Subscribe For Free Updates!

We'll not spam mate! We promise.

Sep 28, 2007

New tools help hack into iPhone

By Robert McMillan

New tools help hack into iPhone

HD Moore, one of the developers of the Metasploit hacking software, is supporting the iPhone within the Metasploit framework and providing tools to run 'shellcode' prompts

iPhone hackers have some new tools now, thanks to HD Moore, one of the developers of the Metasploit hacking software.

On Tuesday, Moore announced that he was supporting the iPhone within his Metasploit framework and released software that would allow hackers to run "shellcode" command prompts on Apple's mobile device.

By integrating the iPhone into Metasploit, it will now be a little easier for hackers to gain access to someone else's iPhone, but they will also need a few other tools to succeed. First, they will need to create working exploit code, which takes advantage of bugs in Apple's software, to trick the device into running the shellcode. They will also need to create more sophisticated "payload" applications that can do things like remotely connect with the hacker. "It's a first step," Moore said of his hack.

With iPhone prices dropping and noticeable improvements in the quality of iPhone hacking tools, Apple's phone has become a more interesting target of late, Moore said.

And the iPhone has obviously hit a nerve in the security community. Moore said that about a quarter of the attendees at the recent Black Hat conference in Las Vegas had the devices. "It's trendy," he said. "It kind of creeped me out when I saw how many people had iPhones when I went to Vegas."

In fact, hackers have already developed a number of exploits that they claim could be used on the iPhone's Safari browser.

And security researchers have even demonstrated how the iPhone can be compromised. In July, a Baltimore, Maryland, company called Independent Security Evaluators showed how it could run unauthorized software on an iPhone by taking advantage of a Safari bug.

Moore believes that the iPhone's browser and mail client will be the best sources of bugs and he said that because of the components and information stored on the phone, it may end up being a more attractive target than the PC.

For example, the phone could be used to track someone's location based on information from cell phone towers. Throw in the iPhone's microphone, camera, and an Internet connection, and you suddenly have a device that could be used to secretly keep tabs on people, Moore said. "If you look at what you get by exploiting someone's iPhone, you actually get a lot more than you do from someone's PC a lot of the time," he said.

Sabotaging Google

John C. Dvorak - PC Magazine

A reader, Courtney Cox (no relation to the actress), recently pointed out to me that the top results of recent complex Google searches turned out to be inane Chinese sites that were not even parking sites, just an assortment of keywords that somehow got indexed and brought to the top of the results list. After seeing a few of these sites, I have to wonder what's going on. Is it sabotage?

Let's start by showing you a typical site: (there's some annoying Active X here. So visit at your own risk). This site was the top result listed when the search term "reset mp3 player m240d" was entered. And here are the full search results , in which nine of the top ten results are these weird Chinese sites.

Courtney sent me numerous examples of this phenomenon, and it's obvious that the more specific and detailed the search request, the more likely Google is to list these Chinese sites. The issue has apparently been reported to Google, but if the basic algorithms allow this sort of result, even banning the specific sites will not stop this sort of abuse.

Right now the motives behind this phenomenon are obscure, unless it's being done just for testing purposes. You know, like underground nuclear testing.

I'm reminded of some news reports I read in The New York Times as I was doing some Civil War–era research in old copies of the paper circa 1860 to 1870. At that time, the telegraph was the hot technology, and it was being built out all over the country using telegraph poles and wires strung everywhere. During this era it was not uncommon for one of the telegraph companies to chop down the poles and cut the wires of another telegraph company. There were constant news stories about it, and this sort of thing still exists. It's no different than a phone company "accidentally" unhooking a competitor's DSL rig in the central office during the burst of open-access activity in the 1990s.

I remember my first visit to China 20 years ago, listening to the long lectures about how China intends to become a capitalist nation. The Chinese liked to say they were going to emulate American capitalism. Ever since then I wondered what that meant. Would it mean chopping down telegraph poles? The American way? —next: Gaming the System

When I see this sort of site at the very top of a list of Google results, I wonder how hard it would be to scuttle Google by gaming the system. I don't think Yahoo! or even Microsoft has thought of this. But if not, why not? Perhaps one of the two companies is indeed behind the Chinese sites. Who would know?

We do already know that Google is susceptible to Google-bombing and click fraud. Now we have this. We also know that Google's search results include far too many parking sites. So many, in fact, that there are brokers who will turn all your domains into parking sites for a revenue split. You've all seen these parking sites. Many are done as typo sites: Mistype a URL and you wind up at some site that is nothing more than links to various shopping and search sites that generally have nothing to do with anything. In some instances, these sites appear on the first page of Google search results. As far as I'm concerned, they should not appear at all. And while they're an eye-rolling nuisance to readers of PC Magazine, you can be certain that multitudes of rubes using the Internet think that they're real sites.

