penetration testing – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 09 Mar 2020 23:52:42 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png penetration testing – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Building an Open Source Community: Wirefall | Jupiter Extras 62 https://original.jupiterbroadcasting.net/140122/building-an-open-source-community-wirefall-jupiter-extras-62/ Tue, 10 Mar 2020 04:00:00 +0000 https://original.jupiterbroadcasting.net/?p=140122 Show Notes: extras.show/62

The post Building an Open Source Community: Wirefall | Jupiter Extras 62 first appeared on Jupiter Broadcasting.

]]>

Show Notes: extras.show/62

The post Building an Open Source Community: Wirefall | Jupiter Extras 62 first appeared on Jupiter Broadcasting.

]]>
Pentesting Problems: Bryson Bort | Jupiter Extras 60 https://original.jupiterbroadcasting.net/139917/pentesting-problems-bryson-bort-jupiter-extras-60/ Tue, 03 Mar 2020 04:00:00 +0000 https://original.jupiterbroadcasting.net/?p=139917 Show Notes: extras.show/60

The post Pentesting Problems: Bryson Bort | Jupiter Extras 60 first appeared on Jupiter Broadcasting.

]]>

Show Notes: extras.show/60

The post Pentesting Problems: Bryson Bort | Jupiter Extras 60 first appeared on Jupiter Broadcasting.

]]>
Mastering Cyber Security Basics: James Smith | Jupiter Extras 58 https://original.jupiterbroadcasting.net/139727/mastering-cyber-security-basics-james-smith-jupiter-extras-58/ Tue, 25 Feb 2020 04:00:00 +0000 https://original.jupiterbroadcasting.net/?p=139727 Show Notes: extras.show/58

The post Mastering Cyber Security Basics: James Smith | Jupiter Extras 58 first appeared on Jupiter Broadcasting.

]]>

Show Notes: extras.show/58

The post Mastering Cyber Security Basics: James Smith | Jupiter Extras 58 first appeared on Jupiter Broadcasting.

]]>
Hacking on Linux | Ask Noah 40 https://original.jupiterbroadcasting.net/120757/hacking-on-linux-ask-noah-40/ Tue, 19 Dec 2017 01:00:54 +0000 https://original.jupiterbroadcasting.net/?p=120757 RSS Feeds: MP3 Feed | HD Video Feed | iTunes Feed Become a supporter on Patreon: — Show Notes: — — The Cliff Notes — Zoneminder – Open Source Security Cameras Home Assistant – Open Source Home Automation NMap – Open Source Network Scanning Metasploit – Open Source Exploit Scanner Tripwire – Open Source Intrusion […]

The post Hacking on Linux | Ask Noah 40 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | HD Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —

— The Cliff Notes —

Vote for your favorite Distro

Join us for the AMA Episode

  • Ask Noah anything you want about any topic personal or tech!
  • Call In 1-855-450-NOAH
  • Monday, December 25th
  • Listen Live
  • Watch Live

— Stay In Touch —

Find all the resources for this show on the Ask Noah Dashboard

Ask Noah Dashboard

Need more help than a radio show can offer? Altispeed provides commercial IT services and they’re excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show!

Altispeed Technologies

Contact Noah

asknoah [at] jupiterbroadcasting.com

— Twitter —

The post Hacking on Linux | Ask Noah 40 first appeared on Jupiter Broadcasting.

]]>
Hacking Devices with Kali Linux | LINUX Unplugged 214 https://original.jupiterbroadcasting.net/118191/hacking-devices-with-kali-linux-lup-214/ Tue, 12 Sep 2017 21:23:15 +0000 https://original.jupiterbroadcasting.net/?p=118191 RSS Feeds: MP3 Feed | iTunes Feed | Video Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Follow Up / Catch Up Equifax blames open-source software for its record-breaking security breach It’s far more likely that — if the problem was indeed with Struts — it was with a separate but equally […]

The post Hacking Devices with Kali Linux | LINUX Unplugged 214 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Follow Up / Catch Up

Equifax blames open-source software for its record-breaking security breach

It’s far more likely that — if the problem was indeed with Struts — it was with a separate but equally serious security problem in Struts, first patched in March.

