Showing posts with label Linux. Show all posts
Showing posts with label Linux. Show all posts

Tuesday, October 16, 2012

debian 6 0 5 i386 DVD 1 iso

Posted by Unknown On 10:33 AM
imagebam.com 


Description:
Debian is a free operating system (OS) for your computer. An operating system is the set of basic programs and utilities that make your computer run. Debian uses the Linux kernel (the core of an operating system), but most of the basic OS tools come from the GNU project; hence the name GNU/Linux.

Debian GNU/Linux provides more than a pure OS: it comes with over 29000 packages, precompiled software bundled up in a nice format for easy installation on your machine.

Official website: www.debian.org


Download:
Ryushare Link: debian-6.0.5-i386-DVD-1.iso - 4.4 GB

BackTrack 5 R3 KDE 32bit

Posted by Unknown On 10:31 AM
 imagebam.com 


Description:
The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.

Building, testing and releasing a new BackTrack revision is never an easy task. Keeping up-to-date with all the latest tools, while balancing their requirements of dependencies, is akin to a magic show juggling act. Thankfully, active members of our redmine community such as backtracklover and JudasIscariot make our task that much easier by actively reporting bugs and suggesting new tools on a regular basis. Hats off to the both of you.

We would like to thank Offensive Security for providing the BackTrack dev team with the funding and resources to make all of this happen. Also, a very special thanks to dookie, our lead developer – for building, testing and packaging most of the new tools in this release.

Together with our usual KDE and GNOME, 32/64 bit ISOs, we have released a single VMware Image (Gnome, 32 bit). For those requiring other VM flavors of BackTrack – building your own VMWare image is easy – instructions can be found in the BackTrack Wiki.

Lastly, if you’re looking for intensive, real world, hands on Penetration Testing Training – make sure to drop by Offensive Security Training, and learn the meaning of “TRY HARDER“.

For the insanely impatient, you can download the BackTrack 5 R3 release via torrent right now. Direct ISO downloads will be available once all our HTTP mirrors have synched, which should take a couple more hours. Once this happens, we will update our BackTrack Download page with all links.

BT5R3-GNOME-64.torrent (md5: 8cd98b693ce542b671edecaed48ab06d)
BT5R3-GNOME-32.torrent (md5: aafff8ff5b71fdb6fccdded49a6541a0)
BT5R3-KDE-64.torrent (md5: 981b897b7fdf34fb1431ba84fe93249f)
BT5R3-KDE-32.torrent (md5: d324687fb891e695089745d461268576)
BT5R3-GNOME-32-VM.torrent (md5: bca6d3862c661b615a374d7ef61252c5)


Download:

Ryushare Link: BT5R3-KDE-64.rar - 3.0 GB
Lumfile Link: BT5R3-KDE-64.rar - 3.0 GB

BackTrack 5 [32-Bit] [ISO]

Posted by Unknown On 10:30 AM
 imagebam.com 


Description:
As BackTrack 5 development rolls on full steam ahead, we’ve been getting numerous questions about the future release. We thought we’d publish a blog post with general information about BT5 for the impatient. The codename of this release will be “revolution”, for a bunch of reasons.

BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), and will (finally) support both 32 bit and 64 bit architectures. We will be officially supporting KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment (DE). Tool integration from our repositories will be seamless with all our supported DE’s, including the specific DE menu structure.

Perhaps most importantly BackTrack 5 “revolution” will be our first release to include full source code in it’s repositories. This is a big thing for us, as it officially joins us to the open-source community and clears up any licensing issues which were present in BackTrack 4.

The absence of source code availability in BT4 was mainly due to lack of resources when we initially structured the BT4 development environment. Newly armed with our support from Offensive Security, we have  now built a *proper* development environment, which allows us to do some pretty awesome things.

Our tool list has completely been revamped and refreshed. Each tool’s functionality was assessed and decided upon before inclusion to BT5. Obviously, we are constantly staying up to date with interesting new tools and are adding them to our repositories when appropriate. In addition, our menu structure has been much optimized – streamlined with both the PTES and OSSTMM standards. This will make finding and using the right tools much easier.

We are finally able to update our roadmap and pin down a date for the release – May 10th, 2011. If you have a tool request for a tool that does not already exist in BackTrack, please use this form to request it. This form will be active for 4 weeks.


Download:

Ryushare Link: BT5-GNOME-32.rar - 1.9 GB
Lumfile Link: BT5-GNOME-32.rar - 1.9 GB

BackTrack 3.0 Final ISO LiveCD

Posted by Unknown On 10:29 AM
 imagebam.com

Download:

Ryushare Link: bt3-final.iso - 694.9 MB
Lumfile Link: bt3-final.iso - 694.9 MB

Auditor - Wifi Cracking Linux Distro

Posted by Unknown On 10:27 AM
imagebam.com


Description:
Live Cd For Wireless Hacking, Also Used By The Fbi

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).

- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI ...


WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsG?"a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"


WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104.

The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process.

An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.

This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

As Special Agent Bickers noted :

"It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"


Download:

Ryushare Link: auditor-250405-01.iso - 635.6 MB
Lumfile Link: auditor-250405-01.iso - 635.6 MB

Archlinux 2012.10.06 dual

Posted by Unknown On 8:19 AM
  imagebam.com 


Description:

Pierre Schmitz has announced the release of Arch Linux 2012.10.06, the latest release of the project's installation CD image - now with systemd as the service manager: "The October release of the Arch Linux install medium is available for download and can be used for new installs or as a rescue system. It contains a set of updated packages and the following notable changes: systemd is used to boot up the live system; initscripts are no longer available on the live system but are still installed by default on the target system - this is likely to change in the near future; EFI boot and setup has been simplified; Gummiboot is used to display a menu on EFI systems; the following new packages are available on the live system: ethtool, FSArchiver, Gummiboot, Midnight Commander, Partclone, Partimage, rEFInd, rfkill, sudo, TestDisk, wget, xl2tpd."


Download:
 Ryushare Link: archlinux-2012.10.06-dual.iso - 415.0 MB
 Lumfile Link: archlinux-2012.10.06-dual.iso - 415.0 MB