As Google gets bigger and more dominant, you can be certain that the competition will come up with some way to ruin Google and make it simply unusable. I have to assume that these Chinese sites, which serve no purpose other than to scramble Google, are a step in that direction.

On that note, I should add that entering "reset mp3 player m240d" on Yahoo! yielded worse returns, with all the results being weird Chinese sites—including one that tried to load a Trojan (caution!!) that AVG killed immediately. When the same search terms were used on MSN, there were no results at all.

Sep 21, 2007

Vista Infected By Virus Stoned.Angelina

New Info

A batch of laptops pre-installed with Windows Vista Home Premium was found to have been infected with a 13-year-old boot sector virus.

Those of you with a long memory will vividly recall the year 1994: Nirvana's lead singer Kurt Cobain died, South Africa held its first multi-racial elections, and Tony Blair became leader of the Labour party. Oh, and Microsoft's operating system was the quaint, pre-NT Windows for Workgroups.

Click here to find out more!

But it was a year that also saw the arrival of a boot sector computer virus known as Stoned.Angelina which moved the original master boot record to cylinder 0, head 0, sector 9.

It would appear that this teenage virus has not yet been consigned to the history books.

According to Virus Bulletin , the consignment of infected Medion laptops – which could number anything up to 100,000 shipments – had been sold in Danish and German branches of retail giant Aldi.

The computers had been loaded with Microsoft's latest operating system Vista and Bullguard's anti-virus software, which failed to detect and remove the malware.

Although the infection itself is harmless, Stoned.Angelina will undoubtedly have left Microsoft and Bullguard execs blushing with embarrassment about the apparent flaws in their software which allowed an ancient virus to slip through the back door.

On its website Bullguard offered some reassurance to Medion customers hit by the virus:

"Stoned.Angelina is a low-risk boot virus that infects the MBR (Master Boot Record) of hard disks. This is a very old virus. Apart from its ability to spread from computer to computer, it carries no payload (damage) to the systems it infects."

It added that the virus commonly spreads by being booted from an infected floppy disk, and causes no damage to the operating system.

Virus Bulletin technical consultant John Hawes said: "This is a reminder that old viruses never really die.

"Malware that's been off the radar for years often pops up when least expected, after someone digs out an old floppy or boots up an ancient system, and security firms have a duty to maintain protection against older threats for just this kind of eventuality."

Original source

Sep 8, 2007

Novell Client For Windows Vista

Download Client for VistaNovell Netware now support Windows Vista , you can download Vista Client here or Click on image

System requirements

The Novell Client for Windows Vista is supported on the following platforms:
* Windows Vista Business (x86 or x64)
* Windows Vista Enterprise (x86 or x64)
* Windows Vista Ultimate (x86 or x64)
The Novell Client for Windows Vista might run but is not supported on Windows Vista Starter, Windows Vista Home Basic, and Windows Vista Home Premium editions. This Client will not run on Windows XP, 2000, or 2003.

Key features

* Support for Novell Open Enterprise Server (OES) 1, OES 2, NetWare 5.1/6.0/6.5
* File system integration with NSS and non-NSS volumes via NCP
* Login script processing
* Notification area (Red N) options
* Integrated login with Windows Vista (single username and password)
* NMAS™ client integration
* Forgotten password recovery options
* LDAP contextless login support
* DFS junctions
* Support for 802.1x wireless authentication
* DHCP options
* OpenSLP support
* Shell extensions for Windows Vista�s file browser
* File caching/shared open mode support
* Auto-reconnect
* Cluster failover support
* Property pages, NCIMAN, and updating Client settings

Sep 7, 2007

Apple iTunes Music File Buffer Overflow Vulnerability

According to , a vulnerability has been reported in Apple iTunes, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an unspecified boundary error when processing album cover art. This can be exploited to cause a buffer overflow via a specially crafted music file.

Successful exploitation may allow execution of arbitrary code.

The vulnerability is reported in versions prior to 7.4.

Solution : Update your iTunes Software to version 7.4.

iTunes 7.4 for Mac:

iTunes 7.4 for Windows:

Related Article :

1. Apple iTunes Music File Buffer Overflow Vulnerability
2. Apple QuickTime Multiple Vulnerabilities
3. Apple QuickTime Java Extension Two Vulnerabilities
4. Apple QuickTime Java Extension "toQTPointer()" Code Execution
5. Apple QuickTime Multiple Vulnerabilities
6. Apple Quicktime RTSP URL Handling Buffer Overflow Vulnerability
7. Apple QuickTime Plug-In Local Resource Linking Weakness
8. Apple QuickTime Multiple Vulnerabilities
9. Apple iTunes AAC File Parsing Integer Overflow Vulnerability
10. QuickTime Multiple Code Execution Vulnerabilities