tag:blogger.com,1999:blog-58929742820396853882024-03-12T19:28:37.046-07:00r00t@~TechnomaniaA blog where things are different
Research is my passion
ideas are its Fuel
i am not a pro, i am even not n00b you cannot rate me ;) i am just myselfUnknownnoreply@blogger.comBlogger141125tag:blogger.com,1999:blog-5892974282039685388.post-39642232509577063892014-08-23T06:16:00.001-07:002014-11-13T09:04:07.893-08:00SCAPS static code analyser for php hey guys , its been a really long time im in my 5 th semester and i have started an awesome project called SCAP it is really early stages of development but still i'd like some suggestions, there's only one project RIPS , like this is available and it is really good. they also have a research paper on it. but the main difference between my project is that i will create rule based system while their system is behavior based, rule based systems are fast but they might not be accurate but it will be fast<br />
check out the github repo here https://github.com/rjcrystal/scaps<br />
have fun <br />
Update<br />
scaps is now complete and operational you can check out at scaps.me/analyser.phpUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-4816150736436199002014-04-28T01:56:00.001-07:002014-04-28T01:56:07.194-07:00simple file analyzer in java hi guys its been a long time ...<br />
so i have made a simple java based file analyzer which reads file headers and determines file type, i have added some file formats you can download here https://mega.co.nz/#!w5ZEhITK<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-ZBkLUiBCDHM/U14Xgn74SZI/AAAAAAAACKw/lzM7W_Brksg/s1600/flyser2.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/-ZBkLUiBCDHM/U14Xgn74SZI/AAAAAAAACKw/lzM7W_Brksg/s1600/flyser2.png" height="290" width="400" /></a></div>
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-48233819480427472982013-04-06T08:25:00.000-07:002013-04-06T11:35:23.923-07:00Hcon STF v5 prime releasedhi folks its a long time after i had posted something but what to do life is life, well well so yesterday Hcon stf which is made by ashish mistry v5 prime was released and i must say its awesome. these are its features<br />
<div>
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>Hacker Friendly</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/3193645.png" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
Fully Customizable, Versatile in Usage can be used in many Web related hacking needs, Simple and easy to use interface, small in size and light on resources. contains hundreds of features for :<br />
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Web Penetration Testing</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Web Exploits Development</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Web Malware Analysis</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">OSINT & Cyber spying</li>
</ul>
</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>Exploitation ready</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/2061612.png" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
Very comprehensive and plenty of tools for exploitation and supports verbose debugging features for Web Exploit Development.</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>WebUI</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/1413794.png" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
HconSTF contains blend of online and offline tools for Pentesting called 'WebUI'.<br />
includes scanners, encoders, and much more</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>IDB</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/4719497.png" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
IDB is Integrated database with huge amount of Web payloads like :<br />
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Xss</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Sqli</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">LDAP</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Command execution</li>
</ul>
</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>Osint Ready</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/6895966.png?204" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
Helps in many Open source intelligence based tasks like<br />
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Passive Web & Network Reconnaissance</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Doxing </li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Cyber Spying</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Hash cracking</li>
</ul>
Huge amount of Plugins more than 165</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>Obfuscation Ready</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/4315265.png" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
Encoding / Decoding & hashing Features and tools, supports wide variety of formats, character set and algorithms for making payloads undetectable.</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>Decoy Ready</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/932069.png?245" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
Darknets and proxies integrated, Spoofing tools. supports integration with many decoy options, includes many tools for proxies and anonymizing networks<br />
readily configured for :<br />
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Tor</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">AdvOR</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">I2P</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Https, Socks 4 / 5</li>
</ul>
</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>Enhanced Reporting</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/4037884.png?217" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
Contains many integrated useful reporting features like :<br />
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Screenshots</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Note taking</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Session saving & exporting</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Custom Url Logging</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Automated Request logging</li>
</ul>
</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<h2 style="color: white; font-family: Iceberg !important; font-size: 24px; font-weight: 300; line-height: 1.2; margin: 0px; padding: 0.5em 0px 0.2em;">
<u>Hacker Helper</u></h2>
<span class="imgPusher" style="display: block; float: left; height: 0px; overflow: hidden;"></span><span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;"><a href="http://www.blogger.com/blogger.g?blogID=5892974282039685388" style="color: #c71818;"><img alt="Picture" class="wsite-image galleryImageBorder" src="http://www.hcon.in/uploads/1/8/1/9/1819392/8999075.png?211" style="border: 1px solid rgba(0, 0, 0, 0.129412); margin: 5px 10px 10px 0px; padding: 3px; position: relative;" /></a></span><br />
<div style="font-size: 13px; margin-bottom: 10px; margin-top: -10px; text-align: center;">
</div>
<span style="clear: left; float: left; margin-top: 0px; position: relative; z-index: 10;">
</span>
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
Includes Hackery-Hybrid, collection of huge amount of learning bookmarks for learning any techniques, tools.</div>
<hr style="clear: both; visibility: hidden; width: 819px;" />
<div class="paragraph" style="font-family: Glegoo !important; font-size: 14px; line-height: 1.5; margin: 0px; padding: 0.5em 0px;">
<span style="text-decoration: underline;">More Features</span> :<br />
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Easy to use & collaborative Operating System like interface</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Includes Custom scripts for doing many pentesting tasks</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Includes Cleaner for running HconSTF smoothly</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Light on Hardware Resources & Small in size</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Portable - no need to install, can work from any USB storage device</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Multi-Language support (Partial)</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Works side-by-side with your normal web browser without any conflict issues</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Works on both architectures x86 & x64 on windows XP, Vista, 7 and on Linux with Wine</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Netbook compatible - User interface is designed for using framework on small screen sizes</li>
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Free & Open source and always will be</li>
</ul>
<br />
<span style="text-decoration: underline;">Categories of tools</span> :<br />
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Recon / Mapping</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Editors / Debuggers</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Exploitation / Audit</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Anonymity</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Passwords</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Cryptography</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Database</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Scripting / Automation</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Network Utilities</li>
</ul>
<ul style="list-style-image: initial !important; list-style-position: outside !important; margin: 5px 0px !important; overflow: hidden; padding-bottom: 0px; padding-left: 2.3em !important; padding-right: 0px; padding-top: 0px;">
<li style="list-style: disc outside !important; margin: 3px 0px 0px !important; padding-bottom: 0px; padding-left: 5px !important; padding-right: 0px; padding-top: 0px;">Reporting</li>
</ul>
<div>
download from <a href="http://www.hcon.in/downloads.html" target="_blank">here</a></div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-25235101655125530482012-11-18T09:41:00.002-08:002012-11-18T09:41:14.150-08:00Android custom roms basicshey guys wassup whoa such a long time sorry i couldn't post anything awesome as i was busy with my life and some major up downs. ok so now i got a galaxy Y for testing purposes and i was just messing with the phone and the best way of messing is installing different roms and etc.<br />
So i start with the basics, the kernel is the basic part of every working computer or handheld device on earth. It is the bridge between hardware and software and its installed on rom that can be changed or erased but with some proper procedure. Android truely shares the same kernel as of what we have in linux for desktop but with some modifications So if you see this diagram you will know how critical a kernel is....<br />
<div>
<a href="http://1.bp.blogspot.com/-7et30iHjmmY/UKkQreENrBI/AAAAAAAAAL0/6MzVl2vBr5E/s1600/Android-architecture.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="457" src="http://1.bp.blogspot.com/-7et30iHjmmY/UKkQreENrBI/AAAAAAAAAL0/6MzVl2vBr5E/s640/Android-architecture.jpg" width="640" /></a><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Ok how does a kernel looks like a general question comes to our mind its in .img format and contains main kernel file and boot kernel image and other drivers. So there are lots of kernel available in market which have different types of specialities some are stable, some are exprimental etc. So now comes the system apps and lots and lots of configuration files like audio bluetooth,wifi, camera, etc do not mess with these files until u are sure what are you doing. Remember all mods or custom roms do not come with custom kernel, it depends on the developer that he wants to use stock (company default) rom or a custom rom for his own. Now there are 2 ways to flash your phone to use a custom rom either with PC that is odin mode or either with clockworkmod commonly called as cwm. the basic difference between odin flashes and cwm is that, that odin uses a pc for flashing while. cwm method uses a zip file and only phone in recovery mode<br />
the main differences are as follows.<br />
<br />
Odin flashes are safer compared to CWM flashes in so much as they are a raw device dump with no intervention in between. Its just a basic read/write operation. CWM operations must call the current kernel in order to perform the tasks (which is why the brick bug emerges not by flashing an affected kernel, but using CWM with it afterwards). So although a CWM flash is still fundamentally an I/O process, the currently installed kernel plays its part in order to do so.<br />
<br />
Only real danger with Odin flashes is power supply, so if you have a power cut in the middle of a flash, there is a good chance you might not ever get your device back up and running, especially if it was during a flash of the boot loader).<br />
the firmwares is in .zip for CWM only. and for Odin/Mobile Odin files are in<br />
.tar or .md5 (or .smd) format (other formats for other types of flash eg. .bin, .pit, .xml).<br />
xda-developers is the best forum ever for android hacks,mods custom roms, etc<br />
<br />
So this is pretty much for now<br />
for more information you can read this <a href="http://androidforums.com/sony-ericsson-xperia-mini/581709-what-bootloader-custom-rom-kernel-cwm-firmware-flashing-adb-root.html" target="_blank">article on android forums</a><br />
<div>
<br /></div>
<br />
</div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-5892974282039685388.post-76834650295542878902012-08-10T10:09:00.000-07:002012-08-10T10:10:03.760-07:00Difference between integer based and string based SQL injectionHi friends this one i had posted a question on hackforums about difference between string based and integer based SQL injection it can be explained as follows<br />
<span style="font-weight: bold;">integer</span><br />
<div class="codeblock phpcodeblock">
<div dir="ltr">
<code><span style="color: #3d85c6;">SELECT * FROM pages WHERE page_id=10 [inject] order by title limit 1,</span><span style="color: #66ccff;"><span style="color: #3d85c6;">1 </span></span></code></div>
</div>
so the injection would be<br />
?id=10 union select 1,2,3--<br />
finallly you get<br />
<span style="color: #6fa8dc;">SELECT * FROM pages WHERE page_id=10 union select 1,2,3-- <span style="font-style: italic;">order by title limit 1,1</span></span><br />
<br />
<span style="font-weight: bold;">string</span><br />
<br />
<div class="codeblock phpcodeblock">
<div class="body">
<div dir="ltr">
<code><span style="color: #66ccff;">SELECT </span><span style="color: #7ac07c;">* </span><span style="color: #66ccff;">FROM pages WHERE page_id</span><span style="color: #7ac07c;">=</span><span style="color: #ff99ff;">"10" </span><span style="color: #7ac07c;">[</span><span style="color: #66ccff;">inject</span><span style="color: #7ac07c;">] </span><span style="color: #66ccff;">order by title limit 1</span><span style="color: #7ac07c;">,</span><span style="color: #66ccff;">1 </span></code></div>
</div>
</div>
so the injection would be<br />
?id=10' union select 1,2,3--+<br />
final:<br />
select * from pages where page_id="10"<span style="color: red;">'</span> union select 1,2,3--<span style="color: red;">+</span> <span style="font-style: italic;">order by title limit 1,1</span><br />
<br />
<br />
so in integer based SQL injection you dont have to put a<span style="color: red;"> '</span> and in string based SQL injection you have to put a <span style="color: red;">'</span> and a + sign at the end <br />
the original post<a href="http://www.hackforums.net/showthread.php?tid=2208793" rel="nofollow" target="_blank"> here</a><br />
enjoy Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-78336138776889193172012-08-06T08:06:00.000-07:002012-08-06T08:06:08.925-07:00Will ultrabooks eliminate DVDs and Blue ray dicsHi guys wassup how are you doing? yesterday my brother bought a lenovo ultrabook it was almost copy of a macbook with the hardware but the its slim, keyboard is easy to type and fast. but the fact that it had SSD and no DVD drive only some USB ports, HDMI ports and ethernet port etc and some touch pad changes. so the question is due to new emerging race of ultrabooks will CDs and DVDs will become outdated. maybe not coz still most of the games, blue-ray movies,etc come in DVDs. they are cheap but still they can't just get outdated and what i expect to be that new ultrabooks will have a dvd drive or they wont get apropriate market in india. i am still happy with my old laptop. and i am going to college this month for studies of computer engineering the thing i had loved to do the most.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-16437485563208806092012-08-04T12:02:00.001-07:002012-08-04T12:02:10.201-07:00Call For Papers for the first edition of Hzine(Hacking Magazine)<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-lIZLlHaXIUs/UB1xUgaL4DI/AAAAAAAAALY/lYVlQRo6WeY/s1600/hcon_pic.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="193" src="http://1.bp.blogspot.com/-lIZLlHaXIUs/UB1xUgaL4DI/AAAAAAAAALY/lYVlQRo6WeY/s320/hcon_pic.PNG" width="320" /></a></div>
Hcon has decided to release hacking magazine for you guys. it will be an
online magazine free for all but for now it needs contributions.
Contributions in the sense, Articles. For releasing anything you need
good fleshy information which is not possible for one man. So here by i
ask you all to contribute to this great effort made by Ashish Mistry and
also if you cannot for any reasons atleast share it on your blog like me
or on your facebook homepage.
<br />
Hcon,
Information security Training and Tools provider, launched their own
PenTesting Magazine ‘Hzine’. We are inviting unique and interesting
articles for our First Edition of Hzine.<br />
<br />
Theme for the articles : Operating Systems (OS)<br />
Articles can be on Topics :<br />
1. Penetration testing / Hacking<br />
2. Forensics<br />
3. Malware<br />
4. Exploit Development<br />
5. Embedded, Mobile OS<br />
6. OS Configs and Defenses<br />
7. Offensive or Defensive Programming<br />
8. About OS Tools, any specific OS articles<br />
9. Troubleshooting any security issue<br />
10. Any other OS related quality articles are also welcome<br />
Things to consider for article submission :<br />
1. It will be a free Magazine<br />
2. It has to be your own work, research<br />
3. It has to be in ENGLISH only<br />
4. As we are not gaining any money from it, so don’t expect from us to give you<br />
5. Send articles in document format only (doc, docx, odt)<br />
6. articles has to be with if any needed reference<br />
More info: <a href="http://www.hcon.in/hzine.html">http://www.hcon.in/hzine.html</a><br />
Contact: <a href="https://www.facebook.com/Root.Hcon">https://www.facebook.com/Root.Hcon</a><br />
<a href="http://www.ashtricks.com/call-for-papers-for-the-first-edition-of-hzinehacking-magazine/www.hcon.in/contact-us.html" target="_blank">www.hcon.in/contact-us.html</a><br />
if you feel you have it in you !!Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-5892974282039685388.post-76219411041911491242012-07-30T02:42:00.000-07:002012-07-30T02:43:51.997-07:00computer knowledge megacollectionhi guys i have got an awesome collection of computer books on internet its like 19 GB of books of all types have a look here <a href="http://kat.ph/computer-knowledge-megacollection-v1-0-t6503475.html"><img src="//kat.ph/torrentwidget/99BDA0C6B46EAC962686D5B37DEBD67FAE20DFD3.png" /></a> <br />
<img alt="https://fbcdn-sphotos-a.akamaihd.net/hphotos-ak-snc7/s720x720/376937_444943348871919_124568779_n.jpg" src="https://fbcdn-sphotos-a.akamaihd.net/hphotos-ak-snc7/s720x720/376937_444943348871919_124568779_n.jpg" /><br />
have fun dont forget to add trackers<code> </code><br />
<br />
<blockquote class="tr_bq">
<pre><code>udp://tracker.publicbt.com:80/announce
udp://tracker.openbittorrent.com:80/announce
http://fr33dom.h33t.com:3310/announce
http://cpleft.com:2710/announce
http://tracker.ex.ua/announce
http://exodus.desync.com:6969/announce
http://tracker.torrentbay.to:6969/announce
udp://tracker.1337x.org:80/announce
udp://fr33domtracker.h33t.com:3310/announce
udp://tracker.ccc.de:80
udp://11.rarbg.com/announce
udp://9.rarbg.com:2710/announce
udp://10.rarbg.com/announce</code></pre>
</blockquote>
<br />
<br />
<br />
<br />
<br />
<code></code><br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-57443556980250392632012-07-12T09:28:00.001-07:002012-07-12T09:28:35.777-07:00python based Shell analyserhi guys wassup how you doing? this time i have got an awesome idea and i have started working on it. we already have a python based script called neopi.py to scan and analyse encoded and obfuscated. i am writing my own php and python code in such a way that when a file is uploaded it is checked for both unencoded signatures and encoded things. the first thing i have to find is a common signature for all shells and then combine code of mine and neopi and a php upload page that will initialize a scan after files uploaded and change its perms to obviously to not let execute. and i think the php one is the most hard part for me as i am totally not familiar with php but i have some good friends to help me out, and guess what last month this blog has completed its 2 years thanks for all yours support and your subscriptions Rjcrystal if u have any suggestions then comment hereUnknownnoreply@blogger.com1tag:blogger.com,1999:blog-5892974282039685388.post-60076573582868581012012-07-06T04:06:00.001-07:002012-07-06T04:06:28.857-07:00Update your facebook status via your own name<br />
<div style="border: 0px; color: #373737; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 1.625em; outline: 0px; padding: 0px; vertical-align: baseline;">
hi guys wassup sorry for not bringing any post <span style="background-color: white;">So you might have seen that there are many apps that post on your wall and it has a small link at the bottom right corner telling VIA (app name). so how did they do that its very easy you need API(application programming interface) key of any app to do that.</span></div>
<div style="border: 0px; color: #373737; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 1.625em; outline: 0px; padding: 0px; vertical-align: baseline;">
we will make a app of our name so that we can use our apps` api and update facebook status via it</div>
<div style="border: 0px; color: #373737; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 1.625em; outline: 0px; padding: 0px; vertical-align: baseline;">
STEPS</div>
<ol style="border: 0px; color: #373737; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 15px; line-height: 24px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1.625em 2.5em; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">goto <a href="https://developers.facebook.com/" style="border: 0px; color: #1982d1; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" title="facebook developers">facebook developers</a> then create an app by selecting app tab on the upper side</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">then there will be a small box asking for app names in app display name you can fill out any name which is 3 words long and then click i agree facebook platform policies (even if you dont lol )</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">then fill the security check(captcha) and then you will be taken to app settings then save changes and then you will see a many numbers in that our useful one is App ID/API Key save it</li>
<li style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">then goto https://www.facebook.com/connect/prompt_feed.php?preview=true&api_key=xxxxxxxx (here xxx is your api key) copy your apps api key in place of xxxxxx and then hit the big enter button and you will see that ther will be a update status button just write what ever you want and bravo you have updated your status VIA your own name</li>
</ol>
<div style="border: 0px; color: #373737; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 1.625em; outline: 0px; padding: 0px; vertical-align: baseline;">
here is big list of some good APPS API KEY with which you can update your status same as mentioned before</div>
<div style="border: 0px; color: #373737; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 1.625em; outline: 0px; padding: 0px; vertical-align: baseline;">
*. Skynet (249284985083592)<br />*. iPhone (6628568379)<br />*. Blackberry (2254487659)<br />*. Palm (7081486362)<br />*. Sidekick (21810043296)<br />*. Sony Ericsson (38125372145)<br />*. Xbox LIVE (5747726667)<br />*. iPad (112930718741625)<br />*. Foursquare (86734274142)<br />*. Telegram (140881489259157)<br />*. Carrier Pigeon (130263630347328)<br />*. Morse Code (134929696530963)<br />*. Message in a Bottle (123903037653697)<br />*. Commodore 64 (138114659547999)<br />*. Your moms computer (132386310127809)<br />*. TRS-80 (134998549862981)<br />*. K.I.T.T. (129904140378622)<br />*. Mind Computer Interface (121111184600360)<br />*. eyePhone (110455835670222)<br />*. toaster (203192803063920)<br />*. microwave (0a5266c8844a1b09211e7eb38242ac2f)<br />*. Super Nintendo Entertainment System (235703126457431)<br />*. Gameboy Color (180700501993189)<br />*. GoD (256591344357588)<br />*. Glade Air Freshner (4aeb4db2e8df1cdb7f952b2269afb560)<br />*. Strawberry (a4c9fb1708a848c2241674531176209b)<br />*. The moon (221826277855257)<br />*. Dr. Pepper (eea90d40e1d12565695dbbbdbd5e965b)<br />*. Nintendo wii (243870508973644)<br />*. Alcohol (250335888312118)<br />*. Cheese (218791271497130)<br />*. iPod Nano (142039005875499)<br />*. Nintendo 64 (236264753062118)<br />*. Microsoft Excel (242740155751069)<br />*. Linux Ubuntu (220593361311050)<br />*. iPhone 5g (211333348912523)<br />*. My Bedroom (174811032586879)<br />*. Your Mums Bedroom (5f64bbc9ac2f12b983200925da461322)<br />*. Lamp (230755826955133)<br />*. Refrigerator (250828364944350)<br />*. A potato (127926427295267)<br />*. Nasa Satellite (31d608d30292175bf7703149699ccb39)<br />*. Pogo Stick (185103391549701)<br />*. Banana Phone (1477a4cd29ec724a3de19be5d26e0389)<br />*. Google+ (4d8243dbb7064f88351fe6c809582320)<br />*. The Future (108372819220732)<br />*. Smoke Signal (134138923334682)<br />*. tin cans connected by string (242191299125647)<br />*. Pokedex (de3da265cf6976745bb1d60a8c198151)<br />*. Telepathy (ea01a57edb26cf1de143f09d45cfa913)<br />*. Typewriter (d3d554bf60297cb2c384e3d7cf5a066d)<br />*. Harry Potter (b8ebeb983f45eaa0bd5f4f66cad97654)<br />*. TARDIS (200439256674396)<br />*. Pip Boy (142806259133078)<br />*. Mind Control (1dc633368924b3b0b4d08e3f83230760)<br />*. Jedi Mind Control (240597869302110)<br />*. Telekinesis (224139600960217)<br />*. Post-It Note (115227201900831)<br />*. GLaDOS (246126362083515)<br />*. Ansible (185474028180003)<br />*. W.O.P.R (228373497202865)<br />*. Airwolf (123944137696757)<br />*. HMCS Belafonte (222345601140304)<br />*. HAPPY BIRTHDAY (60280877509)</div>Unknownnoreply@blogger.com5tag:blogger.com,1999:blog-5892974282039685388.post-48503153172593147332012-07-03T01:40:00.000-07:002012-07-03T01:40:03.924-07:00Cracked first apphello guys wassup ?? sorry i could not post anything from many days but still people visit my blog and share it thanks to you all guys. and my e-book has been downloaded 150 times thanks for all people's support. So my life is having many ups and downs right now. today i tried to crack an app called rontgen it is used in making patient reports it is made in visual foxpro its was pretty EASY to crack it, then i made a simple installer to install it and boom it works awesome. now i will post more on SCADA and ASM software crackingUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-23133969041592080612012-06-08T04:46:00.000-07:002012-06-08T04:46:06.035-07:00Censorship in India, beginning of sunset of internet .... or a political game?Before some months Govt. of india passed rules to censor websites like pastebin, thepiratebay, vimeo etc first of all reliance started blocking websites and some were even not told by govt to block. then Anonymous india hacked gateway of reliance and we all are aware of that stuff. but just think once what is need of censorship? why govt is having problems with sites like pastebin etc . Because lots of websites databases getting hacked everyday ?? and pastebin was used to post hacked data ?? the main reason what i think is Piracy because torrents are the biggest source of pirated contents. even songspk.pk was blocked long ago. though some ISP are not in QUE for blocking. On one side govt passes bill for broadband in every home for development. of the country and increasing phones etc. so now still the question is WHY on one side govt is doing more for internet development etc and on other side websites are being censored. till now i have not experienced censorship :) its not that hard to bypass because the DNS query. is this really necessary or just other countries are agreeing with ACTA and other acts , The major reason seems to me is that they want to suppress peoples voice... this is just the beginning of the thing and if we accept it then in future more sites will be blocked and so on..... what is use of freedom if its only on paper and not in reality, its time to react and do something legal dont wait till every ISP accepts the policy of govt. dont bypass we can bypass these idiotic censorship but that should be the last option. if we try to bypass censored websites then govt will think that we are not reacting and we are silent, so maybe if govt will make the mechanism more powerful than before and we may not be able to bypass new systems..... DId the inventors of ARPnet would had the idea that the thing they made for human development and comfort will endup like this ??? we cannot afford this censorshipUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-34107320534013974872012-06-04T23:10:00.001-07:002012-06-05T00:08:41.492-07:00Researching and pentesting DTH services for fun and profit <img height="200" id="il_fi" src="http://www.google.co.in/url?source=imglanding&ct=img&q=http://dalbeer.mobie.in/images/DTH_logo_03_1.jpg&sa=X&ei=DqrNT8X7MNHHrQedieD4Cg&ved=0CAkQ8wc&usg=AFQjCNE4A1q-JwrwLGyr_YpKWXBHLQBGnQ" style="padding-bottom: 8px; padding-right: 8px; padding-top: 8px;" width="190" /><br />
