الجمعة، 31 يوليو 2015

Microsoft Windows 10 Bugs Fixed After Official Released


Microsoft Windows 10 Bugs Fixed After Official Released

Windows 10 has been released this week, after released it gives free up gradation if you use Windows 7 or 8 as for 1 year until 29 July 2016. Microsoft said, more than 14 million installs in the first 24 hours after released Windows 10.

What are the Bugs which Windows 10 fixed ?

  • In this week Nvidia graphic drivers users got the problem by Windows 10 upgrading. 
  • On Saturday had contained a bug that caused Windows' Control Panel to crash if you tried to uninstall an application.
  • Windows 10’s policy of automatic updates has run into its first major problem and it is causing many PCs to stop working correctly.

These issue was fixed soon after official release of Windows 10. But how can we sure that Windows 10 is secure yet. The new Windows 10 operating system software is still a work in progress in many ways, and more bugs may pop up before the initial rollout is completed.

Today, Mostly users are using Windows 7 even after Windows 8 launch. Because Windows 8 doesn't find friendly OS in Windows 8, however it was launched for better graphics, 3D looking icons but it was failed to keep place on users.

But if we talk about Windows 10 performance is faster , quicker as in the part of gaming performance and power management too.

Windows 10 is familiar and easy to use. The start menu is back and improved so you get quick access to your favorite things.

Microsoft introduces Cortana in Windows 10 which is truly personal digital assistant. And Edge, it is the modified version of the Internet Explorer.

Windows 10 claimed that it comes with more security features than ever. And its designed to work with the hardware and software you already use, but Microsoft might be wrong here. Security researchers are working on to find the bug in Windows 10 and Microsoft still working on it.

Security:
Security is a gigantic issue for users and business, as the most well known desktop working framework, Windows is tragically the essential focus for malware, spyware and viruses.

Microsoft has fixed all bugs yet and try to make windows 10 its best version.

Video:

الخميس، 30 يوليو 2015

#Breaking: Forbes Website Is Down




#Breaking: Forbes Website Gets Down. 

We just noticed that Forbes.com is down. while we surf the website we gets the error as you can see above image.

Its seems down from 7:15 PM ET for 15 min.


You can see the report here:
http://www.isitdownrightnow.com/forbes.com.html

We have tried pinging Forbes website using our server and the website returned the above results. If forbes.com is down for us too there is nothing you can do except waiting. Probably the server is overloaded, down or unreachable because of a network problem, outage or a website maintenance is in progress..

We exactly don't know why Forbes.com is down, its might be DDOS Attack or internal server problem with FOrbes.

#Update:

Now the website is Up


HORNET Worlds Fastest Encrypted Browser With 93 Gbps High Speed Than TOR




HORNET Worlds Fastest And Privacy Browser With 93 Gbps High Speed Rather Than TOR

"High Speed Onion Routing At The Network Layer" HORNET, which allows encrypting browsing like TOR. HORNET added more security layers with fastest standard browsers. 

And its developed by five researchers from UK, USA and Switzerland.

Hornet developers said that its browser is the most fastest with more security level than TOR. Tor network, which handles over 2 Million user on its network daily. While surfing TOR its slow and using to hide a user's IP address. HORNET developers found the weakness of TOR and lessen the cryptography work needed from each level.

However, Tor already suffered from Cyber attack recently.

According to HORNET PDF,

"We present Hornet, a system that enables high-speed end-to-end anonymous channels by leveraging next-generation network architectures," write the authors of the paper. "Hornet is designed as a low-latency onion routing system that operates at the network layer, thus enabling a wide range of applications"

“HORNET is designed to be highly efficient,” researchers said. Without sacrificing security, the network supports data transfer speeds of up to 93GBps and can be scaled at little cost.

Specifically, our contributions are the following:

• We design and implement HORNET, an anonymity system that uses source-selected paths and shared keys between endpoints and routers to support onion routing. Unlike other onion routing implementations, HORNET routers do not keep per-flow state or perform computationally expensive operations for data forwarding, allowing the system to scale as new clients are added.

• We analyze the security of our system, showing that it can defend against passive attacks, and certain types of active attacks. Our system provides stronger security guarantees than existing network-level anonymity systems.

• We evaluate the performance of our system, showing that anonymous data processing speed is comparable to that of LAP and Dovetail (up to 93.5 Gb/s on a 120 Gb/s software router). Each HORNET node can process traffic for a practically unlimited number of sources.



Inveigh: A Windows PowerShell LLMNR/NBNS Spoofer With Challenge/Response Capture Over HTTP/SMB




Inveigh: A Windows PowerShell LLMNR/NBNS Spoofer With Challenge/Response Capture Over HTTP/SMB.

Inveigh is a Windows PowerShell LLMNR/NBNS spoofer designed to assist penetration testers that find themselves limited to a Windows system.

This can commonly occur while performing phishing attacks, USB drive attacks, VLAN pivoting, or simply being restricted to a Windows system as part of client imposed restrictions.

Notes

  1. Currently supports IPv4 LLMNR/NBNS spoofing and HTTP/SMB NTLMv1/NTLMv2 challenge/response capture.
  2. LLMNR/NBNS spoofing is performed through sniffing and sending with raw sockets.
  3. SMB challenge/response captures are performed by sniffing over the host system's SMB service.
  4. HTTP challenge/response captures are performed with a dedicated listener.
  5. The local LLMNR/NBNS services do not need to be disabled on the host system.
  6. LLMNR/NBNS spoofer will point victims to host system's SMB service, keep account lockout scenarios in mind.
  7. Kerberos should downgrade for SMB authentication due to spoofed hostnames not being valid in DNS.
  8. Ensure that the LMMNR,NBNS,SMB,HTTP ports are open within any local firewall on the host system.
  9. Output files will be created in current working directory.
  10. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns.


Usage
Obtain an elevated administrator or SYSTEM shell. If necessary, use a method to bypass script execution policy.

To execute with default settings:
Inveigh.ps1 -i localip

To execute with features enabled/disabled:
Inveigh.ps1 -i localip -LLMNR Y/N -NBNS Y/N -HTTP Y/N -HTTPS Y/N -SMB Y/N -Repeat Y/N -ForceWPADAuth Y/N


Download


Windows 10 Pro Final 2015 PT-BR 32/64 Bits





Está é a versão Pro Final lançada no dia 29/07/2015 oficial da Microsoft, imagem ISO de 32 e 64 bits idioma Português Brasil, basta gravar em um DVD comum formatar seu PC e começar a usar o novo Windows 10 Pro que é a versão mais completa do novo sistema operacional. vem com ativador para deixa-lo como original.
O Menu Iniciar do Windows 10 volta após ter sido removido no Windows 8, ganhou várias opções de personalização inclusive colocamos um tutorial para ativar o WINDOWS 10 como original.


Tutorial como criar um Pen Drive com Windows Bootavel
Veja o vídeo explicado passo a passo :



Tamanho: 2.53 GB


Opção 32/64 Bits divididos em 4 partes:

Download BR2Share Parte 1
Download BR2Share Parte 2
Download BR2Share Parte 3
Download BR2Share Parte 4

_________________________________


Download ATIVADOR DEFINITIVO WINDOWS 10:


OU



Download ATIVADOR ATUALIZADO 2016
Raton Shop
Raton Shop

الأربعاء، 29 يوليو 2015

The Path To Value In The Cloud Download Free Report


"The Path to Value in the Cloud"

Download this study by Oxford Economics and Windstream to gain insight about business ennoblement with the cloud.

The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.

Discover how to gain great business advantages by using the cloud to its full potential.

In this report, you will gain valuable insight into how scale, speed, flexibility, and reliability can all be increased through the cloud. The Path to Value in the Cloud also reveals:


  • Potential for innovation and collaboration through the cloud
  • Successful strategies for cloud migration
  • Proper cloud implementation
  • Security issues and concerns with the cloud


Offered Free by: Windstream Communications

Download

الثلاثاء، 28 يوليو 2015

Malvertising Hits 10 Million In 10 Days You Might Be Under Attack While Surfing The Web




Malvertising Hits 10 Million In 10 Days. 
You Might Be Under Attack While Surfing The Web.

