Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - Axon

Pages: 1 [2] 3 4 ... 33
16
Operating System / Evolve OS
« on: January 26, 2015, 10:05:30 pm »
This is the newest Linux distro to be released in 2015. The first beta release was announced in 26/1/2015. 

Evolve OS is a Linux distribution built from scratch. It uses a forked version of the PiSi package manager, maintained as "eopkg" within Evolve OS, and a custom desktop environment called "Budgie", developed in-house. The Budgie desktop, which can be set to emulate the look and feel of the GNOME 2 desktop, is tightly integrated with the GNOME stack. The distribution is available for 64-bit computers only.

https://evolve-os.com/

17
Security Tools / xsscrapy
« on: January 18, 2015, 09:10:46 am »
xsscrapy is Fast, thorough, XSS/SQLi spider. Give it a URL and it'll test every link it finds for cross-site scripting and some SQL injection vulnerabilities.
https://github.com/DanMcInerney/xsscrapy

18
Security Tools / SPARTA
« on: January 14, 2015, 04:29:01 pm »
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his toolkit and by displaying all tool output in a convenient way.

http://sparta.secforce.com/

19
Found it on the Webs / Slur
« on: December 30, 2014, 11:19:20 pm »
Slur is an open source, decentralized and anonymous marketplace for the selling of secret information in exchange for bitcoin. Slur is written in C and operates over the Tor network with bitcoin transactions through libbitcoin. Both buyers and sellers are fully anonymous and there are no restrictions on the data that is auctioned. There is no charge to buy or sell on the Slur

http://slur.io/

That's disturbing!!!

20
Android / Mobile XSS Scanner
« on: December 29, 2014, 01:19:02 pm »
According to this website, this the first mobile XSS scanner designed for use in Android devices.
http://m.xenotix.in/

21
Android / SnoopSnitch
« on: December 28, 2014, 06:05:36 pm »
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.
https://opensource.srlabs.de/projects/snoopsnitch

22
Found it on the Webs / USBdriveby
« on: December 19, 2014, 04:00:53 pm »
USBdriveby is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on an unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing controlled commands, flailing the mouse pointer around and weaponizing mouse clicks.
http://samy.pl/usbdriveby/

23
Found it on the Webs / Google - Year in Search 2014
« on: December 18, 2014, 07:26:12 pm »

24
Articles / Blackphone launching world’s first privacy-focused app store
« on: December 13, 2014, 04:15:13 pm »
Privacy-first smartphone company Blackphone is launching its own app store for users concerned about privacy and security. The Blackphone app store will be available in January and will monitor apps to make sure they do not snoop on users.
http://www.theguardian.com/technology/2014/dec/09/blackphone-app-store-opens

Let's hope the NSA and GCHQ won't poke their noses into this new device mobile phone as they have done with millions worldwide.

25
Mobile Hacking / Why passwords should not be stored on a mobile device
« on: December 12, 2014, 02:22:11 pm »
This link discusses the problem with password storage in modern mobile phones (e.g iOS, Android). Interesting to read.
http://mobilesecurityares.blogspot.de/2014/12/why-passwords-should-not-be-stored-on.html

26
Hacking and Security / The enigma of Regin
« on: November 26, 2014, 08:39:14 pm »
This is the most recent discovery in cyber espionage threats. Another highly sophisticated malicious platform. You will only comprehend the level of sophistication if you read the Kaspersky report.

Quote
A leading computer security company says it has discovered one of the most sophisticated pieces of malicious software ever seen. Symantec says the bug, named Regin, was probably created by a government and has been used for six years against a range of targets around the world.

Once installed on a computer, it can do things like capture screenshots, steal passwords or recover deleted files. Experts say computers in Russia, Saudi Arabia and Ireland have been hit most. It has been used to spy on government organisations, businesses and private individuals, they say.

Researchers say the sophistication of the software indicates that it is a cyber-espionage tool developed by a nation state. They also said it likely took months, if not years, to develop and its creators have gone to great lengths to cover its tracks. Sian John, a security strategist at Symantec, said: "It looks like it comes from a Western organisation. It's the level of skill and expertise, the length of time over which it was developed." Symantec has drawn parallels with Stuxnet, a computer worm thought to have been developed by the US and Israel to target Iran's nuclear program. That was designed to damage equipment, whereas Regin's purpose appears to be to collect information.
http://www.bbc.com/news/technology-30171614

Regin: Top-tier espionage tool enables stealthy surveillance
http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance

Kaspersky full report.
https://securelist.com/files/2014/11/Kaspersky_Lab_whitepaper_Regin_platform_eng.pdf

The usual suspects ::)
http://www.zdnet.com/now-we-know-who-developed-state-sponsored-regin-malware-7000036111/

27
Hardware / USB problem
« on: November 22, 2014, 05:46:59 pm »
I bought Sandisk 16 GB last night, just a few minutes ago, I tried to install a linux distro, I used ImageUSB
http://www.osforensics.com/tools/write-usb-images.html
After finishing the image writing, the usb somehow got corrupted?!


The default options of the software, are shown in the image below.


What went wrong that caused my new USB to be corrupted?  :'(

28
Found it on the Webs / Rise of the hackers
« on: November 21, 2014, 09:50:16 pm »
I just found this really interesting documentary about hackers and hacking. Produced by PBS Nova and titled "Rise of the hackers", aired Sep 24 2014. I just watched 15 minutes of it and I think it is a must watch for you guys.
https://www.youtube.com/watch?v=7pvF1O9LJfU

29
Hacking and Security / Darkhotel: The unusual hospitality
« on: November 20, 2014, 01:16:27 am »
So, you may have heard of this term, or you may not.

Quote
Business executives visiting luxury hotels in Asia have been infected with malware delivered over public Wi-Fi networks, Russian security firm Kaspersky Lab has discovered. The so-called ‘Darkhotel’ hackers managed to tweak their code to ensure that only machines belonging to specific targets were infected, not all visitors’ PCs, and may have included state-sponsored hacking.
http://www.theguardian.com/technology/2014/nov/10/hotel-wi-fi-infected-business-travellers-asia-kaspersky

http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2014/11/darkhotel_kl_07.11.pdf

I strongly feel China has something to do with this, they are relentless when it comes to stealing other nations ideas. This is defiantly a major concern for anyone thinking of travailing to Asia.

30
General discussion / 3 years of Awesomeness
« on: November 18, 2014, 10:02:30 pm »
This is my third anniversary in EZ. Three years and I'm still lovin' it. Three years and still call this my cyber home. Three years and this is the best sec community I've ever seen.  8)




Pages: 1 [2] 3 4 ... 33


Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.