This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - daxda

Pages: [1] 2 3 ... 6
1
Here's the extension, I grabbed it while it was online on the store and packed it with chrome's "pack addon" feature.
http://upload.evilzone.org/download.php?id=9815878&type=rar

To install it you drag 'n drop it on chrome://extensions, the browser should ask you for confirmation to install it.




2
Thanks for the heads up, seems like a neat extension. Also visit their site, they provide database dumps of all the stuff they got, pretty cool.

3
Hacking and Security / Re: oclhashcat brute force problem
« on: July 31, 2014, 08:37:46 PM »
If you really read the wiki you'd come across all the info you need, try harder.
OR remain a stupid fuck and let others spoon feed all the information you want! Because we are totally doing that for free now, when you call us in the next 2 hours you get a "I don't give a damn" for free. So don't wait, and call our hotline directly!

4
News and Announcements / Re: 2 new global mods joined
« on: July 31, 2014, 08:49:40 AM »
Yay, congrats to the two :)

5
C - C++ / [C++] Blackjack
« on: July 30, 2014, 07:30:02 PM »
Skimmed the web for ideas on what to code and encountered some random blog post about Blackjack.
So here it is, my try on the game Blackjack, it's terminal based and pretty shitty.
In it's current state it doesn't support currency at all, which means you can't bet or win anything.
Neither can you split your hand, because stuff and reasons..
Since this is a multi-file project you'll find the repo, which contains everything, here.



Main file, blackjack.cpp:
Code: (cpp) [Select]
#include <iostream>
#include <string>
#include "modules/player.hpp"
#include "modules/deck.hpp"
#include "modules/hand.hpp"


using namespace std;

void displayHand(Player *player)
{
    cout << player->getName() << " hand ";
    for(char card : player->getHand())
    {
        cout << card << " ";
    }
    cout << " <" << player->getTotal() << ">" << endl;
}

void playerLogic(Player *player, Deck *deck)
{
    // Stores the next instruction the player wants to execute
    string action = "";
    const string hit[] = {"Hit", "hit", "H", "h"};
    const string stand[] = {"Stand", "stand", "S", "s"};

    do // Start the interaction loop where the player can either Hit or Stand
    {
        displayHand(player);
        cout << "(H)it or (S)tand? ";
        cin >> action;

        // Check for Hit instruction
        for(string s : hit)
        {
            if(s.compare(action) == 0)
            {
                player->drawCard(deck);
                action = "Hit";
            }
        }

        // Check for Stand instruction
        for(string s : stand)
        {
            if(s.compare(action) == 0)
            {
                action = "Stand";
            }
        }

    }
    while(player->getTotal() < 21 && action.compare("Hit") == 0);

    displayHand(player);
}

void dealerLogic(Player *dealer, Player *player, Deck *deck)
{
    /*  Dealer: Keep drawing cards until either the sum is bigger or equal to
    the sum of the player or we achieve a blackjack. */
    while(dealer->getTotal() < 21 && player->getTotal() >= dealer->getTotal())
    {
        dealer->drawCard(deck);
    }

    displayHand(dealer);
}

int main()
{
    Deck deck;
    Player player;
    Player dealer;

    player.setName("Your");
    dealer.setName("Dealer's");

    dealer.drawCard(&deck);
    /*  Let the player only see one card of the drawn cards of the dealer, this
        is usually the case in blackjack. */
    displayHand(&dealer);
    dealer.drawCard(&deck);

    // Draw the first two cards of your hand
    player.drawCard(&deck);
    player.drawCard(&deck);

    // Check if player drew a 21 the first time
    if(player.getTotal() == 21 && dealer.getTotal() != 21)
    {
        displayHand(&player);
        displayHand(&dealer);
        cout << "You won!" << endl;
        return 0;
    }

    playerLogic(&player, &deck);

    if(player.getTotal() > 21)
    {
        cout << "Busted, you lose!" << endl;
        return 0;
    }

    dealerLogic(&dealer, &player, &deck);

    // Determine the winner
    if(player.getTotal() == dealer.getTotal())
    {
        cout << "You and Dealer tied!" << endl;
    }
    else if(dealer.getTotal() < player.getTotal())
    {
        cout << "You won!" << endl;
    }
    else if(dealer.getTotal() > 21)
    {
        cout << "Dealer busted, you win!" << endl;
    }
    else if(dealer.getTotal() > player.getTotal())
    {
        cout << "Dealer won!" << endl;
    }

    return 0;
}

6
Scripting Languages / Re: [Python] Dubstep Generator
« on: July 30, 2014, 07:23:36 PM »
He's my idol!

7
Game Hacking, Modding & Discussing / Re: Game Bot Competition [IDEA]
« on: July 30, 2014, 10:16:24 AM »
The idea is definitely a great project, I'd love to code something as abstract as a bot. But as Kulver already said, nobody does (or can because of lack of skill?) participate in weekly challenges, it's a shame actually. I really love challenges once in a while, but a big project like that would take quite a bit of time, that alone makes people not want to do it.

8
I didn't do shit with it, so I didn't experience any lag issues.



9
Operating System / Installing Mavericks (10.9 OS X) on VMware
« on: July 29, 2014, 09:40:09 AM »
You can downlad an archive which contains a VMware patcher (to enable OS X) and an OS X VM image. The package is about 4.9 GB in size.
The thing with VMware is that you need a CPU which supports hardware virtualization, every new-ish model should support it by now.

I'll take a look around where I got it so you can download it as well. For now here is a screenshot of my OS X in VMware.





EDIT: http://www.sysprobs.com/working-os-x-10-9-mavericks-vmware-image-for-windows-os-intel-processor
This is the guide I followed, as you can see from the screenshot above, it does work with Linux.


EDIT 2.0: The archive is no longer on the "producer's" site, so you may have to search for it on the webs, I'll hotlink a working version if there's one around.

EDIT 3.0: Found a few links to download said archive:

Torrent
https://kickass.to/os-x-mavericks-10-9-retail-vmware-image-t7981468.html

MEGA
Total of 8 Parts
(source from http://pastebin.com/raw.php?i=PsJWZS6x)
Code: [Select]
https://mega.co.nz/#!RpsQRbYA!MOZeCyekHGZP7rGrINcFtggfBp5U6h7FZkzBRxekgco
https://mega.co.nz/#!90FFzKoa!CY8AdgU-6zt-0fpV31JBOHzCD7M5ofhdab2opdnG5U4
https://mega.co.nz/#!s4sEiRiL!VLah4FCyFzavs8MICBnDyC2ro0lb0mrznZsEoVhhN1E
https://mega.co.nz/#!k9ljEbDL!WxYcbRbi1ZQDWxaMsPPK-VrgEy4dNQ4FC6dVrat62qk
https://mega.co.nz/#!8pdhmaoA!c5KvgzPKSjNitumq4OxgOCrGZCot5Y5gS6MiXMmIrcU
https://mega.co.nz/#!NoV3nKSI!PQgNIm4oHz7wafIi2R_y2zxrYjtQsJnUmFbMiL4NFRo
https://mega.co.nz/#!A5sUkRJB!FB2KG0gOBq-_k19eEOzEI38D7V4pOB3O5ZYOYwP2FVo
https://mega.co.nz/#!oxsUBB6C!REeYr2kpLO10Pg3diSEfqjrydehSJzMvKvpLSuuOKnA

FTP:
(Speed: ~750 Kb/s)
Code: [Select]
ftp://212.253.95.117/USB_SAMSUNG_HD103SI_a_1/OMER/omer/Teknik/OS/OS%20X%20Mavericks%2010.9%20Retail%20VMware%20Image/OS%20X%20Mavericks%2010.9%20Retail%20VMware%20Image.7z
(Speed: 750 Kb/s)
Code: [Select]
ftp://213.125.29.210/Software/Apple/OS%20X%20Mavericks%2010.9%20VMware%20Image/OS%20X%20Mavericks%2010.9%20Retail%20VMware%20Image.7z
(Speed: 60 Kb/s)
Code: [Select]
ftp://41.193.255.27/USBDisk1_1/DVD/Downloads/OS%20X%20Mavericks%2010.9%20Retail%20VMware%20Image/OS%20X%20Mavericks%2010.9%20Retail%20VMware%20Image.7z
(Speed: 56 Kb/s)
Code: [Select]
ftp://217-211-141-7-no33.tbcn.telia.com/pools/A/A0/mytorrent/OS%20X%20Mavericks%2010.9%20Retail%20VMware%20Image/OS%20X%20Mavericks%2010.9%20Retail%20VMware%20Image.7z
Archive contains the following files:
Code: [Select]
OS X Mavericks 10.9 Retail VMware Image/:
total 12K
drwx------ 2 daxda daxda 4.0K Jul 18 15:12 OS X Mavericks
drwx------ 4 daxda daxda 4.0K Mai 24  2012 VMware Unlocker - Mac OS X Guest
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Unlocker - Hardware Virtualization Bypasser

OS X Mavericks 10.9 Retail VMware Image/OS X Mavericks:
total 7.2G
-rw-rw-r-- 1 daxda daxda 7.2G Jul 18 15:03 OS X Mavericks.vmdk
-rw-rw-r-- 1 daxda daxda 3.0K Okt  6  2013 OS X Mavericks.vmx
-rw-rw-r-- 1 daxda daxda  73K Okt  6  2013 OS X Mavericks.nvram
-rw-rw-r-- 1 daxda daxda  372 Okt  6  2013 OS X Mavericks.vmxf
-rw-rw---- 1 daxda daxda    0 Okt  6  2013 OS X Mavericks.vmsd

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest:
total 12K
drwx------ 7 daxda daxda 4.0K Mai 24  2012 VMware 8.x + 9.x + 10.x Series
drwx------ 6 daxda daxda 4.0K Mai 24  2012 VMware 7.1.x Series
-rw-rw-r-- 1 daxda daxda  108 Feb 22  2012 Quick Guide - Make Sure You Know What To Do!.url

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 8.x + 9.x + 10.x Series:
total 28K
-rw-rw-r-- 1 daxda daxda 4.5K Sep 19  2013 README.txt
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Workstation Unlocker - Linux
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Workstation Unlocker - Windows
drwx------ 2 daxda daxda 4.0K Mai 24  2012 Tools
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware ESXi Unlocker
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Fusion Unlocker

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 8.x + 9.x + 10.x Series/VMware Workstation Unlocker - Linux:
total 2.6M
-rw-rw-r-- 1 daxda daxda  508 Okt  5  2013 install.sh
-rw-rw-r-- 1 daxda daxda  498 Sep 19  2013 uninstall.sh
-rw-rw-r-- 1 daxda daxda 1.3M Sep 19  2013 Unlocker.Linux32
-rw-rw-r-- 1 daxda daxda 1.3M Sep 19  2013 Unlocker.Linux64

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 8.x + 9.x + 10.x Series/VMware Workstation Unlocker - Windows:
total 556K
-rw-rw-r-- 1 daxda daxda  921 Okt  5  2013 install.cmd
-rw-rw-r-- 1 daxda daxda  911 Sep 19  2013 uninstall.cmd
-rw-rw-r-- 1 daxda daxda 546K Sep 19  2013 Unlocker.exe

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 8.x + 9.x + 10.x Series/Tools:
total 9.5M
-rw-rw-r-- 1 daxda daxda 9.5M Aug 28  2013 darwin.iso
-rw-rw-r-- 1 daxda daxda  256 Aug 28  2013 darwin.iso.sig

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 8.x + 9.x + 10.x Series/VMware ESXi Unlocker:
total 1.3M
-rw-rw-r-- 1 daxda daxda 1022 Sep 19  2013 install.sh
-rw-rw-r-- 1 daxda daxda  394 Sep 19  2013 uninstall.sh
-rw-rw-r-- 1 daxda daxda 1.3M Sep 19  2013 Unlocker.ESXi

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 8.x + 9.x + 10.x Series/VMware Fusion Unlocker:
total 24K
-rw-rw-r-- 1 daxda daxda 253 Sep 19  2013 install.sh
-rw-rw-r-- 1 daxda daxda 260 Sep 19  2013 uninstall.sh
-rw-rw-r-- 1 daxda daxda 14K Sep 19  2013 Unlocker.OSX

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 7.1.x Series:
total 24K
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Workstation Unlocker - Windows
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Fusion Unlocker
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Player Unlocker
drwx------ 2 daxda daxda 4.0K Mai 24  2012 VMware Workstation Unlocker - Linux
-rw-rw-r-- 1 daxda daxda 5.6K Jul  7  2011 README.txt

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 7.1.x Series/VMware Workstation Unlocker - Windows:
total 80K
-rw-rw-r-- 1 daxda daxda 75K Jun 10  2010 windows_32.exe
-rw-rw-r-- 1 daxda daxda 119 Jun 10  2010 windows.bat

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 7.1.x Series/VMware Fusion Unlocker:
total 16K
-rw-rw-r-- 1 daxda daxda 14K Jun 10  2010 macosx