Even many of the advertising companies didn't know that they are running Malware ads.

How its happen?
When Advertiser contact to advertising companies. Most of the companies didn't check advertising scripts, where users attach script in back-end. Websites are regularly casualties of malvertising and its infect to web visitors since attacker using these tricks for their malware inside of commercials.

Malvertising Example 1:



Malvertising Example 2:



According to Cyphort,

Malvertising attack is still going strong, using SSL redirector at  https://ads.us.e-planning.net .
In the last 10 days, Cyphort Labs found many more infected domains – they are listed below. Please refrain going to these sites as they are dangerous.  

We have notified e-planning.net about this issue and they are actively working to resolve it. At least 10 million people have visited these websites and were potentially exposed to the Angler exploit kit in the last 10 days according to our estimates and data from Similar Web.


How can we save from Malware Ads?

By using AdBlock Plus .

  • Surf the web without annoying ads!
  • Can block tracking, malware domains, banners, pop-ups and video ads - even on Facebook and YouTube
  • Unobtrusive ads aren't being blocked in order to support websites (configurable)
  • It's free! (GPLv3)


الاثنين، 27 يوليو 2015

Android Phones Can Be Hacked With Just A Text Message




     Android Phones Can Be Hacked With Just A Text Message


Yes, you heard it right!


About 990 Million Android Phones could be hacked with just a simple text. This is one of the biggest smartphone flaw ever found.


A Security Research Company ‘Zimperium’ claims to have found a bug to tap into the world’s most popular mobile platform. This hack relies on flaw found in Stagefright, a core android component and a media playback service that’s built into Android which is used to process, record and play the multimedia files.

This security hole puts 990 million Android devices at risk. And that is truly a huge number of smartphones. In 2014, more than 1 billion Android phones shipped throughout the world, in accordance with Researcher Strategy Analytics, which expects the number to go up in 2015 and beyond. Zimperium termed Stagefright the "Mother of all Android vulnerabilities". In this attack, the victim would not need to do any mistake like opening an attachment or download a file that's corrupt. The malicious code would take over instantly, the moment you receive a text message. You may not even see anything.

Once the attackers get in, Drake says, they would be able to do anything — may be copy or delete the data, take the control of your camera and microphone to monitor your every move. "It's really up to their imagination what they do once they get in," he said.

Joshua Drake, VP of platform research and exploitation of a mobile security firm Zimperium, reported the flaw to Google earlier this year, but he said that most manufacturers have not made fixes available to the user base till date. 

All the bugs are provided with CVE numbers, used to identify the severe vulnerabilities. They include CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, CVE-2015-3829. When the disclosure lands today, security researchers and attackers could have enough information to get cracking on exploits. Manufacturers have been requested to bring in patches as soon as possible to protect their consumers against this malicious flaw.

Even more information will be disclosed by Drake who deserves much credit for his work in addressing and fixing the issues, in full at the Black Hat and Defcon security events going to taking place in Las Vegas next week.


السبت، 25 يوليو 2015

Smashing The Browser: From Vulnerability Discovery To Exploit Development



Smashing The Browser: From Vulnerability Discovery To Exploit Development.

Part 1: Browser Fuzzing Technology

This part will first introduce a fuzzer framework (StateFuzzer) developed by myself as well as the fuzzing strategies behind it. Then conclude some effective fuzzing ideas and related vulnerabilities based on results of the fuzzer.

Part 2: Advance Browser Exploitation Techniques

This part will first brief introduce the security model of modern browsers as well as the combat between exploit and mitigation. Then introduce all kinds of heap management mechanisms and their defects together with some exploit-friendly data structures of Google Chrome and IE 11. After that, analyze the advance exploit technologies of these two browsers, including two new exploitation techniques, one of which is not limited by sandbox (Demo). Finally conclude the dilemmas of Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP) and Sandbox.

