scanner – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:48:44 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png scanner – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Kali Linux Interview | LAS 321 https://original.jupiterbroadcasting.net/62177/kali-linux-interview-las-321/ Sun, 13 Jul 2014 17:00:58 +0000 https://original.jupiterbroadcasting.net/?p=62177 The core developer of Kali Linux joins us to discuss the projects history, what keeps Kali Linux so relevant in the penetration testing industry, the future and the major misconceptions he wants to correct about the distro. Plus we’ll explains all the recent KDE releases, and demo the latest state of the Plasma 5 desktop […]

The post Kali Linux Interview | LAS 321 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The core developer of Kali Linux joins us to discuss the projects history, what keeps Kali Linux so relevant in the penetration testing industry, the future and the major misconceptions he wants to correct about the distro.

Plus we’ll explains all the recent KDE releases, and demo the latest state of the Plasma 5 desktop and tour a radio station that runs linux.

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:


DigitalOcean


Ting

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Kali Linux Interview:


System76

Brought to you by: System76

Kali Linux

Mati (muts) Aharoni

Mati Aharoni is the founder and core developer of the Kali Linux project, as well as the CEO of Offensive Security. Over the past year, Mati has been developing a curriculum designed for users who wish to make the most out of the Kali Linux operating system. By bringing together several advanced features in the Kali OS and projecting them into useful and practical scenario based exercises, the Kali Linux workshop was born. The workshop is designed to be a fast-paced, crash course to the most advanced features in the distribution, giving attendees the ability and freedom to bend Kali Linux to fit their needs.

Questions for Mati:

  • What made you to create/develop for Kali/Backtrack?

  • Do you still work in the security / penetration testing filed?

  • How do you think the industry has changed in the recent years?

  • Do you ever feel concerned that Kali could raise the wrong kind of attention?

  • Can you touch on the Backtrack to Kali transition?

  • Could you talk about the move to Debian as the base?

  • How big is the Kali Team?

  • In our Subreddit you mentioned:

One of my personal crusades in the next few months is to try to increase awareness of the flexibility of Kali Linux and try to change people’s mindsets about what our project has to offer.

Black Hat USA 2014 | The Kali Linux Dojo

The developers of Kali Linux present the first official all-day Kali Linux event at Black Hat USA 2014. Consisting of five, one-hour workshops, we will take you on a unique journey through Kali Linux while providing rare insights and an in-depth look at the most powerful features available in our advanced penetration-testing platform.


— Picks —

Runs Linux

Radio Station runs ALL Linux

Video edited entirely in Linux (Lightworks on Ubuntu 12.04 x64)

Desktop App Pick

mpv.io

a free, open source, and cross-platform media player
mpv is a fork of mplayer2 and MPlayer. It shares some features with the former projects while introducing many more.

Weekly Spotlight

Unreal Engine 4 Now Has Linux Demo Games To Try

Thanks to the community a bunch of demo games built in Unreal Engine 4 now work on 64bit Linux, so give it a try! The current Unreal Engine only supports 64bit Linux, so remember that if you plan to try the test games.


— NEWS —

KDE Frameworks 5 Has Been Officially Released

The KDE Community is proud to announce KDE Frameworks 5.0. Frameworks 5 is the next generation of KDE libraries, modularized and optimized for easy integration in Qt applications.

On Plasma 5 | Mart

We used to have a 6 months “big release” of all things KDE, called in the beginning just “KDE”, then “KDE SC”, but this release is not that anymore, because KDE grown a lot in the past years, is not just that anymore, and “a single release of everything” scales only so much.

So, when a new version will arrive? how do you check if new applications come? The development cycle will be much faster now: you can expect a new release of the KDE frameworks (so the libraries, not the applications) every month, while Plasma5 will be each 3 months instead for now.

  • Getting Started/Using Project Neon to contribute to KDE – KDE TechBase

  • wteng on Reddit ELI5: KDE SC, Plasma Next, QT5, etc?

  • KDE – The community, similar to e.g. Mozilla.

  • KDE Plasma Workspaces – The workspaces created by KDE. This is what you “log in” to, and what handles the windows, desktop, and panels. There are different KDE workspaces for different form factors, such as Plasma Desktop (most common one), Plasma Netbook, Plasma Mobile (replaced by Contour) etc. So instead of saying “I use KDE”, you probably want to say “I use [KDE] Plasma Desktop”, similar to how you would say “I use [Ubuntu] Unity” or “I use GNOME Shell”. Plasma 5 is the next generation of Plasma Workspaces. Plasma 2 and Plasma Next were temporary working names that people used to refer to Plasma 5.

  • KDE Applications – Applications created using KDE libraries.

  • KDE Frameworks – The libraries and software frameworks that allow you to create graphical applications. (Formerly called KDE Platform.)