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 7.1.x Series/VMware Player Unlocker:
total 80K
-rw-rw-r-- 1 daxda daxda 75K Jun 10  2010 windows_32.exe
-rw-rw-r-- 1 daxda daxda 119 Jun 10  2010 windows.bat

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Mac OS X Guest/VMware 7.1.x Series/VMware Workstation Unlocker - Linux:
total 24K
-rw-rw-r-- 1 daxda daxda  120 Jun 10  2010 linux
-rw-rw-r-- 1 daxda daxda 6.6K Jun 10  2010 linux_32
-rw-rw-r-- 1 daxda daxda 9.0K Jun 10  2010 linux_64

OS X Mavericks 10.9 Retail VMware Image/VMware Unlocker - Hardware Virtualization Bypasser:
total 20K
-rw-rw-r-- 1 daxda daxda 13K Mai 20  2012 vmware-vmx-patch.exe
-rw-rw-r-- 1 daxda daxda 108 Feb 22  2012 Quick Guide - Make Sure You Know What To Do!.url

10
Creative Arts / Re: Rapture - Amongst the Forgotten (Dubstepish)
« on: July 28, 2014, 06:47:53 PM »
Dubstepish? Just because you add some wobble here and there doesn't mean you can call it Dubstep (not even -ish). Shame on you.
Sounds like a random collection of wobbles, some gay techno rhythm here and there, done. It's a bummer you had to waste even one minute
on this lame track. But hey, there's always a next time in mixing random shit together, right?

11
News and Announcements / Re: Newest Alpha dev
« on: July 23, 2014, 07:49:29 PM »
As long as I don't know what exactly is new and what is not I won't be able to tell you exactly what I think about it. But that's just my drunk mind speaking right now. Good to see you guys are making progress, keep up the good work, I know it's not easy to find time to work on "free stuff" since people who actually have rl shit to do are busy enough.

12
General discussion / Password managers, yay or nay?
« on: July 20, 2014, 01:42:26 PM »
Simply put, I got various emails from Facebook this morning stating that my account has been reactivated (which I obviously didn't do)
and all of a sudden I got 32 new friends (yay!). After a bit of a mind struggle between "these emails must be scam" and "oh shit who haxxored my ass?", I found that these mails were indeed for real. As I attempted to recover my password, I came across a happy little message which read: "Your password was changed at: Yesterday at 11:13pm", and people who know me even just a tiny wee bit, know that I strictly fall dead to bed at 8:00 PM (don't ask why). Either my password got hacked or a session cookie stolen (if that's even possibru). I did not use any kind of password managers in the past and thought, this might be a good time to switch.

So now my question(s) for you:  What is your opinion on password managers?
                                                     Do they provide a secure way of storing and managing passwords?
                                                     Do you use them personally?
                                                     Can you recommend a certain manager?
                                                     

13
Found it on the Webs / Re: VMware Workstation 10 serial keys
« on: July 17, 2014, 08:55:24 PM »
Is this for windows or linux?

VMware 10 keys are for both operating systems.

14
Scripting Languages / [Python] Udemy course extractor
« on: July 17, 2014, 08:19:19 PM »
Since Geoff and some other guy posted coupons for udemy.org discounts, I tried to extract all video links from a course.
With this script you are able to extract the "Solid Introduction to Ethical Hacking and Penetration Testing" course from udemy.
The only "limitation" of it, is the fact that you have to buy the courses first (or get access to a valid cookie which have the courses you want,
or 100% off coupon, more 100% off coupons), to be able to extract the links. You need to manually fill out the cookie dict on line L17 and enter the URL,
you want to scrape from, at the bottom of the script on line L115.

I couldn't be bothered to take care of all the various login routines for the site, so you have to do some dirty work.
Unless you want to modify the source that is.



[gist]Daxda/d1b9e535b9aced2450cc[/gist]

Example output:
Code: [Select]
Section 1. Solid Introduction to Ethical Hacking and Penetration Testing

Chapter 1. About the course
File name: Intro.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-34-7bf522b269e5ff8cd7e3b0c5200c1254/WebHD_720p.mp4?__gda__=1405633327_ef25fbdfa32f33faa6f5b32a009e80b2&filedownload=attachment%3Bfilename%3Dintromp4.mp4

Chapter 2. Hacking vs Ethical Hacking
File name: hacking_vs_ethical_hacking.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-31-54ea765817edd834a9e12d202a3c91fd/WebHD_720p.mp4?__gda__=1405633327_d34925cf2e59c2ad3c166b7c228e6343&filedownload=attachment%3Bfilename%3Dhacking_vs_ethical_hackingmp4.mp4

Chapter 3. Who is a Hacker ?
File name: hacker_def.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-35-1ef8ba7ccb507e462b0e2f312a75734b/WebHD_720p.mp4?__gda__=1405633329_f901b01c40d7e1ed8e32dfed7fe1b2b6&filedownload=attachment

Chapter 4. Types of Hackers
File name: types_of_hackers.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-31-38-4473ae9aabc6d12f545c415acc776b38/WebHD_720p.mp4?__gda__=1405633330_968e467f33b34e1d727f8a9e69657292&filedownload=attachment

Chapter 5. Hacktivism
File name: hacktivism.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-29-09-e1ece5d5151c24417daad579e350187e/WebHD_720p.mp4?__gda__=1405633330_e07dde57e3243969ac58e9e45f6b5f4d&filedownload=attachment

Chapter 6. Computer Crimes
File name: computer_crimes.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-10-14_22-30-11-6a371e23b8b06801b071e265ff2a5451/WebHD_720p.mp4?__gda__=1405633331_3ad47c63f467ce5754c0c50c55f6276d&filedownload=attachment

Chapter 7. Important Terms 1
File name: Important Terms 1
Link: https://sknowbucket-a.akamaihd.net/2013-10-17_10-23-52-5dd4eaef148cdfeca88e33f9c64cb1b2/WebHD_720p.mp4?__gda__=1405633327_9aaa81ed7803bdbeca1fbc28c305bcb0&filedownload=attachment%3Bfilename%3Dimportant-terms-1.mp4

Chapter 8. Important Terms 2
File name: Important Terms 2
Link: https://sknowbucket-a.akamaihd.net/2013-10-17_10-27-57-bba20df22f12b4e2c5154f78964ccc9b/WebHD_720p.mp4?__gda__=1405633331_167ae0893ff873e25fa257a7f969709e&filedownload=attachment

Chapter 9. Why Penetration Testing ?
File name: Why Pentest
Link: https://sknowbucket-a.akamaihd.net/2013-10-19_07-42-18-4fde9bf6cd6ff8e0439de030ee05746d/WebHD_720p.mp4?__gda__=1405633327_d1420e1c02e0b162614ddc60e57e03eb&filedownload=attachment%3Bfilename%3Dwhy-pentest.mp4

Chapter 10. Penetration Testing Types
File name: Pentest Types
Link: https://sknowbucket-a.akamaihd.net/2013-10-19_07-46-07-20a37118e33a48e86f961d3a70303f8c/WebHD_720p.mp4?__gda__=1405633332_5c588bb2d5fd8d7b605a30a7e27c2006&filedownload=attachment

Section 2. Real World Information Intelligence Techniques

Chapter 11. Introduction to Information Intelligence Techniques
File name: Module2RealWorldInformationIntelligenceTechniques.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-37-10-0842b3c32f853ff4d63bf34fff815871/WebHD_720p.mp4?__gda__=1405633332_edc5ce7ea852d3a7aaa370e16ee78034&filedownload=attachment

Chapter 12. organizing information during a penetration test
File name: organizinginformationduringapenetrationtest.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-41-079e30176fcce1ac705271f61332cf2c/WebHD_720p.mp4?__gda__=1405633333_5677739b53d5347995dbb4684f80abf0&filedownload=attachment

Chapter 13. how to locally copying company websites
File name: locallycopyingcompanywebsites.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-34-45-8b90bcc134c59b1c03f7cf738c06668d/WebHD_720p.mp4?__gda__=1405633333_eeb162863162e2acc8bfc697d5f213fc&filedownload=attachment

Chapter 14. newsgroups and list-servers
File name: newsgroupsandlistservers.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-18-b6caaca940dfc0df12a0329d3aeab500/WebHD_720p.mp4?__gda__=1405633333_30ce6d72caa84de5697f5ae23b6b4233&filedownload=attachment

Chapter 15. online job listing
File name: onlinejoblisting.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-29-05-6c5d3d5fe49b29e1b5dfca43d17ec3e3/WebHD_720p.mp4?__gda__=1405633334_17df81f31125dd95143d0bf6428ddcf7&filedownload=attachment

