Archive | articles RSS for this section

Hynix Reveals World’s First 128GB DDR4 Memory Module

The new memory module can process up to 17GB of data per second

Computerworld – SK Hynix today announced it has developed the world’s first 128GB DDR4 memory module, twice the capacity of the company’s current 64GB module.
The new memory module, which is also being touted as the world’s highest density module, is based on 8Gbit DDR4 chips created with 20nm process lithography.
The new memory module runs at 2,133Mbps with 64-bit I/O, and processes up to 17GB of data per second. It also runs at ultra low-voltage of 1.2V, compared to 1.35V of existing DDR3 memory modules.
While major memory makers such as Hynix, Samsung and Crucial have started producing next-generation DDR4 memory, it’s not expected to show up in servers until late this year, and in PCs until 2015.
Until Intel and Advanced Micro Devices begin supporting DDR4 in their processor boards, users won’t be able to enjoy the benefits of the technology, which offer twice the performance, twice the base capacity and 20% to 40% less power consumption than today’s technology, according to industry analysts.
Intel is expected to add support for DDR4 memory to its high-end computers in the third quarter.
Hynix said it plans to begin shipping 128GB and 64GB DDR4 modules to computer makers soon.
Hynix’s 128GB memory, which is expected to go into mass production early next year, is double the density of existing 64GB modules and uses TSV (Through Silicon Via) technology. TSV is a method for passing electrical connections vertically through a silicon die and is used to create three-dimensionally stacked integrated circuits.
Mike Howard, a DRAM and compute platforms analyst with research firm IHS, said Hynix’s 128GB module is going to be a niche product. He said it is the 8GB, 16GB and 32GB DDR4 memory boards that are the mainstream densities right now.
“We expect Intel to support DDR4 for servers this year and client PC next year. DDR4/DDR3 crossover should occur sometime in mid 2016,” Howard said. “I think this product is largely about bragging rights.”
According to market research firm Gartner, the server DRAM market will grow an annual average of 37% until 2018, following expansion of the mobile environment. The new interface DDR4 is expected to be certified by customers this year and is anticipated to be commercialized regularly starting in 2015. The DDR4 is also expected to be the main standard in the industry from 2016.
“The development of the world’s first 128GB DDR4 module has its significance in opening the ultrahigh density server market,” Sung Joo Hong, head of DRAM Development at Hynix, said in a statement. “The company will further strengthen its competitiveness in the premium DRAM sphere with the development of high density, ultrahigh speed and low power consuming products.”

Hynix Reveals World’s First 128GB DDR4 Memory Module

articles

from iExplo1t http://ift.tt/1xHq9BN

ArtistX – The Linux Distro for Artists

ArtistX is a fantastic Ubuntu based Linux Distro developed by Marco Ghirlanda in Milan, Italy.  It features a wide range of free 2D/3D graphic, audio, and video editing soft-ware that can be installed or accessed via live-USB booting; to make any machine into a fully equipped production suite.
The range of soft-ware included in ArtistX is quite impressive. Some of them being Blender for 3D modelling, Gimp for 2D image alteration, Animata for cartoon animation, and Cinepaint for video editing. A full list can be found on the ArtistX website.

I’ve been using this distro for a while now and I have to say my impressions are very good. It runs well with very little lag on my low end netbook. The design is simple and nice. But most of all the provided arsenal of soft-ware gives you everything you could possibly want, to work on almost any sort of project whether it be film, animation, or writing.
If you’re on a tight budget and looking for a great OS designed for creative individuals that maintains a Linux environment, ArtistX is definitely for you.

ArtistX – The Linux Distro for Artists

linux, articles

from iExplo1t http://ift.tt/1jfuDsM

EXPLORE THE ATTACK

  • How does the attack begin ?
Attackers follow a fixed methodology to penetrate into a system. The steps a hacker follows can be broadly divided into five phases:



1. Reconnaissance:


Reconnaissance or Footprinting is consideredthe first pre-attack phase and is a systematic attempt to locate, gather, identify, and record information about the target. The hacker seeks to find out as much information as possible about the victim. Some hackers might dumpster dive to find out more about the victim. Dumpster diving is the act of going through the victim’s trash. Another favorite of the hacker is social engineering. A social engineer is a person who can smooth talk other individuals into revealing sensitive information. This might be accomplished by calling the help desk and asking someone to reset a password or by sending an email to an insider telling him he needs to reset an account.

