Jump to content
xisto Community

RemoteConnection

Members
  • Content Count

    109
  • Joined

  • Last visited

Posts posted by RemoteConnection


  1. :: All I ever wanted is in youLove, laughter, a pillow for my fears.I want to give and to be given toSo I might feel myself flow through the yearsAlive in you, the wonder of my tears.-----------------------------------------I know you now so many ways,And yet I don't know you at all,Will never know you,For you are a mystery impenetrableEven by joy.Love, like a wave, joins sea and sand,But then must roll back into itself,Singing in its lusty longing,Ever resurrected.Yet beyond love is love,Which neither lives nor diesBut simply is.Which now we share in a burst of inner glory.Which we become through will and time.---------------------------------------I never wanted to invadeThe forest of a friend.I never meant to plant myselfBeyond where I might end.But there it was--I wandered in--And seized a wild field,And turned its berries into corn,And took what it would yield.Years later, we would often walkOut to the boundary line,And picnic where the fence once stoodThat marked off what was mine.-----------------------------------------I love you with all I amAnd all I'll ever be.You are my moon, my sun and stars,My earth, my sky, my sea.My love for you goes down and downBeneath both life and death,So deep it must remain when IHave drawn my last faint breath.Holding you for months and yearsWill make Time disappear,Will make your lips my lips, your faceMy face, your tear my tear;Will make us one strange personageAll intertwined in bliss,Not man or woman, live or dead--Just nothing--but a kiss!please give me your opinion ...


  2. Part 1 , useful command line tools for network security.


    Info.txt:
    A handy collection of command line tools
    cpuinfo.exe - gets the processor type and CPU clocking speed (mhz)
    fport.exe - shows open ports and the process that owns the port
    iplist.exe - enumerates the ip's of the computer
    md5.exe - gets the md5 hash of a file
    pw2kget.exe - for win2k gets the password of the currently logged on user
    pwreveal.exe - gets the passwords of any window that has a ****** editbox
    regshell.exe - a commandline registry explorer/editor
    resolve.exe - a commandline URL resolver
    sendmail.exe - a commandline email sender
    uptime.exe - gets the machines current uptime
    xwhois - advanced whois lookup
    Screencap.exe - makes a screenshot of the screen and saves it to screenshot.bmp
    CMDget.exe - Downloads a file from a website from user provided parameters
    webscr.exe - creates a snapshot from the webcam and saves it
    shutd.exe - program that forces shutdown/reboot of machine
    bnc.exe - bnc for windows (see bnc.cfg)
    clslog.exe - clears app/security/system logs XP/NT/2k
    enum.exe - enumerates IPC$ share to collect information
    winfo.exe - enumerates IPC$ share to collect information
    FTPd.exe - small ftp server for dos (see slimftpd.conf)
    Global.exe - process dos command on all disc/subdirs
    iCmd.exe - telnet server 98/xp/nt/2k
    iislog.exe - clears IIS logs
    Info.exe - gets system information
    nc.exe - netcat
    pv.exe - process manager for dos
    Pwdump.exe - dumps SAM hashes
    scrnmode.exe - change screen mode from dos
    unrar.exe - unrar for dos
    wget.exe - wget for windows
    wizmo.exe - command tool (see w.txt)
    dwpp.exe - dial up password graber
    winrelay.exe - relay tcp/udp connections
    getad.exe - escalate to admin user in w2k
    pipeup.exe - escalate to admin user in w2k
    dnsid - identify remore dns server
    rinetd.exe see rinetd.txt


    Link
    well , the pass is : http://forums.xisto.com/ . i've tested with norton av and it's detect some of them as security tools ... doesn't matter.


  3. A prototype implementation of a wireless intrusion detection and active response system is described. An off the shelf wireless access point was modified by downloading a new Linux operating system with non-standard wireless access point functionality in order to implement a wireless intrusion detection system that has the ability to actively respond to identified threats. An overview of the characteristics and functionality required in a wireless intrusion detection system is presented along with a review and comparison of existing wireless intrusion detection systems and functionalities. Implemented functionality and capabilities of our prototyped system are presented along with conclusions as to what is necessary to implement a more desirable and capable wireless intrusion detection system.


    Link


  4. well , we can disable echo command for security ... let's go on:

     

    WARNING: make a backup copy of cmd.exe first!!

    open cmd.exe ( if you don't know where is it, use windows search) with a hex editor, and then search for echo ... you should get this results :

    0002F8D0 | 5000 4400 0000 0000 4100 5300 5300 4F00 | P.D.....A.S.S.O.

    0002F8E0 | 4300 0000 4600 5400 5900 5000 4500 0000 | C...F.T.Y.P.E...

    0002F8F0 | 4400 4500 4C00 0000 4500 4300 4800 4F00 | D.E.L...E.C.H.O.

    0002F900 | 0000 0000 4500 4E00 4400 4C00 4F00 4300 | ....E.N.D.L.O.C.

    0002F910 | 4100 4C00 0000 0000 4500 5200 4100 5300 | A.L.....E.R.A.S.

     

    Now just change just change "4500 4300 4800 4F00" to "0000 0000

    save and exit from editor ... now run cmd.exe :D

    * edit to fix typo in Topic Title and add Topic Description *


  5. Internet Explorer allows users to utilize Windows's COM Objects. A vulnerability with javaprxy.dll allows attackers to craft a special HTML code that will cause Internet Explorer to execute a remote command by using one of Windows's COM Objects.

    u can find the patches here :
    http://www.microsoft.com/err/technet/security/
    also i just posted the exploit link here for educational perposes :
    http://imp.ovh.net/fr/


  6. Well I thing most users of here are using Microsoft , yea ? maybe some of them use Win2000 , It's from microsoft >>>
    Overview
    This document provides administrator guidance for how to set up and configure secure Windows 2000 systems in several scenarios. This document is a baseline for other hardening guides published by Microsoft, such as the Microsoft Solutions for Security.

    This document is not meant as a replacement for the Windows 2000 Common Criteria Security Configuration Guide, but rather as a more generally applicable hardening guide which applies to a much broader range of specific systems which may include or exclude services specified in the Windows 2000 Common Criteria evaluated configuration. The Common Criteria guide is designed for general purpose systems that specifically need to be compliant with the Common Criteria evaluation requirements and sacrifices some usability to do so. The document you are currently reading is designed to provide more generic guidance for a wider range of specific system classes, without necessarily trading off basic operating system functionality. The recommendations in this guide were generally chosen to safely allow Microsoft customers to deploy the recommended settings on existing Windows 2000 systems, not just on newly-built systems. We have also reviewed the default permissions on Windows Server 20003 and recommended those permissions here where they did not break existing Windows 2000 Server services.

    This guide covers hardening of Windows 2000 in three different configurations each for Windows 2000 Professional and the Windows 2000 Server family. The configurations are designed to be very generic to enhance applicability.

    Link

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.