Hi guys sorry for not posting from long time but i have lots of work currently i am making videos on HCON STF for more easy pentesting and research . will post soon......<br />
today i was thinking to hack or pentest the DTH devices that are bit modern that regular cable connections and they also have so called firmware for good organization of content.<br />
the transmission in tata sky is mpeg-2 type while others use mpeg-4. the transmission is encrypted (of course :P) and that is decrypted by the card so called as smart card. the card stores the customers information its like its identitiy card of the box :D and that can be read using external devices and can also be connected to a computer the thing is most of the cards are not generic so sometimes you have to make one yourself. and they also have a cam module (conditional access module) that is used when you have to use some others service without changing the settop box and other things. but thing is tata sky is having such module slot but the transmission they use is incompatible with other DTH companies now thats bit confusing :/ i have opened tata sky settop box and hopeful i was able to get a simple circuit map of the STB from the mpeg-2 decoder processor website :D so now i have got some good results if you have any ideas or questions ask me here is the circuit diagram of it.<br />
it has 128 Mb SDRAM , a EPROM etc etc <br />
the main things that can be done according to me<br />
1=> smart card editing or reading (most probable thing that can be done)<br />
2=>Custom firmware patching (somewhat possible)<br />
3=>memory patching (bit hard)<br />
4=>using CAM module to connect box to a computer<br />
i also found some useful information here about hacking smart cards =>http://www.123helpme.com/view.asp?id=68386 <br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="401" src="http://1.bp.blogspot.com/-OyY2-lx9_HY/T82n1lbQ9ZI/AAAAAAAAAK4/kAmiSI_3pjY/s640/Trident-CX24155-Diagram-SM.gif" width="640" /></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-Sw21cmEuDfg/T82n2jkmVtI/AAAAAAAAALA/zVuLEYGXWEk/s1600/Trident-CX24155-Diagram2-SM.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="308" src="http://3.bp.blogspot.com/-Sw21cmEuDfg/T82n2jkmVtI/AAAAAAAAALA/zVuLEYGXWEk/s640/Trident-CX24155-Diagram2-SM.gif" width="640" /></a></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-75579905211924820792012-05-19T08:48:00.001-07:002012-05-19T08:48:16.361-07:00Learning Assembly language from basicshi guys sorry for posting late as i dont have much time from school and other things after learning some basic python i am going with assembly language yeah its hard as some of hardware things are important for it. its 1 level up from binary and the programs work hell fast in assembly. Directly jumping to assembly is risky first you need to study architecture of your computer and its working there are some selected book which cover from basics to advanced i am posting some of them if you are totally new to ASM consider reading "programming from ground up" the things are quite good in it and easy to understand<br />
another great book is the art of assembly. basically ASM and its code is based on type of processor there are major 2 types of processor<br />
<ol>
<li>CISC (pentium, asus, etc)</li>
<li>RISC (SCADA devices use this processors to make work faster and easier)</li>
</ol>
so have fun with assembly it will also create your programming concepts more clear and better. i have put 4 best books to read to learn ASM<br />
<ol>
<li>Art of assembly </li>
<li>programming from ground up</li>
<li>Guide to Assembly Language - A Concise Introduction </li>
<li><a href="http://www.mediafire.com/download.php?8gsx6h9scasn82a" target="_blank">Introduction to 80x86 Assembly Language and Computer Architecture</a></li>
<li>Introduction to assembly language</li>
</ol>
download other books =><a href="http://www.mediafire.com/download.php?95t7u24jm692wme" target="_blank">here</a>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5892974282039685388.post-67185309464566131962012-05-08T01:56:00.002-07:002012-05-08T01:56:33.040-07:00Reading and Editing metadata using exiftoolhi guys this is helpful to many to trace people and reading data and adding information sometimes wrong information for misdirection.<br />
<b>ExifTool is a platform-independent Perl
library plus a command-line application for
reading, writing and editing meta information in a
wide variety of files.</b><br />
<br />
<h2>
<a href="" name="features">Features</a> </h2>
<ul>
<li>Powerful, fast, flexible and customizable</li>
<li>Supports a large number of different file formats</li>
<li>Reads EXIF,
GPS,
IPTC,
XMP,
JFIF, MakerNotes,
GeoTIFF,
ICC Profile,
Photoshop IRB,
FlashPix,
AFCP,
ID3 and more...</li>
<li>Writes EXIF,
GPS,
IPTC,
XMP,
JFIF, MakerNotes,
ICC Profile,
Photoshop IRB,
AFCP and more...</li>
<li>Reads and writes maker notes of many digital cameras</li>
<li>Decodes a riddle wrapped in a mystery inside an enigma</li>
<li>Numerous output formatting options (including tab-delimited, HTML, XML and JSON)</li>
<li>Multi-lingual output (cs, de, en, en-ca, en-gb, es, fi, fr, it, ja, ko, nl, pl, ru, sv, tr, zh-cn or zh-tw)</li>
<li>Geotags images from GPS track log files (with time drift correction!)</li>
<li>Generates track logs from geotagged images</li>
<li>Shifts date/time values to fix timestamps in images</li>
<li>Renames files and organizes in directories (by date
or by any other meta information)</li>
<li>Extracts thumbnail images, preview images, and large JPEG images from RAW files</li>
<li>Copies meta information between files (even different-format files)</li>
<li>Reads/writes structured XMP information</li>
<li>Deletes meta information individually, in groups, or altogether</li>
<li>Sets the file modification date from EXIF information</li>
<li>Supports alternate language tags in XMP,
PNG, ID3,
Font, QuickTime,
ICC Profile, MIE and
MXF information</li>
<li>Processes entire directory trees</li>
<li>Creates text output file for each image file</li>
<li>Creates binary-format metadata-only (MIE) files for metadata backup</li>
<li>Automatically backs up original image when writing</li>
<li>Organizes output into groups</li>
<li>Conditionally processes files based on value of any meta information</li>
<li>Ability to add custom user-defined tags</li>
<li>Support for MWG (Metadata Working Group) recommendations</li>
<li>Recognizes thousands of different tags</li>
<li>Tested with images from thousands of different camera models</li>
<li>Advanced verbose and HTML-based
hex dump outputs</li>
</ul>
how to use on windows just for basics<br />
open command put exiftool and your image in same directory and type<br />
exiftool a.jpg -a<br />
and boom you have all the info theres much more than this but for now we will keep it to this much theres more info <a href="http://www.sno.phy.queensu.ca/%7Ephil/exiftool/" target="_blank">here</a> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-72317946623797682842012-05-08T01:34:00.000-07:002012-05-08T01:34:02.167-07:00WHMCS pentesting toolhi guys wassup today i found a good tool for pentesting WHMCS servers it has many types of payloads and exploits so have fun and happy hacking its made by team of <a href="http://www.theprojectxblog.net/" rel="nofollow" target="_blank">projectx blog </a><br />
<strong>Features:</strong><br />
<address>
*GUI</address>
<address>
*In .EXE Format</address>
<address>
* 10 payloads = 10 directories</address>
<address>
* Gets the db_username, db_password, db_license, db_host, db_name, cc_enryption_hash, and templates_compiledir</address>
<address>
* Allows the user to use their own directory by putting it after the target link</address>
<address>
* Added a song entitled Cowboys From Hell by Pantera (because we love Metal Rock! m/)</address>
<div style="text-align: justify;">
<strong>Download Link:</strong></div>
<blockquote>
<div style="text-align: justify;">
<a href="http://www.4shared.com/file/6ebvAUgy/ProjectX_WHMCS_Pentesting_Tool.html">http://www.4shared.com/file/6ebvAUgy/ProjectX_WHMCS_Pentesting_Tool.html</a></div>
<div style="text-align: justify;">
oR</div>
<div style="text-align: justify;">
<a href="http://www.mediafire.com/?3f00r95dodjijdh">http://www.mediafire.com/?3f00r95dodjijdh</a></div>
</blockquote>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-12393440594742262192012-04-26T13:11:00.001-07:002012-04-26T13:16:21.413-07:00My book on hacking A guide, A representation of todays condition of cyber lif3 of hackershi guys wassup i was a skid before but i left that path and went in the search of truth and knowledge. SQL injection is fun but then i realized that thats not true hacking and now i am changed....... Looking at the current condition of skids and new beginners i wrote a small book to start with. it does not contain any article,tutorial,or 0day exploits it contains real life and experiences that are experienced by young hackers it contains inspirational things that will help people a lot. hope you like it. my main motive was to direct young progressing hackers to a path that will lead to a good hacking carrier omg too much philosophy :P but its important too <a href="http://www.mediafire.com/download.php?511s96yc2cwyohc" target="_blank">download</a>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5892974282039685388.post-31765350484983285092012-04-23T11:32:00.002-07:002012-04-23T11:35:14.039-07:00How to become d0x pr00fhi friends after exams i am free now will write some posts. yesterday i saw 1 one of my friends exposing s3rverexe. and s3rverexe also tried to expose him but failed. so today i will give you some tips on not letting your identities exposed. so first never share any information on forums, dating sites. matrimonial websites, or not even Facebook as now Google indexes its posts and comments. and be aware of adding unknown friend in your real account and never put a connection between your real and fake account. mostly if you are in INDIA you don't need to worry much as there are not any public records. but for countries like USA there are sites which have many information about you by credit-card etc. <br />
