Jul 1, 2011

Anonymous Launches A WikiLeaks For Hackers: HackerLeaks

Despite countless WikiLeaks copycats popping up since the secret-spilling site first dumped its cache of State Department cables last year, the new generation of leaking sites has produced few WikiLeaks-sized scoops. So instead of waiting for insider whistleblowers, the hacker movement Anonymous hopes that a few outside intruders might start the leaks flowing.
Earlier this week members of the hacker collective, and specifically a sub-group known as the People’s Liberation Front, (PLF) launched two new leaking sites, LocalLeaks.tk (not to be confused with the similarly named Localeaks.com) and HackerLeaks.tk. Both hope to receive documents through anonymous submission systems, analyze them, and then distribute them to the press to get “maximum exposure and political impact.”

Source: http://news.hitb.org/content/anonymous-launches-wikileaks-hackers-hackerleaks

Jun 30, 2011

Mobius Forensic Toolkit

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Source: http://freshmeat.net/projects/mobiusft

The Android boot process from power on

Since mobile platforms and embedded systems has some differences compared to Desktop systems in how they initially start up and boot this post will discuss the initial boot stages of an Android phone in some detail. Since we have used the Beagle Board as reference in some previous examples any specifics here are related to a similar system.

1. Power on and boot ROM code execution
At power on the CPU will be in a state where no initializations have been done. Internal clocks are not set up and the only memory available is the internal RAM. When power supplies are stable the execution will start with the Boot ROM code. This is a small piece of code that is hardwired in the CPU ASIC. For more information on boot ROM and configurations study the initalization chapter in
the Omap 3530 TRM.
  • A. The Boot ROM code will detect the boot media using a system register that maps to some physical balls on the asic. This is to determine where to find the first stage of the boot loader.
  • B. Once the boot media sequence is established the boot ROM will try to load the first stage boot loader to internal RAM. Once the boot loader is in place the boot ROM code will perform a jump and execution continues in the boot loader.
2. The boot loader
The boot loader is a special program separate from the Linux kernel that is used to set up initial memories and load the kernel to RAM. On desktop systems the boot loaders are programs like GRUB and in embedded Linux uBoot is often the boot loader of choice. Device manufacturers often use their own proprietary boot loaders. The requirements on a boot loader for Linux running on an ARM system can be found in the Booting document under /Documentation/arm in the kernel source tree.

  • A. The first boot loader stage will detect and set up external RAM.
  • B. Once external RAM is available and the system is ready the to run something more significant the first stage will load the main boot loader and place it in external RAM.
  • C. The second stage of the boot loader is the first major program that will run. This may contain code to set up file systems, additional memory, network support and other things. On a mobile phone it may also be responsible for loading code for the modem CPU and setting up low level memory protections and security options.
  • D. Once the boot loader is done with any special tasks it will look for a Linux kernel to boot. It will load this from the boot media (or some other source depending on system configuration) and place it in the RAM. It will also place some boot parameters in memory for the kernel to read when it starts up.
  • E. Once the boot loader is done it will perform a jump to the Linux kernel, usually some decompression routine, and the kernel assumes system responsibility.
3. The Linux kernel
The Linux kernel starts up in a similar way on Android as on other systems. It will set up everything that is needed for the system to run. Initialize interrupt controllers, set up memory protections, caches and scheduling.

  • A. Once the memory management units and caches have been initialized the system will be able to use virtual memory and launch user space processes.
  • B. The kernel will look in the root file system for the init process (found under system/core/init in the Android open source tree) and launch it as the initial user space process.
4. The init process
The init process is the "grandmother" of all system processes. Every other process in the system will be launched from this process or one of its descendants.

