Metasploit – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:47:48 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Metasploit – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Ethically Hacked | TechSNAP 120 https://original.jupiterbroadcasting.net/40802/ethically-hacked-techsnap-120/ Thu, 25 Jul 2013 19:17:35 +0000 https://original.jupiterbroadcasting.net/?p=40802 A huge amount of SIM cards are susceptible to an Over the Air attack, Apple’s hacker outs himself, and the trouble with the Ubuntu forums!

The post Ethically Hacked | TechSNAP 120 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A huge amount of SIM cards are susceptible to an Over the Air attack, Allan’s got the details, Apple’s hacker outs himself, and the trouble with the Ubuntu forums!

Plus a batch of your questions, and much much more!

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit techsnap.ting.com to save $25 off your device or service credits.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed


Security Researcher Claims Apple Developer Website Hack

  • Apple\’s Developer Center first went offline last Thursday, and on Sunday, Apple revealed that it had been taken down as a precaution after a security breach. It is unclear who was responsible for the hacking, but a security researcher, Ibrahim Balic has suggested that he might be to blame for the outage.
  • The company added that critical developer data had not been compromised and that they were working day n’ night to fix the vulnerability and bring the site back online.
  • According to 9 to 5 Mac adds that, “In an email… Balic … is persistent in stating he did this for security research purposes and does not plan to use the information in any malicious manner.”
  • The comment comes from independent security researcher Ibrahim Balic, who claims that his effort was not intended to be malicious and that he reported his findings to Apple just hours before the developer site was taken down by the company.
  • Balic, who has reported 13 different bugs to Apple, originally discovered an iAd Workbench vulnerability on June 18 that allowed a request sent to the server to be manipulated. This security hole could be used to acquire the names and email addresses of iTunes users (even non-developers).
  • After finding the loophole, Balic wrote a Python script to harvest data from the vulnerability and then displayed it in a YouTube video, which may have put him on Apple\’s radar.
  • In addition to the iAd Workbench bug, Balic also discovered and submitted a report on a bug that caused the Dev Center site to be vulnerable to a stored XSS attack. While Balic says that it was possible to access user data by exploiting the Dev Center issue, he claims that he did not do so.
  • New Details Emerge on Security Researcher Potentially Responsible for Dev Center Outage s
  • Apple Outlines Plan for Bringing Developer Center Back Online
    Additional Coverage

Ubuntu Forums compromised

  • The forums were defaced and the database compromised
  • There were approximately 1.82 million registered accounts in the forum database
  • Attackers have access to each of these user\’s username, password and email address
  • The passwords were salted hashes, but by which algorithm was not made clear. Where these cryptographic hashes, or just md5(salt+md5(password)) or similar like some forum software?
  • If you were a registered user, and reused that password anywhere else, you are likely going to have a bad time
  • “Ubuntu One, Launchpad and other Ubuntu/Canonical services are NOT affected by the breach”
  • Timeline:
  • 2013-07-20 2011 UTC: Reports of defacement
  • 2013-07-20 2015 UTC: Site taken down, this splash page put in place while investigation continues.
  • 2013-07-21: we believe the root cause of the breach has been identified. We are currently reinstalling the forums software from scratch. No data (posts, private messages etc.) will be lost as part of this process.
  • 2013-07-22: work on reinstalling the forums continues.

Feedback:

TechSNAP Bitmessage: BM-GuGEaEtsqQjqgHRAfag5FW33Dy2KHUmZ

The enterprise-class Open Source LDAP server for Linux. It is hardened by real-world use, is full-featured, supports multi-master replication, and already handles many of the largest LDAP deployments in the world. The 389 Directory Server can be downloaded for free and set up in less than an hour using the graphical console.

Round Up:


The post Ethically Hacked | TechSNAP 120 first appeared on Jupiter Broadcasting.

]]>
Self Healing Internet | TechSNAP 76 https://original.jupiterbroadcasting.net/24846/self-healing-internet-techsnap-76/ Thu, 20 Sep 2012 16:42:00 +0000 https://original.jupiterbroadcasting.net/?p=24846 The story about an antivirus that detects itself, IE’s awful zero day exploits, and the Internets amazing ability to route around problems.

The post Self Healing Internet | TechSNAP 76 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The story about an antivirus that detects itself, IE’s awful zero day exploits, and the Internets amazing ability to route around problems.

Plus: A huge batch of your feedback, and so much more in this week’s episode of TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

SPECIAL OFFER! Save 20% off your order!
Code: go20off5

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Sophos anti-virus detects it self

  • Earlier this week Sophos released a scheduled update to their anti-virus definition files
  • The new definitions detected the Sophos updating process, and a number of other auto-updating applications, as variants of the malware Shh/Updater-B
  • In addition to setting of a huge volume of false positives, the detection also resulted in the quarantine, blocking or deletion of parts of the Sophos updater
  • The updated definitions that solve the problem were released on Wed, 19 Sep 2012 21:32 BST
  • However, the updated definitions could not be downloaded by Sophos, because the updater had been broken
  • This is an especially large issue for enterprise deployments of Sophos
  • The Sophos support number was down, the call volume was so great that most people could not even get into the hold queue

0-day Flaw in Internet Explorer active in the wild

  • Internet Explorer versions 6 through 9 are vulnerable to a new series of attacks
  • Exploits for a previously unknown use-after-free memory corruption vulnerability, in addition to three more exploits that were found and tied to a hacker group in China known as Nitro (the same group responsible for exploits of two zero-day Java flaws disclosed three weeks ago)
  • Security researcher Eric Romang discovered the first of the exploits last weekend while monitoring an infected server
  • When a user lands on an infected page, the exploit installs the PoisonIvy remote access Trojan
  • Jaime Blasco of AlienVault Labs then discovered three additional exploits, one of which drops the PlugX trojan
  • The new exploits appear to be targeted at defense contractors in the U.S. and India
  • An unknown exploit was found in a Defense News Portal site in India, it had been served for at least four days
  • Microsoft is slated to release a patch on Friday , until then, a ‘fixit’ patch is available
  • A new metasploit module to test for and exploit the vulnerability has been released
  • Additional Coverage

The “top secret” room where 260 Internet Service Providers connect

  • Nearly every carrier neutral data center in the world contains a MeetMe room
  • MeetMe rooms more often used for private peering, rather than internet transit
  • Transit is when you buy ‘Internet’ service from another provider, they provide you with a ‘default route’ that you can send traffic to, and it will be delivered to anywhere on the internet
  • Peering is where providers swap traffic that is specifically destin to each others networks, so if Provider A peers with Provider B, Provider A must use their transit connection to reach provider C, only traffic between A and B (and their customers) are allowed across the ‘peering’ link
  • If 1 Wilshire (the building in question) were to go entirely offline, all connections in and out severed, the Internet would continue to operate, traffic would be routed around the missing nodes
  • Performance would be degraded, and it is possible that some of the ‘backup’ routes could not handle all of the traffic, but the network would not cease to work
  • The Internet is based on the principle of being able to get data from Point A to any Point B, reliably
  • To do this, the Internet’s backbone providers use BGP4 routing protocol (Border Gateway Protocol)
  • Most Internet Transit providers have maps that look like this:
  • nLayer
  • Hurricane Electric
  • Abovenet (Zayo)
  • Level3
  • NTT
  • Vocus (Australian)
  • As you can see on most all of these maps, there are almost always multiple paths that a packet can take to get from point A to point B

Feedback:

Special Community Events

  • Lynx Music:

He goes by Illusionist Lynx and he’s used MATH to make music (and a bunch of ther cool methods) check out his pay-what-you-want music on his bandcamp site: Illusionist Lynx

  • Nicholas is getting married, and he needs your HELP!

Nicholas is live streaming his marriage proposal, and hopes to have the JB audience tune in, and maybe help get his girl friend to the right location!

The site people can visit is https://rachelwillyoumarryme.com/

  • Visit his site an hour before the event (countdown on his website)
  • When the call to action comes, help him spam his girlfriend into arriving at the correct location.
  • To help organize, show up early and watch the show’s subreddit!

Have some fun:

What I wish the new hires “knew”

Round-Up:

The post Self Healing Internet | TechSNAP 76 first appeared on Jupiter Broadcasting.

]]> BackTrack Review by Example | LAS | s23e04 https://original.jupiterbroadcasting.net/23686/backtrack-review-by-example-las-s23e04/ Sun, 26 Aug 2012 13:01:28 +0000 https://original.jupiterbroadcasting.net/?p=23686 We use BackTrack 5 R3 to hack a remote box, and get root access. We cover the high and low points of the security toolbox distribution.

The post BackTrack Review by Example | LAS | s23e04 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We use BackTrack 5 R3 to hack a remote box, and get root access. We cover the high and low points of the security toolbox distribution.

Plus – The outreach from the Linux community helping one of our own receive life saving medical treatments.

Then it’s your feedback…

And so much more!

All this week on, The Linux Action Show!

Thanks to:

GoDaddy.com

Limited time offer:
SPECIAL OFFER! For all customers, Save 20% off your order! – code: go20off6
Expires: August 31st 2012

Missed the good deal? Use our code LINUX and save 10%! anytime!

Direct Download:

HD Video | Mobile Video | Ogg Video | MP3 Audio | Ogg Audio | YouTube | Torrent File

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

   

Show Notes:

Runs Linux:

Android Pick:

Desktop App Pick:

Distro Of The Day

Linux Action Show Subreddit

Search our past picks:

News:

Helping A Fellow Linux Geek:

BackTrack Review:

This famous distro is a powerhouse of troublemaking, but in the right hands it can keep you on top of expolit, and ahead of the attackers. We review BackTrack 5 R3 Gnome Edition.


System76

Brought to you by: System76

Feedback:

Chris’ Stash:

What’s Matt Doin?

Find us on Google+
Find us on Twitter:

Follow the network on Facebook:

Jupiter Broadcasting Forum:

Catch the show LIVE Sunday 10am Pacific / 5pm UTC:

The post BackTrack Review by Example | LAS | s23e04 first appeared on Jupiter Broadcasting.

]]> Learning to Hack | TechSNAP 56 https://original.jupiterbroadcasting.net/19266/learning-to-hack-techsnap-56/ Thu, 03 May 2012 17:19:29 +0000 https://original.jupiterbroadcasting.net/?p=19266 In Barnes and Noble attempt to censor a magazine article about hacking, that have propelled it into the spotlight. We’ve got the details on this great write up!

The post Learning to Hack | TechSNAP 56 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In Barnes and Noble attempt to censor a magazine article about hacking, that have propelled it into the spotlight. We’ve got the details on this great write up!

PLUS: Moving big files around the world, faster torrents, and Microsoft’s hotmail flaw.

All that and more, in this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer:

New customers 25% off your entire order, code: 25MAY7
Expires: May 31, 2012

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | Torrent File

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Support the Show:

Show Notes:

OpenSSL fixes land for most distros


Barnes and Noble pulls magazine for article on how to hack

  • Issue #154 of Linux Format magazine has been pulled off shelves at Barnes and Noble stores in the US after complaints about the cover article, ‘Learn To Hack’
  • The content of the article has been posted online
  • The article walks the user through using the BackTrack Linux, the Penetration Testing distribution in order to exploit a virtual machine, specifically the ‘Metaspoitable’ image, which was setup specifically to contain vulnerabilities for the user to test against and exploit
  • The tutorial then walks the user through exploiting a PHP vulnerability to get a shell, and then further exploiting the Debian SSH Key weakness to gain root access to the virtual machine
  • The tutorial then moves on from attacking servers to attacking desktop machine
  • If you have physical access to a machine, is it trivial to boot from a live cd/usb and access the files on the disks, however if the user has encrypted their home directory (a simple option in newer versions of Ubuntu), then you need to be a bit more devious
  • The tutorial walks through using the LiveCD to creating a reverse-tcp shell to allow you to access the system at a later time, once the user has mounted their encrypted /home partition, giving you access to the files
  • The tutorial goes on to explain using WireShark to capture unencrypted HTTP credentials and quite a bit more
  • Metasploit Testing Lab Setup Instructions
  • Metasploitable VM Image

Microsoft patches widely exploited 0-day flaw in hotmail password reset system

  • Researchers discovered a problem with the way hotmail handles password resets
  • When you reset a hotmail password, they provide you with a token that allows you to set a new password on the account, the issue is that their code did not properly check the token, and pretty much any non-null value allowed any user to reset any other users’ password
  • Microsoft was notified of the flaw on April 20th and responded with a fix within hours, but not before the flaw was widely exploited
  • It can be particularly difficult to recover your account from an attack like this if the attacker changed the secret answer questions, removing your further ability to reset the password
  • Flaw was discovered by Vulnerability-Lab.com

Feedback:

In this week’s feedback segment, we discuss how ScaleEngine handled the unique challenges of delivering large video files to a global audience in both the short and long term.

Round Up:

The post Learning to Hack | TechSNAP 56 first appeared on Jupiter Broadcasting.

]]>