Only hiding everything is not fun always. sometimes even misdirection also makes fun.<br />
real life example. i tired to get information about coded32 i googled his name i got his threads and in one thread i saw that he posted his university results then i thought that there was someone of similar profile on facebook. he had chosen a person similar to his behavior,living place(old ), and university. that was a type of misdirection<br />
so you can also try it on others and secure your identity online. this becomes important after passing of CISPA. <br />
stay saFE.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-89210813046013726772012-04-07T01:12:00.001-07:002012-04-23T11:36:59.052-07:00Introduction to SCADA hacking<div class="MsoNormal">
hi guys wassup today i will tell you about SCADA hacking
some other reosurces </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
so first what is SCADA ? its abbreviated as Supervisory
Control and Data Acquisition so basically there are lots of hardwares in it ans
used in power grids, Dams and many other industires. they use primitive
softwares that are easy to exploit. remember Stuxnet that exploited Iran`s
windows computer to exploit iran`s nuclear facility which was of Siemens. same
way there are lots of companies who make SCADA and for ease of use and to
control them from remote places they have internet connection<br />
so basically there are PLC (programmable logic contoller) which are exploited
mostly. the I/O cycles are controlled by RISC (Reduced instruction set computing)
processor<br />
<br />
PLCs use RISC processors to run continuous, cyclical programs and they take
time in their I/O cycle to talk to the SCADA unit and receive instructions from
the SCADA to modify its instruction sets or operating parameters. SCADA
typically operates by evaluating the input data and determine if it is within
an allowable set of parameters<br />
<br />
1st how to find vulnerable SCADA devices<br />
you must know what an HTTP header does and also that we can know that what
software or authentication a server is running. with the use of that we will
find vulnerable SCADA devices. A website called <a href="http://www.shodanhq.com/" target="_blank">Shodanhq </a>does and
makes our work easy<br />
from that a specific code(something like dorks) we can get lots of SCADA<br />
<br />
2nd exploits<br />
SCADA exploits are hard to get coz no one shares that sometimes you
need to make your own but you can get some from exploit Db or there is are
modules by metasploit to exploit some of them are<a href="http://www.metasploit.com/modules/exploit/windows/scada/realwin_on_fc_binfile_a" target="_blank"> here</a> or <a href="http://www.scadahacker.com/resources/msf-scada.html" target="_blank">here </a><br />
<br />
RESOURCES<br />
1. shodanhq.com<br />
2. scadahacker.com<br />
3.<a href="http://blog.xanda.org/2010/11/10/find-vulnerable-scada-systems-with-shodan/" target="_blank"> SCADA dorks list </a><br />
4.<a href="http://www.digitalbond.com/" target="_blank">SCADA security research
and tools </a><br />
<br />
warning SCADA hacking is a very very dangerous it can get people killed
and lot of property damage... and end up in your life in jail for longer time
and<br />
this article is for education purposes only</div>
<div class="MsoNormal">
<br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-46609090609801461352012-04-06T08:09:00.000-07:002012-04-06T08:09:20.953-07:00ROOTCON 6 Philippines premier hacking conferenceOne of my friends from cebu city (Philippines) is a blogger at theprojectxblog.net and blog.rootcon.org<br />
its a awesome conference for hackers and security professionals registration is not that expensive every body can visit these conference...<br />
the main language of communication will be english<br />
for more visit here =>>https://rootcon.orgUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-65350085366611615822012-04-02T09:31:00.000-07:002012-04-02T11:38:30.867-07:00Social engineering- The art of human hacking<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-o3JfCf9wupQ/T3npPLvQhbI/AAAAAAAAAKo/ylUglsaxp8U/s1600/social-engineering-specialist.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-o3JfCf9wupQ/T3npPLvQhbI/AAAAAAAAAKo/ylUglsaxp8U/s1600/social-engineering-specialist.jpg" /></a></div>
<br />
you might be confused that why this thing is here right ? social engineering is also a type of hacking with humans. so i thought lets do something new!!<br />
<br />
<br />
the official portal of social engineering defines it like this.....<br />
<br />
<blockquote class="tr_bq">
Social Engineering (SE) is both incredibly complex and amazingly simple.<br />
What really is social engineering? We define it as the act of
manipulating a person to accomplish goals that may or may not be in the
“target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action.</blockquote>
<br />
<blockquote class="tr_bq">
Due to the mystery surrounding this dark art many people are afraid
of it, or they feel they will never be able to accomplish a successful
social engineering test. However, every time you try to get someone to
do something that is in your interest, you are engaging in social
engineering. From children trying to get a toy from their parents to adults trying to land a job or score the big promotion, all of it is a form of social engineering.</blockquote>
so why i am posting this is because you can try something new and interesting thing and i am also personally interested in this method of hacking. So how you can start Social engineering<br />
it totally depends on your mind power and observation power . you need to think how humans behave in what type of situation for eg in a bomb blast every body wants safety people think that they are insecure ? so a good social engineer will try to feel people that they are secure like winning trust on people and they think that he cares about US or me, remember social engineering is not like cheating people or frauding them in traps etc.its just for educational knowledge<br />
think of a salesmen or a TV advertisements they are perfect examples of social engineering on people to sell their products,<br />
Wikipedia defines it like this<br />
<blockquote class="tr_bq">
" <i>it is the act of manipulating people into performing actions or
divulging confidential information. While similar to a confidence trick
or simple fraud, the term typically applies to trickery or deception for
the purpose of information gathering, fraud, or computer system access;
in most cases the attacker never comes face-to-face with the victim.</i>" Although it has been given a bad name by the plethora of <i>"free pizza"</i>, <i>"free coffee"</i>, and <i>"how to pick up chicks"</i> sites, aspects social engineering actually touches on many parts of daily life. Many consider social engineering to be the <a class="external text" href="http://www.social-engineer.org/wiki/archives/SEDefined/SEDefined-GreatestRisk.htm" rel="nofollow">greatest risk to security</a> "</blockquote>
So sometimes it become more easy with Facebook ..HOW??<br />
consider a scenario where a girl is chatting with a boy (a classic example where girl is thought to be SEr) <br />
so from starting if the girl didnt knew the boy in real life then the boy is surely going to do some flirt (for common people) and the girl gets most common and basic details by using some special word etc(you know that)<br />
so what are we talking here<br />
basically what i think SE is like telling some one that hey i am here for you..<br />
mostly strangers need more time than known ones to get SEd,<br />
mostly sometimes its like feeling of commonness for eg a person from india has went to london or america or some where else and some person from india meets him and asks are you indian he says yeah i am indian and nice to meet you and so on...<br />
another example<br />
like someone who meets a guitarist or a singer and says i am also a guitarist or something else so they feel more power-full as they have same type of hobbies<br />
other thing i learned from (<a href="http://hcon.in/" target="_blank">Ashish mistry</a> he is a grest SE and IT security specialist )that SEers that they learn your local language to become more closer to you.<br />
if you want to do more research on it then visit this sites will post more after some time.<br />
and like fingerprinting you should have good background information about victim. and yeah kevin mitnik was considerd one of the best social engineer of his time<br />
1st <a href="http://www.hopenumbersix.net/" target="_blank">hope number 6</a><br />
2nd <a href="http://www.social-engineer.org/" target="_blank">social-engineer</a><br />
3rd its about how humans behave and react <a href="http://www.2knowmyself.com/" target="_blank">2knowmyself</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-19225450058771034652012-03-31T12:37:00.000-07:002012-03-31T12:37:12.981-07:00convert python programs to standalone windows exe filehi guys wassup i found a interesting thing that i would like to share as a python programmer<br />
the program is py2exe as the name suggests it converts python files to an exe standalone file here is the method<br />
<span class="anchor" id="line-45"></span><span class="anchor" id="line-46"></span><div class="line867">
<span class="anchor" id="Step2"></span> <span class="anchor" id="line-47"></span><span class="anchor" id="line-48"></span></div>
<div class="line867">
</div>
<h2 id="A2.Createyoursetupscript.28setup.py.29">
Create your setup script (setup.py)</h2>
<span class="anchor" id="line-49"></span><div class="line862">
py2exe extends <a class="http" href="http://www.python.org/doc/current/dist/">Distutils</a>
with a new "command". If you've installed third party Python modules
then there's a good chance you've seen at least one distutils command:</div>
<div class="line862">
<br /></div>
<div class="line862">
<span class="anchor" id="line-50"></span><span class="anchor" id="line-51"></span></div>
<div class="line867">
<span class="anchor" id="line-52"></span><span class="anchor" id="line-53"></span></div>
<pre>C:\Tutorial>python setup.py install</pre>
<span class="anchor" id="line-54"></span><div class="line874">
"install"
is a Distutils command that installs something (typically a Python
module or package). The details Distutils needs to do that installation
are contained in setup.py (and sometimes other associated files). <span class="anchor" id="line-55"></span><span class="anchor" id="line-56"></span></div>
<div class="line874">
"py2exe"
is a new Distutils command that is added when you import py2exe. To use
py2exe you need to create a setup.py file to tell Distutils and py2exe
what you want to do. Here's a setup.py whose simplicity is appropriate
for our sample program...</div>
<div class="line874">
<br /></div>
<div class="line874">
<span class="anchor" id="line-57"></span><span class="anchor" id="line-58"></span></div>
<div class="line867">
<span class="anchor" id="line-59"></span><span class="anchor" id="line-60"></span><span class="anchor" id="line-61"></span><span class="anchor" id="line-62"></span><span class="anchor" id="line-63"></span><span class="anchor" id="line-64"></span><span class="anchor" id="line-65"></span></div>
<div class="codearea" dir="ltr" lang="en">
<blockquote class="tr_bq">
<pre dir="ltr" id="CA-ce3f97ce2124a17b5c27cf5161bdc7866075a693" lang="en"><span class="line"><span class="LineNumber"> </span><span class="ResWord">from</span> <span class="ID">distutils</span><span class="Operator">.</span><span class="ID">core</span> <span class="ResWord">import</span> <span class="ID">setup</span></span>
<span class="line"><span class="LineNumber"> </span><span class="ResWord">import</span> <span class="ID">py2exe</span></span>
<span class="line"><span class="LineNumber"> </span></span>
<span class="line"><span class="LineNumber"> </span><span class="ID">setup</span><span class="Operator">(</span><span class="ID">console</span><span class="Operator">=</span><span class="Operator">[</span><span class="String">'hello.py'</span><span class="Operator">]</span><span class="Operator">)</span><span class="Text"></span></span></pre>
</blockquote>
save it as setup.py and hello.py is your python filename </div>
<span class="anchor" id="line-66"></span><div class="line867">
<br /></div>
<div class="line874">
Notice that this is ordinary Python. Let's go through it line by line... <span class="anchor" id="line-69"></span><span class="anchor" id="line-70"></span></div>
<ol type="1">
<li>When
working with py2exe the only part of Distutils we'll typically need to
reference directly is the setup function, so that's all we'll import. <span class="anchor" id="line-71"></span></li>
<li>Once Distutils is loaded, we need to load py2exe so that it can add its command. <span class="anchor" id="line-72"></span></li>
<li>Whitespace is good! <span class="anchor" id="line-73"></span></li>
<li>Call setup and tell it that we want a single console application and the main entry point is "hello.py". <span class="anchor" id="line-74"></span><span class="anchor" id="line-75"></span></li>
</ol>
<div class="line867">
<span class="anchor" id="Step3"></span> <span class="anchor" id="line-76"></span><span class="anchor" id="line-77"></span></div>
<div class="line867">
</div>
<h2 id="A3.Runyoursetupscript">
Run your setup script</h2>
<span class="anchor" id="line-78"></span><div class="line874">
The next step is to run your setup script. Make sure to give the py2exe command and expect to see lots and lots of output: <span class="anchor" id="line-79"></span><span class="anchor" id="line-80"></span></div>
<div class="line867">
<span class="anchor" id="line-81"></span><span class="anchor" id="line-82"></span><span class="anchor" id="line-83"></span><span class="anchor" id="line-84"></span><span class="anchor" id="line-85"></span><span class="anchor" id="line-86"></span><span class="anchor" id="line-87"></span><span class="anchor" id="line-88"></span><span class="anchor" id="line-89"></span><span class="anchor" id="line-90"></span><span class="anchor" id="line-91"></span><span class="anchor" id="line-92"></span><span class="anchor" id="line-93"></span><span class="anchor" id="line-94"></span><span class="anchor" id="line-95"></span><span class="anchor" id="line-96"></span><span class="anchor" id="line-97"></span><span class="anchor" id="line-98"></span><span class="anchor" id="line-99"></span><span class="anchor" id="line-100"></span><span class="anchor" id="line-101"></span><span class="anchor" id="line-102"></span><span class="anchor" id="line-103"></span><span class="anchor" id="line-104"></span><span class="anchor" id="line-105"></span><span class="anchor" id="line-106"></span><span class="anchor" id="line-107"></span><span class="anchor" id="line-108"></span><span class="anchor" id="line-109"></span><span class="anchor" id="line-110"></span><span class="anchor" id="line-111"></span><span class="anchor" id="line-112"></span><span class="anchor" id="line-113"></span><span class="anchor" id="line-114"></span><span class="anchor" id="line-115"></span><span class="anchor" id="line-116"></span></div>
<pre>C:\Python27> python setup.py py2exe
running py2exe
creating C:\Python27\build
creating C:\Python27\build\bdist.win32
creating C:\Python27\build\bdist.win32\winexe
creating C:\Python27\build\bdist.win32\winexe\collect-2.7
creating C:\Python27\build\bdist.win32\winexe\bundle-2.7
creating C:\Python27\build\bdist.win32\winexe\temp
creating C:\Python27\dist
*** searching for required modules ***
*** parsing results ***
creating python loader for extension 'unicodedata' (C:\Python27\DLLs\unic
creating python loader for extension 'select' (C:\Python27\DLLs\select.py
creating python loader for extension '_socket' (C:\Python27\DLLs\_socket.
creating python loader for extension '_hashlib' (C:\Python27\DLLs\_hashli
creating python loader for extension '_ssl' (C:\Python27\DLLs\_ssl.pyd ->
creating python loader for extension 'bz2' (C:\Python27\DLLs\bz2.pyd -> b
*** finding dlls needed ***
*** create binaries ***
*** byte compile python files ***
byte-compiling C:\Python27\build\bdist.win32\winexe\temp\_hashlib.py to _
byte-compiling C:\Python27\build\bdist.win32\winexe\temp\_socket.py to _s
byte-compiling C:\Python27\build\bdist.win32\winexe\temp\_ssl.py to _ssl.
byte-compiling C:\Python27\build\bdist.win32\winexe\temp\bz2.py to bz2.py
byte-compiling C:\Python27\build\bdist.win32\winexe\temp\select.py to sel
byte-compiling C:\Python27\build\bdist.win32\winexe\temp\unicodedata.py t
byte-compiling C:\Python27\lib\StringIO.py to StringIO.pyc
byte-compiling C:\Python27\lib\UserDict.py to UserDict.pyc
byte-compiling C:\Python27\lib\__future__.py to __future__.pyc
byte-compiling C:\Python27\lib\_abcoll.py to _abcoll.pyc
byte-compiling C:\Python27\lib\_strptime.py to _strptime.pyc
byte-compiling C:\Python27\lib\_threading_local.py to _threading_local.py
byte-compiling C:\Python27\lib\_weakrefset.py to _weakrefset.pyc
byte-compiling C:\Python27\lib\abc.py to abc.pyc
byte-compiling C:\Python27\lib\atexit.py to atexit.pyc
byte-compiling C:\Python27\lib\base64.py to base64.pyc
byte-compiling C:\Python27\lib\bdb.py to bdb.pyc
byte-compiling C:\Python27\lib\bisect.py to bisect.pyc
byte-compiling C:\Python27\lib\calendar.py to calendar.pyc
byte-compiling C:\Python27\lib\cmd.py to cmd.pyc
byte-compiling C:\Python27\lib\codecs.py to codecs.pyc
byte-compiling C:\Python27\lib\collections.py to collections.pyc
byte-compiling C:\Python27\lib\copy.py to copy.pyc
byte-compiling C:\Python27\lib\copy_reg.py to copy_reg.pyc
byte-compiling C:\Python27\lib\difflib.py to difflib.pyc
byte-compiling C:\Python27\lib\dis.py to dis.pyc
byte-compiling C:\Python27\lib\doctest.py to doctest.pyc
byte-compiling C:\Python27\lib\dummy_thread.py to dummy_thread.pyc
byte-compiling C:\Python27\lib\email\__init__.py to email\__init__.pyc
creating C:\Python27\build\bdist.win32\winexe\collect-2.7\email
byte-compiling C:\Python27\lib\email\_parseaddr.py to email\_parseaddr.py
byte-compiling C:\Python27\lib\email\base64mime.py to email\base64mime.py
byte-compiling C:\Python27\lib\email\charset.py to email\charset.pyc
byte-compiling C:\Python27\lib\email\encoders.py to email\encoders.pyc
byte-compiling C:\Python27\lib\email\errors.py to email\errors.pyc
byte-compiling C:\Python27\lib\email\feedparser.py to email\feedparser.py
byte-compiling C:\Python27\lib\email\generator.py to email\generator.pyc
byte-compiling C:\Python27\lib\email\header.py to email\header.pyc
byte-compiling C:\Python27\lib\email\iterators.py to email\iterators.pyc
byte-compiling C:\Python27\lib\email\message.py to email\message.pyc
byte-compiling C:\Python27\lib\email\mime\__init__.py to email\mime\__ini
creating C:\Python27\build\bdist.win32\winexe\collect-2.7\email\mime
byte-compiling C:\Python27\lib\email\parser.py to email\parser.pyc
byte-compiling C:\Python27\lib\email\quoprimime.py to email\quoprimime.py
byte-compiling C:\Python27\lib\email\utils.py to email\utils.pyc
byte-compiling C:\Python27\lib\encodings\__init__.py to encodings\__init_
creating C:\Python27\build\bdist.win32\winexe\collect-2.7\encodings
byte-compiling C:\Python27\lib\encodings\aliases.py to encodings\aliases.
byte-compiling C:\Python27\lib\encodings\ascii.py to encodings\ascii.pyc
byte-compiling C:\Python27\lib\encodings\base64_codec.py to encodings\bas
byte-compiling C:\Python27\lib\encodings\big5.py to encodings\big5.pyc
byte-compiling C:\Python27\lib\encodings\big5hkscs.py to encodings\big5hk
byte-compiling C:\Python27\lib\encodings\bz2_codec.py to encodings\bz2_co
byte-compiling C:\Python27\lib\encodings\charmap.py to encodings\charmap.
byte-compiling C:\Python27\lib\encodings\cp037.py to encodings\cp037.pyc
byte-compiling C:\Python27\lib\encodings\cp1006.py to encodings\cp1006.py
byte-compiling C:\Python27\lib\encodings\cp1026.py to encodings\cp1026.py
byte-compiling C:\Python27\lib\encodings\cp1140.py to encodings\cp1140.py
byte-compiling C:\Python27\lib\encodings\cp1250.py to encodings\cp1250.py
byte-compiling C:\Python27\lib\encodings\cp1251.py to encodings\cp1251.py
byte-compiling C:\Python27\lib\encodings\cp1252.py to encodings\cp1252.py
byte-compiling C:\Python27\lib\encodings\cp1253.py to encodings\cp1253.py
byte-compiling C:\Python27\lib\encodings\cp1254.py to encodings\cp1254.py
byte-compiling C:\Python27\lib\encodings\cp1255.py to encodings\cp1255.py
byte-compiling C:\Python27\lib\encodings\cp1256.py to encodings\cp1256.py
byte-compiling C:\Python27\lib\encodings\cp1257.py to encodings\cp1257.py
byte-compiling C:\Python27\lib\encodings\cp1258.py to encodings\cp1258.py
byte-compiling C:\Python27\lib\encodings\cp424.py to encodings\cp424.pyc
byte-compiling C:\Python27\lib\encodings\cp437.py to encodings\cp437.pyc
byte-compiling C:\Python27\lib\encodings\cp500.py to encodings\cp500.pyc
byte-compiling C:\Python27\lib\encodings\cp720.py to encodings\cp720.pyc
byte-compiling C:\Python27\lib\encodings\cp737.py to encodings\cp737.pyc
byte-compiling C:\Python27\lib\encodings\cp775.py to encodings\cp775.pyc
byte-compiling C:\Python27\lib\encodings\cp850.py to encodings\cp850.pyc
byte-compiling C:\Python27\lib\encodings\cp852.py to encodings\cp852.pyc
byte-compiling C:\Python27\lib\encodings\cp855.py to encodings\cp855.pyc
byte-compiling C:\Python27\lib\encodings\cp856.py to encodings\cp856.pyc
byte-compiling C:\Python27\lib\encodings\cp857.py to encodings\cp857.pyc
byte-compiling C:\Python27\lib\encodings\cp858.py to encodings\cp858.pyc
byte-compiling C:\Python27\lib\encodings\cp860.py to encodings\cp860.pyc
byte-compiling C:\Python27\lib\encodings\cp861.py to encodings\cp861.pyc
byte-compiling C:\Python27\lib\encodings\cp862.py to encodings\cp862.pyc
byte-compiling C:\Python27\lib\encodings\cp863.py to encodings\cp863.pyc
byte-compiling C:\Python27\lib\encodings\cp864.py to encodings\cp864.pyc
byte-compiling C:\Python27\lib\encodings\cp865.py to encodings\cp865.pyc
byte-compiling C:\Python27\lib\encodings\cp866.py to encodings\cp866.pyc
byte-compiling C:\Python27\lib\encodings\cp869.py to encodings\cp869.pyc
byte-compiling C:\Python27\lib\encodings\cp874.py to encodings\cp874.pyc
byte-compiling C:\Python27\lib\encodings\cp875.py to encodings\cp875.pyc
byte-compiling C:\Python27\lib\encodings\cp932.py to encodings\cp932.pyc
byte-compiling C:\Python27\lib\encodings\cp949.py to encodings\cp949.pyc
byte-compiling C:\Python27\lib\encodings\cp950.py to encodings\cp950.pyc
byte-compiling C:\Python27\lib\encodings\euc_jis_2004.py to encodings\euc
byte-compiling C:\Python27\lib\encodings\euc_jisx0213.py to encodings\euc
byte-compiling C:\Python27\lib\encodings\euc_jp.py to encodings\euc_jp.py
byte-compiling C:\Python27\lib\encodings\euc_kr.py to encodings\euc_kr.py
byte-compiling C:\Python27\lib\encodings\gb18030.py to encodings\gb18030.
byte-compiling C:\Python27\lib\encodings\gb2312.py to encodings\gb2312.py
byte-compiling C:\Python27\lib\encodings\gbk.py to encodings\gbk.pyc
byte-compiling C:\Python27\lib\encodings\hex_codec.py to encodings\hex_co
byte-compiling C:\Python27\lib\encodings\hp_roman8.py to encodings\hp_rom
byte-compiling C:\Python27\lib\encodings\hz.py to encodings\hz.pyc
byte-compiling C:\Python27\lib\encodings\idna.py to encodings\idna.pyc
byte-compiling C:\Python27\lib\encodings\iso2022_jp.py to encodings\iso20
byte-compiling C:\Python27\lib\encodings\iso2022_jp_1.py to encodings\iso
byte-compiling C:\Python27\lib\encodings\iso2022_jp_2.py to encodings\iso
byte-compiling C:\Python27\lib\encodings\iso2022_jp_2004.py to encodings\
byte-compiling C:\Python27\lib\encodings\iso2022_jp_3.py to encodings\iso
byte-compiling C:\Python27\lib\encodings\iso2022_jp_ext.py to encodings\i
byte-compiling C:\Python27\lib\encodings\iso2022_kr.py to encodings\iso20
byte-compiling C:\Python27\lib\encodings\iso8859_1.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_10.py to encodings\iso88
byte-compiling C:\Python27\lib\encodings\iso8859_11.py to encodings\iso88
byte-compiling C:\Python27\lib\encodings\iso8859_13.py to encodings\iso88
byte-compiling C:\Python27\lib\encodings\iso8859_14.py to encodings\iso88
byte-compiling C:\Python27\lib\encodings\iso8859_15.py to encodings\iso88
byte-compiling C:\Python27\lib\encodings\iso8859_16.py to encodings\iso88
byte-compiling C:\Python27\lib\encodings\iso8859_2.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_3.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_4.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_5.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_6.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_7.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_8.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\iso8859_9.py to encodings\iso885
byte-compiling C:\Python27\lib\encodings\johab.py to encodings\johab.pyc
byte-compiling C:\Python27\lib\encodings\koi8_r.py to encodings\koi8_r.py
byte-compiling C:\Python27\lib\encodings\koi8_u.py to encodings\koi8_u.py
byte-compiling C:\Python27\lib\encodings\latin_1.py to encodings\latin_1.
byte-compiling C:\Python27\lib\encodings\mac_arabic.py to encodings\mac_a
byte-compiling C:\Python27\lib\encodings\mac_centeuro.py to encodings\mac
byte-compiling C:\Python27\lib\encodings\mac_croatian.py to encodings\mac
byte-compiling C:\Python27\lib\encodings\mac_cyrillic.py to encodings\mac
byte-compiling C:\Python27\lib\encodings\mac_farsi.py to encodings\mac_fa
byte-compiling C:\Python27\lib\encodings\mac_greek.py to encodings\mac_gr
byte-compiling C:\Python27\lib\encodings\mac_iceland.py to encodings\mac_
byte-compiling C:\Python27\lib\encodings\mac_latin2.py to encodings\mac_l
byte-compiling C:\Python27\lib\encodings\mac_roman.py to encodings\mac_ro
byte-compiling C:\Python27\lib\encodings\mac_romanian.py to encodings\mac
byte-compiling C:\Python27\lib\encodings\mac_turkish.py to encodings\mac_
byte-compiling C:\Python27\lib\encodings\mbcs.py to encodings\mbcs.pyc
byte-compiling C:\Python27\lib\encodings\palmos.py to encodings\palmos.py
byte-compiling C:\Python27\lib\encodings\ptcp154.py to encodings\ptcp154.
byte-compiling C:\Python27\lib\encodings\punycode.py to encodings\punycod
byte-compiling C:\Python27\lib\encodings\quopri_codec.py to encodings\quo
byte-compiling C:\Python27\lib\encodings\raw_unicode_escape.py to encodin
byte-compiling C:\Python27\lib\encodings\rot_13.py to encodings\rot_13.py
byte-compiling C:\Python27\lib\encodings\shift_jis.py to encodings\shift_
byte-compiling C:\Python27\lib\encodings\shift_jis_2004.py to encodings\s
byte-compiling C:\Python27\lib\encodings\shift_jisx0213.py to encodings\s
byte-compiling C:\Python27\lib\encodings\string_escape.py to encodings\st
byte-compiling C:\Python27\lib\encodings\tis_620.py to encodings\tis_620.
byte-compiling C:\Python27\lib\encodings\undefined.py to encodings\undefi
byte-compiling C:\Python27\lib\encodings\unicode_escape.py to encodings\u
byte-compiling C:\Python27\lib\encodings\unicode_internal.py to encodings
byte-compiling C:\Python27\lib\encodings\utf_16.py to encodings\utf_16.py
byte-compiling C:\Python27\lib\encodings\utf_16_be.py to encodings\utf_16
byte-compiling C:\Python27\lib\encodings\utf_16_le.py to encodings\utf_16
byte-compiling C:\Python27\lib\encodings\utf_32.py to encodings\utf_32.py
byte-compiling C:\Python27\lib\encodings\utf_32_be.py to encodings\utf_32
byte-compiling C:\Python27\lib\encodings\utf_32_le.py to encodings\utf_32
byte-compiling C:\Python27\lib\encodings\utf_7.py to encodings\utf_7.pyc
byte-compiling C:\Python27\lib\encodings\utf_8.py to encodings\utf_8.pyc
byte-compiling C:\Python27\lib\encodings\utf_8_sig.py to encodings\utf_8_
byte-compiling C:\Python27\lib\encodings\uu_codec.py to encodings\uu_code
byte-compiling C:\Python27\lib\encodings\zlib_codec.py to encodings\zlib_
byte-compiling C:\Python27\lib\fnmatch.py to fnmatch.pyc
byte-compiling C:\Python27\lib\ftplib.py to ftplib.pyc
byte-compiling C:\Python27\lib\functools.py to functools.pyc
byte-compiling C:\Python27\lib\genericpath.py to genericpath.pyc
byte-compiling C:\Python27\lib\getopt.py to getopt.pyc
byte-compiling C:\Python27\lib\getpass.py to getpass.pyc
byte-compiling C:\Python27\lib\gettext.py to gettext.pyc
byte-compiling C:\Python27\lib\hashlib.py to hashlib.pyc
byte-compiling C:\Python27\lib\heapq.py to heapq.pyc
byte-compiling C:\Python27\lib\httplib.py to httplib.pyc
byte-compiling C:\Python27\lib\inspect.py to inspect.pyc
byte-compiling C:\Python27\lib\keyword.py to keyword.pyc
byte-compiling C:\Python27\lib\linecache.py to linecache.pyc
byte-compiling C:\Python27\lib\locale.py to locale.pyc
byte-compiling C:\Python27\lib\logging\__init__.py to logging\__init__.py
creating C:\Python27\build\bdist.win32\winexe\collect-2.7\logging
byte-compiling C:\Python27\lib\mimetools.py to mimetools.pyc
byte-compiling C:\Python27\lib\mimetypes.py to mimetypes.pyc
byte-compiling C:\Python27\lib\ntpath.py to ntpath.pyc
byte-compiling C:\Python27\lib\nturl2path.py to nturl2path.pyc
byte-compiling C:\Python27\lib\opcode.py to opcode.pyc
byte-compiling C:\Python27\lib\optparse.py to optparse.pyc
byte-compiling C:\Python27\lib\os.py to os.pyc
byte-compiling C:\Python27\lib\os2emxpath.py to os2emxpath.pyc
byte-compiling C:\Python27\lib\pdb.py to pdb.pyc
byte-compiling C:\Python27\lib\pickle.py to pickle.pyc
byte-compiling C:\Python27\lib\posixpath.py to posixpath.pyc
byte-compiling C:\Python27\lib\pprint.py to pprint.pyc
byte-compiling C:\Python27\lib\quopri.py to quopri.pyc
byte-compiling C:\Python27\lib\random.py to random.pyc
byte-compiling C:\Python27\lib\re.py to re.pyc
byte-compiling C:\Python27\lib\repr.py to repr.pyc
byte-compiling C:\Python27\lib\rfc822.py to rfc822.pyc
byte-compiling C:\Python27\lib\shlex.py to shlex.pyc
byte-compiling C:\Python27\lib\socket.py to socket.pyc
byte-compiling C:\Python27\lib\sre.py to sre.pyc
byte-compiling C:\Python27\lib\sre_compile.py to sre_compile.pyc
byte-compiling C:\Python27\lib\sre_constants.py to sre_constants.pyc
byte-compiling C:\Python27\lib\sre_parse.py to sre_parse.pyc
byte-compiling C:\Python27\lib\ssl.py to ssl.pyc
byte-compiling C:\Python27\lib\stat.py to stat.pyc
byte-compiling C:\Python27\lib\string.py to string.pyc
byte-compiling C:\Python27\lib\stringprep.py to stringprep.pyc
byte-compiling C:\Python27\lib\struct.py to struct.pyc
byte-compiling C:\Python27\lib\subprocess.py to subprocess.pyc
byte-compiling C:\Python27\lib\tempfile.py to tempfile.pyc
byte-compiling C:\Python27\lib\textwrap.py to textwrap.pyc
byte-compiling C:\Python27\lib\threading.py to threading.pyc
byte-compiling C:\Python27\lib\token.py to token.pyc
byte-compiling C:\Python27\lib\tokenize.py to tokenize.pyc
byte-compiling C:\Python27\lib\traceback.py to traceback.pyc
byte-compiling C:\Python27\lib\types.py to types.pyc
byte-compiling C:\Python27\lib\unittest\__init__.py to unittest\__init__.