2. Scanning:

Scanning and enumeration is considered the second pre-attack phase. Scanning is the active step of attempting to connect to systems to elicit a response. Enumeration is used to gather more in-depth information about the target, such as open shares and user account information. At this step in the methodology, the hacker is moving from passive information gathering to active information gathering. Hackers begin injecting packets into the network and might start using scanning tools such as Nmap. The goal is to map open ports and applications. Unlike the elite blackhat hacker who attempts to remain stealth, script kiddies might even use vulnerability scanners such as Nessus to scan a victim’s network.

3. Gaining Access:

As far as potential damage, this could be considered one of the most important steps of an attack. This phase of the attack occurs when the hacker moves from simply probing the network to actually attacking it. After the hacker has gained access, he can begin to move from system to system, spreading his damage as he progresses. Access can be achieved in many different ways. A hacker might find a vulnerability in the web server’s software or might perform a denial of service (DOS) on that server. If the hacker is really bold, he might even walk in and tell the receptionist that he is late for a meeting and will wait in the conference room with network access. Pity the poor receptionist who unknowingly provided network access to a malicious hacker.

4. Maintaining Access:

Hackers are diligent at working on ways to maintain access to the systems they have attacked and compromised. They might attempt to pull down the etc/passwd file or steal other passwords so that they can access other user’s accounts. Rootkits are one option for hackers. A rootkit is a set of tools used to help the attacker maintain his access to the system and use it for malicious purposes.

5. Clearing Tracks:

Nothing happens in a void, and that includes computer crime. Hackers are much like other criminals in that they would like to be sure to remove all evidence of their activities. Hackers must also be worried about the files or programs they leave on the compromised system. In order that the target company’s security engineer or network administrator cannot detect the evidence of attack, the hacker needs to delete logs files and replace system binaries with Trojans.


  • How do you defend the attack ?
In order to defend a hacker, you have to think from his/her perspective. Being an ethical hacker, you will need to be aware of these tools and techniques to discover their activities and to deploy adequate countermeasures.
 
 

EXPLORE THE ATTACK

articles

from iExplo1t http://ift.tt/1mOG526

Recover Deleted Data from Remote Victim PC Using Meterpreter

Recover Deleted Data from Remote Victim PC Using Meterpreter

BackBox, Kali Linux, recovery, BackTrack, Victim, articles, hacking

Read More At: http://ift.tt/1l7JUfg

TOP 13 PENETRATION TESTING LINUX DISTRIBUTIONS

[Source: concise-courses.com]

OK, none of the following Pentesting distributions were in the top 100 list over at Distro Watch but we don’t care – we are talking about penetration testing tools – or specifically the creation of distro’s that have all the necessary  open source tools that help ethical hackers and penetration testers do their job. Like everything else when it comes to choices, every pentesting distro has its own pros, cons and specialty. Some distro for example are better at web application vulnerability discovery, forensics, WiFi cracking, reverse engineering, malware analysis, social engineering etc.

1. Kali Linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution.
Kali Linux is preinstalled with numerous penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs). Kali Linux can be run from a hard disk, live CD, or live USB. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits.
Kali Linux is distributed in 32- and 64-bit images for use on hosts based on the x86 instruction set, and as an image for the ARM architecture for use on the Raspberry Pi computer and on Samsung’s ARM Chromebook.
9. BackTrack 5R3

The mamma or best known of Linux pentesting distros. BackTrack has a very cool strapline: “The quieter you become, the more you are able to hear.” That just sounds cool….

BackTrack is based on the ever-popular Ubuntu. The pentesting distro used to be only available within a KDE environment but Gnome become was added as an option with the release of BackTrack v5. For those working in Information Security or intrusion detection, BackTrack is one of the most popular pentesting distros that can run on a live CD or flash drive. The distribution is ideal for wireless cracking, exploiting, web application assessment, learning, or social-engineering a client.
Here is a list of some of the awesome tools available in BackTrack 5r3 (the latest release).
To identify Live Hosts:
dnmap – Distributed NMap
address6 – (which acts as a IPV6 address conversion)
Information Gathering Analysis (Social Engineering)
Jigsaw – Grabs information about company employees
Uberharvest – Email harvester
sslcaudit – SSL Cert audit
VoIP honey – VoIP Honeypot
urlcrazy – Detects URL typos used in typo squatting, url hijacking, phishing
Web Crawlers
Apache_users – Apache username enumerator
Deblaze – Performs enumeration and interrogation against Flash remote end points
Database Analysis
Tnscmd10g – Allows you to inject commands into Oracle
BBQSQL – Blind SQL injection toolkit
* If you are interested in Database Security see our Hacker Halted summary here.
Bluetooth Analysis
Blueranger – Uses link quality to locate Bluetooth devices
Vulnerability Assessment
Lynis – Scans systems & software for security issues
DotDotPwn – Directory Traversal fuzzer
Exploitation Tools
Netgear-telnetable – Enables Telnet console on Netgear devices
Terminator – Smart Meter tester
Htexploit – Tool to bypass standard directory protection
Jboss-Autopwn – Deploys JSP shell on target JBoss servers
Websploit – Scans & analyses remote systems for vulnerabilities
Wireless Exploitation Tools
Bluepot – Bluetooth honeypot
Spooftooph – Spoofs or clones Bluetooth devices
Smartphone-Pentest-Framework
Fern-Wifi-cracker – Gui for testing Wireless encryption strength
Wi-fihoney – Creates fake APs using all encryption and monitors with Airodump
Wifite – Automated wireless auditor
Password Tools
Creddump
Johnny
Manglefizz
Ophcrack
Phrasendresher
Rainbowcrack
Acccheck
smbexec

3. NodeZero.

Like BackTrack, NodeZero is an Ubuntu based distro used for penetration testing using repositories so every time Ubuntu releases a patch for its bugs, you also are notified for system updates or upgrades. Node Zero used to be famous for its inclusion of THC IPV6 Attack Toolkit which includes tools like alive6, detect-new-ip6, dnsdict6, etc, but I think that these days BackTrack 5r3 also includes these tools.

Whereas BackTrack is touted as being a “run-everywhere” distro, i.e. running it live, NodeZero Linux (which can also be run live) state that the distros real strength comes from a hard install. NodeZero, in their own words, believe that a penetration tester “requires a strong and efficient system [achieved by using] a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable Linux environment. Sounds cool. Ever tried it? Let us know in the comments below.

4. BackBox Linux

BackBox is getting more popular by the day. Like BackTrack and NodeZero, BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. The developers state that the intention with BackBox is to create a pentesting distro that is fast and easy to use. BackBox does have a pretty concise looking desktop environment and seems to work very well. Like the other distros BackBox is always updated to the latest stable versions of the most often used and best-known ethical hacking tools through repositories.

BackBox has all the usual suspect for Forensic Analysis, Documentation & Reporting and Reverse Engineering with tools like ettercap, john, metasploit, nmap, Social Engineering Toolkit, sleuthkit, w3af, wireshark, etc.

5. Blackbuntu.

Yes, as the name clearly suggests, this is yet another distro that is based on Ubuntu. Here is a list of Security and Penetration Testing tools – or rather categories available within the Blackbuntu package, (each category has many sub categories) but this gives you a general idea of what comes with this pentesting distro: Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Privilege Escalation, Maintaining Access, Radio Network Analysis, VoIP Analysis, Digital Forensic, Reverse Engineering and a Miscellaneous section. This list is hardly revolutionary but the tools contained within might be different to the other distros.


6. Samurai Web Testing Framework.

This is a live Linux distro that has been pre-configured with some of the best of open source and free tools that focus on testing and attacking websites. (The difference with Samurai Web Testing Framework is that it focuses on attacking (and therefore being able to defend) websites. The developers outline four steps of a web pen-test. These steps are incorporated within the distro and contain the necessary tools to complete the task.
Step 1: Reconnaissance – Tools include Fierce domain scanner and Maltego.
Step 2: Mapping – Tools include WebScarab and ratproxy.
Step 3: Discovery – Tools include w3af and burp.
Step 4: Exploitation – Tools include BeEF, AJAXShell and much more.

Of interest as well, the Live CD also includes a pre-configured wiki, set up to be a central information store during your pen-test.
The Samurai Web Testing Framework is a live Linux distro that focuses on web application vulnerability research and web pentesting within a “safe environment” – i.e. so you can ethical hack without violating any laws. This is a pentesting distro recommended for penetration testers who wants to combine network and web app techniques.

7. Knoppix STD.

This distro is based on Debian and originated in Germany. The architecture is i486 and runs from the following desktops: GNOME, KDE, LXDE and also Openbox. Knoppix has been around for a long time now – in fact I think it was one of the original live distros.

Knoppix is primarily designed to be used as a Live CD, it can also be installed on a hard disk. The STD in the Knoppix name stands for Security Tools Distribution. The Cryptography section is particularly well-known in Knoppix.

8. Pentoo.

Pentoo is a security-focused live CD based on Gentoo. In their own words “Pentoo is Gentoo with the pentoo overlay.” So, if you are into Pentoo then this is the distro for you. Their homepage lists some of their customized tools and kernel, including: a Hardened Kernel with aufs patches, Backported Wifi stack from latest stable kernel release, Module loading support ala slax, XFCE4 wm and Cuda/OPENCL cracking support with development tools.


9. WEAKERTH4N.

This penetration distribution is built from Debian Squeeze and uses Fluxbox for its’ desktop environment. This pentesting distro is particularly well adjusted for WiFi hacking since it contains many Wireless tools. Here is a quick summary of WEAKERTH4N’s tool categories: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing, Android Hacking, Networking and Shells.


10. Matriux Krypton.

This linux distro is, I believe, is the first security distribution based directly on Debian, (after WEAKERTH4N?) if I am wrong please comment below! There are 300 security tools to work, called “arsenals”. The arsenals allow for penetration testing, ethical hacking, system and network administration, security testing, vulnerability analysis, cyber forensics investigations,  exploiting, cracking and data recovery. The last category, data recovery, doesn’t seem to be prevalent in the other distros.


11. DEFT.

The latest version is DEFT 7 which is based on the new Linux Kernel 3 and the DART (Digital Advanced Response Toolkit). This distro is more orientated towards Computer Forensics and uses LXDE as desktop environment and WINE for executing Windows tools under Linux. The developers, (based in Italy) hope that their distro will be used by the Military, Police, Investigators, IT Auditors and professional penetration testers. DEFT is an abbreviation for “Digital Evidence & Forensic Toolkit”


12. CAINE

A reader to our blog suggested to add CAINE which we duly have. CAINE Stands for Computer Aided Investigative Environment, and like many information security products and tools – it is Italian GNU/Linux live distribution. CAINE offers a comprehensive forensic environment that is organized to integrate existing software tools that are composed as software modules, all displayed within a friendly graphical interface. CAINE states to have three objectives. These are, to ensure that the distro works in an interoperable environment that supports the digital investigator during the four phases of the digital investigation. Secondly that the distro has a user friendly graphical interface and finally that it provides a semi-automated compilation of the final forensic report. As you would likely expect, CAINE is fully open-source.

If anyone has used this please let us know.

13. BugtTraq

Bugtraq is another reader submitted pentesting distro. Based on the 26.6.38 kernel, this distro offers a really wide range of penetration and forensic tools. Like most of the others in this list, Bugtraq can hard-install of obviously run as a Live DVD or from a USB drive. Bugtraq claims to have recently configured and updated the kernel for better performance but also importantly so that it can recognize more hardware, including wireless injection patches pentesting. The team at Bugtraq seem solid because they are clearly making an effort to get the kernel to work with more hardware – something which the other distributions don’t always place enough importance.

Some of the special features included with Bugtraq include (as stated) an expanded range of recognition for injection wireless drivers, (i.e. not just the usual Alfa rtl8187), a patched 2.6.38 kernel and solid installation of the usual suspects: Nessus, OpenVAS, Greenbone, Nod32, Hashcat, Avira etc.
Unique to Bugtraq (as claimed on their site) is the ability to, or better said, ease, of deleting tracks and backdoors. Just by having read about Bugtraq I’m really glad that I can add this to the list because it just sounds like a job well done. If you are interested in any of the following pentesting and forensic categories, then do go and check out Buqtraq: Malware, Penetration Shield, Web audit, Brute force attack, Communication and Forensics Analytics, Sniffers, Virtualizations, Anonymity and Tracking, Mapping and Vulnerability detection.
Quick Summary: You can’t go wrong with any Ubuntu based distro. BackTrack does the job well but I guess, of course, it’s all personal – i.e. does the distro do the job for you? Every penetration tester needs a lean towards a particular tool or tool-set. Frankly they are all good, and it would be prudent to use several of these pentesting distros as live versions. For WiFi hacking then WEAKERTH4N is likely your better friend, whilst to stay within the law, use Samurai.
Bugtraq looks really good – the team behind it seems to have taken considerable time to tick all the boxes. Once we test it I’ll update the post.
Here is a list of other distros (which we think are still alive and kicking – please correct us if we are wrong).

TOP 13 PENETRATION TESTING LINUX DISTRIBUTIONS

linux, BackBox, Kali Linux, BackTrack, articles, Ubuntu

from iExplo1t http://ift.tt/1nBMY72

Top 5 Reasons Why Ubuntu 14.04 Can Replace Windows 8.1 and Windows XP

A lot of users out there, still using Windows XP, are on the fence and are willing to consider an upgrade to Windows 8. Luckily for them, now there are a lot more options than in 2001, when Windows XP was initially launched.

We get a lot of questions regarding this issue and we can safely say that Ubuntu, 14.04 to be more precise, will be able to replace Windows 8.1 and XP with ease. Here are a few reasons why:

1. The installation of Ubuntu is a lot simpler than the one for Windows 8. Even better, the installation recognizes any other operating systems and you can install Linux without wiping your hard drive. This is impossible the other way around.

2. The main interface of Ubuntu 14.04 is easy to use and requires virtually no setup. Long gone are the days of complicated procedures to make it work. Now it just does. Better yet, if you do decide to change it completely, that’s actually pretty easy to do.

3. Most of the software is free and most of the regular things that you would use in a Windows environment have equivalents, which sometimes are even better.

4. You don’t need to install any special drivers, besides the ones for the graphic card. Everything you plug in just works. Everything is implemented at the kernel level and you won’t have any problems running it on laptops or PC.

5. Ubuntu is a lot more secure that Windows. It’s Linux-based and it’s very likely that you won’t ever see a virus, malware, or anything of that kind. You don’t need expensive antivirus solutions. If there is a problem, it’s patched right away by the developers.

Top 5 Reasons Why Ubuntu 14.04 Can Replace Windows 8.1 and Windows XP

linux, XP, Windows, Windows 8.1, articles, 8.1, Windows XP, Ubuntu

from iExplo1t http://ift.tt/RvVBEE

Top 10 Linux Server Distributions



You know that Linux is a hot data center server. You know that it saves you money in licensing and maintenance costs. But, what are your options for Linux as a server operating system?
Rated: Top 10 Linux server distributions by ease of use, paid support, and data center reliability.
Listed here are the top ten Linux server distributions (aka “Linux server distros”) — some of which you may not be aware. The following characteristics, in no particular order, qualified a Linux server distro for inclusion in this list: Ease-of-use, available commercial support and data center reliability.
1. Ubuntu – At the top of almost every Linux-related list, the Debian-based Ubuntu is in a class by itself. Canonical’s Ubuntu surpasses all other Linux server distributions — from its simple installation to its excellent hardware discovery to its world-class commercial support, Ubuntu leaves the others fumbling in the dusty distance.
2. Red Hat – Red Hat Enterprise Linux (RHEL) started out as the “little Linux company that could” and is now a major force in the quest for data center rackspace. The Linux darling of large companies throughout the world, Red Hat’s innovations and non-stop support will have you coming back for more.
3. SUSE – Novell-owned SUSE Linux is stable, easy-to-maintain and offers Novell’s 24×7 rapid-response support for those who don’t have the time or patience for lengthy troubleshooting calls. And, Novell’s consulting teams will have you meeting your SLAs and making your accountants happy to boot.
4. Mandriva – For U.S.-based executive or technical folks, Mandriva might be a bit foreign. This incredibly well-constructed Linux distribution hails from France and enjoys extreme acceptance in Europe and South America. It is, as its website claims, a worldwide Linux provider. Its name and its construction derive from the Mandrake Linux and Connectiva Linux distributions.
5. Xandros – If you prefer a Linux server distro with a Microsoft connection, Xandros is the one for you. Rumors aside, Xandros and Microsoft collaborate in what’s known in technical circles as “cooperatition.” This means that they compete cooperatively. To find out more about this unique perspective, check out the Xandros About page.
6. Slackware – While not generally associated with commercial distributions, Slackware maintains relationships with several companies that provide fee-based support. One of the earliest available Linux server distributions, Slackware has an extensive and faithful fan base. Its developers regularly release new versions.
7. Debian – If you’re confused by Debian’s inclusion here, don’t be. Debian doesn’t have formal commercial support but you can connect with Debian-savvy consultants around the world via their Consultants page. Debian has spawned more child distributions than any other parent Linux distribution, including Ubuntu, Linux Mint and Vyatta.
8. Vyatta – Vyatta is more at home on routers and firewalls than PC-based systems, but if you want a commercially-driven distribution for those applications, Vyatta works well for your secure communications needs. Check out the free version of Vyatta Linux.
9. CentOS – It’s true that CentOS isn’t strictly commercial but since it’s based on Red Hat Enterprise Linux (RHEL), you can leverage commercial support for it. CentOS has its own repositories and community support and is not the same as Fedora Linux.
10. Unbreakable Linux – Oracle’s Unbreakable Linux is Red Hat Enterprise Linux with some Oracle logos and art added in. Oracle’s Unbreakable Linux competes directly with Red Hat’s Linux server distributions, and does so quite effectively since purchased support through Oracle is half the price of Red Hat’s equivalent model.

Top 10 Linux Server Distributions

linux, articles

from iExplo1t http://ift.tt/1qjmV9c

How To Install Synaptic and Software-Center in Kali Linux & BackTrack

How to install:


First things first, add repositories


open the /etc/apt/sources.list file in your favourite text editor as root
In the terminal:
@ nano /etc/apt/source.list
Paste the following lines ONLY the one missing from your source list :

Read more

from iExplo1t http://ift.tt/1je72vX

What are the benefits of Linux?

Last time for our Linux beginners guide we took an in depth look at exactly what Linux is and covered a few of the basics of Linux.  For a full understanding of everything we covered, you can read the full article here.  But what exactly are the benefits of Linux?  What reason would you have to abandon Microsoft Windows or Mac OS X for yet another operating system that you would have to learn?  Well, there are many reasons and a many benefits of choosing Linux over one of the commercial operating systems.

The Cost

Linux at its most basic, is a completely free operating system.  Whether you choose Linux for a server or your workstation, you can choose to install and run it with no hard cost whatsoever.  This is a much more attractive alternative to the high price of Microsoft Windows.  Of course nothing is completely free.  Linux distributions make money through support.  So, while you can install it and support it yourself absolutely free, you will have to pay if you need more advanced support with any part of the process.  This is still not a bad deal, though when you compare it to other operating systems that charge for the operating system and then charge you again for support.

Read More: http://ift.tt/1fTJVHr

Top 5 Linux Distributions

There are so many Linux distributions out there these days that it can be tough to sort through so many of them. Most of them are all great Linux releases and they all contain their very own design and software philosophy that give each of the distributions their own unique feel. How do you choose? Well, one thing there are more of out there than Linux distributions are lists about which one is better. Today, I will weigh in on this and give you my top 5 Linux distributions. Many, I’m sure, will disagree with my list and have their own list. But that is the great thing about Linux. It gives you the freedom to make your own choice with your computer.

Read more: http://ift.tt/1uzwpN9