  • A. The init process in Android will look for a file called init.rc. This is a script that describes the system services, file system and other parameters that need to be set up. The init.rc script is placed in system/core/rootdir in the Android open source project.
  • B. The init process will parse the init script and launch the system service processes.
5. Zygote and Dalvik
The Zygote is launched by the init process and will basically just start executing and and initialize the Dalvik VM.
6. The system server
The system server is the first java component to run in the system. It will start all the Android services such as telephony manager and bluetooth. Start up of each service is currently written directly into the run method of the system server. The system server source can be found in the file frameworks/base/services/java/com/android/server/SystemServer.java in the open source project.

7. Boot completed
Added this part to the post on 20090831 since it is very useful and something I should not have left out from the beginning. Once the System Server is up and running and the system boot has completed there is a standard broadcast action called ACTION_BOOT_COMPLETED. To start your own service, register an alarm or otherwise make your application perform some action after boot you should register to receive this broadcast intent

Source:  http://www.androidenea.com/2009/06/android-boot-process-from-power-on.html

Howto: Root Samsung Galaxy Tab 10.1 and Install Ubuntu on it. [Windows]

Actually I haven't  tried it yet 'cause I will got my Galaxy Tab in the middle of July but I want post this for my note. ( If you want to see the picture in every steps or detail please go to the Source.)

1. Root the Tab
  1.1 Get the Tab into Downloader Mode
     -  hold down the Power button to start the device
     -  while you are holding down the Power button, you should see the Samsung Galaxy Tab logo pop up, when you see this, immediately also hold down the Volume Down button
     -  After couple seconds, you will see an Android guy icon pop up, when you see that, immediately let go of both of your fingers/buttons
     -  Volume Up button, finally you will get the Downloader Mode.

  1.2 Install Galaxy Tab driver
     -  Download Link: http://downloadandroidfiles.com/files/get/IwAZDRwKZz/gt-p7510-usb-driver-v1-3-2360-0-escape.exe
        Mirror Link: http://www.wupload.com/file/39343302/GT-p7510_USB_Driver_v1_3_2360_0-Escape.exe
  1.3 Connect your Tab with USB
  1.4 Download Tabroot to root it.
     -  Download Link: http://downloadandroidfiles.com/files/get/wskhwIRfKM/tabroot.zip
        Mirror Link: http://www.wupload.com/file/40652519/tabroot.zip
     -  After download and unzip it, run Odin program
     -  Take PDA button and choose the “PDA_SIGNED_P7105.tar.md5″ file inside the tabroot folder
     -  click “Start” and your Tab 10.1 will be reverting back to Android 3.0.1
  1.5 Install stable root/SU
     -   In the Tab, Go to "Setup->Applications->Development" and make sure USB Debugging is checked OFF
     -   Connect Tab with USB.
     -   Copy over the Samsung_Galaxy_Tab_10.1_root.zip file from the tabroot folder to the root folder of your Tab
     -   Go to Downloader Mode.
     -   Hit the Volume Down button (the one closer to Power button) and hit the Volume Up button to select the stock Recovery:
     -   Use the Volume buttons to choose “apply update from /sdcard” and hit Power button
     -   Using the volume buttons, choose Samsung_Galaxy_Tab_10.1_root.zip and hit the Power button
     -   Next, choose “reboot system now” and hit the Power button
     -   When your Tab 10.1 has rebooted, connect your USB cable from the Tab 10.1 to your computer again and copy over the hc-3.1_ota-full_sam_tab_10.1.zip file to the root folder of your Tab 10.1
     -   Next go to the Market and search for “ROM Manager”.  Download and install the free version of ROM Manager app
     -   Open up ROM Manager app and choose “Flash ClockworkMod Recovery”.  This installs a custom ClockworkMod recovery
     -   And choose “Samsung Galaxy Tab 10.1″
     -   hit “Reboot into Recovery” and “Okay”.
     -   Once you are in ClockworkMod Recovery, choose “install zip from sdcard” (using Volume buttons) and hit the Power button
     -   Choose zip from sdcard and choose the file hc-3.1_ota-full_sam_tab_10.1.zip and hit the Power button
     -   When that is done, we are going to zip the Root/SU files again by going to “choose zip from sdcard” and hit the Power button.
     -   Choose the Samsung_Galaxy_Tab_10.1_root.zip file and hit the Power button, the hit the “Yes” button
     Now you have root your Tab.!!!!

