Pages

Banner 468 x 60px

 

Thursday, April 26

Installing Google Chrome in Backtrack 5

10 comments







Friends ,

Many asking how to install the Google chrome browser in the backtrack 5, today we will be seeing how to install that



Let us see the steps

1.In the root type as

apt-get install chromium-browser



2.change to chrome-browser directory

 cd /usr/lib/chromium-browser




3.Type the following command

 hexedit chromium-browser




4.You will be getting the hex-code ,


Here you have to search for geteuid and replace with getppid


press TAB and search (CTRL+S) for geteuid and change it to getppid and press CTRL+X ,

it will ask to save or not press 'Y' and close the terminal

and go to the Applications --> Internet --> Chromium Browser

and check whether the browser installed properly or not and enjoy the Backtrack.

Read more...

Sunday, April 15

Stuxnet

0 comments
Stuxnet --


Stuxnet is an Computer Worm discovered in the year of June 2010, that is initially spreading via windows machines and targeting the Siemens Systems. it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit.

The worm will spread very fastly and it is mainly target to the Siemens SCADA(supervisory control and data acquisition) Systems that are configured to control and monitor specific industrial processes. It mainly infects the PLC in the SCADA Systems.

when security Expers find to try the sources of the Stuxnet they found that the some sources are in belaraus and the spreading of worm is mostly in Iran i.e..more than 60 % and it mainly infects the iran nuclear program, which uses embargoed Siemens equipment procured secretly, has been damaged by Stuxnet.

The affected countries

Iran - 58.8%
India - 8 %
USA - 1%

The worm itself now appears to have included two major components. One was designed to send Iran’s nuclear centrifuges spinning wildly out of control. Another seems right out of the movies: The computer program also secretly recorded what normal operations at the nuclear plant looked like, then played those readings back to plant operators, like a pre-recorded security tape in a bank heist, so that it would appear that everything was operating normally while the centrifuges were actually tearing themselves apart

About two years ago, centrifuges at Iran’s uranium enrichment facility at Natanz started failing at a suspicious rate. Iran eventually admitted that computer code created problems for their centrifuges, but downplayed any lasting damage. Computer security experts said it was the handiwork of the Stuxnet code, and that it destroyed more than 1,000 centrifuges. Many believe the U.S., in conjunction with Israel, sabotaged the system.

Ralph Langner, a well-respected expert on industrial systems security, published an analysis of the worm, which targets Siemens software systems, and suggested that it may have been used to sabotage Iran's Bushehr nuclear reactor. A Siemens expert, Langner simulated a Siemens industrial network and then analyzed the worm's attack.

See Stuxnet: a Good Idea

on 1 september 2011 security experts found an virus related to the family of stuxnet and they call it as 'DUQU' . it is designed to capture information like keystrokes and system information.


























Read more...