Live Ddos View

Live DDoS Attack Map | Apakau

Live DDoS Attack Map

This map is the fruit of collaboration between Google Ideas and Arbor Networks in an effort to raise awareness about distributed denial of service attacks in the world everyday.

Exploring the Data

The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known. Some features include:

  • Use the histogram at the bottom of the map to explore historical data.
  • Select a country to view DDoS activity to or from that country.
  • Use the color option to view attacks by class, duration, or source/destination port.
  • Use the news section to find online reports of attack activity from a specified time.
  • View the gallery to explore some examples of days with notable DDoS attacks.

Sign Up

Sunday, June 21, 2015

How to Reset Window 7 Administrator password

In this tutorial we will reset the administrator account password in window 7. With this method you can reset any users password in window 7. Window have a inbuilt utility Utilman.exe for disabled people. Utilman.exe allow users to configure the accessibility options like Magnifier, High contrast theme, Narrator and On Screen Keyboard before they log onto the system.
This utility was designed for disabled people who are hard of sight, hearing or mobility to log onto Windows themselves without the need of outside help. You can run this utility by pressing Window Key + U on window login screen. Or you can click on Ease of Access icon. This will load Utilman.exe application from Windows\System32\ directory. Furthermore this application run under the system account which have the highest level of privilege.

accessibility-options
You can take advantage of this utility to reset the user accounts password. You need to replace the Utilman.exe file with cmd.exe file and you will have access to the command prompt running under the SYSTEM privileges. From command prompt you can easily reset the user password.

Step by step guide on how to reset window 7 password

Our primary goal is to replace the Utilman.exe with cmd.exe. You can achieve this goal by several methods like boot system with Live disk and replace the file, boot system with recovery disk and replace the file. In this tutorial we assume that you do not have any bootable disk or live CD. We will do this without any third party software or disk.
To do this turn off the system without properly shutdown. Repeat this until you get Windows Error Recovery message on start up. Select Launch Startup Repair (recommended) and press Enter Key
launch-startup-repair
Window will load necessary files for recovery
window-load-files
Window will automatically try to fix the problems. This process usually take long time so stay cool, you need to do nothing here.
start-up-recovery-running
After a long wait [ around five to ten minutes ] you will receive following message
Windows cannot repair the this computer automatically.
Click view problem details
view-problem-details
It will open problem details in message box. Scroll the message to bottom, at the end of message it contain hyperlinked privacy statement, click it.
problem-details-file
Privacy statement will appear in notepad, Click Open option from File menu item
privacy-file
Click Computer to show all drive
privacy-file-computer-drive
You have to check each drive for Window. Drive letter showing here will be different from the drive letter you see in My computer while system normally boot. Open each drive and find out the partition which contain the windows installation files.
Open Windows folder
window-files
Open system32 folder
window-folder
Change file type to all
file-type-all
Select Utilman file and do Right click and click Copy
utilman-copy
Paste the copied file
utilman-paste
Select the copied file and do right click and click Rename
utilman-rename
We will change it with some descriptive name
window-rename-utilman-type
Set it to Utilman-org
utilman-org
We have taken the backup of original file. Now delete the original file. Select the Utilman file and do right click and click Delete
utilman-delete
Confirm delete operation
utilman-delete-confirm
Now select the cmd file and do right click and click Copy
cmd-file
Paste the copied file
cmd-paste
Select the copied file do right click and click Rename
cmd-copy-right-click
Rename it with Utilman
cmd-rename-utilman
We have replaced the Utilman.exe with cmd.exe
utilman-cmd-verfiy
That's all we need to do here. Close the dialog box, close the file, and close the Startup repair box and Click finish
startup-finish
System will be shutdown. Turn on the system again, let the window boot normally this time on login screen click Ease of Access icon. We have replaced Utilman.exe with cmd.exe so it will launch command prompt instead of accessibility options dialog box.
command-prompt-at-login-screen
Type following command and press Enter
net user administrator *
net userCommand
administratorUser name [ Replace it with user name if changing other users password ]
*Set new password
net-user-command
Type the new password / Retype the password to confirm it. Be aware you will not see any asterisks [*] sign here when you type in your password.
net-user-command-password
Close the command prompt and use the new password to sing in
login-screen
Wow we have successfully changed the users password now it's time to revert the change which we have made during the process. Open My Computer and open the window partition
window-partiton
Open System32 folder and select the replaced Utilman file
window-replaced-utilman-file
Do right click and click Delete option
window-utilman-delete-option
Confirm delete operation
window-utilman-delete-confirm
Select the Utilman-org file and do right click and click Rename
window-utilman-org-right-click
Rename Utilman-org to Utilman
window-rename-utilman-type
We have restored the original file.
window-utilman-restored
We have restored original window utility. To confirm it restart the system and click Ease of Access icon, this time it would launch original Utilman.exe
accessibility-options
Congratulations you have successfully reset the users password without harming any window files or using any third party tools.

#DarkSec  劈水

Oracle SQL Injection Guides and Whitepapers

Introduction

SQL Injection is a hot topic like always, I have been explaining SQL injections with examples in my series of interesting SQL injection attacks, but this time I have gathered some resources on Oracle SQL Injection which can be handy for both penetration testers and developers alike.

Oracle SQL Injection Guides and Whitepapers

Oracle SQL Injection for Oracle Developers:-  This paper is intended for application developers, database administrators, and application auditors to highlight the risk of SQL injection attacks and demonstrate why web applications may be vulnerable.  It is not intended to be a tutorial on executing SQL attacks and does not provide instructions on executing these attacks. It will also help penetration testers, getting their hands dirty on oracle apps. Written by Stephen Kost from  Integrigy Corporation.

Exploiting SQL Injection In Oracle 11g Database :- This paper Explains Exploiting PL/SQL Injection With Only CREATE SESSIO N Privileges in Oracle 11g. Written by David Litchfield from Next Generation Security Software Ltd .

Hacking Oracle Based Web Applications:-  Paper explains hacking Oracle based web applications using SQL injection, understanding Oracle protective mechanism and bypassing privileges. Written by Sumit “sid” Siddharth From  7Safe Limited UK .

Hacking And Protecting Oracle Databases:- This is a very detailed paper on hacking and protecting oracle databases, it discuses in detail about the Oracle security posture, privileges and filters. In depth knowledge about how it works and how they can be bypassed. This guide is beneficial for Developers and penetration testers alike. Written by Esteban Martínez Fayó From Argeniss.

Oracle SQL Injection Explained Wth Examples:- This paper is well written because it explains all aspects of Oracle SQL injection, from finding one in a web application, then exploitation, it also explains about Blind SQL injection in Oracle and Discuses some advance exploitation Techniques Written by Rob David from Sentrigo

SQL Injection Protection And Exploitation In Popular Databases:- This detailed paper explains the security and vulnerabilities in popular databases which includes Oracle, Microsoft SQL server, Sybase and IBM DB2. By Application Security Inc.

Hacking And Defending Databases :- Walk through to the exploitation of popular DBMS , Oracle , Microsoft SQL server, Sybase and IBM DB2. Great visual aid, is available, where actual exploitation is shown, with systems having different levels of privileges. Good read for penetration testers,although its not a research paper or white paper its more of presentation. Written by  Alexander Rothacker from Application Security Inc.