Senin, 09 Mei 2016

Fix VMWARE in Kali Linux 2.0 [SOLVED ERROR VMWARE NET KERNEL UPDATE]

Fix VMWARE in Kali Linux 2.0 [SOLVED ERROR VMWARE NET KERNEL UPDATE]

apt-get install linux-headers-$(uname -r)

1. apt-get install git gcc make linux-headers-$(uname -r)

2. Download vmware at
https://my.vmware.com/web/vmware/downloads
Install VMware
As you saw, VMware can not run.

Now , how to fix
Download patch for kernel 4.0
cd /tmp/ && wget http://archive.xboot.info/tools/fix%20vmware%20kali%202.0/vmnet-3.19.patch
cd /usr/lib/vmware/modules/source
tar -xf vmnet.tar
patch -p0 -i /tmp/vmnet-3.19.patch
tar -cf vmnet.tar vmnet-only
rm -r *-only
vmware-modconfig --console --install-all

3. Now, confinue Fix

cd /usr/lib/vmware/modules/source
tar -xvf vmnet.tar
#edit file vmnet-only/netif.c and replace the line that looks like
#line 152# dev = alloc_netdev(sizeof *netIf, deviceName, VNetNetIfSetup);
to
dev = alloc_netdev(sizeof *netIf, deviceName, NET_NAME_UNKNOWN, VNetNetIfSetup);
save file
$tar -cvf vmnet.tar vmnet-only/
$ rm -rf vmnet-only/

Run Vmware player or workstation again
Baca selengkapnya

Jumat, 08 Januari 2016

Audit Your Android Devices


Recently, there are some famous vulnerabilities on Android devices from Android 4.x to 5.x. Since not all the vendors of Android device will release the fixes, you can inspect your devices to see if they are vulnerable or not. If they are vulnerable, you can use it with care or change to other devices which have been fixed the vulnerabilities.

VTS for Android is an open source project which can scan for the following current vulnerabilities :

ZipBug9950697
Zip Bug 8219321 / Master keys
Zip Bug 9695860
Jar Bug 13678484 / Android FakeID
CVE 2013-6282 / put/get_user
CVE_2011_1149 / PSNueter / Ashmem Exploit
CVE_2014_3153 / Futex bug / Towelroot
CVE 2014-3847 / WeakSauce
StumpRoot
Stagefright bugs
x509 Serialization bug
PingPong root - CVE-2015-3636

By the way, we should also beware of the adware too. Some adware can auto-root your Android devices and they are almost impossible to remove. For details, please refer to this article.

Baca selengkapnya

Senin, 22 Desember 2014

Aceh Smart City 2015

Ayo Ikut dan sukseskan Seminar dengan tema Aceh Smart City 2015 bersama pakar IT indonesia Onno W. Purbo di prakarsai oleh Konsorsium IT Aceh serta didukung oleh berbagai komunitas dan instansi.
Kegiatan di laksanakan di Banda Aceh 25 Januari 2015.
Fasilitas :
*/Sertifikat
*/Snack
*/Makan Siang


Untuk registrasi dapat merujuk ke link pendaftaran. Buruan Tempat terbatas

untuk info tambahan, dapat menghubungi email : event@sagoe.net



Baca selengkapnya

Kamis, 31 Juli 2014

Tsunami


Tsunami is a DNS Amplification Attack Tool which is collected from the internet and modified by Samiux. It is designed for testing your server and/or network under the DNS Amplification Attack. Perform this test on any server and/or network without authorization is a crime and you will be put into a jail.
The number of open recursive DNS servers and the bandwidth of the attacker as well as duration may affect the traffic volume size of the attack.

Usage

To perform DNS Amplification attack :

python amplfiy.py -t 1.2.3.4 -s open_dns.txt -a domain_name.txt -c -1 --verify -v --threads=1000

*where 1.2.3.4 is the victim's IP address

To scan for the open recursive DNS server :

perl find_open_resolvers.pl '1.0.0.0 - 1.84.255.255' -q 1000

Remarks : this script just can check if the DNS server has the RA flag or not only. You need to double check with the following command to confirm the scanned DNS server is a true open recursive DNS server.

dig ANY isc.org @samsung.idv.tw

*where samsung.idv.tw is the open recursive DNS server
where isc.org is the domain to lookup

Tsunami comes with the following files :

amplfiy.py - the attack script
find_open_resolvers.pl - the scanner script
gov-uk_domain.txt - domain names of UK Government
open_dns_1.0.0.0-1.84.255.255.txt - open recursive DNS list within 1.0.0.0 and 1.84.255.255 IP range

Baca selengkapnya