  • Qt – The application framework and graphical toolkit that KDE Frameworks is based on. There are non-KDE applications that use Qt, for example Google Earth, VLC, etc.

Until now there was still a big bundle consisting of the libraries, Plasma Desktop, and a lot of KDE applications that were released together regularly. This bundle was internally called KDE Software Compilation. It seems like KDE is moving away from having the same release schedule for everything, which is why you’ll see things like “New version of KDE Frameworks” etc. instead of “New version of KDE”.


To summarize:

If you like the workspace (the thing you log into and that handles your windows, desktop, widgets, panel, etc.), you should look forward to Plasma 5.

If you like a KDE application, like Dolphin, Okular, Krita, etc., you should be excited about the next version of that KDE application.

If you’re a developer, then you’ll probably enjoy the improvements in KDE Frameworks and Qt. There have been rather big changes in these underlying libraries that bring several benefits to users, such as modularization (less dependencies if you just want to e.g. install a KDE application) and performance, but you really shouldn’t worry too much about these.

When before you would tell people that you use KDE, now say e.g. “I use Plasma Desktop” when referring to the workspace, or “I use Dolphin” when you want to refer to a particular application (in this case Dolphin).

Desktop Containers – The Way Forward

Containers vs Virtualization

There’s quite a lot to be said about sandboxed applications, so this is the first of two posts on the subject.

Fedora Workstation is to have support for quite some technologies, including desktop containers and sandboxed applications.

Manjaro Linux Developers Experience A Mass Exodus [Updated]

“Manjaro will still exist and we have now some issues to deal with. We are sorry to all those projects trusting on us. This issue has grown now and not only our forum is now affect. The team is in direct contact with those forums and projects. It even went so far that people using our pictures and impersonate us. Not only me but other team members as well. Friends, we will pass this issue together and it also shows how strong we are, truly. I thank you all having you in my team and doing Manjaro together.”

Feedback:

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —

— Find us on Twitter —

— Follow the network on Facebook: —

— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Kali Linux Interview | LAS 321 first appeared on Jupiter Broadcasting.

]]>
Big Brother’s Malware | TechSNAP 169 https://original.jupiterbroadcasting.net/61502/big-brothers-malware-techsnap-169/ Thu, 03 Jul 2014 12:08:05 +0000 https://original.jupiterbroadcasting.net/?p=61502 It’s great to be a malware author, if your selling to the government, Bypassing PayPal’s two-factor authentication is easier than you might think. Plus a great batch of your questions and our answers and much, much more! Thanks to: Direct Download: HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | […]

The post Big Brother's Malware | TechSNAP 169 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s great to be a malware author, if your selling to the government, Bypassing PayPal’s two-factor authentication is easier than you might think. Plus a great batch of your questions and our answers and much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Flaw in mobile app allows attackers to bypass PayPal two-factor authentication

  • Researchers at Duo Security have produced a proof-of-concept app that is able to bypass the two-factor authentication when using the PayPal mobile app, allowing an attacker to transfer funds out of a PayPal account with only the username and password, without needing to provide the one-time password
  • The PayPal bug was discovered by an outside researcher, Dan Saltman, who asked Duo Security for help validating it and communicating with the PayPal security team
  • “PayPal has been aware of the issue since March and has implemented a workaround, but isn’t planning a full patch until the end of July”
  • Currently, the PayPal mobile apps do not support 2 factor authentication, meaning if you have 2FA enabled on your PayPal account, you cannot use the mobile app
  • The exploit tricks the PayPal app into ignoring the 2FA flag and allowing the mobile app to work anyway
  • The researchers found that in the PayPal mobile app, the only thing preventing a 2FA enabled account from working was a flag in the response from the server
  • After modifying that flag, it was found that the client could login, and transfer funds
  • The check to prevent 2FA enabled accounts from logging in without the one-time passwords appears to only be enforced on the client, not the server as it should be
  • Once logged in with a valid session_id, the proof-of-concept app is able to use the API to transfer funds
  • “There are plenty of cases of PayPal passwords being compromised in giant database dumps, and there’s also been a giant rise in PayPal related phishing”
  • It is not clear how large the bug bounty on this vulnerability will be

“Hacking Team”

  • “Hacking Team” is an Italian company that develops “legal” spyware used by law enforcement and other government agencies all over the world
  • They originally came to light in 2011 after WikiLeaks released documents from 2008 where Hacking Team was trying to sell its software to governments
  • The software bills itself as “Offensive Security”, allowing LEAs to remotely monitor and control infected machines
  • The software claims to be undetectable, however when samples were anonymously sent to AV vendors in July of 2012, most scanners added definitions to detect some variants of the malware
  • In newly released research, Kaspersky has tracked the Command & Control (C2) servers used by “HackingTeam”
  • The countries with the most C2 servers include the USA, Kazakhstan, Ecuador, the UK and Canada
  • It is not clear if all of the C2 servers located in these countries are for the exclusive use of LEAs in those countries
  • “several IPs were identified as “government” related based on their WHOIS information and they provide a good indication of who owns them.”
  • The malware produced by Hacking Team has evolved to include modern malware for mobile phones
  • Although this is rarely seen, if it is only used by LEAs rather than for mass infection, this is to be expected
  • On a jail broken iOS device, the malware has the following features:
  • Control of Wi-Fi, GPS, GPRS
  • Recording voice
  • E-mail, SMS, MMS
  • Listing files
  • Cookies
  • Visited URLs and Cached web pages
  • Address book and Call history
  • Notes and Calendar
  • Clipboard
  • List of apps
  • SIM change
  • Live microphone
  • Camera shots
  • Support chats, WhatsApp, Skype, Viber
  • Log keystrokes from all apps and screens via libinjection
  • The Android version is heavily obfuscated, but it appears to target these specific applications:
  • com.tencent.mm
  • com.google.android.gm
  • android.calendar
  • com.facebook
  • jp.naver.line.android
  • com.google.android.talk
  • The article also provides details about how mobile phones are infected. Connecting a phone to an already compromised computer can silently infect it. In addition, the research includes screenshots of the iOS “Infector”, that merely requires LEAs connect the phone to their computer, where they can manually infect it before returning it to the owner
  • Additional Coverage – ThreatPost
  • Additional Coverage – SecureList
  • Additional Coverage – SecureList – Original article on HackingTeam from April 2013

Feedback:


Round Up:


The post Big Brother's Malware | TechSNAP 169 first appeared on Jupiter Broadcasting.

]]>
Don’t Switch to Linux | LINUX Unplugged 15 https://original.jupiterbroadcasting.net/46582/dont-switch-to-linux-lup-15/ Tue, 19 Nov 2013 19:43:27 +0000 https://original.jupiterbroadcasting.net/?p=46582 Our frank advice for switches to Linux. Despite what what the advocates would have you believe, there are some important consideration you should make.

The post Don’t Switch to Linux | LINUX Unplugged 15 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Our frank advice for switches to Linux. Despite what what the advocates would have you believe, there are some important consideration a potential Linux switcher should make. Our team of silverback Linux users shares their tips after years of using Linux.

Thanks to:

\"Ting\"


\"DigitalOcean\"

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Show Notes:

FU

Switching Ain’t Easy, Don’t Fool Yourself

Two huge opportunities for the Linux desktop right now are the end of Windows XP support and the less than amazing reception of Windows 8 by casual users.

These may like silly stuff to wine about, but your little quarrel couple episodes ago with IRC on same topic, and I share your point of view. Windows is just too comfortable.

Mail Sack:

The post Don’t Switch to Linux | LINUX Unplugged 15 first appeared on Jupiter Broadcasting.

]]>
Security Theater Critics | Unfilter 2 https://original.jupiterbroadcasting.net/19937/security-theater-critics-unfilter-2/ Sat, 26 May 2012 07:48:33 +0000 https://original.jupiterbroadcasting.net/?p=19937 The TSA is one of the stars in the US Government's security theater that keeps the public always fearing attack. We take a look at what role the media plays.

The post Security Theater Critics | Unfilter 2 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The TSA is one of the stars in the US Government\’s security theater that keeps the public always fearing attack. In this week’s episode we’ll demonstrate how the media is used to manipulate public support for sweeping security changes.

Plus – We’ll unfilter some headlines, and cover your feedback from our first episode.

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | OGG Audio Feed | iTunes Feeds

ACT ONE: NEWS

ACT TWO: TSA Security Theater

ACT THREE: Feedback

  • Ubiquity Writes…

    Was hoping for a video show, LAS and SNAP are great because of that.

  • Jim Writes…

    If you are going to be doing shows on political issues, you at least have to make some kind of attempt at balance. You are going to have to present arguments from all sides of the issue and you need guests on the show to argue the opposing sides.

  • Ubiquity Writes.. (again)

    I think it\’s about time more people did discuss issues that do really matter. While not everyone may agree with topics that are political or religious, its discussion that needs to happen. I would suggest sticking to the facts as much as possible, and unfortunately there are many facts that challenge popular beliefs. One advantage of the IT industry is that most \”wise\” decisions are based on facts and statistics. I think of this content as educational, better for the greater good of people.

Unfilter on Reddit

Link List:

Song pick of the week: SONG: Mr. TSA: a Response to Having My Pants Pulled Down by the TSA Which was released under a Creative Commons License

The post Security Theater Critics | Unfilter 2 first appeared on Jupiter Broadcasting.

]]>
Pimp My Network | TechSNAP 27 https://original.jupiterbroadcasting.net/12758/pimp-my-network-techsnap-27/ Thu, 13 Oct 2011 19:11:59 +0000 https://original.jupiterbroadcasting.net/?p=12758 We cover your best options for pimping your home network for speed! Plus Facebook is fooled again, remote controlled voting machines!

The post Pimp My Network | TechSNAP 27 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Facebook is fooled again, remote controlled voting machines, and Sony has another 93,000 accounts hacked, we’ll load you up on the details!

Then – We cover your best options for pimping your home network for speed!

Direct Download Links:

HD Video | Large Video | Mobile Video | WebM | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

Facebook URL scanner easily fooled

  • Facebook has a malicious URL scanner that checks urls linked to in posts to make sure they do not contain content that could be harmful to users
  • The most simple content cloaking technique, displaying different content to different users (ie, look for the facebook bots user-agent string) and fool this system
  • In the example proof of concept attack, the url looks like a .jpg file, and will get a thumbnail in the facebook preview, but if you follow the link, you will be rickrolled
  • Proof of Concept

*

Sony Locks 93,000 Accounts After Hacking Attempt

  • Sony has suspended 93,000 accounts that were successfully accessed during a massive wave of failed login attempts.
  • This suggests that Sony does not have any automated systems for slowing, or blocking such brute force attacks.
  • The attack effected large numbers of users on both the PSN/SEN, and SOE
  • While Sony claims the the attackers must have had a list of username/password combinations from some other site that was attacked, the fact that 100s of thousands of accounts had attempts against them, and 93,000 succeeded, suggests one of a few hypothesises:
  • The attack used user data from the original sony hack (and/or users reset their passwords back to the same stolen passwords)
  • The flaw in the PSN password reset system that allowed attackers to reset other users’ passwords was more widespread that first though
  • Users were the victims of the multiple phishing attempts we saw around the the PSN compromise
  • Sony was compromised again
  • Additional Article
  • Sony CISO Statement

*

Diebold Voting machines susceptible to untraceable man in the middle attack

*

Feedback:

  • Dominic emails in:
    YOU’RE DOING IT WRONG

  • How to connect multiple switches

  • Q: When building physical network topology, say you have 5x 8 port switches, are you best to connect the router to port 1 of switch#1 then connect various other computers to the rest of the ports on switch#1 with the last port connecting to switch#2 which has one port to switch#3 and so on (essentially daisy chaining) or have one ‘master’ switch where each port of the switch connects to each of the other switches (2, 3, 4 and 5) then have the router and PCs plugged into those (I know its a bit overkill for a home network but its just in theory as I’ve had to deal with stuff like network loops and such before and wondering if there is any real advantage between the two methods).

  • A: The second setup you described is a proper ‘hierarchical networking model’, which usually consists of three layers. The first layer is the Access Layer, this is where individual computers are connected to the network, this is typically just a (relatively) low-end switch. The next layer, is the Distribution Layer, this is where a lot of routers and firewalls do their work, they usually also acts as the separation between departments, locations and regions. Typically computers in the same Access Layer can reach each other directly without going through a router. The top layer of the network is the Core Layer, this is the fastest part of the network, where data is exchanged between the different Distribution Layers. In your more limited setup, the ‘master’ switch would be the Core Layer, and exchange traffic between each of the different Access Layer switches. However, for your home this may not be the best setup. If all of the switches are 100mbit, then the links between the Core Layer switch, and the Access Layer switch can be a bottleneck. For example, if you had 2 pairs of clients communicating with each other on the same switch (so 4 machines, A<->B and C<->D), they could each communicate at 100mbit/second. However, if A and C are on Access Layer switch#2, and B and D are on Access Layer switch#3, then the bandwidth between #2 and #3 is limited to 100mbit total, and so each stream would only be able to use 50mbit/sec. However, if A and B are on one switch, and C and D are on another, then no data is exchange through the Core Layer at all. So a number of factors, especially your traffic patterns, must be considered when setting up your network topology. You do not have to worry about creating ‘loops’ or anything as long as each switch only has a single path to each other switch. Higher end switches (managed ones) will have ‘STP’ (Spanning Tree Protocol), which allows them to avoid loops even when they have multiple paths, while still adapts and using one of the extra paths if the preferred path is disconnected.

  • At my house, I have a 5 port gigabit switch, and 3 100mbit switches. My PC, Router/File Server, and Media center connect to the gigabit switch, the 4th port goes to the wireless AP, and the 5th to the switch in my bedroom. The remaining 100mbit switch (used for the machines in the rack in my living room) is fed off the wired ports for the wireless AP.

Round Up:

The post Pimp My Network | TechSNAP 27 first appeared on Jupiter Broadcasting.

]]>