 2. Install Ubuntu On Your Samsung Galaxy Tab 10.1
   2.1  Download file that you will need.
     -   Ubuntu.zip
         Download Link: http://downloadandroidroms.com/files/get/Nhi9EJWSw7/ubuntu.zip
         Mirror Link: http://www.wupload.com/file/40557189/ubuntu.zip
     -   adb (Or Android SDK)
         Download Link: http://downloadandroidfiles.com/files/get/qB0x8hl_Sy/adb.zip
         Mirror Link: http://www.wupload.com/file/41166462/adb.zip
     -   Busybox file
         Download Link: http://downloadandroidfiles.com/files/get/yIkKESKxmC/su-busybox-misc-sam-tab-10.1-061611.zip
         Mirror Link: http://www.wupload.com/file/41169477/su_busybox_misc-sam_tab_10.1-061611.zip
   2.2 Install busybox on your Tab.
     -  Go to the Clockwork Recovery, then flash the zip file
   2.3 Setup Ubuntu on your Tab.
     -  Copy over the ubuntu folder you unzipped earlier over to root folder of your Galaxy Tab 10.1
   2.4 Go to the shell in your Tab.
    -   Open up a command prompt/shell by typing “cmd” and type "adb shell"
    -   Run the ubuntu.sh with "cd /sdcard/ubuntu/" and "sh ubuntu.sh"
    ** Don't worry about any error messages.
    -   Type "bootubuntu"
   2.5 Update your Ubuntu and Install some packages.
    -   $ apt-get update
    -   $ apt-get install openssh-server
    -   $ apt-get install tightvnc-server
    -   $ export USER=root
    -   $ vncserver -geometry 1280*800
    -   Set your vncserver password

- To login from your own Tab 10.1, download the free app “Android VNC Viewer” off market
- Set the IP address to “″, enter the password you set earlier, then set port to 5901, you will get the Ubuntu Desktop
  Now you can use the Ubuntu on your Samsung Galaxy Tab 10.1

How to Fix the Keyboard Mapping!

1. cat > $HOME/.vnc/xstartup

2. copy and paste the below:

xrdb $HOME/.Xresources

xsetroot -solid grey

#x-terminal-emulator -geometry 80×24+10+10 -ls -title “$VNCDESKTOP Desktop” &

#x-window-manager &



3. hit Ctrl+D twice and hit Enter

4. edit the file $HOME/.vnc/xstartup

5. added the line “export XKL_XMODMAP_DISABLE=1″ before “/etc/X11/Xsession”

How to Reboot/Restart your Ubuntu

1.  Get the shell

-  adb shell

2. change directory to ubuntu:

-   cd /sdcard/ubuntu

3. run:
-   bootubuntu

4. kill instances of VNC server (just to make sure):
-   killall Xtightvnc

5. Run tightvncserver again.
vncserver -geometry 1280×800

Source: http://galaxytabhacks.com/galaxy-tab-10-1-hacks/how-to-install-ubuntu-linux-on-galaxy-tab-10-1-tabuntu/


Android app. for my site.

Now I create android app for feed my blog with AppYet. So if you have android device and want to feed my blog, try to install it.

Thank you

Download Link: http://www.wupload.com/file/39325441/com.rtsecblog.apk

Sony PSN Breach Infographic

Sony PSN hack
Infographic by Veracode Application Security
Source: http://www.veracode.com/resources/sony-psn-infographic

Jun 29, 2011

Please donate me.

Now I create the donate button in the right side, if you want to donate me for help my volitation, please donate me.