Part 3: IE 11 0day Exploit Development

After taking one of my IE 11 UAF vulnerabilities from StateFuzzer, I will share the whole exploit developing experience from the vulnerability trigger to arbitrary code execution, together with all related technologies and skills (Demo).

At last, I will bring a special, interesting and undisclosed IE 11 0day (not affected by isolated heap and protected free).

Download

الجمعة، 24 يوليو 2015

Who's Using Cyber Threat Intelligence And How ?





"Who's Using Cyber Threat Intelligence And How" ?

In the last several years, we've seen a disturbing trend--attackers are innovating much faster than defenders are.

We've seen the “commercialization” of malware, with attack kits available on underground forums for anyone who wants to perpetrate a variety of attacks. Large Botnets are available for rent, allowing attackers to send spam or launch DDoS attacks at will.

Many attackers reuse malware and command and control protocols and methods, adapting their “products” over time to keep ahead of the anti-malware industry and security professionals. As more and more attacks occur, however, the likelihood increases that some organization or group has seen the attack before.

Offered Free by: ThreatStream

Free Download now


الخميس، 23 يوليو 2015

Security Hole in Apple OS X Privilege Escalation Bug Found



Security Hole in Apple OS X, Privilege Escalation Bug Found By Security Researcher Stephan Esser.

Esser said the vulnerability is present in both the current 10.10.4 (Yosemite) version of OS X and the current beta version of 10.10.5. 

Significantly, the present beta variant of 10.11 is free of the flaw, an evidence that Apple designers might as of now aware of the vulnerability. It wouldn't be astounding for the fix to discover its way into an incremental redesign to OS X released in the coming weeks.

Its the type of security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications.

Esser explained in the blog post,

When Apple changed the dynamic linker code for OS X 10.10 to support the new DYLD_PRINT_TO_FILE environment variable they added the following code directly to the _main function of dyld. As you can see from this code the value of the environment variable is directly used as filename for the opened or created logging file.

const char* loggingPath = _simple_getenv(envp, "DYLD_PRINT_TO_FILE");
if ( loggingPath != NULL ) {
        int fd = open(loggingPath, O_WRONLY | O_CREAT | O_APPEND, 0644);
        if ( fd != -1 ) {
                sLogfile = fd;
                sLogToFile = true;
        }
        else {
                dyld::log("dyld: could not open DYLD_PRINT_TO_FILE='%s', errno=%d\n", loggingPath, errno);
        }
}


The problem with this code is that it does not come with any safeguards that are required when adding new environment variables to the dynamic linker. Normally for security reasons the dynamic linker should reject all environment variables passed to it in case of restricted files. This is automatically handled when new environment variables are added to the process DyldEnvironmentVariable() function. However in the DYLD_PRINT_TO_FILE case the code was directly added to the _main function of dyld.

Notwithstanding that it includes a relief against a typical trap to evade O_APPEND limitations on document descriptors.

How can we protect?

Before going into the exploitation of this problem please be reminded that because it will likely take months for Apple to react to this issue we released a kernel extension that protects from this vulnerability by stopping all DYLD_ environment variables form being recognized by the dynamic linker for SUID root binaries. In addition to that it adds a mitigation against a common trick to circumvent O_APPEND restrictions on file descriptors.

Essar tweeted:




If you want to fix this vulnerability before apple new update then here you can. Security researcher Esser explained to fix this vulnerability on GitHub.

SUIDGuard - A kernel extension adding mitigations to protect SUID/SGID binaries

SUIDGuard is a TrustedBSD kernel driver that implements several mitigations to protects against weaknesses usually involving SUID/SGID binaries.

  • Protects SUID/SGID root binaries from DYLD_ environment variables by overwriting the string DYLD_ with XYLD_
  • Protects the O_APPEND flag usually used when opening e.g. logfiles from being disabled by someone with credentials that are different from those used to open the file
  • Tested with OS X Yosemite 10.10.4.


