # strobe - fast network scanner (open e-mail relays) http://forums.xisto.com/no_longer_exists/ # portscan - C++ Port Scanner will try to connect on every port you define for a particular host. http://www.ricksoft.co.uk/downloads/portscan/portscan.htm # portscan - Perl script to scan for open ports http://forums.xisto.com/no_longer_exists/ This list will update soon
  9. well,I have some ebooks for starters , send PM
  10. hi friends, you know that there're lots of attacking methods in network security . Here's a collection of links for different kind of attacks : SYN packet manipulation -- SYN packet manipulation http://www-03.ibm.com/security/xforce/ -- Syn Flood experiment http://forums.xisto.com/no_longer_exists/ -- SYN Cookie http://cr.yp.to/syncookies.html Smurf DOS -- ISS.com: Description http://www-03.ibm.com/security/xforce/ -- GRC.com: DDOS Anatomy http://forums.xisto.com/no_longer_exists/ IRC (Internet Relay Chat) Client attacks -- IIS.com: Description http://www-03.ibm.com/security/xforce/ Service attacks -- Buffer Overflow attacks http://www-03.ibm.com/security/xforce/ -- Buffer overflow vulnerabilities explained http://forums.xisto.com/no_longer_exists/ Session Hijacking -- IIS.com: Descriptions http://www-03.ibm.com/security/xforce/ ARP Cache poisoning -- Wireless Access Points and ARP Poisoning http://forums.xisto.com/no_longer_exists/ -- Wireless Attacks Threaten Wired Networks http://searchsecurity.techtarget.com/ if you know more plz send reply
  11. hi all, here's a collection of top linux security books and you can obtain each one by searching in amazon.com . If you know more plz add it here ."Hacking Linux Exposed"by Brian Hatch, James B. Lee, George KurtzISBN #0072225645, McGraw-Hill (2nd edition)"Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation"by Anonymous and John RayISBN #0672321343, SamsCovers not only audit and protection methods but also investigates and explains the attacks and how they work. "Network Intrusion Detection: An Analyst's Handbook"by Stephen Northcutt, Donald McLachlan, Judy NovakISBN #0735710082, New Riders Publishing"SSH, the Secure Shell : The Definitive Guide"by Daniel J. Barrett, Richard SilvermanISBN #0596000111, O'Reilly & Associates"Computer Security Incident Handling Step by Step"by Stephen NorthcuttISBN #0967299217"Snort 2.1 Intrusion Detection, Second Edition"by Jay Beale, CaswellISBN #1931836043, Syngress"Ethereal Packet Sniffing"by Angela D. Orebaugh, Gilbert Ramirez, Ethereal.comISBN #1932266828, Syngress"Nessus Network Auditing (Jay Beale's Open Source Security)"by Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy AldersonISBN #1931836086, Syngress"Security Assessment: Case Studies for Implementing the NSA IAM"by Russ Rogers, Greg Miles, Ed Fuller, Ted DykstraISBN #1932266968, Syngress"Network Security Assessment"by Chris McNabISBN #059600611X, O'Reilly"A Practical Guide to Security Assessment"by Sudhanshu KairabISBN #0849317061, Auerbach Publicationshope to be useful
  12. In last post I've added some linux security links , also here's some security tools for linux : :: ipfilter - packet filter http://forums.xisto.com/no_longer_exists/ :: rsaeuro - cryptographic toolkit http://forums.xisto.com/no_longer_exists/ :: SSH - Comercial versions SSH1 and SSH2 http://forums.xisto.com/no_longer_exists/ :: SSL - Encrypted telnet http://forums.xisto.com/no_longer_exists/ :: WinSCP - scp (secure copy) client. http://forums.xisto.com/no_longer_exists/ :: Netlog - TCP and UDP suspicious traffic logging system http://it.tamu.edu/Former_Departments.php :: TAMU - Texas A&M University developed tools http://it.tamu.edu/Former_Departments.php :: PuTTY - Telnet, SSH, SCP, SFTP client http://forums.xisto.com/no_longer_exists/ :: SARA - Security Auditor's Research Assistant - network security vulnerability scanner. http://www-arc.com/sara/sara.html :: satan - Security Administrator Tool for Analyzing Networks http://forums.xisto.com/no_longer_exists/ :: Rkdet - root kit detector daemon. Intended to catch someone installing a rootkit or running a packet sniffer. http://vancouver-webpages.com/rkdet/ hope to enjoy
  13. Well Thanks Sunny, Let me add some security links for linux : - Apache Web Server Security Tips http://httpd.apache.org/docs/current/misc/security_tips.html - Red Hat Security Page http://forums.xisto.com/no_longer_exists/ - XForce (ISS) Library http://forums.xisto.com/no_longer_exists/ - BugTraq http://forums.xisto.com/no_longer_exists/ - CERT Coordination Center http://www.cert.org/ - CGI & Perl http://forums.xisto.com/no_longer_exists/ - CIAC - Computer Incident Advisory Capability http://forums.xisto.com/no_longer_exists/ - COAST Hotlist: Computer Security, Law & Privacy http://forums.xisto.com/no_longer_exists/ - COAST Hotlist: Internet Firewalls http://www.cerias.purdue.edu/site/about/history/coast_resources/firewalls/ - COAST Security Archive http://www.cerias.purdue.edu/about/history/coast/archive/index.html - Dave Dittrich's Security Page http://forums.xisto.com/no_longer_exists/ - Firewall Wizards Mail Archive http://forums.xisto.com/no_longer_exists/ - HackerWacker http://www.hackerwhacker.com/ - IP Masquerading Site http://forums.xisto.com/no_longer_exists/ - Lance Spitzner's Security Publications http://forums.xisto.com/no_longer_exists/ -Linux Security Resources http://forums.xisto.com/no_longer_exists/ - Matt's Unix Security Page http://www.deter.com/unix/ - NIH: Computer Security Information http://forums.xisto.com/no_longer_exists/ - N- IPC: National Infrastructure Protection Center http://forums.xisto.com/no_longer_exists/ - Linux Security Systems and Tools http://www.linas.org/linux/secure.html - Root Shell http://forums.xisto.com/no_longer_exists/ - SANS Institute http://www.sans.org/ - Security Focus http://forums.xisto.com/no_longer_exists/ - Security Portal http://forums.xisto.com/no_longer_exists/ - WWW Security Resources http://www.w3.org/Security/ Have fun
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.