9/26/2014 #Shellshock Images of the Week


During these days we're hearing about #Shellshock bug, and I's just wondering if the Sysadmin of US DoD network is going to invite everybody to the big party with all these attacks,botnets, forkbombs,etc :P stay alert ,During all these two days one of the major flaws has been exploited and that's the obviously! ,  Who does not like free shells :3, there're right now tons of  people creating new PoC's now imagine how money could you get :P Do you imagine how the defense should be.

I've been collecting  a couple of fun pics regarding to this topic , enjoy it .

Embedded image permalink
Fig.1 I can't reproduce #shellshock on this system either! Plz help.

Embedded image permalink

Fig.2 Jailbreaked iOS 7.1.2 #shellshock test result.


Embedded image permalink

                                Fig.3  For a laugh: *Facepalm* Oh GoDaddy... #Shellshock #CVE20146271 #bashbug #bashbleed #bashpocalypse #infosec

Embedded image permalink

Fig.4 #infosec #shellshock #bashbleed #bashpocalypse

Embedded image permalink

Fig.5 Lol In your servers, stealing your secretz #bashbug #shellshock

Embedded image permalink
Fig.6 How many people already talking about #shellshock? About 40K tweets by 46K users since yesterday. #bash #bashbug

Embedded image permalink
Fig.7 Since 90's ?

Embedded image permalink
Fig.8 In the Wake of Shellshock, Mac Users Are Left Waiting for a Patch via @mashable http://avgclick.me/1n46EUP


Embedded image permalink

#Shellshock: All you need to know about the #BashBug vulnerability http://symc.ly/1u21HMX



Digg it StumbleUpon del.icio.us

9/01/2014 Pwnables.kr


Well this post is to share with you an amazing site saw in #pwning channel ,I say that because in this site we can practice all the important aspects (Reversing, Programming, System Knowledge and Exploitation)it has a special thing where you need to know about Gnu/Linux Operative System and it is intended for students,professionals and enthusiast  of  Information Security.

The site is divided in four categories as it is explained below :

  1. Toddler's Bottle: Tasks for beginners. Basic tasks for pwning. Somewhat educative. 
  2. Rookiss: These tasks suffers from typical rookie mistakes regarding computer security.
  3. Grotesque: These tasks are somewhat difficult to exploit, you need to buckle down and focus to solve these tasks.
  4. Hackers's Secret: Advanced system knowledge is required for pwning these tasks. Being smart isn't enough.

The learning process is part of you , here you'll need to do the proper homework , it can overcome the limitations imposed by the concept of tacit, also the fun thing is the key to pass some of the challenges.

Play Just for fun not for profit.



Digg it StumbleUpon del.icio.us