الثلاثاء، 21 يوليو 2015

Ashley Madison Website Hacked: Hackers Want To Release 37 Million Secret Data




Ashley Madison Website Hacked: Hackers Want To Release 37 Million Users Data.

Ashley Madison is and undertaking site to the online personals & dating destination for easygoing experiences, wedded dating, attentive experiences and extramarital issues.

Ashley Madison is a Canadian based online dating service and social networking service marketed to people who are already in a relationship, whose slogan is "Life is short. Have an affair." The website was launched in 2001. The name of the site was created from two popular female names, "Ashley" and "Madison".

Screenshot during Ashley Madison Site Hacked

One of the Impact Team member said, "will profit in a big way" if they sell the stolen personal details.

ALM Chief Executive Noel Biderman confirmed the hack given interview to Krebsonsecurity , and said the company was “working diligently and feverishly” to take down ALM’s intellectual property. Indeed, in the short span of 30 minutes between that brief interview and the publication of this story, several of the Impact Team’s Web links were no longer responding.

“We’re not denying this happened,” Biderman said. “Like us or not, this is still a criminal act.”

A member of a hacking community claims Impact Team "will profit in a big way" if they sell the stolen personal details.

However, according to the Impact Team, Ashley Madison made money from the paid "Full Delete" service that does not work.

ALM statement in Blog,
"We were recently made aware of an attempt by an unauthorized party to gain access to our systems. We immediately launched a thorough investigation utilizing leading forensics experts and other security professionals to determine the origin, nature, and scope of this incident.

We apologize for this unprovoked and criminal intrusion into our customers’ information. The current business world has proven to be one in which no company’s online assets are safe from cyber-vandalism, with Avid Life Media being only the latest among many companies to have been attacked, despite investing in the latest privacy and security technologies.

We have always had the confidentiality of our customers’ information foremost in our minds, and have had stringent security measures in place, including working with leading IT vendors from around the world. As other companies have experienced, these security measures have unfortunately not prevented this attack to our system.

At this time, we have been able to secure our sites, and close the unauthorized access points. We are working with law enforcement agencies, which are investigating this criminal act. Any and all parties responsible for this act of cyber–terrorism will be held responsible."

"Full Delete netted [Avid Life Media] $1.7mm in revenue in 2014. It’s also a complete lie," the group wrote in a statement released Sunday. "Users almost always pay with the credit card; their purchase details are not removed as promised and include real name and address, which is, of course, the most important information the users want to be removed."

Ashley Madison Website is Live now

الجمعة، 17 يوليو 2015

Snitch: A Tool For Information Gathering Via Dorks


Snitch: A Tool For Information Gathering Via Dorks.

Snitch is a tool which automate information gathering process for specified domain. Using build-in dork categories, this tool helps gather specified information's domain which can be found using web search engines. It can be quite useful in early phases of pentest.


devil@hell:~/snitch$ python snitch.py
                       _ __       __  
           _________  (_) /______/ /_ 
          / ___/ __ \/ / __/ ___/ __ \ 
         (__  ) / / / / /_/ /__/ / / /
        /____/_/ /_/_/\__/\___/_/ /_/ ~0.3   

Usage: snitch.py [options]

Options:

  -h, --help            show this help message and exit
  -U [url], --url=[url]
                        domain(s) or domain extension(s) separated by comma*
  -D [type], --dork=[type]
                        dork type(s) separated by comma*
  -C [dork], --custom=[dork]
                        custom dork*
  -O [file], --output=[file]
                        output file
  -S [ip:port], --socks=[ip:port]
                        socks5 proxy
  -I [seconds], --interval=[seconds]
                        interval between requests, 2s by default
  -P [pages], --pages=[pages]
                        pages to retrieve, 10 by default
  -v                    turn on verbosity


 Dork types:

  •   info   Information leak & Potential web bugs
  •   ext    Sensitive extensions
  •   docs   Documents & Messages
  •   files  Files & Directories
  •   soft   Web software
  •   all    All


Download

الخميس، 16 يوليو 2015

Passgen: To Cracking WPA/WPA2 Keys



Passgen To Cracking WPA/WPA2 Keys 

Passgen 0.3:
Passgen is an alternative for the random character generator crunch which attempts to solve cracking WPA/WPA2 keys by randomizing the output opposed to generating a list like so, (aaaaaaaa, aaaaaaab, aaaaaac, etc).

