Polymorphic code: The (same) code takes many forms (like encryptions)
Oligomorphic code: The (same) code takes one of a few predefined forms (and thus can be possibly matched against signatures that can cover all cases)
- ۰ نظر
- ۱۵ بهمن ۹۱ ، ۰۹:۵۸
Polymorphic code: The (same) code takes many forms (like encryptions)
Oligomorphic code: The (same) code takes one of a few predefined forms (and thus can be possibly matched against signatures that can cover all cases)
Zebra is a multi-server routing software which provides TCP/IP based routing protocols. Zebra turns your machine into a full powered router.
Zebra / GNU Zebra by Kunihiro Ishiguro
GNU Zebra is free software that manages TCP/IP based routing protocols. It is released as part of the GNU Project, and it is distributed under the GNU General Public License. It supports BGP-4 protocol as described in RFC-4271 (A Border Gateway Protocol 4) as well as RIPv1, RIPv2 and OSPFv2. Unlike traditional, monolithic architectures and even the so-called "new modular architectures" that remove the burden of processing routing functions from the cpu and utilize special ASIC chips instead, Zebra software offers true modularity. Zebra is unique in its design in that it has a process for each protocol.
Operating System: Unix / Linux / BSD / Solaris.
Additional information about Zebra
Please see the Zebra Links and Related Resources / Zebra how to guides / info / help etc.
--------------------------------------------------------------------------------------
توضیحات فارسی
توسط این برنامه میتوانید اکثر پروتکل های مسیریابی را برروی پلتفرم های یونیکس اجراکنید، کمی شیطنت!!! خوب حالا از این امکان برنامه چیکارکنیم؟!؟ ایول شروع به حمله برروی روتینگ پروتکل ها کنیم :دی
Loki finally runs on all big operating systems. Im proud to announce the first Loki release for Windows!
There are a few things not working (yet / at all) under Windows. Those are:
The most testing so far was done on Windows 7 were all the other functions work as they do on Linux and Mac.
Download the installer here [1ebf2edbb0cdb631dc2704e82d9c2d778fac703d].
In an ecosystem full of
potentially malicious apps, you need to be careful about the tools you
use to analyze them. Without a full understanding of how the Android
Dalvik VM or dex file interpreters actually work, it's easy for things
to slip through the cracks. Based on learnings from the evolution of
PC-based malware, it's clear that someone, somewhere will someday
attempt to break the most commonly used tools for static and dynamic
analysis of mobile malware. So we set out to see who was already
breaking them and how, then, how we could break them more.
We've
taken a deep dive into Android's dex file format that has yielded
interesting results related to detection of post-compilation file
modification. After deconstructing some of the intricacies of the dex
file format, we turned our attention to dex file analysis tools
themselves, analyzing how they parse and manage the dex format. Along
the way we observed a number of easily exploitable functionality,
documenting specifically why they fail and how to fix them. From this
output we've developed a proof of concept tool - APKfuscator - that
shows how to exploit these flaws. It's our hope that it can be a tool
that helps everyone practice safe dex.
This is the proof of
concept tool which was presented for the talk; "Dex Education:
Practicing Safe Dex" Slides for this talk can be found here, www.strazzere.com/papers/DexEducation-PracticingSafeDex.pdf
Hope everything is okay.
Regards,
AHA
Hi guys.
In this video I will show you how to penetrate an Android application and static analyze *.apk files for keygenning.
Hope everything is okay.
Regards,
[Download Link]
http://tuts4you.com/download.php?view.3413
سلام .
این ویروس از نوع File infection می باشد که البته
بعضی ها میگن روت کیت هستش!! وقت نکردم زیاد برم تو کار آنالیزش . این
ویروس یک فایل DLL که توی فایل ها مینویسه رو Extract میکنه بیرون و بعد
اونو اجرا میکنه که باز فایل DLL اجرا شده یک درایور روی سیستم میندازه که
دیگه نمیدونم اون چیکار میکنه !!
هدف اصلی این آموزشی گندزدایی این ویروس می باشد یعنی فایل های آلوده شده را تصحیح می نماییم.بطوری هم میتوان گفت که با نگاه کامل این فیلم با یکی از الگوریتم های آلوده سازی فایل ها توسط ویروس ها آشنا می شوید ( تنها ویدیو موجود در این زمینه در اینترنت).
دعای خیر یادتون نره
Description: My video tutorial is about the disinfection of Alman.NAB (ESET NOD32 AV) from an infected file with example and full details.
[Download Link]
http://tuts4you.com/download.php?view.2938
- شل کد چیست ؟
- چگونگی اجراشدن شل کد
- Buffer OverFlow چیست ؟
- چگونه Stack OverFlow رخ می دهد ؟
[#]stack-Based Exploition
[#]Heap-Based Exploition- نحوه پیدا کردن Buffer OverFlow در برنامه ها
- مشکلات آدرس دهی
[#]Nop Sled Technique
[#]Jump to Address Stored In a Register Technique- Null Byte چیست ؟
- Null Byte چیست ؟
- چگونگی از بین بردن Null Byte ?
- Self-Modifiyng Code Technique
- Alphanumeric Code Technique
- Return to LibC Attacks Technique
- پیشگیری
- ضمیمه 1 :ثبات ها
- ضمیمه 2 : دستورات اسمبلی ( با شرح جامع )
- Attachment : Find2JMP SRC And its4 SRC And Sample File
البته چیزایی دیگه ای هم بود واسه نوشتن ولی دیگه حوصله نداشتم و همه چیز رو نمیشه گفت ;-)
امیدوارم که خوب باشه و آقایون لطفا نظراتونم بگین واسه مقاله بعدی که بهتر بشه . از همگی پیشاپیش ممنون
راستی اینم لینک دانلود :
توی این فیلم آموزشی میاد برنامه lc5 رو طوری کرک میکنه که هرچی بعنوان
انلاک کد بهش بدین برنامه بطور ادمین رجیستر بشه یک طور تغییر کد هستش .عین
موقع نصب وی بی6 که از ما سریال میخاد و هرچی که بخوایم بهش
میدیم.امیدوارم که به دردتون بخوره .
ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
به علت درخواست دوستان فایل دوباره آپلود گردید :
لینک دانلود - میرور در چند سرور