Linus Torvalds Wants Hackers to Join Linux Before They Attack Linux

Torvalds also noted that as a technical person he is impressed by the ingenuity of the people who attack Linux code.

“There are smart people doing bad things. I wish they were on our side, and they could help us,” Torvalds said. “Where I want us to go is to get as many smart people as we can before they turn to the dark side.

“We would improve security that way and get those who are interested in security to come to us before they attack us,” he added.

GNOME 3.26: Wayland vs. X.Org Performance – Boot Times, Power Use, Memory Use & Gaming

  • Wayland loads the desktop slightly faster
  • no real significant difference in memory and battery consumption
  • On benchmarks that can use Wayland directory there is no significant difference between Mutter using Wayland or Xorg
  • On benchmarks forced to use XWayland Xorg is like 5 times more frames per second.

Linux Academy

Mailspring – The best free email app

A fast and maintained fork of Nylas Mail – the best free email app for Mac, Linux, and Windows.

Hi there! My name is Ben Gotow, and I’m one of the original authors of Nylas Mail. My company, Foundry 376, is re-launching Nylas Mail because I believe it can be—and should have been—the best new mail client in a decade.

Manjaro Linux has a Laptop

Powered with 7th Generation Intel Core Processors, up to 32GB RAM and dual drive bays, the Spitfire can take whatever you can throw at it. And keep going.

With a super-light all-aluminum chassis, and a killer 1080p IPS display, the Spitfire can run Manjaro at blazing speed.

Key features are:

  • 7th Gen Intel® Core™ CPUs (i5-7200u or i7-7500u)
  • INTEL® HD GRAPHICS 610/620
  • Backlit Keyboard
  • Silver Aluminium Chassis
  • DDR4 Memory Support up to 32 GB of RAM
  • Ultra thin: just 17.8mm!
  • Full HD IPS 1920 x 1080
  • SuperFast SSDs (up to 500 GB)
  • SuperSpeed USB 3.0
  • HDMI Output Connection
  • Mini Display Port
  • 1.0MP Webcam
  • Wireless Fitted as Standard

Ubuntu GNOME Shell in Artful: Day 11

However, as I mentioned when talking about our new Ubuntu Shell theme, GDM, as being a system-wide component, will keep using our Ubuntu style with no easy way to change it. The theme name is indeed hardcoded in the Shell for good reasons (for instance, there is the fear that user themes, changing the css, may end up being outdated, and potentially can break the Shell and GDM, leaving the user with no UI at all). We were distro-patching this by changing gnome-shell.css by our ubuntu.css style.

It would mean as well people switching to the vanilla session or GNOME classic had no way (apart from recompiling) to change the current GDM theme.

DigitalOcean

Hacking IoT Devices with Kali Linux

Remember BackTrack Linux?

The BackTrack distribution originated from the merger of two formerly competing distributions which focused on penetration testing:

  • WHAX: a Slax-based Linux distribution developed by Mati Aharoni, a security consultant. Earlier versions of WHAX were called _Whoppix_[6] and were based on Knoppix.
  • Auditor Security Collection: a Live CD based on Knoppix developed by Max Moser which included over 300 tools organized in a user-friendly hierarchy.

The overlap with Auditor and WHAX in purpose and in collection of tools partly led to the merger.

Note: BackTrack Linux is no longer being maintained. Please check www.kali.org

Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution

Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.


TING

Official Kali Linux Downloads

We generate fresh Kali Linux image files every few months, which we make available for download. This page provides the links to download Kali Linux in its latest official release. For a release history, check our Kali Linux Releases page. Please note: You can find unofficial, untested weekly releases at https://cdimage.kali.org/kali-weekly/.

netdiscover: netdiscover

To discover the IP’s on an internal network, we will usually want to scan a range of IP addresses. In netdiscover, we can use the -r switch (for range) and then in CIDR notation provide it the network range we want it to scan. In the command below, we are asking netdiscover to find all the live hosts with IP addresses between 192.168.1.1 to 192.168.1.255. We do this by typing;

netdiscover -r 192.168.1.0/24

OpenVAS – OpenVAS – Open Vulnerability Assessment System

OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.

Metasploit Framework | Kali Linux

In keeping with the Kali Linux Network Services Policy, no network services, including database services, run on boot as a default, so there are a couple of steps that need to be taken in order to get Metasploit up and running with database support.

