Month: September 2012

Help Help Terrorist

New Android Exploit Could Force Factory Reset remotely

 

Clicking one wrong link can cause malicious code to execute, which could do anything from infecting your computer with malware to, apparently, wiping your phone data completely. At the Ekoparty security conference, researcher Ravi Borganokar demonstrated at the Ekoparty security conference in Argentina last week, that how a single line of HTML code could be used to run a factory reset or even clear the SIM card on certain Samsung phones.
Malicious hackers can hide a code in a web page that will trigger a full factory reset of Samsung’s best-selling Galaxy S3 smartphone, deleting contacts, photographs, music, apps and other valuable data. Read More

Billions of Windows Users Affects with Java Vulnerability

Researchers at Security Explorations disclosed a new vulnerability in Java that could provide an attacker with control of a victim’s computer. The researchers have confirmed that Java SE 5 – Update 22, Java SE 6 – Update 35, and Java SE 7 Update 7 running on fully patched Windows 7 32-bit operating systems are susceptible to the attack.
This Flaw allowing a malicious hackers to gain complete control of a victim’s machine through a rigged website. The affected web browsers are Safari 5.1.7, Opera 12.02, Chrome 21.0.1180.89, Firefox 15.0.1, and Internet Explorer 9.0.8112.16421. Read More

Backdoored PhpMyAdmin distributed at SourceForge site

 

A security issue has been reported in phpMyAdmin, which can be exploited by malicious people to compromise a vulnerable system. The security issue is caused due to the distribution of a compromised phpMyAdmin source code package containing a backdoor, which can be exploited to e.g. execute arbitrary PHP code.
 One of the SourceForge.net mirrors, namely cdnetworks-kr-1, was being used to distribute a modified archive of phpMyAdmin, which includes a backdoor. This backdoor is located in file server_sync.php and allows an attacker to remotely execute PHP code. Another file, js/cross_framing_protection.js, has also been modified.
SourceForge.Net is the world’s largest open source software development website. A very large impact on the domestic users with this incident. The vulnerability has been cataloged as being a critical one.

100k IEEE site Plain-Text Passwords found on Public FTP

 

A Romanian researcher – Radu Drăgușin found that 100000 usernames and passwords of the Institute of Electrical and Electronics Engineers (IEEE) was stored in plaint-text on a publicly accessible FTP server.
According to him, on Sept. 18 he first discovered a log with usernames and passwords in plaintext, publicly available via IEEE’s FTP server for at least a month. He informed them of his find yesterday, and evidently the organization is addressing the issue.
On the FTP server, according Dragusin were the logfiles for the offers and ieee.org spectrum.ieee.org – Total data to approximately 376 million HTTP requests. Including 411,308 log entries with login and password in plain text.
Among the users who’s information was exposed are researchers at NASA, Stanford, IBM, Google, Apple, Oracle and Samsung. IEEE’s membership of over 340,000 is roughly half American (49.8 percent as of 2011). Read More

Hashcat v0.41 released, Now Support AVX and XOP

A new version of oclHashcat is available. oclHashcat is the GPU accelerated version of Hashcat, a MD5 password cracker. oclHashcat is able to use up to 16 GPUs to achieve its job. oclHashcat is available in two versions: OpenCL (oclHashcat) and CUDA (cudaHashcat). Now also Support AVX and XOP.

Main features of Hashcat:

  • Free
  • Multi-GPU (up to 16 gpus)
  • Multi-Hash (up to 24 million hashes)
  • Multi-OS (Linux and Windows native binaries)
  • Multi-Platform (OpenCL and CUDA support)
  • Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, …)
  • Fastest multihash MD5 cracker on NVidia cards
  • Fastest multihash MD5 cracker on ATI 5xxx cards
  • Supports wordlists (not limited to Brute-Force / Mask-Attack)
  • Combines Dictionary-Attack with Mask-Attack to launch a Hybrid-Attack
  • Runs very cautious, you can still watch movies or play games while cracking
  • Supports pause / resume
  • The first and only GPU-based Fingerprint-Attack engine
  • Includes hashcats entire rule engine to modify wordlists on start Read More

This guy must be an Engineer

Do you defend the decision to publish images of the Prophet Mohammed?

Do you defend the decision to publish images of the Prophet Mohammed?
Scroll down and vote “No”

http://edition.cnn.com

HOWTO : Encrypt the Home Directory in Ubuntu

 

You may want to encrypt the home working directory or any user’s working home directory if you have not been set it up during the installation of Ubuntu.

Step 1 :

sudo apt-get install ecryptfs-utils

Step 2 :

adduser tempuser admin

Logout and re-login as tempuser.

Step 3 :

sudo ecryptfs-migrate-home -u samiux

Logout and re-login as samiux. But DO NOT reboot your system.

If you are not asking for the “Passphrase“, you should enter the following command :

sudo ecryptfs-add-passphrase Read More

HOWTO : Back|Track 5 r3 on Gigabyte TouchNote T1028X/M1028

Gigabyte TouchNote T1028X/M1028 equipped with Intel Atom N280 and eGalax touch screen. It runs Back|Track 5 r3 flawlessly except touchpad. This tutorial is telling you how to overcome this problem.

The kernel version of Back|Track 5 r3 is 3.2.6 and the touch screen is functioning flawlessly.

Touchscreen Hardware

lsusb” shows the following :

Bus 005 Device 002: ID 0eef:0001 D-WAV Scientific Co., Ltd eGalax TouchScreen

Step 1 :

Boot up the 32-bit version of Back|Track 5 r3 USB stick which is created by Unetbootin or DVD-ROM. On the menu screen, press “Tab” and append the following to the end of the line.

i8042.noloop=1 reboot=b

Then install as usual and then reboot. Read More