Saturday 15 June 2013

tor+raspberrypi+onion pi (fbi also cant track you if you do something)


Photo: Thumb Your Nose at the NSA With Raspberry Pi
=============================
The NSA is watching you. But you can get around the agency’s prying eyes with Tor and a Raspberry Pi.

Adafruit has created a handy how-to to help you build a wireless access point that anonymizes your internet browsing. The Onion Pi Tor proxy directs your internet access through the Tor routing service. All your data packets go through three layers of relays before hitting their destination. This level of routing makes it difficult for anyone to determine who and where you are.

The main items you’ll need for the kit include: the Raspberry Pi model B, a Wi-Fi adapter, the Raspbian software distro, and a distaste for being monitored without a warrant. Once finished, you can plug the device into an Ethernet port and create a Wi-Fi hotspot that eludes the long ear of The Man.

Now you can anonymously browse all those brony sites without tipping off the feds, or the hotel you’re staying in.

read more @
http://www.wired.com/gadgetlab/2013/06/thumb-your-nose-at-the-nsa-with-raspberry-pi/
http://www.wired.com/threatlevel/2013/06/snowden-thumb-drive/

http://learn.adafruit.com/onion-pi/overview==Onion Pi


Thumb Your Nose at the NSA With Raspberry Pi
=============================
The NSA is watching you. But you can get around the agency’s prying eyes with Tor and a Raspberry Pi.

Adafruit has created a handy how-to to help you build a wireless access point that anonymizes your internet browsing. The Onion Pi Tor proxy directs your internet access through the Tor routing service. All your data packets go through three layers of relays before hitting their destination. This level of routing makes it difficult for anyone to determine who and where you are.

The main items you’ll need for the kit include: the Raspberry Pi model B, a Wi-Fi adapter, the Raspbian software distro, and a distaste for being monitored without a warrant. Once finished, you can plug the device into an Ethernet port and create a Wi-Fi hotspot that eludes the long ear of The Man.

Now you can anonymously browse all those brony sites without tipping off the feds, or the hotel you’re staying in.

read more @
http://www.wired.com/gadgetlab/2013/06/thumb-your-nose-at-the-nsa-with-raspberry-pi/
http://www.wired.com/threatlevel/2013/06/snowden-thumb-drive/

http://learn.adafruit.com/onion-pi/overview==Onion Pi

CYBERGATE V1.11.0

CYBERGATE V1.11.0

[Image: ijvpCE.PNG]

(It's still showing up trial message, but it's only showing - nothing else, no connection limit)

Changelog:

Platform: Microsoft ® Windows All
License: Private Release

[+] webloader (ability to create a web downloader with 3.5 Kb's);

[+] increased quality on saved files on audio capture;

[+] webcam capture was totally reprogrammed;

[+] password recovery was totally reprogrammed:

-Internet Explorer (auto-complete, auto-save);

-Firefox;

-Chrome;

-Opera;

-Windows Live Messenger;

-Yahoo! Messenger;

-Trillian;

-Internet Download Manager;

-NO-Ip;

-DynDNS;

-Filezilla;

-Paltalk;

-Pidgin.

[+]Run as admin files remotely;

[+]Multi-Thumbnails view on file manager (ability to create thumbs out of any file/all files of remote folder);

[+]Lock station (ability to lock CyberGate after a certain time of idling or by button press ot avoid outsiders from accessing your CyberGate if you leave your computer etc ...)

download

OS FINGERPRINTING

OS FINGERPRINTING




OS (Operating System) Fingerprinting is a process to find out victim's Operating System(Windows, Linux, UNIX)Certain parameters within the TCP protocol definition are left up to the implementation.  Different operating systems, and different versions of the same operating system, set different defaults for these values.  By collecting and examining these values, one may differentiate among various operating systems, and implementations of TCP/IP. The TCP/IP fields that may vary include the following:

Initial packet size (16 bits)
Initial TTL (8 bits)
Window size (16 bits)
Max segment size (16 bits)
Window scaling value (8 bits)
"don't fragment" flag (1 bit)
"sackOK" flag (1 bit)
"nop" flag (1 bit)
These values may be combined to form a 67-bit signature, or fingerprint, for the target machine.
Tools: nmap, NetScanTools Pro, P0f.

HOW TO DETECT HIDDEN BACKDOORS, TROJAN HORSES AND ROOTKIT TOOLS

HOW TO DETECT HIDDEN BACKDOORS, TROJAN HORSES AND ROOTKIT TOOLS







What is a BackDoor?
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files.
Backdoor will not duplicate or actively spread itself. It will only open a certain port through which a remote computer in the network can control the infected computer. Generally the backdoor will not influence normal communication of the network, so firewalls or IDS can hardly detect its existence.
Is my network infected with a backdoor?


ALIEN IP 2.3.0



Find people or computers or IP addresses atravez We
Alien IP is very useful and can even show the country and city people who visit your site, people who send e-mails, web servers and other IP owners around the world. It will detect the country, the city and region on the world map by IP or web address.

IP Locator
Size: 14.6 MB
Format: Zip
Language: English

BACKTRACK codename whydah live distribution

BACKTRACK codename whydah live distribution




 BACKTRACK codename whydah is a fast, lightweight and easy slax based linux live distribution focused on wireless security testing, automatic hardware detection, and support for many graphics cards, sound cards, wireless, SCSI and USB device.

BACKTRACK codename whydah provides users with easy access to a comprehensive and large collection of security-related tools. Support for live USB functionality allows users to boot directly from portable media without requiring installation, though permanent installation to hard disk is also an option. With whydah you can easily grasp the concepts and understand the techniques to perform wireless attacks in your own lab. Get started with wireless testing, security and hacking with basic wireless concepts.

download

wifi cracking word lists

WPA WPA2 WORD LIST



WPA WPA2 Word List

Compressed File Size: 4.4 GB Decompressed File Size: 13 GB

The list contains 982,963,904 words exactly no dupes and all optimized for wpa/wpa2.

This is my final series of WPA-PSK wordlist(S) as you can't get any better than this !!!

My word list is compiled from all known & some unknown internet sources such as :
1. openwall
2. coasts password collections
3. Xploitz Master Password Collection(s) vol 1 and vol 2 (official Backtrack 3/4/4R1 wordlist collections, Thanks Xploitz)
4. ftp sites such as; ftp://ftp.ox.ac.uk/pub/wordlists/ & others
5. all wordlists on and (as of 07/11/2010)
6. all wordlists hosted on;
7. all usernames from "100 million Facebook usernames and personal details" as leaked onto Torrent sites
8. all wordlists from the Argon (site now closed)

And as a bonus my personal wordlist of 1.9 GB !!!

Which also includes :

My "WPA-PSK WORDLIST 2 (107 MB).rar" & "WPA-PSK WORDLIST (40 MB).rar" Torrent
& random usernames grabbed from over 30,000+ websites such as youtube, myspace, bebo
& others sites which I can't mention :-)

download