The post Hacking Devices with Kali Linux | LINUX Unplugged 214 first appeared on Jupiter Broadcasting.

]]>
Skills to Pay the Bills | CR 267 https://original.jupiterbroadcasting.net/117006/skills-to-pay-the-bills-cr-267/ Thu, 27 Jul 2017 13:39:45 +0000 https://original.jupiterbroadcasting.net/?p=117006 RSS Feeds: MP3 Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video Become a supporter on Patreon: — Show Notes: — Feedback Nick’s Email Andrew’s Das Kapital Perspective on GPL Logan’s RSI Feedback Hoopla Why I’m Learning Perl 6 Mike’s Reluctant Embrace of JS Classes How Dropbox securely stores your passwords […]

The post Skills to Pay the Bills | CR 267 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | Video Feed | Torrent Feed | iTunes Audio | iTunes Video

Become a supporter on Patreon:

Patreon

— Show Notes: —

Feedback

Hoopla

Bootcamps Booted

Book Pick

WebGL Insights presents real-world techniques for intermediate and advanced WebGL developers by assembling contributions from experienced WebGL engine and application developers, GPU vendors, browser developers, researchers, and educators. By focusing on current and emerging techniques , WebGL Insights demonstrates the breadth and depth of WebGL. Readers will gain practical skills to solve problems related to performance, engine design, shader pipelines, rendering, mobile devices, testing, and more.

The post Skills to Pay the Bills | CR 267 first appeared on Jupiter Broadcasting.

]]>
Fixing the Barn Door | TechSNAP 257 https://original.jupiterbroadcasting.net/97301/fixing-the-barn-door-techsnap-257/ Thu, 10 Mar 2016 09:39:46 +0000 https://original.jupiterbroadcasting.net/?p=97301 We’ll tell you about the real world pirates that hacked a shipping company, the open source libraries from Mars Rover found being used in malware & Microsoft’s solution for that after-hack hangover. Plus great questions, a packed round up & much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | […]

The post Fixing the Barn Door | TechSNAP 257 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll tell you about the real world pirates that hacked a shipping company, the open source libraries from Mars Rover found being used in malware & Microsoft’s solution for that after-hack hangover.

Plus great questions, a packed round up & much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Pirates hacked Shipping Company to find valuable cargo

  • As described in Verizon’s most recent Data Breach Digest, a collection of cyber-security case studies the company’s RISK Team helped investigate and solve sometime in the past year, a reputable global shipping conglomerate started having peculiar problems with sea pirates.
  • The shipping company was telling Verizon that pirates were boarding their vessels at regular intervals.
  • Equipped with a barcode reader (and weapons, of course), searching specific crates, emptying all the high-value cargo, and making off with the loot within minutes of launching their attacks.
  • All of this made the shipping company think there was something strange and hired the RISK Team to track down the source of a possible leak.
  • The RISK Team quickly narrowed down the problem to the firm’s outdated custom-built CMS, which featured an insecure upload script.
  • As the Verizon team explained, a hacker, either part of the sea pirates group or hired by them, had uploaded a Web shell via this insecure form. In turn, this shell was uploaded inside a Web-accessible directory.
  • To make things worse, that particular folder also had “execute” permissions.
  • Using this access to the shipping firm’s database, the hacker pulled down BoLs (bills of lading), future shipment schedules, and ship routes so the pirates could plan their attack and identify crates holding valuable content.
  • Fortunately, the hacker wasn’t that skilled. Verizon says that the attacker used a Web shell that didn’t support SSL, meaning that all executed commands were recorded in the Web server’s log.
  • The RISK Team was able to recreate a historic timeline of all the hacker’s actions and identify exactly what he looked at and where he sent the files.
  • Verizon’s RISK Team states:

“These threat actors, while given points for creativity, were clearly not highly skilled,” the RISK Team explains. “For instance, we found numerous mistyped commands and observed that the threat actors constantly struggled to interact with the compromised servers.”


