The Cryptohaze Multiforcer is a high performance multihash brute forcer with support for per-position character sets, and very good performance scaling when dealing with large hash lists. As an example, on a list of 10 hashes, the Cryptohaze Multiforcer achieves 390M steps per second on a GTX260/216SP@1.24ghz card. On a list of 1.4 million hashes with the same card, performance drops to 380M steps per second. This is the password stepping rate – not the search rate. The search rate is 380M * 1.4M passwords per second!

Platforms

The Cryptohaze Multiforcer supports Windows, Linux, and Mac OS X. An nVidia GPU with CUDA support (8000 series, 9000 series, GTX200 series, GTX400 series) is required for this to function. Additionally, a reasonably modern driver with CUDA support will be required. However, to see good rates, a fairly powerful GPU is required. GTX200 series cards are the lowest recommended cards.

Usage

The Multiforcer takes two files as inputs: the hash file, and the character set file. The hash file is very simple: One hash per line as follows:

Hash input file

C55DC1C662628C7B3B85635A4E96262A
5F4DCC3B5AA765D61D8327DEB882CF99
0040F2ABC2CFF0C8F59883B99AE9FAB6
D41D8CD98F00B204E9800998ECF8427E

The character set file is slightly more complex. For a single character set (the same character set applied to all positions), the character set file is very simple: Just the character set in a file, followed by a newline:

Single charset file (-c parameter)

abcdefghijklmnopqrstuvwzyx0123456789

You can download CUDA-Multiforcer here:

MacOS (Intel Only) – CUDA-Multiforcer-Mac-0.72.tar.bz2
Windows (64-Bit Only) – CUDA-Multiforcer-Windows-0.72.zip
Linux – (32 & 64-Bit) – CUDA-Multiforcer-Linux-0.72.tar.bz2

Advertisements

Katana is a portable multi-boot security suite which brings together many of today’s best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal
. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Able, and many more.

New in V2

This version has a bunch of new stuff all around. One major addition to the project is Forge. This tool facilitates a simple point-and-click installation for adding even more distributions to Katana Bootable. This new version also adds the Computer Aided Investigative Environment (CAINE) for a live forensics environment and Kon-Boot for bypassing password. Much effort was placed on the installation of additional applications to the Katana Tool Kit. These new applications include Metasploit, NMAP, Cain & Able, John the Ripper, Cygwin, and more.

Bootable

* BackTrack
* the Ultimate Boot CD
* CAINE
* Ultimate Boot CD for Windows
* Ophcrack Live
* Puppy Linux
* Trinity Rescue Kit
* Clonezilla
* Darik’s Boot and Nuke (DBAN)
* Kon-Boot

A full list of the tools available is here.

You can download Katana v2 here:

Torrent – katana-v2.0.torrent
Direct – katana-v2.0.rar

Or read more here.


BOYUT ÖNEMLİDİR

Böyle devam ederse dünyadaki balık stokları 2050’de tükenecek. Büyük
balıkların %90’ı çoktan yakalandı. Toplam balık stoklarının %60’ı çoktan bitti.
Balıkların bittiği gün deniz yaşamı da bitecek.

Oysa hala zaman var. Büyük balıkların yüzde 10’u hala hayatta, balıkların yüzde
40’ı hala denizlerdeki ekosistemi beslemeye devam ediyor. Bugün yavru balık avını
durdurabilirsek yarın herşeyi düzeltebiliriz.

Eyleme katılın! Tarım Bakanlığı’ndan yavru balık satışını engellemesini ve yasal balık
boylarını düzenlemesini isteyin. Denizlerden vazgeçmeyin!


Ata`mızı Saygıyla Anıyoruz

Posted: 10 November, 2010 in life

Ulu Önder Gazi Mustafa Kemal’in aramızdan ayrılışının üzerinden tam 72 yıl geçti.Her fani gibi o da payına düşeni yaşadı O,kısacık hayatında bir ulusun kötü talihini yenmesini sağladı ve dünya tarihinde de benzeri görülmemiş izler bırakarak bu dünyadan göçtü.

Atatürk ilkeleri ve Atatürkçülük,Türk milletinin ihtiyaçlarından doğan,gerçekçi,milli ve yenileşmeye açık,Çağdaş bir sistem kurmayı amaçlar.Atatürk demek;özgürlük demektir,aydınlık demektir,vatanseverlik demektir.Atatürk demek ,çağdaşlık demektir. O, 72 yıl önce bugün bize kurduğu,bizim de yükseltmek zorunda olduğumuz pırıl pırıl cumhuriyeti ve ilkelerini bırakarak sonsuzluğa göçtü.Yolundan ayrılmayacağımızı vurgulayarak,onun yüce anısı önünde saygıyla eğiliyoruz.

PoC to generate Reverse TCP backdoors, running Autorun or LNK USB infections, but also dumping all USB files remotely on multiple targets at the same time. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET (The Social Engineering Toolkit). The Meterpreter script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

usbsploit-0.3-BETA-linux-i686.tar.gz

more info

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Features

  • Intercepting proxy
  • Automated scanner
  • Passive scanner
  • Spider

Next Release

The next release of OWASP ZAP, planned for later this year, is expected to include:

  • OWASP rebranding
  • Improvements to the passive and active automated scanners
  • Improvements the Spider
  • The addition a basic port scanner
  • The ability to brute force files and directories (using components from DirBuster)

ZAP is actually a fork from Paros Proxy.

Cross Platform – ZAP_1.0.0b_installation.tar.gz
Windows Installer – ZAP_1.0.0_installer.exe

more info

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a webpage.

It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injection vulnerable targets using Havij.

The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

Havij - SQL Injection Tool

There is a free version available and also a more fully-featured commercial edition available here.

You can download Havij v1.12 Free Edition here:

Havij1.12Free.rar

Or read more here.