creating C:\Python27\build\bdist.win32\winexe\collect-2.7\unittest
byte-compiling C:\Python27\lib\unittest\case.py to unittest\case.pyc
byte-compiling C:\Python27\lib\unittest\loader.py to unittest\loader.pyc
byte-compiling C:\Python27\lib\unittest\main.py to unittest\main.pyc
byte-compiling C:\Python27\lib\unittest\result.py to unittest\result.pyc
byte-compiling C:\Python27\lib\unittest\runner.py to unittest\runner.pyc
byte-compiling C:\Python27\lib\unittest\signals.py to unittest\signals.py
byte-compiling C:\Python27\lib\unittest\suite.py to unittest\suite.pyc
byte-compiling C:\Python27\lib\unittest\util.py to unittest\util.pyc
byte-compiling C:\Python27\lib\urllib.py to urllib.pyc
byte-compiling C:\Python27\lib\urlparse.py to urlparse.pyc
byte-compiling C:\Python27\lib\uu.py to uu.pyc
byte-compiling C:\Python27\lib\warnings.py to warnings.pyc
byte-compiling C:\Python27\lib\weakref.py to weakref.pyc
*** copy extensions ***
copying C:\Python27\DLLs\_hashlib.pyd -> C:\Python27\dist
copying C:\Python27\DLLs\_socket.pyd -> C:\Python27\dist
copying C:\Python27\DLLs\_ssl.pyd -> C:\Python27\dist
copying C:\Python27\DLLs\bz2.pyd -> C:\Python27\dist
copying C:\Python27\DLLs\select.pyd -> C:\Python27\dist
copying C:\Python27\DLLs\unicodedata.pyd -> C:\Python27\dist
*** copy dlls ***
copying C:\Python27\w9xpopen.exe -> C:\Python27\dist
copying C:\WINDOWS\system32\python27.dll -> C:\Python27\dist
setting sys.winver for 'C:\Python27\dist\python27.dll' to 'py2exe'
copying C:\Python27\lib\site-packages\py2exe\run.exe -> C:\Python27\dist\
The following modules appear to be missing
['_scproxy']
*** binary dependencies ***
Your executable(s) also depend on these dlls which are not included,
you may or may not need to distribute them.
Make sure you have the license if you distribute any of them, and
make sure you don't distribute files belonging to the operating system.
WS2_32.dll - C:\WINDOWS\system32\WS2_32.dll
SHELL32.dll - C:\WINDOWS\system32\SHELL32.dll
USER32.dll - C:\WINDOWS\system32\USER32.dll
ADVAPI32.dll - C:\WINDOWS\system32\ADVAPI32.dll
KERNEL32.dll - C:\WINDOWS\system32\KERNEL32.dll
C:\Tutorial></pre>
<span class="anchor" id="line-117"></span><div class="line874">
Two
directories will be created when you run your setup script, build and
dist. The build directory is used as working space while your
application is being packaged. It is safe to delete the build directory
after your setup script has finished running. The files in the dist
directory are the ones needed to run your application. <span class="anchor" id="line-118"></span><span class="anchor" id="line-119"></span></div>
<div class="line867">
<span class="anchor" id="Step4"></span> <span class="anchor" id="line-120"></span><span class="anchor" id="line-121"></span></div>
<div class="line867">
</div>
<h2 id="A4.Testyourexecutable">
Test your executable</h2>
<span class="anchor" id="line-122"></span><div class="line874">
Now that the package has been created it is ready to test: (the exe file will be in dist folder)<span class="anchor" id="line-123"></span><span class="anchor" id="line-124"></span></div>
<div class="line867">
<span class="anchor" id="line-125"></span><span class="anchor" id="line-126"></span><span class="anchor" id="line-127"></span><span class="anchor" id="line-128"></span><span class="anchor" id="line-129"></span></div>
<pre>C:\Tutorial>cd dist
C:\Tutorial\dist>hello.exe
Hello World</pre>
<span class="anchor" id="line-130"></span><div class="line874">
Excellent, it works!!! <span class="anchor" id="line-131"></span><span class="anchor" id="line-132"></span></div>
<div class="line867">
<span class="anchor" id="Step5"></span> <span class="anchor" id="line-133"></span><span class="anchor" id="line-134"></span></div>
<div class="line867">
</div>
<h2 id="A5.ProvidingtheMicrosoftVisualCruntimeDLL">
Providing the Microsoft Visual C runtime DLL</h2>
<span class="anchor" id="line-135"></span><div class="line874">
The Python
interpreter was compiled using Microsoft Visual C, so your new program
needs the Microsoft Visual C runtime DLL to run. If you have installed
appropriate versions of Python or Visual Studio, then you will already
have this DLL on your computer. If some of your users might not already
have this DLL, then they will not be able to run your program. The
methods you may use to solve this depend on the version of Python you
are using: <span class="anchor" id="line-136"></span><span class="anchor" id="line-137"></span></div>
<div class="line867">
<span class="anchor" id="Step51"></span> <span class="anchor" id="line-138"></span><span class="anchor" id="line-139"></span></div>
<div class="line867">
</div>
<h3 id="A5.1.Python2.4or2.5">
Python 2.4 or 2.5</h3>
<span class="anchor" id="line-140"></span><div class="line874">
If you are
using Python 2.4 or 2.5, then the DLL you need is called MSVCR71.dll.
This DLL will probably already have been included in your dist
directory, in which case you need do nothing more. <span class="anchor" id="line-141"></span><span class="anchor" id="line-142"></span></div>
<div class="line874">
However,
the copyright on this file is owned by Microsoft, and you need to check
whether you have the legal right to redistribute it. If you have a copy
of Visual Studio, check the file redist.txt provided within the
installation to see whether you have redistribution rights for this DLL.
Generally you have the right to redistribute it if you own a license
for Microsoft Visual C++, but not if you use the Express Editions. <span class="anchor" id="line-143"></span><span class="anchor" id="line-144"></span></div>
<div class="line862">
If you do not have the rights to redistribute MSVCR71.dll, then your users must install it for themselves, using the <a class="http" href="http://www.microsoft.com/downloads/details.aspx?familyid=32bc1bee-a3f9-4c13-9c99-220b62a191ee&displaylang=en">Microsoft Visual C++ 2005 Redistributable Package</a> (vcredist_x86.exe). <span class="anchor" id="line-145"></span><span class="anchor" id="line-146"></span></div>
<div class="line862">
Either you can instruct your users to download and run this themselves, or you could create an installer for your application (<a href="http://www.py2exe.org/index.cgi/Tutorial#Step6">see Step 6 below</a>),
that includes vcredist_x86.exe (which is itself redistributable by
anyone), and then run that as part of your application installation. <span class="anchor" id="line-147"></span><span class="anchor" id="line-148"></span></div>
<div class="line867">
<span class="anchor" id="Step52"></span> <span class="anchor" id="line-149"></span><span class="anchor" id="line-150"></span></div>
<div class="line867">
</div>
<h3 id="A5.2.Python2.6.2C2.7.2C3.0.2C3.1">
Python 2.6, 2.7, 3.0, 3.1</h3>
<span class="anchor" id="line-151"></span><div class="line874">
For Python
2.6, the DLL you need is called MSVCR90.dll. Py2exe is not able to
automatically include this DLL in your dist directory, so you must
provide it yourself. <span class="anchor" id="line-152"></span><span class="anchor" id="line-153"></span></div>
<div class="line862">
To
complicate things, there is more than one version of this DLL in
existance, each with the same filename. You need the same version that
the Python interpreter was compiled with, which is version 9.0.21022.8.
Through the remainder of these instructions, hover your mouse over the
dll file (or the vcredist_x86.exe installer executable) to confirm which
version you've got. You'll need the vcredist_x86.exe that contains the <a class="http" href="http://www.microsoft.com/downloads/en/details.aspx?FamilyID=9b2da534-3e03-4391-8a4d-074b9f2bc1bf&displaylang=en">Microsoft Visual C++ 2008 Redistributable Package</a> published 29-11-2007, so not the VS2008 SP1 one (tested with Python 2.7.1). <span class="anchor" id="line-154"></span><span class="anchor" id="line-155"></span></div>
<div class="line874">
As
for older versions of Python, you need to check redist.txt within your
Visual Studio installation to see whether you have the legal right to
redistribute this DLL. If you do have these rights, then you have the
option to bundle the C runtime DLL with you application. If you don't
have the rights, then you must have your users run the redistributable C
runtime installer on their machines. <span class="anchor" id="line-156"></span><span class="anchor" id="line-157"></span></div>
<div class="line867">
<span class="anchor" id="Step521"></span> <span class="anchor" id="line-158"></span><span class="anchor" id="line-159"></span></div>
<div class="line867">
</div>
<h4 id="A5.2.1.BundlingtheCruntimeDLL">
Bundling the C runtime DLL</h4>
<span class="anchor" id="line-160"></span><div class="line874">
If you do
have the rights to redistribute MSVCR90.dll, there should be a copy of
it in your Visual Studio install, under
VC\redist\x86\Microsoft.VC90.CRT. Since Visual Studio 2008, you can't
just copy this DLL file - you also need the manifest file that you'll
find there. The redist.txt file states that you must distribute all
three dlls and the unmodified manifest file and it is a violation of the
license agreement to distribute only one of the dlls without the others
(though py2exe only needs MSVCR90.dll.) The pertinent passage from the
redist.txt file is as follows: <span class="anchor" id="line-161"></span><span class="anchor" id="line-162"></span></div>
<ul>
<li style="list-style-type: none;">"For
your convenience, we have provided the following folders for use when
redistributing VC++ runtime files. Subject to the license terms for the
software, you may redistribute the folder (unmodified) in the
application local folder as a sub-folder with no change to the folder
name. You may also redistribute all the files (*.dll and *.manifest)
within a folder, listed below the folder for your convenience, as an
entire set." <span class="anchor" id="line-163"></span><span class="anchor" id="line-164"></span></li>
</ul>
<div class="line874">
You
must make py2exe copy the three dlls and the manifest file into your
project's dist directory, in a subdirectory called 'Microsoft.VC90.CRT'.