Open source libraries from Mars Rover found being used in malware

  • According to Palo Alto Networks, on December 24, 2015, India’s Ambassador to Afghanistan received a spear-phishing email that contained a new malware variant, which, if downloaded and installed, would have opened a backdoor on the official’s computer.
  • India has been a trustworthy business partner for Afghanistan, helping the latter build its new Parliament complex, the Salma Dam, along with smaller transportation, energy, and infrastructure projects.
  • Because of this tight collaboration between the two, it is normal that other nations or interest groups may want to know what the two countries are planning together.
  • The Ambassador’s email was spoofed and made to look like it was coming from India’s Defense Minister, Manohar Parrikar. Attached to the email was an RTF file.
  • Palo Alto researchers say that this file contained malicious code to exploit the CVE-2010-3333 Office XP vulnerability, resulting in the download of a file named “file.exe” from the newsumbrealla[.]net domain.
  • This file was automatically launched into execution and was a simple malware payload dropper that was tasked with downloading the real threat, a new trojan that the researchers christened Rover.
  • This malware was given the “Rover” name because it relied on the OpenCV and OpenAL open source libraries, both used in the software deployed with the famous Mars Rover exploration robot.
  • OpenCV is a library used in computer vision applications and image processing while OpenAL is a cross-platform library for working with multichannel audio data.
  • Its capabilities included the ability to take screenshots of the desktop in BMP format and send them to the C&C server every 60 minutes, logging keystrokes and uploading the data to the C&C server every 10 seconds, and scanning for Office files and uploading them to the C&C server every 60 minutes.
  • Additionally, there was also a backdoor component that allowed attackers to send commands from the C&C server and tell Rover to take screenshots or start recording video (via webcam) and audio (via microphone) whenever the attacker wanted to.
  • “Though ‘Rover’ is an unsophisticated malware lacking modern malware features, it seems to be successful in bypassing traditional security systems and fulfilling the objectives of the threat actor behind the campaign in exfiltrating information from the targeted victim,” Palo Alto researchers explain.
  • Rover is largely undetected by today’s antivirus engines, and despite not coming with that many features, it is successful at keeping a low profile, exactly what cyber-espionage groups need from their malware to begin with.
  • New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan – Palo Alto Networks Blog

Microsoft brings post-breach detection features to Windows

  • Microsoft announced its new post-breach enterprise security service called Windows Defender Advanced Threat Protection, which will respond to these advanced attacks on companies’ networks.
  • The company found that it currently takes an enterprise more than 200 days to detect a security breach, and 80 days to contain it. When there is such a breach, the attackers can steal company data, find private information, and damage the brand and customer trust in the company.
  • For example, a social engineering attack might encourage a victim to run a program that was attached to an e-mail or execute a suspicious-looking PowerShell command. The Advanced Persistent Threat (APT) software that’s typically used in such attacks may scan ports, connect to network shares to look for data to steal, or connect to remote systems to seek new instructions and exfiltrate data. Windows Defender Advanced Threat Protection can monitor this behavior and see how it deviates from normal, expected system behavior. The baseline is the aggregate behavior collected anonymously from more than 1 billion Windows systems. If systems on your network start doing something that the “average Windows machine” doesn’t, WDATP will alert you.
  • The whole thing is cloud-based with no need for any on-premises server. A client on each endpoint is needed, which would presumably be an extended version of the Windows Defender client.
  • Windows Defender Advanced Threat Protection is under development, though it is currently available to some early-adopter customers.
  • This service will help enterprises to detect, investigate and respond to advanced attacks on their networks.
  • Microsoft said that it is building on the existing security defenses Windows 10 offers today, and the new service will provide a post-breach layer of protection to the Windows 10 security stack.
  • With the client technology built into Windows 10 along with the cloud service, it will help detect threats that have made it past other defenses, provide enterprises with information to investigate the breach across endpoints, and offer response recommendations.
  • To avoid Windows 7 becoming “the new Windows XP,” the company is being rather more aggressive in applying pressure on users to upgrade to Windows 10 sooner rather than later.
  • WDATP is going to be part of that same push to Windows 10, and it won’t be available for older operating systems.
  • Windows Defender Advanced Threat Protection uses cloud power to figure out you’ve been pwned | Ars Technica

Feedback:


Round Up:


The post Fixing the Barn Door | TechSNAP 257 first appeared on Jupiter Broadcasting.

]]>