Jump to content

iskey

Retired Staff
  • Content Count

    347
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    19

Everything posted by iskey

  1. iskey

    GFX wpp | since 2011...

    superb awsome
  2. iskey

    Retro Style CP Sigs

    nice work sir Happy new year 2015
  3. iskey

    any help? [COMPLETE]

    http://www.Filehost banned (4S)/file/1QHrzkSxce/Microsoft_Toolkit.html you must validated win 8.1
  4. iskey

    Windows 8.1 pro n [COMPLETE]

    http://www.Filehost banned (4S)/file/1QHrzkSxce/Microsoft_Toolkit.html
  5. iskey

    windows (request filled)

    completed
  6. iskey

    Introduction

    First Happy New Year 2015 Welcome to CyberPhoenix community
  7. http://www.Filehost banned (4S)/file/1QHrzkSxce/Microsoft_Toolkit.html
  8. iskey

    Hyperdesktop [COMPLETE]

    completed
  9. use this one 2XKYR-THNHY-4M9D4-9YG2X-M96XV JR3N8-YV72J-86V92-HC2PM-PRXTW
  10. Happy New Year 2015 Attacks against Crypto Guide for Analysts on how to use the PRISM Skype Collection GCHQ Briefing on the BULLRUN Program GCHQ Presentation on the BULLRUN Programs Decryption Capabilities NSA LONGHAUL program for end-to-end attack orchestration and key recovery service BLUESNORT program on "Net Defense" from Encrypted Communications Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not NSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestrated Description of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack Attacks on SSL/TLS NSA Experiment for massive SSL/TLS Decryption Canadian Document from CES on TLS Trends Details on how NSA uses the SCARLETFEVER program to attack Scure Sockets Layer (SSL)/Transport Layer Scurity (TLS) Analysis from SSL/TLS Connections through GCHQ in the flying pig database Attacks on VPN NSA High Level Description on TURMOIL / APEX Programs on Attacking VPN Explanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAUL Intro to the VPN Exploitation Process mentioning the protocols attacked - PPTP, IPSEC, SSL, SSH) Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNs Overview of the capabilities of the VALIANTSURF program MALIBU Architecture Overview to exploit VPN Communication POISENNUT Virtual Private Network Attack Orchestrator (VAO) NSA Presentation on the development of Attacks on VPN NSA Presentation on the Analysis and Contextualisation of data from VPN Description of existing projects on VPN decryption Explanation of the Transform Engine Emulator when attacking VPN Explanation of the POISENNUT Product and its role when attacking VPN Explanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPN Processing of data from exploited VPN in the TURMOIL program Decryption of VPN Connections within the VALIANTSURF program Description on the processing of VPN data packets within the TURMOIL program Explanation on the SPIN9 program on end-to-end attacks on VPN Deanonymizing Explanation of a potential technique to deanonymise users of the TOR network Analytics on security of TOR hidden services Overview on Internet Anonymization Services on how they work TOR deanonymisation research TOR Overview of Existing Techniques A potential technique to deanonymise users of the TOR network Cryptanalytics General Description how NSA handles encrypted traffic Intercept with PGP encrypted message Classification Guide for Cryptanalysis Procedural GCHQ Document on how analysts are to handle encrypted traffic NSA / GCHQ Crypt Discovery Joint Collaboration Activity NSA Cryptographic Modernization (CryptoMod) Classification Guide "National Information Assurance Research Laboratory (NIARL)": Newsletter, Keyword TUNDRA What Your Mother Never Told You About the development of Signal Intelligence Intercept with OTR encrypted chat
  11. iskey

    Happy New Year All

    he will be reborn as a phoenix in 2015
  12. iskey

    Happy New Year All

    We expect 2015
  13. iskey

    Happy New Year All

    Happy New Year for CyberPhoenix community 2015
  14. iskey

    VirusTotal

    Happy New Year 2015 https://www.virustotal.com/en/ VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
  15. iskey

    All Sites where you can Upload Images

    thanks good work
  16. iskey

    TapinRadio

    Happy New Year for Windows XP/Vista/W7 The lightweight radio software that is great for the visually impaired or anyone that wants a simple but funtional radio player (Portable version also available) http://www.raimersoft.com/tapinradio.aspx
  17. Hello http://www.googlinux.com/ Enjoy
×