Example :
usuage with aircrack-ng (python passgen.py -l | sudo aircrack-ng --bssid 00:11:22:33:44:55 -w- WiFi.cap)

Argument switches are as followed

  • -l lowercase ascii 
  • -l1 lowercase ascii + digits(0-9) 
  • -U uppercase ascii 
  • -U1 uppercase ascii + digits 
  • -lU lowercase + uppercase ascii 
  • -lU1 lowercase + uppercase ascii + digits 
  • -C [char] [length] custom character set + length


This application will be updated with new features as needed.

Download

الثلاثاء، 14 يوليو 2015

Firefox Blocks Adobe Flash Player Plugin Due To Unpatched 3rd Zero Day Vulnerability




Firefox Blocks Adobe Flash Player Plugin Due To Unpatched 3rd Zero Day Vulnerability.

Some of the places user didn't see the videos due to block. Exploits for these vulnerabilities were found in the information taken from HackingTeam in the assault revealed a week ago.

Adobe expected to patch these flash Zero days in this week, but at the meantime Adobe disabled all versions of plugin.

Adobe released 18.0.0.209 update version for flash player plugin today

In the Mozilla Statement,
"All versions of Adobe’s Flash Player plugin are currently deactivated by default, until Adobe releases an updated version to address known critical security issues."

Last week we reported Hacking Team was hacked and 400GBs Data Leaked. These zero days comes out from these leaks.

Firefox officially Tweeted,


New Facebook Chief Security Officer (CSO) Alex Stamos tweeted,


In the Statement of Adobe,

"Security Advisory for Adobe Flash Player
Release date: July 10, 2015

Last Updated: July 12, 2015

Vulnerability identifier: APSA15-04

CVE number: CVE-2015-5122, CVE-2015-5123


Platform: Windows, Macintosh and Linux


Summary:

Critical vulnerabilities (CVE-2015-5122, CVE-2015-5123) have been identified in Adobe Flash Player 18.0.0.204 and earlier versions for Windows, Macintosh and Linux. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system.  

Adobe is aware of reports that exploits targeting these vulnerabilities have been published publicly. Adobe expects to make updates available during the week of July 12, 2015."


By playing any flash content in Firefox, top of the browser windows can read 

"Firefox has presented the unsafe plugin 'Adobe Flash' from running on the target URL."


الأحد، 12 يوليو 2015

#Breaking: ISRO Commercial Arm ANTRIX Website Gets Hacked





#Breaking: ISRO Commercial Arm ANTRIX Website Gets Hacked.

Indian Space Research Organisation's (ISRO) Commercial Arm Antrix Website Hacked, Possibility By Chinese hackers.

Hacked URL: www.antrix.gov.in 

Screenshot

Major security breach in Indian Government website. Antrix website hacked 2 days after ISRO launched 5 UK Probes.

Antrix Corporation Limited is the marketing arm of ISRO for promotion and commercialization of space products, technical consultancy services and transfer of technologies developed by ISRO.

Website Still Under Construction

#Update:
Website is Live now


السبت، 11 يوليو 2015

The Wind: Man In The Middle (MITM) Attack Tool




The Wind: Man In The Middle (MITM) Attack Tool.
To do man in the middle attacks on multiple application layer protocols. 

What is MITM Attack?
A man-in-the-middle (MITM) attack is a form of eavesdropping where communication between two users is monitored and modified by an unauthorized party. Its intercepts a communication between two systems.

For now, it only supports SSL protocol.