Chapter 16. the power of social media websites
File name: thepowerofsocialmediawebsites.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-57-25-eb883a97adc20934bff8ca155d519386/WebHD_720p.mp4?__gda__=1405633334_dc747bed1191767a15ae8bfbbe9b188b&filedownload=attachment

Chapter 17. harvesting a company emails
File name: harvestingacompanyemails.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-57-25-00c33e21a9bdf11f34c0ffb2459981b1/WebHD_720p.mp4?__gda__=1405633335_6d7fc73afe01a392de58247dcc00a529&filedownload=attachment

Chapter 18. how to generate a targeted wordlist for password cracking
File name: generateatargetedwordlistforpasswordcracking.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-57-07-4b3a4ba00c3acb3d69a4d8c4929638c4/WebHD_720p.mp4?__gda__=1405633335_944c4b599b3e6b828205bcec973ca259&filedownload=attachment

Chapter 19. information intelligence with Maltego
File name: informationintelligencewithMaltego.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-40-02-0f6ccec6289b617b08bf1761ab299354/WebHD_720p.mp4?__gda__=1405633336_409dcbffe6982340d8b93a9d625104d9&filedownload=attachment

Chapter 20. Google Search Techniques for penetration testers
File name: GoogleSearchTechniquesforpenetrationtesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-46-45-52961f997a4535a7abff091be7a0e9b9/WebHD_720p.mp4?__gda__=1405633336_8590a103a67540396c2fccdbdb3cb782&filedownload=attachment

Chapter 21. other search engines for penetration testers
File name: Othersearchenginesforpenetrationtesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-26-f73f415bec0dfd8e86a4ab6e65da9498/WebHD_720p.mp4?__gda__=1405633337_06a3de0b51a7ef8caae20270f03999dc&filedownload=attachment

Chapter 22. Enumerating Internal Network From Outside
File name: EnumeratingInternalNetworkFromOutside.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-10-22-1eb47c83fea468299e58000430627783/WebHD_720p.mp4?__gda__=1405633337_2dcb3f682188ab65b1f6092334c3249d&filedownload=attachment

Chapter 23. gather information using WhatWeb, HttpRecon and SSL SCAN
File name: WhatWebHttpReconandSSLSCAN.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-00-54-0f051ced02577053a29fbb525d575653/WebHD_720p.mp4?__gda__=1405633338_7e0542e63718dc58002f1f5a40e31684&filedownload=attachment

Chapter 24. Whois Lookups, finding other Web Sites Hosted on a Web Server
File name: Whoisandotherwebsites.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-58-44-fe1e23878431e05e4be8b3c85b44211e/WebHD_720p.mp4?__gda__=1405633338_c3f49ce95ff57ddb20c5eeac35eb4179&filedownload=attachment

Chapter 25. IP Address Geolocation
File name: IPAddressGeolocation.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-54-19-d1cb3251403bef64225a2da11f930785/WebHD_720p.mp4?__gda__=1405633339_279940e07a17ff9ea0d95000547f5320&filedownload=attachment

Chapter 26. finding subdomains, extracting exif data and finding hidden web dirs
File name: findingsubdomainsexifdataandrobots.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-59-12-3ab312685fa771da694849989975bfdb/WebHD_720p.mp4?__gda__=1405633339_c6ef71c927fc714a87987afd0e60112d&filedownload=attachment

Chapter 27. ShodanHQ for fun and profit
File name: ShodanHQforfunandprofit.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-58-37-b47408d62dca66a53be97b172533a2ff/WebHD_720p.mp4?__gda__=1405633328_b0c686f0249c294962b823208867b43d&filedownload=attachment%3Bfilename%3Dshodanhqforfunandprofitmp4.mp4

Chapter 28. Web Application Firewall Detection, HTTP and DNS load balancer detection
File name: WAFandLoadBalancersDetection.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-36-09-7a48ff856ed417db45cd1613f8a043da/WebHD_720p.mp4?__gda__=1405633340_0ac879dc2d450864830ce43ef6e1bee6&filedownload=attachment

Chapter 29. DNS Enumerating for penetration testers
File name: DNSEnumerating.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-12-16-bf772604b02808cd5caa593ad478c5cc/WebHD_720p.mp4?__gda__=1405633340_b37f86ce2dfb7c95a1857a28d66aafab&filedownload=attachment

Chapter 30. Mail Server Enumeration for penetration testers
File name: EnumeratingMailServer.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-53-20-f87eb1767e1c349976fc40a6d935927e/WebHD_720p.mp4?__gda__=1405633341_622c08463f9678183c8acea827907eb6&filedownload=attachment

Chapter 31. Intel Gathering Methodology for penetration testers
File name: IntelGatheringMethodology.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-38-06-27b8159caa30b8a1cb10068c01f3f1f9/WebHD_720p.mp4?__gda__=1405633341_f3744acec514ce11a23fed8bf88736ff&filedownload=attachment

Section 3. Scanning and vulnerability Assessment

Chapter 32. packet Crafting and Manipulating with Scapy
File name: PacketCraftingandManipulatingwithScapy.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-59-12-cf21674c636b66676c0ec24f745ea699/WebHD_720p.mp4?__gda__=1405633342_0f8b0922524d3da9472df81ac18a6bd1&filedownload=attachment

Chapter 33. port scanning with scapy
File name: portscanningwithscapy.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-56-28-cdb4fdafeedb2d33b0050d418cbee043/WebHD_720p.mp4?__gda__=1405633328_362c9cf7ac8bc6784a4509b4c11fa280&filedownload=attachment%3Bfilename%3Dportscanningwithscapymp4.mp4

Chapter 34. Network Enumeration and Mapping Techniques
File name: NetworkEnumerationandMapping.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-38-28-5b869517c7aae103de2e3e609e260ad7/WebHD_720p.mp4?__gda__=1405633342_fedb0325fb6f1db5bd7c8b2e64a0d108&filedownload=attachment

Chapter 35. Network scanning techniques
File name: networkscaning.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-04-36-d13cea9d2d62e7f46c39c3ad63610692/WebHD_720p.mp4?__gda__=1405633343_038ef25df0f5429d972c83e2883911d9&filedownload=attachment

Chapter 36. Vulnerability Identification and Assessment techniques
File name: VulnerabilityIdentificationandAssessment.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_07-37-04-6cd5ac881a3927401a9732d9db284cc6/WebHD_720p.mp4?__gda__=1405633343_d59b4f4deea4acaa994ab56476bce28d&filedownload=attachment

Chapter 37. Practical Evasion and avoidance Techniques
File name: EvasionandavoidanceTechniques.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-11-28-8c6fabb19a5f8ac85672786f8b306c6b/WebHD_720p.mp4?__gda__=1405633343_980c45c2bde1af1ccc3b62e262ecb3e2&filedownload=attachment

Section 4. Network Attacking Techniques

Chapter 38. Password cracking, MITM, Sniffing SSL and RDP Attacks
File name: module4.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-04-56-393b234b3a01e61bfb72f91031b1db86/WebHD_720p.mp4?__gda__=1405633344_b63233fbafc86c1ececa8a4f6377a8e2&filedownload=attachment

Section 5. Windows and Linux Attacking Techniques

Chapter 39. Windows Security Overview for Penetration Testers
File name: WindowsSecurityOverviewforPenetrationTesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-54-10-7f5f4262bce22d65479122a05f5aefbb/WebHD_720p.mp4?__gda__=1405633344_8338e8398d551c219feff06e8f8faab6&filedownload=attachment

Chapter 40. Linux Security Overview for Penetration Testers
File name: UnixSecurityOverviewforPenetrationTesters.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-48-55-ee6ffd440246ae961aaae83b81438e67/WebHD_720p.mp4?__gda__=1405633346_a5fc5c07eec9133c52202475872efb46&filedownload=attachment

Chapter 41. Attacking and Hacking Windows
File name: AttackingWindows.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-14-25-a76aa25fa37624873f4b32ef8dfc29ff/WebHD_720p.mp4?__gda__=1405633346_8828abdce7a9db7ea94b0cdef8319397&filedownload=attachment

Chapter 42. Attacking and Hacking Linux
File name: AttackingUnix.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-11-27-4e9b6ae0f4831efd8cde29901a2a57f3/WebHD_720p.mp4?__gda__=1405633347_a0293cddef422a7b699d43185ad4e08a&filedownload=attachment

Section 6. Windows and Linux Post-Exploitation Techniques

Chapter 43. Windows post exploitation techniques
File name: TacticalPostExploitationTechniquesWindows.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-03-47-2558a5d56bba644970d47cbc9318ec38/WebHD_720p.mp4?__gda__=1405633347_291748ffc0dd36de038527aa41379284&filedownload=attachment