My country is in the APAC countries group that make me can't create "Donation Button" from paypal.com directly. So I tried to create the donate button with "Buy Now Button" from paypal.com and edit the picture and price options with 3 options(1,2,3).

So if you like my blog and want to support my blog, please donate me.

Thank you.

Jun 28, 2011

Tip: Beginner tutorial for SQL Injection by p00l_b0y

I received this tutorial link from my twitter. And it's say p00l_b0y is writer. After I read it, I like it 'cause it's easy to read and easy to understand.

View: http://pastebin.com/FquhJkmA

Download: http://www.wupload.com/file/36436006/Beginners_tutorial_for_SQL_Injection_written_by_p00l.docx

Jun 27, 2011

Did LulzSec expose your (friend) passwords?

After LulzSec released many many information of username,password, I found some post that interesting and share it here. So find with your username.

So I found this site which allows you to search for your email address to see if you may have been effected; http://dazzlepod.com/lulzsec/final/

So then I began to wonder, If I was on that list, who else I knew may have been on it.
So I decided to write a quick Ruby script which would check just that.
First off, I had to download my Google contacts. To do this simply go to http://contacts.google.com.
I exported all of my contacts in Excel format. Highlighted the email column and pasted them into a file called contacts.txt. (remove the column name from the text file)
Then simply run my (very rushed, it’s 1AM) Ruby script which can be found here; http://www.pastie.org/2126584 (you will need to install the Typhoeus gem)

If you want to see full detail, please go to the Source.

Source: http://www.ethicalhack3r.co.uk/toolz/did-lulzsec-expose-your-freinds-password/

Jun 26, 2011

AnonOps Shell List Leaked

I don't want to explain anything about it, please take a look by yourself.

View: http://pastebin.com/ZDyb4UM5

Download: http://www.wupload.com/file/34529452/AnonOps_Shell_List_Leaked.docx

AES encryption on your gmail message with Encipher It

If you want to encrypt your Gmail, try Encipher It.

Source: https://encipher.it/

Proof-Of-Concept: Session Hijacking Facebook account with Wireshark and Tamper Data

This post is my video about PoC. session hijacking Facebook Account with  Wireshark and Tamper data tool.

* c_user is user id.(I Think).
* xs is authentication token.

Now take a look in my video, how to session hijacking it.

Howto: Output From Metasploit Console

HD Moore Blog:

the Metasploit Framework Console is a great interface for getting things done quickly, but so far, has been missing the capability to save command and module output to a file. We have a lot of small hacks that makes this possible for certain commands, such as the "-o" parameter to db_hosts and friends, but this didn't solve the issue of module output or general console logs.

As of revision r13028 the console now supports the spool command (similar to database consoles everywhere). This command accepts one parameter, the name of an output file. Once set, this will cause all console output to be shown on the screen and written to the file. Calling the spool command with the parameter "off" will disable the spool. Even better, this command opens the destination file in append-only mode, so you can add the following line to your ~/.msf3/msfconsole.rc to automatically log all of your output for the rest of time:

spool /home/<username>/.msf3/logs/console.log

After I update the Metasploit(2011-06-25) and read the post of HD about spooling, I tried it and create this howto.

1. Go to Metasploit Console
    $ msfconsole

2. Use the spooling command
    msf > spool /pentest/exploits/framework3/test-spool.log

3. Use any modules in Metasploit, console output will appear in the path that you set in step#2. in this case is /pentest/exploits/framework3/test-spool.log and I tried to use auxiliary/scanner/http/crawler/ module to test.
   msf > use auxiliary/scanner/http/crawler
   msf > set RHOST www.google.com
   msf > run

4. Now you can "cat" it for display the log or "tail -f" for follow the log.
   $  tail -f /pentest/exploits/framework3/test-spool.log

Source: https://community.rapid7.com/community/metasploit/blog/2011/06/25/metasploit-framework-console-output-spooling





 Please subscribe my blog.

 Old Subscribe

Share |