Feature

  • SSL Freak Attack


Installation

1) mv ssl_tls.py to ./scapy/layers

2) modify ./scapy/config.py to autoload ssl_tls layer

    config.py::Conf::load_layers 
    375,376c375
    <                    "sebek", "skinny", "smb", "snmp", "tftp", "x509", "bluetooth", "dhcp6", "llmnr", "sctp", "vrrp",
    <                    "ssl_tls", ]
    ---
    >                    "sebek", "skinny", "smb", "snmp", "tftp", "x509", "bluetooth", "dhcp6", "llmnr", "sctp", "vrrp"]

Usage


  • redirect traffic to port 8888: iptables -t nat -A PREROUTING -p tcp --dport 443 -j REDIRECT --to-port 8888 Or rdr on xxiface inet proto tcp from xxx.xxx.xxx.xxx/xx to any port = 443 -> 127.0.0.1 port 8888
  • edit wind.py to import the right file, for example, add import freak to launch the SSL FREAK attack
  • you can write your own module to implement a specific ssl attack, the compulsory funtions you need to supply are those in forward.py
  • if man in the middle wants to connect to another server, set use OrinAddr = False, then set ip, port
  • set doProcess = True to make the process functions take effect.



الأربعاء، 8 يوليو 2015

To See Who Unfriend You On Facebook Find Out Here



To See Who Unfriend You On Facebook Find Out Here
The free app for iOS and Android is called Who Deleted Me!

Who Deleted Me keeps track of your Facebook friend list and notifies you when friends go missing. We'll tell you if they deleted you or deactivated. We'll also tell you when you make new friends!

Facebook doesn't give any function to see who unfriend you.
but now this chrome browser extension and app will tell you everything about who unfriend your from Facebook.

How its work?
Just saving a copy of your friend list after you first use Who Deleted Me.

Who Deleted Me tells you who your missing friends are are and in addition who recently add your Facebook friend list.

When you revisit the app or browser extension, it will then compare your current friend list to the saved version.



Download >>

Chrome Browser Extension

For iOS | For Android

الثلاثاء، 7 يوليو 2015

Security Reimagined: An Adaptive Approach to Cyber Threats for the Digital Age (Part 1) Free Download


Security Reimagined: An Adaptive Approach to Cyber Threats for the Digital Age (Part 1)

Conventional security detects threats too late (if at all), and resolves them too slowly. Organizations need a flexible, deeply integrated framework that offers a far-reaching view of threats and evolves as quickly as conditions do. 

And it must take an active, “lean-forward” posture. FireEye calls this approach Adaptive Defense.

This two-part, educational series outlines this new approach to CyberSecurity. Part I describes what features and capabilities organizations need in the face of a complex and growing threat.

Read Part I to learn:
Why it's time to reimagine your security architecture
How to reduce two key metrics: time to detection and time to resolution
How to use “hunting” and “gathering” together for better detection
By submitting your information, you agree to receive email communications from FireEye. Understand that you can unsubscribe at any time.

Publisher: FireEye

الاثنين، 6 يوليو 2015

Italian Surveillance Company "HackingTeam" Gets Hacked, 400GBs Data Leaked Online




Italian Surveillance Company "HackingTeam" Gets Hacked, 400GBs Data Leaked Online!

An Italian company which sells spying tools to government and law enforcement agencies has been hacked with 400GB data of internal documents, source code and emails.

Hacking Team is one of the most private companies in the world which sells powerful surveillance tools across the world to the Law Enforcement and Government Intelligence Agencies.

Yesterday their internal network had been breached with 400GBs of data have been compromised and distributed publically on torrents and file sharing sites.

Despite their previous denials of exposing this precious data to companies, they sold their data and tools to countries like Egypt, Ethiopia, Morocco, Nigeria, Sudan, Chile, Colombia, Ecuador, Honduras, Mexico, Panama, United States, Azerbaijan, Kazakhstan, Malaysia, Mongolia, Singapore, South Korea, Thailand, Uzbekistan, Vietnam, Australia, Cyprus, Czech Republic, Germany, Hungary.

