9 Feb 2009

BackTrack 3 Final

BackTrack adalah salah satu distribusi Linux Live popular yang fokus ditargetkan untuk masalah sekuriti sebagai 'penetration testing'. Versi 3 baru saja (2008-06-19) dirilis setelah ia sejak enam bulan (2007-12-14) berstatus beta. Perjalan cukup panjang selama limabelas bulan sejak BackTrack 2 (2007-03-07) memastikan kematangan versi final ini.

 Tanpa perlu di instalasi, dalam waktu singkat langsung dari CDROM semua perkakasan yang disiapkan untuk menganalisa keamanan sistem komputer dapat dijalankan.

BackTrack merupakan gabungan dari dua proyek utama untuk keamanan yaitu - Whax dan Auditor Security Collection. Sejak merger dua distribusi yang melahirkan BackTrack di tahun 2006 dengan rilis BackTrack 1 (2006-05-26), distro ini langsung menanjak popularitasnya dan berhasil meraih peringkat top sebagai #1 Security Live Distribution by insecure.org. BackTrack sampai kini menjadi favorit baik bagi Security professionals maupun pemula sebagai penyadia perkakasan untuk bidang keamanan TI.

Perkakasan (tools) Tools yang ditawarkan BackTrack untuk penelitian keamanan sistem termasuk peranti lunak membobol sistem LAN maupun WLAN, pembongkar Password, scanner pencari celah keamanan seperti Exploit Framework dari Metasploit dan banyak tools terbaik lainnya.

Pada versi 3 dikemas paket-paket versi terkini yang telah dioptimasi, ditingkatkan dan/atau diperbaiki selama masa tenggang pengujian beta enam bulan terakhir. Sebagai contoh adalah perkakas wessid-ng, yang dapat disalahgunakan untuk membongkar WEP-Keys pada WLAN (WiFi). Ia kini lebih mudah digunakan dan dapat melakukan proses otomatis menggunakan 'aircrack-ng Suite'.

Dari sejarah BackTrack tercatat, berbagai distro awalnya telah dicoba sebagai basis distribusi, namun saat ini BackTrack menggunakan Slackware linux sebagai basis dan live-CD scripts terkait berasal dari Tomas M. (www.slax.org). Setiap paket, konfigurasi kernel dan script, menurut pengembangnya telah dioptimasi untuk penggunaan sebagai 'security penetration testers'.

Download disini :

http://rapidshare.com/files/153853383/bt3-final.iso.crc
http://rapidshare.com/files/153853484/bt3-final.iso.001
http://rapidshare.com/files/153853450/bt3-final.iso.002
http://rapidshare.com/files/153853532/bt3-final.iso.003
http://rapidshare.com/files/153853535/bt3-final.iso.004
http://rapidshare.com/files/153853505/bt3-final.iso.005
http://rapidshare.com/files/153853508/bt3-final.iso.006
http://rapidshare.com/files/153853525/bt3-final.iso.007
http://rapidshare.com/files/153853533/bt3-final.iso.008
http://rapidshare.com/files/153853531/bt3-final.iso.009
http://rapidshare.com/files/153853516/bt3-final.iso.010
http://rapidshare.com/files/153853521/bt3-final.iso.011
http://rapidshare.com/files/153853504/bt3-final.iso.012
http://rapidshare.com/files/153853528/bt3-final.iso.013
http://rapidshare.com/files/153853522/bt3-final.iso.014
http://rapidshare.com/files/153853537/bt3-final.iso.015
http://rapidshare.com/files/153853529/bt3-final.iso.016
http://rapidshare.com/files/153853563/bt3-final.iso.017

pass :

HJSPLIT

penulis sedang berbaik hati nih

29 Jan 2009

Wireless Hacking FBI Live DVD

Wireless Hacking FBI Live DVD

















Info


Live Cd For Wireless Hacking, Also Used By The Fbi

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).

- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI ...


WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsâ€"a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"


WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104.

The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process.

An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.

This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.


Download link :

http://rapidshare.com/files/173708326/FBI_FIELD_KIT.part01.rar
http://rapidshare.com/files/173711492/FBI_FIELD_KIT.part02.rar
http://rapidshare.com/files/173710864/FBI_FIELD_KIT.part03.rar
http://rapidshare.com/files/173712944/FBI_FIELD_KIT.part04.rar
http://rapidshare.com/files/173715592/FBI_FIELD_KIT.part05.rar
http://rapidshare.com/files/173710730/FBI_FIELD_KIT.part06.rar
http://rapidshare.com/files/173710757/FBI_FIELD_KIT.part07.rar
http://rapidshare.com/files/173715157/FBI_FIELD_KIT.part08.rar
http://rapidshare.com/files/173714402/FBI_FIELD_KIT.part09.rar
http://rapidshare.com/files/173715434/FBI_FIELD_KIT.part10.rar
http://rapidshare.com/files/173713720/FBI_FIELD_KIT.part11.rar
http://rapidshare.com/files/173712876/FBI_FIELD_KIT.part12.rar



DOWNLOAD CRACK :

http://delfiextra.com/download/crack.FBI.Wireless.Hacking.Live.DVDc3098.exe

**Interchangeable Links**
Rapidshare.com
Code:

BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP
BAGLANTI LINKLERINI VE RESIMLERI SADECE UYELER GOREBILIR
LINKLERI VE RESIMLERI GOREBILMEK ICIN UYE OL veya GIRIS YAP