Showing posts with label News. Show all posts
Showing posts with label News. Show all posts

Monday, June 22, 2015

Parrot Security OS  for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, Privacy/Anonimity and Cryptography

Parrot security OS is an open source distribution of Linux based on the well known and award winning Debian GNU/Linux operating system. As its developers describe, it is a masterpiece that gathers together all the necessary tools for hacking, penetration testing, security and privacy tasks.
According to its developers, Parrot Security OS is a security oriented operating system designed for Penetration Testing, Computer Forensic, Reverse engineering, Hacking, Privacy/Anonymity and Cryptography.
Parrot Security OS  for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, Privacy/Anonimity and Cryptography
Instead of installing the OS then painstakingly assembling your collection of security tools (and package dependencies), using something like Parrot Security OS takes care of all that for you
It is based on Debian and developed by Frozenbox network. Parrot is designed for everyone, from the Pro pen-tester to the newbie, because it provides the most professional tools combined in a easy to use, fast and lightweight pen-testing environment, and it can be used also for an everyday use.
Most of the penetration testing tools can be found under the Parrot entry of the main menu, where they’re organized in subsections. In addition, an anonymous surfing mode is available for those who don’t want to be traced.
Among the included applications, we can mention TrueCrypt, Ettercap, Iceweasel, Vidalia, Wireshark, VLC Media Player, RecordMyDesktop, BleachBit, XRCed, PyCrust, aircrack-ng, Hydra, Nmap, and many others.

Features

  • Updated pen-testing tools
  • Great for forensic analysis
  • Custom hardened 3.16 kernel
  • MATE interface with custom themes, wallpapers and icons
  • Fast lightweight system designed also for old computers
  • PenMode + AirMode
  • AnonSurf functionality (tor & i2p)
  • Pandora’s box ram cleaner at shutdown
  • Encrypted installation
  • Cryptocurrency friendly
  • All the necessary for programming out of the box
  • Cloud compatible
Rather than downloading the whole ISO, there’s also a BASH script version which turns a regular Debian Stable install into Parrot Security OS, you can find the script here:
You can download Parrot Security OS here:
amd64 Parrot Full – Parrot-full-1.9_amd64.iso
i386 Parrot Full – Parrot-1.9_i386.iso

The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even if it’s a fiber optic network.

Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network.
Kevin Mitnick is the father of the art of hacking, hacking is a philosophy of life and today the Master demonstrates how easy it is for an attacker to tap into a network to steal sensitive data, access emails, even if it’s a fiber optic network.
Kevin Mitnick clamped onto a fiber optic cable, CAT5x or CAT6x network wire, and by using the popular network analyzer Wireshark demonstrated how is simple to sniff any unencrypted information is a few minutes without leaving any trace. Mitnick used in his attack an optic fiber clip-on coupler that provides non-invasive bi-directional coupling into 250 micron coated single-modefibers.
“The FOD 5503 offers the ability to couple fiber optic talk sets at any intermediate point along a fiber span where access to a terminated end is not available.” states the description of the optic fiber clip-on coupler.
Kevin Mitnick sniffs fibers
Such kind of hardware is not used to hack into fiber, but it is designed for maintenance purpose and fiber identification.
Kevin Mitnick published a video to demonstrate the attack, it shows the popular hacker while is sniffing an email directly from the tapped cable.
The hackers can easily tap without cutting the wire by using alligator clips to attach to the cable or they can cut the cable and plug both ends into a small hub to intercept the traffic.
In both cases, it is essential to prevent physical access to the wire, but most important is to use encrypted connections, while accessing any kind of web services, including email, chat, web browsing.
An attack like the one presented by Kevin Mitnick is very easy to arrange, clever attackers could use a cheap and tiny Raspberry Pi hide the tap used to grab the data. A similar scenario is scaring because an attacker can exfiltrate data from the targeted network for a long period without arousing suspicions.
Let me suggest to watch the video.

Thursday, June 18, 2015

A brief introduction to several malware-related terms in an easy-to-understand manner. A useful glossary to better understand the “malware” terminology.

Introduction

Wednesday, June 10, 2015

ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools.

ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in order to evade detection.
The Book of Terror has been posted online by the ISIS sympathizers a week ago, it is a 5,232-page PDF document.
“It’s difficult to tell if the guide is actually being used by the group, but the 5,232-page PDF was uploaded to a Pastebin-style site just over a a week ago, and then linked to from an ISIS supporter forum on Saturday, the pseudonymous security researcher known as “Switched” told Motherboard.” reported Motherboard that first published the news. 
The package includes a guide to teach ISIS militant on how to use encryption to evade surveillance and a manual on the use of firing weapons.
Many Twitter accounts were used the by ISIS to spread copies of the Book of Terror, many websites and forums used for propaganda are also informing sympathizers about the existence of the package, which is written in English.

Book of Terror ISIS


The package includes an entire section, titled “Secret Spy Devices,” related to electronic equipment. The section includes information on “high power” mobile phone jammer, for recording landline telephone calls and a spy camera hidden within a pen.



book of terror 22
The experts who examined the Book of Terror confirmed that it is not a guide written from scratch by the ISIS members, instead it is a cut and paste from consumer electronic sites.
The Book of Terror also explains hot to crack Wi-Fi networks by using the popular Kali Linux distribution to hack WPA and WEP encrypted networks.
“If you live in an area where there are Muslims