This attack was performed by some unknown hackers who exposed their internal private documents on various file sharing sites as well as they replaced the logo of Hacking Team’s twitter account to “Hacked Team” and currently tweeted with images of compromised data.





Regarding this breach, one of the employees of Hacking Team, Christian Pozzi has responded on twitter :

#Update now: 
1. @HackingTeam account restored & @christian_pozzi account deleted.


2. Hacking Team Website Offline:
"503 Service Temporarily Unavailable"


السبت، 4 يوليو 2015

WATOBO- The Web Application Security Auditing Toolbox For XSS, LFI And SQL Injections




WATOBO- The Web Application Security Auditing Toolbox

WATOBO is a security tool for testing web applications. It is intended to enable security professionals to perform efficient (semi-automated) web application security audits.

It is competent to the discovery of common vulnerabilities like (XSS, LFI, SQL injections etc) in web applications.

Most important features:

  • WATOBO has Session Management capabilities! You can define login scripts as well as logout signatures. So you don’t have to login manually each time you get logged out.
  • WATOBO can act as a transparent proxy (requires nfqueue)
  • WATOBO can perform vulnerability checks out of the box
  • WATOBO can perform checks on functions which are protected by Anti-CSRF-/One-Time-Tokens
  • WATOBO supports Inline De-/Encoding, so you don’t have to copy strings to a transcoder and back again. Just do it inside the request/response window with a simple mouse click.
  • WATOBO has smart filter functions, so you can find and navigate to the most interesting parts of the application easily.
  • WATOBO is written in (FX)Ruby and enables you to easily define your own checks
  • WATOBO runs on Windows, Linux, MacOS ... every OS supporting (FX)Ruby
  • WATOBO is free software ( licensed under the GNU General Public License Version 2)


Installation on Windows
c:\> gem install watobo
This might take some time ...

To start watobo enter
c:\> watobo_gui 


Installation on Kali Linux
WATOBO is included in the official Kali Linux repo. You can install it by
apt-get install watobo


الخميس، 2 يوليو 2015

q-shell - Unix Remote Login And Rootkit Shell Tool



q-shell - Unix Remote Login And Rootkit Shell Tool. 
Quick Shell for Unix administrator!

q-shell is quick shell for remote login into Unix system, it use blowfish crypt algorithm to protect transport data from client to server, you can get two program: 'qsh' for client, and 'qshd' for server, those program can rename by any name with you prefer.

Compile

Just enter 'make' and it will automation to compile, but, you must input the server key.

Usage

1. Server:

Just run qshd on server:

   $ ./qshd

But, you would like to run after change it to other name, such as:

   $ mv qshd smbd
   $ export PATH=.:$PATH
   $ smbd

2. Client:

Set some environment variable, then run qsh:

  $ export _IP=127.0.0.1
  $ export _PORT=2800
  $ unset _P
  $ ./qsh shell

Now you already login into server $_IP .

More function

1. q-shell include more function to manage system:

put/get files:

$ ./qsh get /path/to/server/file .
$ ./qsh put /path/to/local/file  /path/to/server/file

2. Run a command on server:

$ ./qsh exec 'ls -l /bin'

3. Update server program:

$ ./qsh update /path/to/local/qshd

This function will update remote qshd, and run again.

4. Automation to run command on many server:

$ for i in {10..20} ; do \
      export _IP=192.168.0.$i
      export _PORT=2800
      export _P=key   # set key
      ./qsh exec 'ls -l /bin'
  done

Note: qsh use $_P to fetch server key, so you should erase all history data after to use $_P.

5. Update password

start with version 3.2, you can update the password as below:

  $ ./qsh passwd

about VERSION file

Client and server must have the same main version serial, otherwise, the client cannot to connect the server. the main version serial like, both is 1.x, or 2.x, or 3.x, etc.

For example, if the client version is 1.1, and server is 1.5, so client can connect to the server, but if server version is 2.1, in that way the client cannot connect to server.

file config.h

You can configure the server port in config.h : #define _PORT 2800

And undef _HAVE_MORE_FUNCTION to disable some function.

Download