Language Selection

English French German Italian Portuguese Spanish

Security: Kali Linux Forensics Tools, SSH Primer and “Yelp, but for MAGA” Mad About Holes

Filed under
Security
  • Kali Linux Forensics Tools

    Kali Linux is a powerful Operating system especially designed for Penetration Tester and Security Professionals. Most of its features and tools are made for security researchers and pentesters but it has a separate “Forensics” tab and a separate “Forensics” mode for Forensics Investigators.
    Forensics is becoming very important in Cyber Security to detect and backtrack Black Hat Criminals. It is essential to remove Hackers’ malicious backdoors/malwares and trace them back to avoid any possible future incidents. In Kali’s Forensics mode, Operating System doesn’t mount any partition from System’s hard drive and doesn’t leave any changes or fingerprints on host’s system.

    Kali Linux comes with pre-installed popular forensics applications and toolkits. Here we’ll review some famous open source tools present in Kali Linux.

  • What is SSH (Secure shell protocol)?

    SSH stands for Secure Shell which is a security protocol based on the application layer. We use the SSH to securely access the remote servers and Desktops to execute various commands. In short, we can control the complete system remotely, if we have login information and SSH server access. Because The Secure Shell (SSH) is a cryptographic network protocol designed to replace the Telnet and access the remote system even on the unsecured remote shell by encrypting data before sending.

  • Security Researcher Discovers Flaws In Yelp-For-MAGAs App, Developer Threatens To Report Him To The Deep State

    Even a cursory look at past stories we've done about how companies treat security researchers who point out the trash-state of their products would reveal that entirely too many people and companies seem to think shooting the messenger is the best response. I have never understood the impulse to take people who are essentially stress-testing your software for free, ultimately pointing out how the product could be safer than it is, and then threatening those people with legal action or law enforcement. But, then, much of the world makes little sense to me.

    Such as why a Yelp-for-MAGA people should ever be a thing. But it absolutely is a thing, with conservative news site 63red.com releasing a mobile app that is essentially a Yelp-clone, but with the twist that its chief purpose is to let other Trump supporters know how likely they are to be derided when visiting a restaurant. This is an understandable impulse, I suppose, given the nature of politics in 2019 America, though the need for an app seems like overkill. Regardless, the app was released and a security researcher found roughly all the security holes in it.

  • “Yelp, but for MAGA” turns red over security disclosure, threatens researcher

    But the safe space for 63red founder Scott Wallace was violated quickly when French security researcher Elliot Alderson discovered some fundamental security flaws in Safe's architecture—making it not so safe.

    Because the application is build in React Native, a JavaScript- and JSX-based scripting language that basically turns Web apps into "native" Apple iOS and Android applications, the entire architecture of the application is available to anyone who downloads and unpacks it. And in that code, Alderson discovered a few things: [...]

More in Tux Machines

Tor-Powered Tails 3.13 Anonymous Linux OS Adds Extra Security and Latest Updates

Powered by the Linux 4.19.28 kernel, the Tails 3.13 operating system is now available with latest TOR technologies to help you stay hidden while surfing the Internet, including the Tor Browser 8.0.7 anonymous web browser and Tor 0.3.5.8 client and server for the anonymous Tor network. However, probably the most important addition in the Tails 3.13 release is the updated Intel microcode to version 3.20180807a.2, which adds an extra security measure against more variants of the well-known Spectre, Meltdown, and L1TF (Level 1 Terminal Fault) security vulnerabilities. Read more

NetworkManager 1.16 Released with WPA3-Personal and WireGuard VPN Support, More

NetworkManager 1.16 has been released two days after the launch of the GNOME 3.32 desktop environment and promises lots of exciting new features and improvements, starting with support for the new WireGuard protocol implemented in the Linux kernel for creating secure IPv4 and IPv6 VPNs (Virtual Private Networks). "Unlike other VPN solutions NetworkManager supports, WireGuard tunneling will be entirely handled by the Linux kernel. This has an advantages in terms of performance, and also removes the needs of a VPN plugin," explained developer Lubomir Rintel in a recent blog article. Read more

What’s New in ArcoLinux 19.2 and MakuluLinux Core

NVIDIA GeForce GTX 1660 Linux Benchmarks

Last week NVIDIA announced the GeForce GTX 1660 as the newest RTX-less Turing GPU but costing only $219+ USD. The GTX 1660 is a further trimmed down version of the GeForce GTX 1660 Ti that launched several weeks prior. After picking up an ASUS GeForce GTX 1660 Phoenix Edition, here are Linux OpenGL/Vulkan gaming benchmarks compared to a wide assortment of AMD Radeon and NVIDIA GeForce graphics cards under Ubuntu. The GeForce GTX 1660 features 1408 CUDA cores (compared to 1536 with the GTX 1660 Ti) while having a 1785MHz boost clock frequency and 1530MHz base clock frequency. The GeForce GTX 1660 opts for 6GB of GDDR5 unlike the 6GB GDDR6 used by the GTX 1660 Ti, which means only around 192GB/s of video memory bandwidth compared to 288GB/s with the Ti model. The other specifications are largely in common with the GeForce GTX 1660 Ti and the other Turing GPUs aside from lacking the RT/tensor cores. Read more