Chapter 44. Linux post exploitation techniques
File name: TacticalPostExploitationTechniquesUnix.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-04-12-48e6a374c4e53da5a6dcaab4e40f9400/WebHD_720p.mp4?__gda__=1405633348_370453631dbe32d6a22e96b71f744557&filedownload=attachment

Chapter 45. Data mining techniques
File name: datamining.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-08-57-c312b7ae53c9c1788f674e5fc5a138ca/WebHD_720p.mp4?__gda__=1405633348_5e444c134fe053701a717a88d4cb9571&filedownload=attachment

Section 7. Web Exploitation Techniques

Chapter 46. Web Application Primer
File name: WebApplicationPrimer.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-55-58-9eb5009c123e14ba51b427c4b4a38054/WebHD_720p.mp4?__gda__=1405633349_245ebaa07a433bf60b5088ff808f18b0&filedownload=attachment

Chapter 47. Web Application Scanning and Mapping
File name: WebApplicationScanningandMapping.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-56-29-8d0c95a1bf1984a73ea72acfe6a91bfe/WebHD_720p.mp4?__gda__=1405633349_2fcd584e340bba87c5bd3fbd5d89c603&filedownload=attachment

Chapter 48. Exploiting SQL Injection to Full System Access (MYSQL)
File name: ExploitingSQLInjectionMYSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_06-07-33-94075a6fc2b93fd1b1577eacdb7abe0d/WebHD_720p.mp4?__gda__=1405633328_944fda129506961408913c40a5722904&filedownload=attachment%3Bfilename%3Dexploitingsqlinjectionmysqltofullsystemaccessmp4.mp4

Chapter 49. Exploiting SQL Injection to Full System Access (MSSQL)
File name: ExploitingSQLInjectionMSSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_08-53-16-3b0cfd0318044e9de46627f2790747cd/WebHD_720p.mp4?__gda__=1405633350_9e2f1bd840ce7b134fd9619a08294914&filedownload=attachment

Chapter 50. Exploiting Blind SQL Injection to Full System Access (MYSQL)
File name: ExploitingBlindSQLInjectionMYSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-11-14-ce7b8cfa132b7383777e17c8a70fd3c5/WebHD_720p.mp4?__gda__=1405633350_2bc7f694db243c7f181ac0df507278b5&filedownload=attachment

Chapter 51. Exploiting Blind SQL Injection to Full System Access (MSSQL)
File name: ExploitingBlindSQLInjectionMSSQLtoFullSystemAccess.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-03-07-a9c430be43d02e6323e2a1765ce857c6/WebHD_720p.mp4?__gda__=1405633351_31fd04fbdeaafcb5f7a75693e41a1d8c&filedownload=attachment

Chapter 52. Exploiting RFI, Local File include, File Uploads and RCE
File name: ExploitingFilehandlingandcmdexecvulns.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_05-12-16-9313125c96f240a67e8748ef74773c8c/WebHD_720p.mp4?__gda__=1405633351_2089972431bf6d72ac1a655bb8e88ec0&filedownload=attachment

Chapter 53. Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access
File name: ExploitingXSSandCSRF.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-02-49-75f95af78854dbb70ba1b74b9a30d6f5/WebHD_720p.mp4?__gda__=1405633352_1cc4380ca2e57d8e68d82a838f9ad632&filedownload=attachment

Section 8. Windows Exploit Development

Chapter 54. Using Immunity Debugger and Metasploit to develop a windows exploit
File name: Module8Windowsexploitdevelopment.mp4
Link: https://sknowbucket-a.akamaihd.net/2013-09-30_09-08-20-7af8d95e3f18436d5ad97d80a6b2a8d8/WebHD_720p.mp4?__gda__=1405633352_2f5b774ad9431ae7caf5914fa4a6a2d6&filedownload=attachment

Section 9. The end but it is not the end :)

Chapter 55. The end
File name: Final
Link: https://sknowbucket-a.akamaihd.net/2013-10-01_15-57-44-b9b8ee680f7b084642adbac6bc559580/WebHD_720p.mp4?__gda__=1405633353_433c9d6a9c17d49ae6c4f1b9989ca9fe&filedownload=attachment

15
wow that guy in the udemy videos talks like a damaged robot, thanks non the less for the coupon Geoff.

Pages: [1] 2 3 ... 6


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.