bt4_logo

Yes that’s right, a full blown Linux distribution. It will be based on debian base packages with ubuntu repositories integration. I am pretty glad about this because it will make Backtrack much more comfortable to use as an installed Linux distribution on hdd. What exactly do i mean by comfortable:

  • up-to-date kernel
  • package updates
  • security updates
  • easy installation of new packages/applications

All of this summarizes in just two words package-management which is very important for a day to day usage of an installed on disk Linux distribution and keeps you mentally and physically in great form. 😈

You can read more about this transition to a full blown distribution here and here and yes it’s “official” because it comes from muts.

Finally for your enjoyment a collection of Backtrack4 wallpapers from the remote-exploit forum:

Tagged with:
 

Breaking news in the programming world!

In the hospital yesterday, an operator of thirteen characters was successfully removed from a patient — a web developer from near Baltimore; but as most unfortunately the surgeons had opened him in the wrong place, under the impression that he contained a stack trace, he died. The sad event has cast a gloom over the whole community.

From an article about Haskell ➡  https://avdi.org/devblog/2009/01/30/haskell-operators/

Tagged with:
 

Al Gore and the Internet

Want to know the link between Al Gore and the internet?

âž¡ https://www.eecs.umich.edu/~fessler/misc/funny/gore,net.txt

Tagged with:
 
lamo-mitnick-poulsen

Adrian Lamo, Kevin Mitnick, Kevin Poulsen

In case you have been living on the moon:

Kevin David Mitnick (born August 6, 1963) is a computer security consultant and author, who was incarcerated for more than four years without trial or a bail hearing.

He was a world-famous controversial computer hacker in the late 20th century, who was at the time of his arrest, the most wanted computer criminal in United States history. more…

Ever wanted to see Kevin in action?

See him as he types?

See him as he hacks/cracks?

Then you have clicked to the right place.

Some of the network data gathered(sniffed or logged) for prosecution before Kevin’s apprehension by telco’s and other parties involved in the investigation with the help of Tsutomu Shimomura, has been released to the public a long time ago. Shimomura used a custom version of tcpdump in his sniffing sessions on Mitnick and eventually he made a program to convert the gathered data into an interactive application that matches exactly what Mitnick was seeing and doing during his telnet sessions(it sounds more complicated than it is, a little understanding of the telnet protocol, which dominated the internet back then, and the fact that a tcpdump session on a host between mitnick and he’s other peers contains all the needed information to recreate with precise accuracy exactly what happened,when and how it looked).

They have been hosted at the evidence section on a site called Takedown(like the book by Shimomura&John Markoff and the movie) along with the prank calls made to Shimomura’s voicemail and other related stuff.

If you’re not familiar with Kevin’s story and a little bit of unix/linux i don’t think you will be making much sense out of the transcripts,except for the chatting sessions. Although this looks like a great motivation to start learning/using linux/unix just because you wanted to understand what is the stuff Kevin types while he hacks. 😈

If you want to know more about Kevin’s story just press the magic button or roll your eyes over news/articles on takedown.

For the Mitnick familiar and hackers out there i present Tsutomu’s January 25 Post to Usenet which explains with some level of detail the IP source address spoofing and TCP sequence number prediction attacks that were used by Kevin to pwn Shimomura’s diskless X terminal and from there using a loadable kernel STREAMS module an existent connection to Shimomura’s real box was hijacked thus leading to the pwnage of Tsutomu’s goodies treasurechest.It was interesting the way Tsutomu wanted to make sure the world understands how his box got owned. 😳

You will be needing telnet to view the sessions. For each session you will have to telnet on a different port on the same machine as each transcript is served through a different port.

➡  The site
➡  Telnet transcripts
➡  Voicemail pranks to Shimomura

kevin_mitnick

They always use the ugliest picture possible,so that he looks like a pedofile and everyone is happy.

I am eager to see Kevin haaack, i want to see some stuff right now! Gimme teh box and it’s hole!

Well select one from bellow based on the summary of the transcript, then open a shell and type/paste the corresponding telnet command:

This is the chat session in which Kevin asks his friend jsz at Ben-Gurion University in Israel for tools. He asks over and over again until he gets satisfaction. Since we are seeing what Kevin saw, in the talk session the top half of the window (above the dashed line) is what he was saying; the bottom is what jsz was saying.  —>

telnet kevin-on-demand.takedown.com 4009

Nobody speaks better for Kevin Mitnick than Kevin himself. Here we learn that we are indeed dealing with Mitnick, as well as good many other   things.   Do these sound like nice people to you?Discussion of Tsutomu, Markoff, Dan Farmer, a “picture on the front page of the New York Times.” —>

telnet kevin-on-demand.takedown.com 4010

Kevin breaks into Dan Farmer’s machine(creator of SATAN security scanner), fish.com, and peruses his files and mail looking for information about himself, Tsutomu, security holes, and the FBI. Breaks into Sun, confirming that the “access1” in the talk session that afternoon really did refer to access1.sun.com. Kevin also has a fascination with looking through the command histories of system administrators, presumbaly to see if they are on to him. —>

telnet kevin-on-demand.takedown.com 4013

This is the first session where a possible reference to “Mitnick” was seen. —>

telnet kevin-on-demand.takedown.com 4008

Many more here.

Dude??!? What’s a shell?!?! 🙄

This will do just fine for you:

Tagged with:
 

eset-sysinspector

ESET SysInspector is a free diagnostic tool for Windows which takes a snapshot of your core Windows system components and then applies some analysis and heuristics on the data gathered, assigns a risk level of each object in every component and then presents you with the results. It’s good both for security and general system analysis.

I use it plenty and i admit it is a very useful tool to have.

➡  ESET SysInspector

Tagged with:
 

Music with only Windows sounds

Every sound you will hear ships with Windows:

Anyway it seems that the text from the beginning has been checked with Microsoft’s Spell Checker too. 😆

Tagged with:
 

In the the Nevada desert outside of Las Vegas during CES 2009, overclockers Sampsa & SF3D from Team Finland and Pete Hardman and Sami Makinen from AMD, use a combination of liquid nitrogen and liquid helium to reach CPU tempertures of -232 degrees Celsius in order to attain CPU clock speeds of 6.5GHz and smashing the world record for 3DMarks with 45,474 3DMarks in a test.

500 litres of liquid helium for this experiment right? … uh

I especially enjoy the part where they pour liquid helium on to their heads. \o/

Tagged with: