Jump to content

Kalashnikov.

Active Members
  • Posts

    456
  • Joined

  • Last visited

Everything posted by Kalashnikov.

  1. Ce jocuri multiplayer jucati?
  2. The source code for a Linux rootkit that leverages the infected device’s graphics processor unit (GPU) for enhanced stealthiness and efficiency has been published on GitHub. Dubbed Jellyfish, the proof-of-concept malware leverages the LD_PRELOAD technique from the Jynx Linux rootkit and OpenCL, a low-level API developed by Khronos for heterogeneous computing. According to the developers of Jellyfish, who call themselves Team Jellyfish, one of the main advantages of GPU-based malware is that it’s more likely to evade detection due to the lack of malware analysis tools for such threats. Another advantage is that this type of malware can “snoop” on the CPU host memory via direct memory access (DMA). Additionally, the GPU is fast and the malicious code remains in its memory even after the device is shut down, the developers said. The experimental Jellyfish malware is currently designed to run on computers with AMD and NVIDIA graphics cards, but Intel products are also supported through the AMD APP Software Development Kit (SDK). OpenCL drivers must be installed on the system for the rootkit to work. Another PoC malware developed by Team Jellyfish is a keylogger called Demon. The developers say Demon has been built using information from a paper published in 2013 by researchers at Columbia University. The paper describes a stealthy keylogger that runs directly on a graphics processor. “We are not associated with the creators of this paper. We only PoC’d what was described in it, plus a little more,” the developers of Demon noted. While for the Jellyfish rootkit the developers use the LD_PRELOAD variable to hide malicious components, in the case of Demon they say they are using code injection. Team Jellyfish claims that their creations are designed for educational purposes, and that their goal is to “make everyone aware that GPU-based malware is real.” They noted that Jellyfish and Demon are currently only in beta version and they still have a lot of bugs. Malware that uses the GPU is not unheard of. Over the past years, researchers have spotted several threats that leverage an infected device’s GPU to mine Bitcoins. However, Jellyfish and Demon are more interesting because they use the GPU for more than just its processing power. It remains to be seen if the code published by Team Jellyfish will be used by malicious actors in their operations. source: PoC Linux Rootkit Uses GPU to Evade Detection
  3. On Tuesday, May 12, Adobe will release security updates to address critical vulnerabilities discovered in Adobe Reader and Adobe Acrobat for Windows and Mac. Adobe has not provided too much information in the prenotification security advisory published on Thursday, but the company has revealed that the issues affect Acrobat and Reader XI (11.0.10) and earlier versions, and Acrobat and Reader X (10.1.13) and earlier versions. While the vulnerabilities that will be patched next week are considered critical, Adobe has assigned them a priority rating of 2. Updates with this priority rating address security bugs in a product that has historically been at elevated risk. Such flaws are not currently exploited in the wild and the company doesn’t expect them to be exploited too quickly. Administrators are advised by the company to apply such updates within 30 days. Vulnerabilities are often identified in Adobe products, especially Flash Player. Up until this point in 2015, Adobe released six security bulletins for Flash Player. The updates address tens of flaws, including zero-days that had been exploited in the wild before a patch was available. Last month’s Flash Player updates fixed a total of 22 vulnerabilities, including one that has been exploited in the wild. Adobe announced in March the launch of a bug bounty program for the company’s web applications. The program, hosted on the HackerOne platform, has already helped the company close more than 50 vulnerabilities, despite the fact that it’s not offering any monetary rewards to researchers who report bugs. source: Adobe to Patch Critical Vulnerabilities in Reader, Acrobat
  4. The United States expressed concern Friday over reports China has used a powerful censorship tool dubbed “Great Cannon” to attack websites around the world. Researchers reported in April that the “Great Cannon” is an online attack system used to hijack web traffic and enforce the country’s broad censorship of information online. The system was used to shut down websites aimed at helping Chinese bypass the country’s extensive online restrictions known as the “Great Firewall,” experts said. “We are concerned by reports that China has used a new cyber capability to interfere with the ability of worldwide internet users to access content hosted outside of China,” State Department spokesman Jeff Rathke said following a question about the program. Rathke said the cyber attack manipulated Chinese web traffic and “and turned it into malicious traffic directed at US sites.” “We have asked Chinese authorities to investigate this activity and provide us with the results of their investigation,” he said. Experts at the University of Toronto reported on the Great Cannon last month, noting denial of service attacks carried out by the system. The report supported claims by an activist organization which said China was seeking to shut down its online service that offer ways to access content from blocked websites. Great Cannon gives China cyberattack capabilities similar to the US National Security Agency’s Quantum program, revealed in documents leaked by former NSA contractor Edward Snowden, experts said. sursa: US 'Concerned' Over Reported Chinese Global Censorship Tool
  5. Mi se rupe pula daca ne monitorizeaza acum legal, crezi ca nu s-a uitat nimeni peste traficul tau daca "te ocupi" cu rahaturi pana acum?
  6. plm, nu trebuie sa va cacati pe voi de frica daca nu faceti afaceri cu bani murdari pe internet, ca dai deface la alimentara de la colt sau o biserica nu intereseaza pe nimeni...
  7. Bibilesti glodisoarele ? )))) https://www.youtube.com/watch?v=hrNLHvPuNCQ&feature=youtu.be&t=2m25s
  8. Fa un site despre pisici daca vrei sa faci bani multi.
  9. Ce sistem / sisteme de operare folositi si de ce? Eu folosesc windows pe desktop pentru gaming si oleaca de programare, majoritatea timpului ma ocup cu administrarea site-urilor si imi e mai usor de pe windows, fiind obisnuit cu el de mic . Folosesc si linux, dar doar ca server, debian si centos sunt cele care imi plac cel mai mult cu nginx si apache sau litespeed amandoua cu mariaDB (sa fie binecuvantat serveru). Voi?
  10. Tu nu furai carduri? De sub ce piatra ai iesit, cardere... ACUZÁ?IE s.f. Acuzare, învinuire, învinov??ire. [ hai mai da-te-n sloboz )))))) daca si asta e stipulare Tu nu observi ce ai spus dupa semnul intrebari ??? la ce argumente te astepti? vrei sa iti dau hdd-ul sa te uiti pe el ca argument ? in viata mea nu l-am criptat pentru ca nu ma ocup cu cacaturi, hai sa o terminam cu discutia asta . Imi cer scuze daca te-am lezat cu replica mai obscena. ok brb
  11. Pai si daca nu ai argumente nu vi cu acuzatii, nu ma acuz, dar nici tie nu iti placa sa ti se zica virusz, daca intelegi unde bat , e chestie de imagine.
  12. Argumenteaza pls, adu ceva dovezi sau plm, cum esti asa convins ca sunt carder?
  13. pe mine m-ai facut carder ? daca e hai sa o dam pe fata, eu imi dau ip-ul (care e public) pe rst daca sunt carder
  14. azi:Hackerii î?i pot fura datele cu ajutorul c?ldurii emise de calculator. maine:Tutorial cum sa spargi nasa
  15. Solutie: in loc de like modificati in "Mata-i grasa", 100% nu o sa mai dea nimeni dislike. Eu zic sa nu fie luata in considerare regula, astfel o mare majoritate de membri nu isi mai arata frustrarile in public fata de vre-un membru de pe forum-> fara cacaturi postate pe forum -> continut de calitate. Asta este parerea mea. LE: Peste 2-3 ani vor aparea useri cu acceasi varsta ca si forumul -> intrebari de cacat -> preferati dislike sau injuraturi? // sunt total pe langa, credeam ca vreti sa scoateti de tot dislike.
  16. Te descurci bine in engleza? sau esti mai rau ca google translate?
  17. Daca ai incercat acu ceva timp, iar ablertynos a spus ca merge acum , de ce te bagi? nu te-ai retras?
  18. Te-au bagat in hof? bravo
  19. PRE?URILE NOASTRE AU FOST H?CUITE!
  20. Daca mai are cineva sa imi lase si mie pm
  21. Ce date ai reusit sa scoti ? Ce date ai reusit sa scoti ?
  22. Java deoarece majoritatea device-urilor il folosesc.
×
×
  • Create New...