To achieve this, add a data_files option to your project's setup.py: <span class="anchor" id="line-165"></span><span class="anchor" id="line-166"></span></div>
<div class="line867">
<span class="anchor" id="line-167"></span><span class="anchor" id="line-168"></span><span class="anchor" id="line-169"></span><span class="anchor" id="line-170"></span><span class="anchor" id="line-171"></span><span class="anchor" id="line-172"></span><span class="anchor" id="line-173"></span><span class="anchor" id="line-174"></span></div>
<pre> from glob import glob
data_files = [("Microsoft.VC90.CRT", glob(r'C:\Program Files\Microsoft Visual Studio 9.0\VC\redist\x86\Microsoft.VC90.CRT\*.*'))]
setup(
data_files=data_files,
etc
)</pre>
<span class="anchor" id="line-175"></span><div class="line874">
With this in place, running py2exe should put the files into your dist directory: <span class="anchor" id="line-176"></span><span class="anchor" id="line-177"></span></div>
<div class="line867">
<span class="anchor" id="line-178"></span><span class="anchor" id="line-179"></span><span class="anchor" id="line-180"></span><span class="anchor" id="line-181"></span><span class="anchor" id="line-182"></span><span class="anchor" id="line-183"></span><span class="anchor" id="line-184"></span><span class="anchor" id="line-185"></span><span class="anchor" id="line-186"></span><span class="anchor" id="line-187"></span><span class="anchor" id="line-188"></span><span class="anchor" id="line-189"></span></div>
<pre> dist
|
+-Microsoft.VC90.CRT
| |
| +-Microsoft.VC90.CRT.manifest
| +-msvcm90.dll
| +-msvcp90.dll
| +-msvcr90.dll
|
|-etc</pre>
<span class="anchor" id="line-190"></span><div class="line874">
Now,
simply copying the whole dist directory to your users machines should
now allow your application to run, even on machines that don't have
their own copy of the C++ runtime. <span class="anchor" id="line-191"></span><span class="anchor" id="line-192"></span></div>
<div class="line874">
Note
that this method of including the C runtime is used by several Visual
C++ applications - if you search your Program Files folder for
msvcr90.dll, you may find several applications that have this DLL and
the associated manifest bundled alongside their executable like this. <span class="anchor" id="line-193"></span><span class="anchor" id="line-194"></span></div>
<div class="line874">
Also
note that despite all the above, py2exe will complain that it cannot
find MSVCP90.dll. You must edit your setup.py to add the path to the
dlls to the sys.path, e.g. <span class="anchor" id="line-195"></span><span class="anchor" id="line-196"></span></div>
<div class="line867">
<span class="anchor" id="line-197"></span><span class="anchor" id="line-198"></span></div>
<pre> sys.path.append("C:\\Program Files\\Microsoft Visual Studio 9.0\\VC\\redist\\x86\\Microsoft.VC90.CRT")</pre>
<span class="anchor" id="line-199"></span><div class="line867">
<span class="anchor" id="Step5211"></span> <span class="anchor" id="line-200"></span><span class="anchor" id="line-201"></span></div>
<div class="line867">
</div>
<h4 id="A5.2.1.1win32uispecialcase">
win32ui special case</h4>
<span class="anchor" id="line-202"></span><div class="line862">
win32ui needs MFC DLLs to run .exe, see <a href="http://www.py2exe.org/index.cgi/Py2exeAndWin32ui">Py2exeAndWin32ui</a> for extra informations <span class="anchor" id="line-203"></span><span class="anchor" id="line-204"></span></div>
<div class="line867">
<span class="anchor" id="Step522"></span> <span class="anchor" id="line-205"></span><span class="anchor" id="line-206"></span></div>
<div class="line867">
</div>
<h4 id="A5.2.2.RunningtheredistributableCruntimeinstaller">
Running the redistributable C runtime installer</h4>
<span class="anchor" id="line-207"></span><div class="line862">
If you don't have rights to redistribute MSVCR90.dll, then your users may install it on their machine by running the <a class="http" href="http://www.microsoft.com/downloads/details.aspx?FamilyID=9b2da534-3e03-4391-8a4d-074b9f2bc1bf&displaylang=en">Microsoft Visual C++ 2008 Redistributable Package</a>
(vcredist_x86.exe). It is important not to use the SP1 version of this
installer, which contains the wrong version of MSVCR90.dll. <span class="anchor" id="line-208"></span><span class="anchor" id="line-209"></span></div>
<div class="line862">
Either you can instruct users to download and run this themselves, or you could create an installer for your application ,
that includes vcredist_x86.exe (which is itself redistributable by
anyone), and then run that as part of your application installation. <span class="anchor" id="line-210"></span><span class="anchor" id="line-211"></span></div>
<div class="line874">
The
installer puts a copy of the DLLs in the directory C:\WINDOWS\WinSxS
(XP), inside subdirectories with mangled names. The manifest file is in
the 'Manifests' subdirectory, again this will have a mangled filename.
You can still discern the text 'Microsoft.VC90.CRT' and '9.0.21022.8'
within the mangled file and directory names, to find the files. It is
possible to take a copy of these files and remove the filename mangling,
to embed them in your application as described in 5.2.1. <span class="anchor" id="line-212"></span><span class="anchor" id="line-213"></span></div>
<div class="line867">
<span class="anchor" id="Step6"></span> <span class="anchor" id="line-214"></span><span class="anchor" id="line-215"></span></div>
<div class="line867">
</div>
<h2 id="A6.Buildaninstallerifapplicable">
6. Build an installer if applicable</h2>
<span class="anchor" id="line-216"></span>py2exe is
not an installer builder - it merely assembles the files needed to run
your Python program. There are plenty of good installer builders out
there including some that are open source (e.g., <a class="http" href="http://nsis.sourceforge.net/Main_Page">NSIS</a>) and some that are free (e.g., <a class="http" href="http://www.jrsoftware.org/isinfo.php">Inno Setup</a>).Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-35310511397703116942012-03-29T15:42:00.002-07:002012-03-31T13:17:04.195-07:00python program to get facebook users data<div class="separator" style="clear: both; text-align: center;">
<a href="http://python-hosting.org/wp-content/uploads/2011/06/python-logo-master-v3-trans.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="108" src="http://python-hosting.org/wp-content/uploads/2011/06/python-logo-master-v3-trans.png" width="320" /></a></div>
<br />
hi guys after 3 days of python learning i wrote my first prgram which downloads a users info (public one) using graph API its very useful API<br />
<div>
<br />
<br />
<br />
It can be accessed like this </div>
<div>
Users: https://graph.facebook.com/btaylor (Bret Taylor)</div>
<div>
<div>
Pages: https://graph.facebook.com/cocacola (Coca-Cola page)</div>
<div>
Events: https://graph.facebook.com/251906384206 (Facebook Developer Garage Austin)</div>
<div>
Groups: https://graph.facebook.com/195466193802264 (Facebook Developers group)</div>
<div>
Applications: https://graph.facebook.com/2439131959 (the Graffiti app)</div>
<div>
Status messages: https://graph.facebook.com/367501354973 (A status message from Bret)</div>
<div>
Photos: https://graph.facebook.com/98423808305 (A photo from the Coca-Cola page)</div>
<div>
Photo albums: https://graph.facebook.com/99394368305 (Coca-Cola's wall photos)</div>
<div>
Profile pictures: https://graph.facebook.com/Rjcrystal.ica/picture (your profile picture)</div>
<div>
Videos: https://graph.facebook.com/817129783203 (A Facebook tech talk on Graph API)</div>
<div>
Notes: https://graph.facebook.com/122788341354 (Note announcing Facebook for iPhone 3.0)</div>
<div>
Checkins: https://graph.facebook.com/414866888308 (Check-in at a pizzeria)</div>
</div>
<div>
so just we need to put a ID after </div>
<div>
code<br />
<blockquote class="tr_bq">
# -*- coding: utf-8 -*-<br />
# Python<br />
print "##########################################"<br />
print "# coded by Rjcrystal #"<br />
print "# technomaina.blogspot.com #"<br />
print "# licensed under creative commons 2.5 #"<br />
print "# feedback:rjcrystal@gmail.com, #"<br />
print "# put group,page,profile ID #"<br />
print "##########################################"<br />
<br />
from urllib import urlopen<br />
s = raw_input('put ID,name,etc-->')<br />
print urlopen("http://graph.facebook.com/" + s).read()</blockquote>
so the problem with this is i am getting the result in 1 line only<br />
and it adds extra' \' with every '/' but this is a great sucess for me :)<br />
this will ask for a input just put your ID or anything to this and you will get all of its public INFO<br />
have fun<br />
:D</div>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-5892974282039685388.post-45004034365722464262012-03-29T01:11:00.001-07:002012-03-29T01:11:07.142-07:00Netsniff-NG High Performance Sniffer 0.5.6netsniff-ng is a free, performant Linux networking toolkit.
The gain of performance is reached by zero-copy mechanisms, so that on packet reception and transmission the kernel does not need to copy packets from kernel space to user space and vice versa.
For this purpose, the netsniff-ng toolkit is libpcap independent, but neverthelesssupports the pcap file format for capturing, replaying and performing offline-analysis of pcap dumps. Furthermore, we are focussing on building a robust and clean analyzer and utilities that complete netsniff-ng asa support for network development, debugging or network reconnaissance.
The netsniff-ng toolkit consists of the following utilities:
*. netsniff-ng , a zero-copy analyzer, pcap capturer and replayer
*. trafgen , a high-performance zero-copynetwork traffic generator
*. bpfc , a Berkeley Packet Filter compiler supporting Linux extensions
*. ifpps , a top-like kernel networking and system statistics tool
*. flowtop , a top-like netfilter connection tracking tool
*. curvetun , a lightweight multiuser IPtunnel based on elliptic curve cryptography
*. ashunt , an Autonomous System (AS) trace route and ISP testing utility
(Note: libpcap starting from 1.0.0 now also supports zero-copy, but for capturing only! netsniff-ng's pcap files can also be opened with tools like Wireshark , and vice versa!)
download Git repository: git clone git://github.com/gnumaniacs/netsniff-ng.git
Git web: http://src.netsniff-ng.org/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5892974282039685388.post-33899314858672949562012-03-26T21:40:00.002-07:002012-03-26T22:03:49.823-07:00SQLMap Gui - Automatic SQL injection and database takeover tool<img src="http://4.bp.blogspot.com/-0tC6Xs3LO4U/T3BwzO9FJLI/AAAAAAAAA_8/UZXGIdjeU9w/s1600/sq.jpg"> <img src="http://3.bp.blogspot.com/-YPeO1vgPlr4/T3B0YS7fQiI/AAAAAAAABAI/G9r476XzNig/s200/GHG.jpg"><br />
This is a awesome sqlmap python gui made by xcedz.To make it work get andinstall python 2.7 and download the last version of sqlMap-dev<br />
svn checkout https://svn.sqlmap.org/sqlmap/trunk/sqlmapsqlMap-dev<br />
after doing that download the gui scriptfrom :<br />
http://code.google.com/p/gui-for-sqlmap/downloads/list<br />
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, toaccessing the underlying file system andexecuting commands on the operating system via out-of-band connections.<br />
And here is Another Windows GUI forsqlmap written in C#<br />
you have to enter the database parameters, select the table and column that you want to enumerate and press Exploit. SQL Map GUI will do the rest!<br />
Honestly I recommend you python version because works better!<br />
(Via the projectx blog official dev=>http://security-sh3ll.blogspot.com/)<br />
p.s >this was not made by meUnknownnoreply@blogger.com0