Sunday, December 19, 2010

[08/10] Linux Security Summit 2010 slides published

I've updated the papers section of the site to include my slides from the Linux Security Summit 2010. The title of the presentation was "Linux Security in 10 Years". In the presentation, I demonstrated the threat of kernel exploitation, how kernel exploitation subverts access control/container-based security, the need to have a broader view of system protection, in particular the need for kernel self-protection. # grsecur...

Thursday, December 9, 2010

Havij v1.13 Advanced SQL Injection

Description:Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur...

Vigilantes Take Offensive in WikiLeaks Censorship Battle

Internet vigilantes stepped up attacks in support of WikiLeaks on Wednesday, downing Visa’s web site in a widening protest against a handful of companies that banned the secret-spilling site after it began publishing hundreds of secret U.S. diplomatic cables. The outages, organized by the group Anonymous under the banner “Operation Payback,” have taken the battle between WikiLeaks supporters and opponents over web censorship to the streets, so to speak, sparking a series of tit-for-tat retaliations that appeared to be growing at the time this article was posted. At stake is not just the future of WikiLeaks, the protesters seem to believe, but freedom on the net in general — a principle worth defending by any means possible, however dubious. “There are people that want to send a message that...

Maria Ozawa getting married?

...

GnackTrack RC2 Has Just Been Released

After a mad rush over the last few days we have managed to get GnackTrackR2 ready as a direct replacement for GnackTrackFinal. We have updated many of the tools within the feed and have also installed the 2.6.35 kernel with patched wireless drivers.This version, and version here after, will unfortunately not include Nessus but you can still download your copy from the NessusTenable website. Lets hope in the future Tenable will give us permission to re-integrate it.Click here to download the live CD GnackTrackR2.isoe3d144f39b3f912a508c6654656d8b88 GnackTrackR2.isoOr here to download the VMWare image GnackTrackR2.7z93566c5bcd8260f7dc8c2cc1e4bee6b6 GnackTrackR2...

PayPal banned WikiLeaks after US gov intervention

A PayPal executive said his company's decision to suspend payments to Wikileaks came after the US State Department said the whistle-blower site was engaged in illegal activity. The comment came shortly before PayPal agreed to release the remaining funds in the WikiLeaks fund-raising account.Press accounts from The Guardian and TechCrunch differ, but both claim that PayPal's move was influenced by statements from the State Department.“State Dept told us these were illegal activities,” PayPal VP of platform Osama Bedier told the LeWeb conference in Paris, according to this report from The Guardian. “It was straightforward. We ... comply with regulations around the world, making sure that we protect our brand.”TechCrunch reported much the same thing but later updated its post to say: “After talking...

Art is Not a Crime

Made by mattdbk#indonesiancoder....

Troubled Wikileaks Moves To Pirate Party Domain

After being cut off by its nameserver provider EveryDNS, Wikileaks has moved to a domain registered by Pirate Party Switzerland. EveryDNS was forced to stop its services to Wikileaks after continued DDoS attacks, creating yet another setback for the whistleblower site that has dominated the news this week.The release of thousands of US embassy cables and the many more that are expected to come has propelled the whistleblower site Wikileaks to the front page of every respectable news outlet this week. But for the site itself it hasn’t been a smooth ride thus far.After it suffered a continued DDoS attack on its servers earlier this week the site relocated to Amazon’s cloud hosting service, but just a day or two later it was pulled following complaints...

WikiLeaks fights to stay online after US company withdraws domain name

Everydns.net says attack against leaks site endangered other customers' service – effectively pushing site off the webWikiLeaks was removed from its wikileaks.org address. Photograph: Joe Raedle/Getty ImagesThe US was today accused of opening up a dramatic new front against WikiLeaks, effectively "killing" its web address just days after Amazon pulled the site from its servers following political pressure.The whistleblowers' website went offline for the third time in a week this morning, in the biggest threat to its online presence yet.Joe Lieberman, chairman of the Senate's committee on homeland security, earlier this week called for any organisation helping sustain WikiLeaks to "immediately terminate" its relationship with them.On Friday...

WikiLeaks cables: Live Q&A with Julian Assange

The founder of WikiLeaks, Julian Assange, will be live online from 1pm today to answer readers' questions about the release of more than 250,000 US diplomatic cablesRead Julian Assange's answers to your questionsJulian Assange, wikileaks founder. Photograph: GuardianUpdate: Thank you for all your questions. We have now closed comments on this article. Read Julian Assange's answers here.WikiLeaks founder Julian Assange is at the centre of intense media speculation and a hate campaign against him in America, following the leak of 250,000 US diplomatic cables.He will be live online to answer Guardian readers' questions at 1pm today, subject to his access to an internet connection - which is very much a live issue. His online interview comes at...

Saturday, February 6, 2010

How do I update Ubuntu Linux softwares?

Q. I have latest version of Ubuntu Linux. How do I update Ubuntu Linux for security and application fix or upgrades?A. Ubuntu Linux can be upgraded using GUI tools or using traditional command line tools.Using apt-get command line toolapt-get is the command-line tool for handling packages. You can use following command options:=> apt-get update : Update is used to resynchronize the package index files from their sources via Internet.=> apt-get install package-name : install is followed by one or more packages desired for installation. If package is already installed it will try to update to latest version.a) Open terminal and type following two commands (Application > Accessories > Terminal):b) Get update software list, enter:tukulesto:~# sudo apt-get updatec) Update software(s)...

Monday, February 1, 2010

Remove an old Ubuntu Kernels

Someone has asked to me "how to remove old Ubuntu Kernels"Every time Ubuntu installs a new Linux kernel, the old one is left behind. This means that if you are regularly updating an Ubuntu system the Grub boot menu becomes longer and longer with kernels you don’t need anymore.The old kernels are deliberately left installed and on the menu so you can boot a previous kernel if you have trouble with a new one. But if the new one works, you can safely uninstall the old kernel, which will also result in the Grub menu being cleaned up.First you need to find out what your current kernel is. Open a terminal and run the following command:uname -rIt will print the version of the Linux kernel you are running, this is the one you want to keep. It should look something like this:2.6.31-14-genericThis is...

Tuesday, January 19, 2010

Fake Facebook Account

While playing facebook, I accidentally saw a facebook account that uses the name Don Tukulesto.Unexpectedly turned out to have something to drop the name of a Don Tukulesto, is that way until someone wants to get popularity in the eyes of other people to use another person's name?lmaoWALL POSTINFOTHIS IS THE FAKE ACCOUNT OF DON TUKULESTO WATCH H...

Saturday, January 16, 2010

Broadcasting from your own server: Setting up the SHOUTcast Radio DNAS Application

This tutorial is recommended for advanced users.If you chose to setup your own server, you will need lots of bandwidth and a stable connection to the Internet. What do we mean by "your own server"? By that we mean a computer host, usually a pretty powerful one, which you can use to serve websites from. In that regard, a SHOUTcast server will be responsible for identifying in the SHOUTcast Radio Directory your radio to your listeners.Downloading the SHOUTcast DNAS application and setting up your server should take approximately 45 minutes of your time, but may take longer depending on your level of technical expertise.Ready? Let's get started:Installation instructions for each platform are below:Windows 98/ME/2000/XP:1. Download the SHOUTcast DNAS application for Windows by proceeding to this...

Broadcasting through a third-party server or stream hosting solution: Using Winamp with the SHOUTcast Radio DSP Plug-in

If you would like to start your own internet radio station without the hassle of running your own server this is the solution for you. You can host your radio broadcast through a willing third party that will handle the actual streaming for you, leaving you to only worry about what you want to play on your internet radio station! You can search the Internet for the streaming host solution that fits you needs and your budget.Once you have a streaming host in place, you can use the Winamp media player along with the SHOUTcast DSP plug-in to start broadcasting. This plug-in is responsible for sending the audio source feed of your internet radio station to your streaming server, from where it is broadcasted out to your listeners.Instructions -...

Saturday, January 9, 2010

MD5 Hash Cracked Password

d848256cd1ecf2e2fd3927402b194264 - brunoy0f0ece8ebf36f6e8b9f7705243ed6242 - jackeib4cb2a21617c44ae3f3ab0eeaf794fe1 - hum6234042d830dff98f20e9bde2b44616c87e5ab - test1000b45cffe084dd3d20d928bee85e7b0f21 - string0acf4539a14b3aa27deeb4cbdf6e989f - michael4363137f5f83eadeb986fd500bd1fdec - monasb1d49861c0d4ff001d3e736390bc71e9 - depkesdd35e276b2dc45156573a4a10d6a0218 - dephut813c9b334711f6d2bfe9ba5dcf748fd5 - deptanf3f4196460def45be3f4714d34b40d59 - dephan9ef511521f0b69046ebdaa44afad0664 - depkeud1c7e93048a30d60d970e18407699c25 - dinkes03c7173d2ed6323f73452218ae626b78 - kesehatan852de20c088da50f9fcd8270341a015c - depdagria274e4b07f5556db026f41c2b2779718 - deplu6c587ed2b7910068a82ef82e3129597c - depkomc8c44d066af753e1f98ca6d853954bf9 - depinfo4bc4faa2af8971dbb0ca809b9f94d4e9 - depdikbud93fa8f06415338c64bd2a1a9465a5a2f...

Monday, January 4, 2010

Texas Holdem Starting Hands - a Deeper Look

Before reading this little article, review the starting hand table here. It is obvious that AA is a better starting hand then A2 but why are some hands strong in certain situations and why are some hands not? Extremes are always easy but most the game is spent in the muggy middle. Let's try to clear it up some.For example, would you be surprised if your pocket aces lost when 9 other people were against you? Would you prefer another hand, like a suited connector, in that situation? Why is it that K7s is not a very good hand but something like 87s is?If you have already played holdem for sometime then these answers may pop right out; it isn't obvious though to a beginner and it is funny that many people who have been playing for decades still...

Pages 3123 »
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons