Showing posts sorted by relevance for query Amazon. Sort by date Show all posts
Showing posts sorted by relevance for query Amazon. Sort by date Show all posts

Amazon cloud service blamed for Sony hacking



An anonymous source claims the person who hacked into Sony’s Playstation network did so using Amazon’s cloud computing servers. If true, it would suggest previous warnings of the potential for misuse were very much valid.
An unnamed Bloomberg source says the Sony hacker carried out the attack using Amazon’s EC2 service which, unlike more basic forms of cloud computing that are mainly for storage or document editing, allows users to carry out the data processing of their choice on a pay-per-use basis.
Sensibly enough, the hacker is said to have used a bogus name to set up the EC2 account and has since disabled the account. Amazon — which can probably expect a visit from the FBI if the story is true — does have measures to keep track of who uses its services, such as requiring a valid phone number and credit card. There are ways round both of those checks, though it would require a little more determination.
It’s not just the potential for anonymity that can make cloud computing services attractive, however. Back in January a German security consultant said he’d been able to use EC2 to successfully break a wireless password in 20 minutes and that he believed he could cut that to six minutes. That’s not just an issue of saving time, but also money: with Amazon’s pricing structure, a six-minute attack could cost under $2.
If EC2 was indeed used in the Sony attack, it’s clearly going to have been a slightly more sophisticated technique than a brute force attack on a wireless password (in effect, guessing every possible answer, usually starting with dictionary words.) But the basic principle remains the same: using cloud computing allows access to intensive processing without the hardware costs.
Amazon has previously noted that its acceptable use policy bars customers using EC2 for unauthorized hacking, though it isn’t clear if or how it attempts to stop such behavior.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Security Hole in Amazon's Kindle Touch Allowing Attacker to Execute Arbitrary Shell Commands As root

Security Hole in Amazon's Kindle Touch Allowing Attacker to Execute Arbitrary Shell Commands as root
Yet again another major security hole found in Amazon's Kindle Touch which could lead a attacker to run malicious codes and even can get root privilege. This hole has been found into the built in browser of Kindle Touch. The vulnerability is something follows - when a user navigates to a specially crafted web page, the Kindle will execute arbitrary shell commands as root. This allows attackers to access the eBook reader's underlying Linux system at the highest privilege level and potentially steal the access credentials for the Amazon account linked to the Kindle, or purchase books with the Kindle user's account.
Though Amazon have a solid excuse while saying  the Kindle browser has been considered to be in "beta" for more than a year, this status doesn't reduce the risk for inquisitive users as the software is installed on each device by default.  
We would like to give you reminder that, this security issue was publicly documented about three months ago but hasn't attracted much attention – except in the jailbreak community. The issue doesn't appear to affect any other Kindle models. Amazon's security department told heise Security that they are working on a patch. 


-Source (The-H)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Security Flaws in Amazon Silk (The Cloud-Based) Web Browser


Amazon Silk, the cloud-based Web browser for the leading US online retailer’s Kindle Fire tablet, received mix reactions from users re privacy, especially on features with high risks of endangering data confidentiality.
The Amazon Silk Web browser rides on the high-speed and powerful connection offered by the company’s own Elastic Cloud Computing (EC2) service to reduce page load times.
The online retailer apparently boasts on this split browser architecture, which Opera Software ASA already used on its lightweight Opera Mini browser since 2005. Concerning security, the Amazon Silk Web browser stores all the visited sites of any user that are easily accessible to law enforcement agencies by request. Amazon’s servers will act as MITM, or man-in-the-middle, proxy for HTTPS requests, giving the company enough ability to tap on secure communications. Fortunately, the Web browser comes with an offline/off-cloud feature to stop sharing sensitive data to the servers. However, this Amazon Silk functionality is not set to default so most users will likely not notice of having one and use it.


-News Source (Social Barrel)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Russian Hacker 'Dmitry Zubakha' Arrested For DDoS Attacks on Amazon, eBay & Priceline

Russian Hacker 'Dmitry Zubakha' Arrested For DDoS Attacks on Amazon, eBay & Priceline

A twenty five years old hacker from Russia get arrested for allegedly perforimg two massive DDoS (Denial-of-Service) attacks on one of the most popular online shopping site Amazon.com and eBay in 2008. Dmitry Olegovich Zubakha also known as "Cyber bandit" in most of the hacker's underground community was indicted in 2011, but he was just arrested in Cyprus on Wednesday. The arrest of Zubakha took place under an international warrant and  currently he is in custody pending extradition to the United States. According to the indictment unsealed on Thursday said- Zubakha, with the help of another Russian hacker planned and executed DDoS attacks against Amazon.com, eBay, and Priceline in the middle of 2008. Zubakha and his co-conspirator launched the attack with the help of a DDoS botnet to generate a large number of traffic which interrupts the normal service of those online shopping sites. According to a press release by the U.S. Department of Justice (DOJ), the attacks made it "difficult for Amazon customers to complete their business on line."
He has been charged by law enforcement for stealing more than 28,000 credit cards in 2009 for that reason, Zubakha and his partner are also charged with aggravated identity theft for illegally using the credit card of at least one person. At present the charges in the indictment conspiracy, intentionally causing damage toa protected computer resulting in a loss of more than $5000, possession of more than 15 unauthorized access devices (credit card numbers), and aggravated identity theft are just allegations. Zubakha faces up to five years in prison for conspiracy, up to teh years in prison and a $250,000 fine for intentionally causing damage to a protected computer, up to ten years in prison and a $250,000 fine for possessing unauthorized access devices, and an additional two years in prison for aggravated identity theft. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Amazon Will Try To Kill The iPad With Its Kindle Tablets



‘Coyote’ and ‘Hollywood’ are the code-names of two tablets rumored to be a part of Amazon’s
upcoming tablet ‘family’. Details obtained from one tipster reveal the Coyote will boast a dual-core processor much like Apple’s iPad 2, whereas the Hollywood has something even more audacious up its sleeve: hardware that Amazon hopes will potentially make the iPad 3 obsolete even before it launches.


The Coyote will be Amazon’s entry-level tablet in the Kindle family, and will based on the NVIDIA Tegra 2 platform. Nothing too spectacular there, then, but it’s the Hollywood that looks to be most interesting.
Based on the NVIDIA T30 “Kal-El,” the Hollywood boasts a quad-core processor that makes the dual-core Tegra 2 look like a senior stepping off the bus. With a 500% performance increase, the Hollywood wants to make the iPad 3 look silly even before Apple announces the third-generation device. Something tells us Apple’s got a quad-core A6 in the pipeline to cope, though.
Unfortunately, those are the only details Boy Genius Report’s source can provide for now, leaving much to be desired when it comes to details on screen sizes and other technical specs. For now, we’ll just have to wait, but what do you think? Will an Amazon tablet ever steal Apple’s crown?

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Search Guru Bill Stasior CEO of Amazon’s A9 Unit, Hired By Apple To Oversee Siri

Search Guru Bill Stasior CEO of Amazon’s A9 Unit, Hired By Apple To Oversee Siri

To be the very best, you need to deliver your hundred percent even some times more than hundred percent, and this race continues. As a result Apple has hired 'search guru' Bill Stasior, CEO of Amazon.com’s A9 search and advertising search unit, to oversee Apple's Siri voice-activated personal assistantStasior, who joined Amazon in 2003 as director of search and navigation, founded A9.com in May 2004 and then became CEO of the wholly owned subsidiary in February 2006, according to his LinkedIn profile. Stasior, who holds undergraduate and graduate degrees from the Massachusetts Institute of Technology, describes A9.com as a “company with a mission to create groundbreaking technologies in search, advertising, and mobile that power customer centric, Internet businesses.” Apple confirmed his hire but didn't provide any comment. Stasior has an impressive pedigree (you can read his resume and see a really geeky binary image he posted of himself here). The MIT PhD has taught there, too, and has done stints at Oracle, Netcentives and AltaVista. 
 Siri, Apple's famous voice-activated personal assistant program, was acquired in April 2010 to launch a big stake in voice-activated search. Since Apple kicked Google Maps to the curb in iOS 6, the only remaining tie with Google is search. Will Apple eventually do its own search network? Who knows. Stasior’s background in search will certainly be of value if the time ever comes. While Siri has had a high profile in the iPhone range, Apple has lost some of the talent who created it. Adam Cheyer, who co-founded the voice recognition software, recently left the company. CEO Dag Kittlaus departed in October 2011. 
Here we want to remind you that last month Twitter hired famous whitehat hacker Charlie Miller, to boost up its security. Here its Apple who hired Stasior presumably, strengthening Apple’s search and search advertising technology in the wake of its increasing competition with Google. While talking about the news of hiring geniuses then the name of Nicholas Allegra, the world-famous hacker known as "Comex", creater of JailbreakMe.com comes. He was also hired by Apple in 2011. 


-Source (AllThingsD) 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Amazon Kindle Touch (Kindle OS 5) Has been JailBroken



Recently release Kindle Touch has been JailBroken. Yifan Lu, freelance developer found vulnerability Kindle OS 5 and he has exploited Kindle Touch of Amazon. Although it might look completely innocuous due to the e-ink display, the Kindle Touch is a relatively complex device. At the core of the device is an operating system built around HTML5 and Javascript. Unfortunately, the engineers at Amazon left some gaping holes in the system, allowing for a straight-forward XSS (cross site scripting) attack vector to be used. By embedding HTML and JS calls into an MP3, Yifan Lu was able to hook into undocumented debug functions in order to execute code at root level. Not only did Amazon leave a function that allowed any process to be spawned as root, they also didn’t bother to sanitize inputs when reading the ID3 tag for display. With root access, a simple SSH package was created and pushed, providing unfettered access to the device.
Yifan Fu is encouraging other developers to start writing plugins for the device. Open formats such as ePub or Mobi can be supported as well. While apps and games are a possibility, the e-ink display will really limit the possibilities due to the slower refresh rate, lack of color as well as lack of multitouch.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Major players zero in on cloud computing market


As the cloud computing market grows, the battle for work is getting more fierce, particularly among some of the well-known industry players.
Microsoft, Google and Amazon Web Services have made early inroads, but analysts say much of the market is still yet to be realized.
The federal government has adopted a “cloud-first” policy that makes cloud, or Web-based computing, the default choice and has required agencies to move at least three services to the cloud within an 18-month period. The policy announcements have stoked a growing industry of companies — both those better known for commercial work and traditional contractors — hoping to play a part in the shifts.
In recent months, the competition has grown more heated. Teresa Carlson shook up the sector last year when she left her job as head of Microsoft’s U.S. federal sector to become vice president of Amazon Web Services’ global public sector.
In a statement, Carlson said the move gave her an “outstanding opportunity to join the clear business leader in cloud services and solutions.”
Microsoft has not yet filled her spot, but Curt Kolcun, vice president of Microsoft’s U.S. public sector business, said he is seeking a replacement.
“I’m obviously taking the time to find the right person,” he said. “I don’t think we’re missing anything relative to the market opportunities or how we’re competing for business across the market space.”
More recently, Google and Microsoft have wrangled publicly over whether Google’s cloud offering meets a security certification known as FISMA, and Amazon came under fire for a Northern Virginia data center crash that caused an outage for a cloud hosting multiple Web sites.
Though neither of these events will likely have long-term effects, they are indicative of the kind of rivalries shaping up, said Shawn P. McCarthy, research director at IDC Government Insights.
“This is going to be a very competitive space, and people are going to do what they need to do in order to capture that,” he said.
Ray Valdes, a research director on Gartner’s Internet platforms and Web services team, said the players are carving out niches within different parts of cloud computing. Amazon, for instance, has a clear advantage in the infrastructure segment of cloud computing.
Microsoft and Google, on the other hand, are more focused on providing platforms for the cloud, he said. Both companies have won government work migrating federal agency e-mail programs to the Web.
Microsoft is in the process of shifting the Agriculture Department’s 120,000 e-mail accounts to the cloud, and Kolcun said it has already moved more than 17,000. The agency is moving over 1,600 users each night and expects to complete the shift before the end of the year.
Google partnered with Pennsylvania-based contractor Unisys to win a high-profile job migrating the General Services Administration’s e-mail to the cloud.
“The cloud-first mandate has brought increased awareness to this market that there are other options beyond [the] traditional, in-house data center model,” Carlson said in an e-mail.
McCarthy said he sees room for all three companies — and many others.
“Ultimately it will be a huge business,” he said.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Suspected LulzSec and Anonymous Members Got Busted

Four men have been arrested in separate parts of the UK by police investigating the hacker groups Anonymous and LulzSec. The suspects - from Doncaster, Warminster, Northampton and London - are being questioned by Scotland Yard's e-Crime unit. Their arrests are part of a wider operation involving UK law enforcement and the FBI. At the same time, 14 suspected members of Anonymous appeared in a US court.
Authorities around the world have been rounding up suspects following a wave of attacks by both groups on major corporations and government institutions.
Amazon, PayPal, the CIA, US Senate and the UK's Serious Organised Crime Agency have all suffered either intrusions or denial of service attacks, designed to take their websites offline.


Mass arrests:-

In the latest round of British arrests, police detained 20-year-old Christopher Weatherhead from Northampton and 26-year-old Ashley Rhodes from Kennington, near London. The pair are due to appear at Westminster Magistrates Court on 7 September. Detectives also arrested a 24-year-old man from Doncaster, and a 20-year-old from Wiltshire for conspiring to commit offences under the Computer Misuse Act 1990. In the United States, a mass court appearance saw 14 suspected Anonymous members appear before a judge in San Jose, California. All of them denied being involved in a denial of service attack on PayPal's website in December 2010. Anonymous had publicly declared its intent to target both PayPal and Amazon for, what the group perceived as, their complicity in isolating whistle blowing website Wikileaks. Following the leaking of confidential US State Department memos, PayPal stopped processing donations to Wikileaks, while Amazon kicked the site off its web hosting service.

-News Source (BBC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

CloudCrack: An NVIDIA GPU-Accelerated Cryptanalysis Suite!


You must be aware of our previous posts such as – MOSCRACK and WPA Cracker. We now have another open source offering that is NOT a cracker, but a cryptanalysis suite that is written in CUDA – a parallel computing architecture.
CloudCrack is a GPU-enhanced cryptanalysis suite for cloud computing platforms such as the Amazon EC2 Cluster Compute cloud. It is a NVIDIA GPU-accelerated cryptanalysis suite written in CUDA, NVIDIA’s massively parallel concurrent programming language. CloudCrack contains custom CUDA multiprecision math libraries for storing a large target RSA modulus n in shared GPU memory, with each GPU core working as a parallel factoring process to break the target modulus.
CloudCrack is based upon a Pollard’s Rho factoring hybrid with an updated Brent cycle finder, and includes performance optimizations to the traditional Rho factoring method. The massively parallel design of the NVIDIA GPU architecture lends itself quite well to Pollard’s Rho, and the reduction sieve performance enhancements added with CloudCrack can reduce by several orders of magnitude the size of the keyspace required to search for a successful brute force attack against a large RSA target modulus n.
The only thing that will hurt us is that our small time home computers will not be able to support thisapplication. To run this open source software, you will need a Fermi capable GPU such as a GeForce GTS 450 or GTX 460 series, and a Linux-based NVIDIA CUDA (3.2 or better) development environment. RHEL 5.5 or Fedora 13 is preferred for maximum compatibility with future EC2 parameterized launch instances.  The most recent generation of consumer CUDA GPUs from NVIDIA contain hundreds of cores, each core of which can be utilized as a concurrent Rho factoringthread (the GTS 450 has 192 hardware cores; the GTX 460 has 336; and, the M2050/2060 Tesla series have 448 cores each). You ofcourse could rent them from Amazon, etc.
All this certainly sounds awesome and we are sure that there will be a spurt in cracking services. This software currently comes in two versions -
  • REVA, which implements the Greatest Common Denominator (gcd) function on the GPU itself; currently there is a bug in the Montgomery math routines in the REVA gcd however.
  • REVB includes reduction sieve performance enhancements but with the gcd function implemented on the host CPU, which requires about 25% of the PCIe bus bandwidth to shuffle targets from the GPU to the host CPU for the gcd test.
We can expect a REVC soon, which will include all of the performance enhancements inherent to the REVB fork, with a GPU-localized gcd like the architecture of REVA.
Download CloudCrack_REVA.tar.gz and CloudCrack_REVB.tar.gz or view the complete archivehere.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

‘Unauthorized’ Autobiography of Julian Assange Released


The highly anticipated autobiography of WikiLeaks founder Julian Assange hit bookshelves here on Thursday — released without Assange’s consent and following a spectacular falling-out with his publisher. Three months ago, Assange tried to cancel the contract for the autobiography, for which he reportedly was paid more than $1 million. But as the 40-year-old Australian knows better than most, objecting to the release of information is no guarantee that it will be withheld.
Edinburgh, Scotland, publisher Canongate Books said it decided to publish an “unauthorized first draft” of the autobiography, noting that Assange has not repaid his advance, which is tied up in legal fees.
Assange has hit back at Canongate in a lengthy statement, accusing the publisher of “profiteering from an unfinished and erroneous draft.” The 244-page memoir traces Assange’s life from his early years in Queensland, Australia, through to the founding of the whistleblowing Web site that has embarrassed the U.S. government with its release of thousands of diplomatic cables.
Assange devotes an entire chapter to allegations of sexual misconduct with two Swedish women, which he staunchly denies. Perhaps the women were motivated by revenge, he says, or perhaps he was set up. He claims a Western intelligence agency warned him that the U.S. government was discussing ways to deal with him “illegally,” which could include an elaborate trap. Speaking at length about his version of events with women he calls “A” and “W,” Assange writes: “I may be a chauvinist pig of some sort but I am no rapist.”
According to extracts published Thursday in the Independent, he also writes: “The international situation had me in its grip, and although I had spent time with these women, I wasn’t paying enough attention to them, or ringing them back, or able to step out of the zone that came down with all these threats and statements against me in America. One of my mistakes was to expect them to understand this . . . I wasn’t a reliable boyfriend, or even a very courteous sleeping partner, and this began to figure. Unless, of course, the agenda had been rigged from the start.”
Assange didn’t respond to requests for an interview. But in his statement, he disputed the publisher’s version of events — saying that when he tried to cancel the contract, he was seeking a new one with an extended deadline in light of his legal battles. He said: “This book was meant to be about my life’s struggle for justice through access to knowledge. It has turned into something else. The events surrounding its unauthorized publication by Canongate are not about freedom of information — they are about old-fashioned opportunism and duplicity.”
On Twitter, WikiLeaks wrote that “Life is stranger than fiction,” and offered a helpful link to Amazon for anyone seeking to buy the book. When Canongate signed up Assange last December, it was seen as a fantastic coup for the relatively small publisher, who went on to sell the book rights to 38 publishing houses around the globe, including Alfred A. Knopf in the U.S. Canongate said in a statement that Assange sat for 50-plus hours of interviews with a ghost writer at the Georgian manor home northeast of London where Assange currently lives under partial house arrest as he fights an extradition warrant to Sweden. Canongate said that “Julian became increasingly troubled by the thought of publishing an autobiography.” While every word in the book is Assange’s, Canongate said, Assange came to feel it was too personal. Despite pulling the ghostwriter off the project and offering Assange more control, the publisher said, Assange didn’t offer a single edit or additional material while the book was being completed.
Knopf said in a statement that it had cancelled plans to publish the memoir in the United States. “The author did not complete his work on the manuscript or deliver a book to us in accordance with our agreement,” Knopf said. Assange told the Sunday Times last December that he was reluctant to write a memoir, but that he needed the money.
“I don’t want to write this book, but I have to,” he said. “I have already spent £200,000 for legal costs and I need to defend myself and to keep WikiLeaks afloat.”

-News Source (Washington Post)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google CEO Larry Page said G+ Hit 10M Users in 2 Weeks


Google's Facebook competitor Google Plus grew to 10 million users in just two weeks, the company announced Thursday.
That's only a bit more than 1 percent of Facebook's 750 million global users, but it still represents staggering growth for Google's infant social network, which isn't yet open to the public. The site remains in a "limited" trial phase.
"Growth on Google has been great," Google CEO Larry Page said on a conference call with analysts. 

"Over 10 million have joined. That's a great achievement for the team. There has been a ton of activity."

Page said more than 1 billion items are being shared on the network every day. The " 1" button, which populates search results with friends' recommendations, has been clicked 2.3 billion times a day.
Google represents a part of the new CEO's grand vision for the 13-year old company. Despite Google's position as the worldwide leader in search, Page has opted to treat the company as a startup, increasing hiring and starting several new initiatives. 
"Today, I see more opportunities for Google than ever before; we're just at the beginning of what we want to do," Page said. "We're only at 1 percent of what's possible. Google's just getting started."

Accordingly, Google continued its hiring spree in the second quarter, upping its headcount by nearly 9 percent, or 2,500 employees -- including 450 from the acquisition of flight data company ITA .
The company also has spent freely, putting more than $900 million into its infrastructure during the quarter, including expanding its massive data centers. The company says it expects to continue to make "significant" capital expenditures going forward.
Google says all that spending will keep the company ahead of its rivals.

The past quarter has been a busy one. In addition to Google , the company started selling its Chromebook line of laptops aimed at current Microsoft corporate clients and launched its Music application to compete with Apple's iTunes and Amazon's Cloud Drive.
The company also unveiled Google Wallet, which will allow customers to pay for items using their smartphones, and it launched Google Offers, a Groupon competitor.
But Google also shut down several products that weren't working, such as Google Health and PowerMeter.
"Our focus is more wood behind fewer arrows," said Page. "I'm very happy with our progress."
Still, the free spending has made some stock analysts cautious. Page lashed back at that criticism, noting that when Google started its search engine, no one believed the company could monetize that besides the occasional banner ad.

"Fast forward to today, it seems like we're playing the same movie all over again," he said.

The world's online search leader said its net income in the second quarter rose to $2.5 billion, up 36 percent from a year earlier.
Results included one-time charges totaling $1.06 per share. Without the charges, Google said it earned $8.74 per share. Analysts polled by Thomson Reuters, who typically exclude one-time items from their estimates, had forecast earnings of $7.85 per share.
Profit rose as both the number of clicks on Google's ads and the amount that advertising partners pay per click increased substantially: Paid clicks surged 18 percent and cost per click grew 12 percent compared to last year.

Sales for the Mountain View, Calif., company rose 32 percent to $9 billion. Excluding advertising sales that Google shares with partners, a figure also known as traffic acquisition costs, the company reported revenue of $6.9 billion, which topped analysts' forecasts of $6.6 billion.
Shares of Google jumped 12 percent after hours.
Still, not all the news has been positive for Google, which has recently landed in antitrust crosshairs.

The Federal Trade Commission began investigating the company for evidence of abusive practices, and a federal judge rejected Google's planned settlement deal in its attempt to create a universal online book library.
The Department of Justice also heavily scrutinized the company's recent purchase of flight data software company ITA, and Google set aside $500 million for a potential settlement with the DOJ regarding the company's advertising practices. The DOJ is currently studying Google's proposed $400 million purchase of digital advertising toolmaker Admeld.
Late last month, French search company 1plusV said it would seek $423 million in damages from the American search giant over alleged anti-competitive practices.


-The News Source (Chicago Tribune)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Critical vulnerability in open source Eucalyptus clouds


Researchers at the Ruhr-University Bochum have discovered a critical vulnerability in Eucalyptus, an open source implementation of the Amazon EC2 cloud APIs. An attacker can, with access to the network traffic, intercept Eucalyptus SOAP commands and either modify them or issue their own arbitrary commands. To achieve this, the attacker needs only to copy the signature from one of the XML packets sent by Eucalyptus to the user. As Eucalyptus did not properly validate SOAP requests, the attacker could use the copy in their own commands sent to the SOAP interface and have them executed as the authenticated user.
All versions up to and including 2.0.2 are vulnerable; a fixed version, 2.0.3, is available to download. Ubuntu's Eucalyptus-based Ubuntu Enterprise Cloud (UEC) is also vulnerable; updates for Ubuntu 10.04 LTS, 10.10 and 11.04 are already available in Canonical's repositories. Eucalyptus does note that the changes made to close the holes may lead to some existing tools failing to work as the system will interpret them as a replay attack if they issue commands too rapidly.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google Vs. Microsoft (For Cloud)


Google has locked horns with Microsoft in a high-stakes showdown to dominate what could be the next great mother lode of Internet-derived profits. Each is seeking to attract businesses to lease its hosted versions of essential communications and office programs, instead of maintaining these basic tools in house. It's an emerging form of digital office outsourcing — often referred to as cloud computing — one which Microsoft's outspoken CEO, Steve Ballmer, has vowed to own. "At Microsoft, for the cloud, we're all in," Ballmer told an auditorium full of University of Washington computer science students last spring. "It's just a great time to be all-in and really drive the next generation of technology advances." The software giant recently released a near-final test version of Office 365, a hybrid of its ubiquitous productivity software suite. Tuned for the Internet, Office 365 extends the slow-but-steady advances the company has been making since 2002 in delivering business programs over the Web, much as a utility delivers water or electricity. But now that's being challenged again by search-advertising company Google. At its recent Google I/O developer conference, Google made a move to steal some of Ballmer's thunder. There, Google unveiled Chromebooks, stripped-down computers optimized to run its hosted messaging, calendaring and collaboration tools. "Chromebooks is actually a huge leap forward for cloud computing," says Dave Girouard, Google's president of enterprise. "We're excited about putting more pieces of the puzzle together. Our aim is to be No.1 in cloud computing." Delivering software over the Internet is nothing new. Cloud computing occurs when an individual accesses services housed on a third-party server rather than a local PC. Consumers use cloud computing with free Web mail services and popular social-networking sites. The race among Amazon, Google and Apple to popularize cloud-based storage of your music collection is yet another example. And Salesforce.com and NetSuite have long supplied businesses with specialized customer relationship management and bookkeeping programs as hosted services. Yet, a confluence of developments has buoyed the big pushes by Microsoft and Google to extend cloud computing to basic workplace tools: e-mail, messaging, calendaring, word processing, spreadsheets, slide presentations and file sharing. Many companies that hunkered down during the recession are eager to refresh aging systems. Security has become a major pain, and everything is getting more complex as mobile-device use rises. And capital spending budgets are as tight as ever. A desire to become more efficient and reduce long-term costs was identified as an influential factor by 60% of information technology buyers from government agencies recently surveyed by CompTIA, a non-profit association for IT pros. For the tech companies wrestling for the future of office software, the stakes are high. Tech researcher Gartner forecasts that global spending on e-mail, collaboration and cloud-based applications will more than double to $20.7 billion by 2014, up from $9.8 billion this year. 


Cloud savings 
Now cloud computing is getting a second look by often-conservative IT buyers because Internet connectivity has become ubiquitous, and data storage, dirt cheap, says Wes Miller, industry analyst at research firm Directions on Microsoft. "But the real reason people are flocking to it has to do with saving money, whether directly or indirectly." In many cases, the first basic tool companies look to outsource is e-mail. Shane Ochotny, tech architect at Tampa General Hospital, had four technicians working full time maintaining e-mail for 7,000 employees, including 1,000 physicians, spread through the hospital, a clinic and separate administrative offices. After testing several hosted e-mail services, including Google's Gmail, Ochotny chose to outsource e-mail, instant messaging and video conferencing to Microsoft; the software giant first began offering hosted e-mail in 2002, and it added other services in 2005 and 2008. That freed four technicians to create a customized program that provides instant e-mail access to new workers. Next up for the hospital's techs: developing a way to integrate video conferencing with instant messaging and voice over Internet. While some analysts worry that cloud outsourcing will ultimately cut employment, Tampa General's experience is likely more the norm. "Moving stuff that isn't central to the business into the cloud frees up IT people to work on systems that are central," says Rob Helm, analyst at Directions on Microsoft. The hospital is one of the early testers of Office 365, which features a lightweight version of Office that can be accessed by workers from any device with an Internet browser. Ochotny is prepping a test to see if Microsoft's approach to cloud computing — which continues to require traditional desktop PC software in combination with new hosted services — can be tweaked to let doctors and nurses instant message each other on their iPhones, as well as BlackBerry, Android and Windows Phone 7 smartphones. "Since we spend less time on maintenance, we can focus on innovation and better use of existing tools," says Ochotny. Microsoft's huge advantage over Google: "The sheer number of companies of literally every size for whom Office is the de facto productivity suite," says Charles King, principal analyst at Pund-IT. "After years of fumbling with its online strategy, Microsoft now has a viable plan with Office 365 to entice enterprises to dip a toe in." 


Google’s cloud 
Google's strategy is 100% cloud-based. Basic versions of Gmail and its office productivity suite, Google Apps, are free to consumers; businesses pay a monthly per-user fee for commercial versions. It all runs through a Web browser on servers owned and maintained by Google. This arrangement works especially well for businesses looking to extend Internet communications and file sharing to managers in far-flung operations or to workers on the factory floor or out in the field. Jason's Deli, a Beaumont, Texas-based restaurant chain, uses Google Docs to schedule meetings, share reports and plan events among managers working in 230 eateries, five corporate offices and two food distribution hubs. "Our use cases are wide and varied," says Kevin Verde, chief information officer of Jason's Deli. "We currently have 10,000 documents that our users are collaborating on using Google Docs." When Google approached Jason's Deli about testing Chromebooks, Verde says, he was skeptical that a device built solely to access a Web browser, and which could not store files nor run applications as a tablet or laptop PC could, would prove useful. But he distributed test models to sales reps who spend all day pitching catering services to schools, churches and local businesses. He was pleasantly surprised. Using Chromebooks, the reps could tap into spreadsheets and monitor successful sales campaigns in other regions. They could access customer relationship management programs hosted by Salesforce.com. Verde is now a Chromebook fan. "The administration side of the Chromebook is almost effortless, and that is a big deal for corporate IT," he says. But can Google make any meaningful encroachment on Microsoft's turf? Chromebook, while intriguing, is going head-to-head against tablets and netbooks, priced roughly the same. "The competitive landscape has been complicated by the emergence of tablets, particularly the iPad," analyst King says. "Though tablets essentially offer the same browser-centric experience Google is promoting, they also enhance the user experience via a wide variety of apps." Google remains undaunted. In an effort to entice Microsoft Office fans to give Google Docs a whirl, the search giant in March 2010 reportedly spent $25 million to acquire start-up DocVerse, launched by two former Microsoft engineers. DocVerse subsequently came out in February as Google Connect, a free browser plug-in that lets users access Microsoft Office files using Google Apps. "It really knocks down some of the last reasons people have for not wanting to use Google," says Girouard. "This makes it easier." Microsoft swiftly counterpunched., with officials lambasting Google Connect in the tech media for ruining the formatting of complicated Office docs. Lately, they've been spinning Connect as a concession that Office cannot be displaced. "Google was trying to shoehorn a consumer offering, Google Apps, into an enterprise value proposition, by telling customers, 'You don't need Office anymore,'" says Tim O'Brien, general manager of Microsoft's platform strategy. "That strategy failed. So now they've changed tack and are telling customers, 'We don't think Office is going anywhere soon, so let us show you how our product can work alongside of it.'" Maybe, but Microsoft can't get complacent, analysts say. Google claims more than 30 million "active users" of Google Apps at some 3million businesses, with more than 3,000 new sign-ups every day. That includes midsize companies, such as Virgin America and National Geographic, and a few large ones, such as Jaguar Land Rover, Motorola andInterContinental Hotels. "Google is a serious wannabe contender," says King. "The search giant has to be taken seriously if only because it has deep pockets and a strong will."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google TV Update For Android 3.1 (Honeycomb)

Google announced on its Google TV blog Friday that the platform will be upgraded to Android 3.1 (otherwise known as Honeycomb) for Sony devices Sunday, with the Logitech Revue set-top box getting its upgrade "soon thereafter." What will you get with this software upgrade to Android? Google says it's "much simpler." Its customization capabilities will go a long way toward alleviating the awkwardness of its first iteration, which Google admits was "not perfect."
And the addition of the Android Market will open up a variety of applications, with the promise of more -- perhaps thousands more -- on the way. One welcome improvement will be an easier ability to search across all the TV shows at your disposal. With this update, Google's trying to answer that age-old question, "What's on?" If Google can pull that off, it could be a powerful thing indeed. The company says it has learned from its mistakes with the first version of Google TV and is "committed to find the best way to discover and engage with the high-quality entertainment on your television." So does that mean Google TV will be able to find all the shows from whichever cable or satellite provider you're subscribing to, or from the web via all of the apps within Google TV, such as Netflix, Amazon Instant Video, and HBO Go? Maybe. Of course, Google plans to improve Google TV's search across YouTube, its own video streaming service.
In the blog post, Google also hinted at future software updates (Ice Cream Sandwich, anyone?) and new devices "on new chipsets from multiple hardware partners." Hey, this is getting interesting.
We'll have to reserve judgment until we can install this software update on our Logitech Revue box, but for now, clearly this update has great potential. It makes perfect sense for Google -- purveyor of Android, the Chrome browser, YouTube and by the way, the world's search expert -- to leverage these powerful capabilities in its TV set-top. The hurdle Google needs to navigate is not so much a technical or software one, but a matter of negotiating and arm-twisting of content providers. Will the company gain cooperation from TV networks and movie studios, allowing their content to be searchable on the Google TV platform? That's the key to Google TV's success.

  • To see the google TV blog post click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Teen Hacker "Cosmo the God" of Underground Nazi Sentenced 6 Yrs Internet Ban By California Court

Teen Hacker "Cosmo the God" of Underground Nazi Sentenced 6 Yrs Internet Ban By California Court

A teenager hacker from an infamous hacker collective group named Underground Nazi faced Internet ban. On Wednesday the 15 years old hacker known as "Cosmo" or "Cosmo the God" was sentenced in juvenile court in Long Beach, California. According to sources, Cosmo pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation. 
This newly formed hacker group Underground Nazi had taken the spot light in January this year, when they hacked UFC.com (Ultimate Fighting Championship). Later they involved them selves in mass protest against controversial privacy act SOPA & PIPA. The protest was dubbed Operation Megaupload (#OpMegaupload), where hacktivist Anonymous  along with hackers around the globe stand together against the take down of Megaupload.com. In the middle of 2012 Cosmo was also responsible for Twitter outage, where Cosmo along with few other UG Nazi members performed massive denial of service attack to interrupt the service of Twitter. Also it has been found that, Cosmo pioneered social-engineering techniques that allowed him to gain access to user accounts at Amazon, PayPal, and a slew of other companies. He was arrested in June during a part of a multi-state FBI sting. 
Representatives from both the Long Beach district attorney and public defenders offices refused to comment on the case, given Cosmo’s status as a juvenile. However, according to Cosmo, the terms of the plea place him on probation until his 21st birthday. During that time, he cannot use the internet without prior consent from his parole officer. Nor will he be allowed to use the Internet in an unsupervised manner, or for any purposes other than education-related ones. He is required to hand over all of his account logins and passwords. He must disclose in writing any devices that he has access to that have the capability to connect to a network. He is prohibited from having contact with any members or associates of UG Nazi or Anonymous, along with a specified list of other individuals. He had to forfeit all the computers and other items seized in the raid on his home. Also, according to Cosmo, violating any of these terms will result in a three-year prison term. The probationary period lasting until age 21 is standard, but other terms were more surprising.



-Source (Wired) 









SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NATO Said:- Anonymous will be "infiltrated" and "persecuted"


The North Atlantic Treaty Organization contains the combined military might of 28 member countries, including Germany, the United Kingdom, and France. All three of those nations, and the United States, possess huge armies, nuclear weapons, and are committed to Article Five of NATO's charter:
"The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked."
Yet reading NATO's new draft general report on cyber security, one gets the impression that what the alliance worries about most these days is not an "armed attack," but a cyberattack on its network servers, or the infrastructure of any of its member countries.
"In this Information Age, the North Atlantic Alliance faces a dilemma of how to maintain cohesion in the environment where sharing information with Allies increases information security risks," NATO's Information and National Security survey observes, "but where withholding it undermines the relevance and capabilities of the Alliance."
And WikLeaks and Anonymous get top billing as visible threats to NATO's efforts to control its information perimeters.
"The time it takes to cross the Atlantic has shrunk to 30 milliseconds, compared with 30 minutes for ICBMs and several months going by boat," the report warns. "Meanwhile, a whole new family of actors are emerging on the international stage, such as virtual 'hactivist' groups. These could potentially lead to a new class of international conflicts between these groups and nation states, or even to conflicts between exclusively virtual entities."

The irony of 9/11:-

Authored by Lord Michael Jopling, Rapporteur for NATO, the study begins with an irony. Following the attacks of September 11, 2001 on New York City and Washington, DC, the United States government concluded that one of the reasons that the plot succeeded was because information about its perpetrators wasn't widely shared among US intelligence agencies, especially the Department of Defense, CIA, State Department, and Federal Bureau of Investigation.
And so the US opened up its data sharing practices. This made matter worse, Jopling appears to suggest. It "resulted in an exponential number of people obtaining access to classified information." Over 850,000 functionaries now enjoy some kind of "top-secret" security status, he claims. Many have access to the DoD's Secret Internet Protocol Router Network (SIPRNet), dispenser of embassy cables.
The study cites critics of SIPRNet who say that it lacks the ability to detect unauthorized access. "Thus, those in charge of the network design relied on those who had access to this sensitive data to protect it from abuse. These users were never scrutinized by any state agency responsible for the data-sharing system."
Jopling doesn't explicitly blame this openness policy for WikiLeaks phenomenon, but his narrative leads right into Private Bradley Manning, accused of providing documents for the outfit, prompting the group's famous publication of a continuous stream of State Department cables.
Not surprisingly, he thinks that this is bad:
The Rapporteur believes that even if one is in favour of transparency, military and intelligence operations simply cannot be planned and consulted with the public. Transparency cannot exist without control. The government, and especially its security agencies, must have the right to limit access to information in order to govern and to protect. This is based on the premise that states and corporations have the right to privacy as much as individuals do and that secrecy is required for efficient management of the state institutions and organizations.

Hacktivity:-

A big chunk of the assessment is devoted to the activities of Anonymous, most notably its denial-of-service attacks against PayPal, MasterCard, Visa, and Amazon.com for shutting down financial and server space services to WikiLeaks. Next comes the Anonymous assault on HBGary Federal, which had been planning some methods to take down WikiLeaks and expose Anonymous. It didn't turn out that way, of course. Instead, Anonymous penetrated the security company, erasing data, publishing e-mails, and wrecking its website.
The author seems confident, however, that the notorious group's days are numbered. "It remains to be seen how much time Anonymous has for pursuing such paths," Jopling writes. "The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted."
But the larger question hovering over this document is what NATO should do if one of its over two-dozen member nations is cyberattacked. The US has lately been pondering this dilemma as well.
"Certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners," says a White House strategy report published in mid-May. "When warranted, the United States will respond to hostile acts in cyberspace as we would any other threat to our country."
This NATO draft seems to want to go in a similar direction—especially if something on the scale of a Stuxnet malware attack is deployed against a member nation. Designed to penetrate software for industrial equipment, researchers believe that it was originally intended for Iran's nuclear program.
"Some argue that Article 5 should not be applied with respect to cyberattacks because their effect so far has been limited to creating inconvenience rather than causing the loss of human lives and because it is hard to determine the attacker," Jopling notes. "However, The Rapporteur believes that the application of Article 5 should not be ruled out, given that new developments in cyber weapons such as Stuxnet might eventually cause damage comparable to that of a conventional military attack."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Nmap 5.59 BETA1 (With 40 new NSE scripts)



Nmap 5.59 BETA1 released. This version includes 40 new NSE scripts (plus improvements to many others), even more IPv6 goodness than the informal World IPv6 Day release, 7 new NSE protocol libraries and hundreds of bug fixes! This release also expands and improves IPv6 support!

o [NSE] Added 40 scripts, bringing the total to 217!  You can learn
 more about any of them at http://nmap.org/nsedoc/. Here are the new
 ones (authors listed in brackets):

 + afp-ls: Lists files and their attributes from Apple Filing
   Protocol (AFP) volumes. [Patrik Karlsson]

 + backorifice-brute: Performs brute force password auditing against
   the BackOrifice remote administration (trojan) service. [Gorjan
   Petrovski]

 + backorifice-info: Connects to a BackOrifice service and gathers
   information about the host and the BackOrifice service
   itself. [Gorjan Petrovski]

 + broadcast-avahi-dos: Attempts to discover hosts in the local
   network using the DNS Service Discovery protocol, then tests
   whether each host is vulnerable to the Avahi NULL UDP packet
   denial of service bug (CVE-2011-1002). [Djalal Harouni]

 + broadcast-netbios-master-browser: Attempts to discover master
   browsers and the Windows domains they manage. [Patrik Karlsson]

 + broadcast-novell-locate: Attempts to use the Service Location
   Protocol to discover Novell NetWare Core Protocol (NCP)
   servers. [Patrik Karlsson]

 + creds-summary: Lists all discovered credentials (e.g. from brute
   force and default password checking scripts) at end of scan.
   [Patrik Karlsson]

 + dns-brute: Attempts to enumerate DNS hostnames by brute force
   guessing of common subdomains. [Cirrus]

 + dns-nsec-enum: Attempts to discover target hosts' services using
   the DNS Service Discovery protocol. [Patrik Karlsson]

 + dpap-brute: Performs brute force password auditing against an
   iPhoto Library. [Patrik Karlsson]

 + epmd-info: Connects to Erlang Port Mapper Daemon (epmd) and
   retrieves a list of nodes with their respective port
   numbers. [Toni Ruottu]

 + http-affiliate-id: Grabs affiliate network IDs (e.g. Google
   AdSense or Analytics, Amazon Associates, etc.) from a web
   page. These can be used to identify pages with the same
   owner. [Hani Benhabiles, Daniel Miller]

 + http-barracuda-dir-traversal: Attempts to retrieve the
   configuration settings from a Barracuda Networks Spam & Virus
   Firewall device using the directory traversal vulnerability
   described at
   http://seclists.org/fulldisclosure/2010/Oct/119. [Brendan Coles]

 + http-cakephp-version: Obtains the CakePHP version of a web
   application built with the CakePHP framework by fingerprinting
   default files shipped with the CakePHP framework. [Paulino
   Calderon]

 + http-majordomo2-dir-traversal: Exploits a directory traversal
   vulnerability existing in the Majordomo2 mailing list manager to
   retrieve remote files. (CVE-2011-0049). [Paulino Calderon]

 + http-wp-plugins: Tries to obtain a list of installed WordPress
   plugins by brute force testing for known plugins. [Ange Gutek]

 + ip-geolocation-geobytes: Tries to identify the physical location
   of an IP address using the Geobytes geolocation web service
   (http://www.geobytes.com/iplocator.htm). [Gorjan Petrovski]

 + ip-geolocation-geoplugin: Tries to identify the physical location
   of an IP address using the Geoplugin geolocation web service
   (http://www.geoplugin.com/). [Gorjan Petrovski]

 + ip-geolocation-ipinfodb: Tries to identify the physical location
   of an IP address using the IPInfoDB geolocation web service
   (http://ipinfodb.com/ip_location_api.php). [Gorjan Petrovski]

 + ip-geolocation-maxmind: Tries to identify the physical location of
   an IP address using a Geolocation Maxmind database file (available
   from http://www.maxmind.com/app/ip-location). [Gorjan Petrovski]

 + ldap-novell-getpass: Attempts to retrieve the Novell Universal
   Password for a user. You must already have (and include in script
   arguments) the username and password for an eDirectory server
   administrative account. [Patrik Karlsson]

 + mac-geolocation: Looks up geolocation information for BSSID (MAC)
   addresses of WiFi access points in the Google geolocation
   database. [Gorjan Petrovski]

 + mysql-audit: Audit MySQL database server security configuration
   against parts of the CIS MySQL v1.0.2 benchmark (the engine can
   also be used for other MySQL audits by creating appropriate audit
   files).  [Patrik Karlsson]

 + ncp-enum-users: Retrieves a list of all eDirectory users from the
   Novell NetWare Core Protocol (NCP) service. [Patrik Karlsson]

 + ncp-serverinfo: Retrieves eDirectory server information (OS
   version, server name, mounts, etc.) from the Novell NetWare Core
   Protocol (NCP) service. [Patrik Karlsson]

 + nping-brute: Performs brute force password auditing against an
   Nping Echo service. [Toni Ruottu]

 + omp2-brute: Performs brute force password auditing against the
   OpenVAS manager using OMPv2. [Henri Doreau]

 + omp2-enum-targets: Attempts to retrieve the list of target systems
   and networks from an OpenVAS Manager server. [Henri Doreau]

 + ovs-agent-version: Detects the version of an Oracle OVSAgentServer
   by fingerprinting responses to an HTTP GET request and an XML-RPC
   method call. [David Fifield]

 + quake3-master-getservers: Queries Quake3-style master servers for
   game servers (many games other than Quake 3 use this same
   protocol). [Toni Ruottu]

 + servicetags: Attempts to extract system information (OS, hardware,
   etc.) from the Sun Service Tags service agent (UDP port
   6481). [Matthew Flanagan]

 + sip-brute: Performs brute force password auditing against Session
   Initiation Protocol (SIP -

http://en.wikipedia.org/wiki/Session_Initiation_Protocol)

   accounts.  This protocol is most commonly associated with VoIP
   sessions. [Patrik Karlsson]

 + sip-enum-users: Attempts to enumerate valid SIP user accounts.
   Currently only the SIP server Asterisk is supported. [Patrik
   Karlsson]

 + smb-mbenum: Queries information managed by the Windows Master
   Browser. [Patrik Karlsson]

 + smtp-vuln-cve2010-4344: Checks for and/or exploits a heap overflow
   within versions of Exim prior to version 4.69 (CVE-2010-4344) and
   a privilege escalation vulnerability in Exim 4.72 and prior
   (CVE-2010-4345). [Djalal Harouni]

 + smtp-vuln-cve2011-1720: Checks for a memory corruption in the
   Postfix SMTP server when it uses Cyrus SASL library authentication
   mechanisms (CVE-2011-1720).  This vulnerability can allow denial
   of service and possibly remote code execution. [Djalal Harouni]

 + snmp-ios-config: Attempts to downloads Cisco router IOS
   configuration files using SNMP RW (v1) and display or save
   them. [Vikas Singhal, Patrik Karlsson]

 + ssl-known-key: Checks whether the SSL certificate used by a host
   has a fingerprint that matches an included database of problematic
   keys. [Mak Kolybabi]

 + targets-sniffer: Sniffs the local network for a configurable
   amount of time (10 seconds by default) and prints discovered
   addresses. If the newtargets script argument is set, discovered
   addresses are added to the scan queue. [Nick Nikolaou]

 + xmpp: Connects to an XMPP server (port 5222) and collects server
   information such as supported auth mechanisms, compression methods
   and whether TLS is supported and mandatory. [Vasiliy Kulikov]

o Nmap has long supported IPv6 for basic (connect) port scans, basic
 host discovery, version detection, Nmap Scripting Engine.  This
 release dramatically expands and improves IPv6 support:
 + IPv6 raw packet scans (including SYN scan, UDP scan, ACK scan,
   etc.) are now supported. [David, Weilin]
 + IPv6 raw packet host discovery (IPv6 echo requests, TCP/UDP
   discovery packets, etc.) is now supported. [David, Weilin]
 + IPv6 traceroute is now supported [David]
 + IPv6 protocol scan (-sO) is now supported, including creating
   realistic headers for many protocols. [David]
 + IPv6 support to the wsdd, dnssd and upnp NSE libraries. [Daniel
   Miller, Patrik]
 + The --exclude and --excludefile now support IPV6 addresses with
   netmasks.  [Colin]

o Scanme.Nmap.Org (the system anyone is allowed to scan for testing
 purposes) is now dual-stacked (has an IPv6 address as well as IPv4)
 so you can scan it during IPv6 testing.  We also added a DNS record
 for ScanmeV6.nmap.org which is IPv6-only. See
 http://seclists.org/nmap-dev/2011/q2/428. [Fyodor]

o The Nmap.Org website as well as sister sites Insecure.Org,
 SecLists.Org, and SecTools.Org all have working IPv6 addresses now
 (dual stacked). [Fyodor]

o Nmap now determines the filesystem location it is being run from and
 that path is now included early in the search path for data files
 (such as nmap-services).  This reduces the likelihood of needing to
 specify --datadir or getting data files from a different version of
 Nmap installed on the system.  For full details, see
 http://nmap.org/book/data-files-replacing-data-files.html.  Thanks
 to Solar Designer for implementation advice. [David]

o Created a page on our SecWiki for collecting Nmap script ideas! If
 you have a good idea, post it to the incoming section of the page.
 Or if you're in a script writing mood but don't know what to write,
 come here for inspiration: https://secwiki.org/w/Nmap_Script_Ideas.

o The development pace has greatly increased because Google (again)
 sponsored a 7 full-time college and graduate student programmer
 interns this summer as part of their Summer of Code program!
 Thanks, Google Open Source Department!  We're delighted to introduce
 the team: http://seclists.org/nmap-dev/2011/q2/312

o [NSE] Added 7 new protocol libraries, bringing the total to 66.  You
 can read about them all at http://nmap.org/nsedoc/. Here are the new
 ones (authors listed in brackets):

 + creds: Handles storage and retrieval of discovered credentials
   (such as passwords discovered by brute force scripts). [Patrik
   Karlsson]

 + ncp: A tiny implementation of Novell Netware Core Protocol
   (NCP). [Patrik Karlsson]

 + omp2: OpenVAS Management Protocol (OMP) version 2 support. [Henri
   Doreau]

 + sip: Supports a limited subset of SIP commands and
   methods. [Patrik Karlsson]

 + smtp: Simple Mail Transfer Protocol (SMTP) operations. [Djalal
   Harouni]

 + srvloc: A relatively small implementation of the Service Location
   Protocol. [Patrik Karlsson]

 + tftp: Implements a minimal TFTP server. It is used in
   snmp-ios-config to obtain router config files.[Patrik Karlsson]

o Improved Nmap's service/version detection database by adding:
 + Apple iPhoto (DPAP) protocol probe [Patrik]
 + Zend Java Bridge probe [Michael Schierl]
 + BackOrifice probe [Gorjan Petrovski]
 + GKrellM probe [Toni Ruotto]
 + Signature improvements for a wide variety of services (we now have
   7,375 signatures)

o [NSE] ssh-hostkey now additionally has a postrule that prints hosts
 found during the scan which share the same hostkey. [Henri Doreau]

o [NSE] Added 300+ new signatures to http-enum which look for admin
 directories, JBoss, Tomcat, TikiWiki, Majordomo2, MS SQL, WordPress,
 and more. [Paulino]

o Made the final IP address space assignment update as all available
 IPv4 address blocks have now been allocated to the regional
 registries.  Our random IP generation (-iR) logic now only excludes
 the various reserved blocks.  Thanks to Kris for years of regular
 updates to this function!

o [NSE] Replaced http-trace with a new more effective version. [Paulino]

o Performed some output cleanup work to remove unimportant status
 lines so that it is easier to find the good stuff! [David]

o [Zenmap] now properly kills Nmap scan subprocess when you cancel a
 scan or quit Zenmap on Windows. [Shinnok]

o [NSE] Banned scripts from being in both the "default" and
 "intrusive" categories.  We did this by removing dhcp-discover and
 dns-zone-transfer from the set of scripts run by default (leaving
 them "intrusive"), and reclassifying dns-recursion, ftp-bounce,
 http-open-proxy, and socks-open-proxy as "safe" rather than
 "intrusive" (keeping them in the "default" set).

o [NSE] Added a credential storage library (creds.lua) and modified
 the brute library and scripts to make use of it. [Patrik]

o [Ncat] Created a portable version of ncat.exe that you can just drop
 onto Microsoft Windows systems without having to run any installer
 or copy over extra library files. See the Ncat page
 (http://nmap.org/ncat/) for binary downloads and a link to build
 instructions. [Shinnok]

o Fix a segmentation fault which could occur when running Nmap on
 various Android-based phones.  The problem related to NULL being
 passed to freeaddrinfo(). [David, Vlatko Kosturjak]

o [NSE] The host.bin_ip and host.bin_ip_src entries now also work with
 16-byte IPv6 addresses. [David]

o [Ncat] Updated the ca-bundle.crt list of trusted certificate
 authority certificates. [David]

o [NSE] Fixed a bug in the SMB Authentication library which could
 prevent concurrently running scripts with valid credentials from
 logging in. [Chris Woodbury]

o [NSE] Re-worked http-form-brute.nse to better autodetect form
 fields, allow brute force attempts where only the password (no
 username) is needed, follow HTTP redirects, and better detect
 incorrect login attempts. [Patrik, Daniel Miller]

o [Zenmap] Changed the "slow comprehensive scan" profile's NSE script
 selection from "all" to "default or (discovery and safe)"
 categories.  Except for testing and debugging, "--script all" is
 rarely desirable.

o [NSE] Added the stdnse.silent_require method which is used for
 library requires that you know might fail (e.g. "openssl" fails if
 Nmap was compiled without that library).  If these libraries are
 called with silent_require and fail to load, the script will cease
 running but the user won't be presented with ugly failure messages
 as would happen with a normal require. [Patrick Donnelly]

o [Ncat] ncat now listens on both localhost and ::1 when you run ncat
 -l. It works as before if you specify -4 or -6 or a specific
 address. [Colin Rice]

o [Zenmap] Fixed a bug in topology mapper which caused endpoints
 behind firewalls to sometimes show up in the wrong place (see
 http://seclists.org/nmap-dev/2011/q2/733).  [Colin Rice]

o [Zenmap] If you scan a system twice, any open ports from the first
 scan which are closed in the 2nd will be properly marked as
 closed. [Colin Rice].

o [Zenmap] Fixed an error that could cause a crash ("TypeError: an
 integer is required") if a sort column in the ports table was unset.
 [David]

o [Ndiff] Added nmaprun element information (Nmap version, scan date,
 etc.) to the diff.  Also, the Nmap banner with version number and
 data is now only printed if there were other differences in the
 scan. [Daniel Miller, David, Dr. Jesus]

o [NSE] Added nmap.get_interface and nmap.get_interface_info functions
 so scripts can access characteristics of the scanning interface.
 Removed nmap.get_interface_link. [Djalal]

o Fixed an overflow in scan elapsed time display that caused negative
 times to be printed after about 25 days. [Daniel Miller]

o Updated nmap-rpc from the master list, now maintained by IANA.
 [Daniel Miller, David]

o [Zenmap] Fixed a bug in the option parser: -sN (null scan) was
 interpreted as -sn (no port scan). This was reported by
 Shitaneddine. [David]

o [Ndiff] Fixed the Mac OS X packages to use the correct path for
 Python: /usr/bin/python instead of /opt/local/bin/python. The bug
 was reported by Wellington Castello. [David]

o Removed the -sR (RPC scan) option--it is now an alias for -sV
 (version scan), which always does RPC scan when an rpcinfo service
 is detected.

o [NSE] Improved the ms-sql scripts and library in several ways:
 - Improved version detection and server discovery
 - Added support for named pipes, integrated authentication, and
   connecting to instances by name or port
 - Improved script and library stability and documentation.
 [Patrik Karlsson, Chris Woodbury]

o [NSE] Fixed http.validate_options when handling a cookie table.
 [Sebastian Prengel]

o Added a Service Tags UDP probe for port 6481/udp. [David]

o [NSE] Enabled firewalk.nse to automatically find the gateways at
 which probes are dropped and fixed various bugs. [Henri Doreau]

o [Zenmap] Worked around a pycairo bug that prevented saving the
 topology graphic as PNG on Windows: "Error Saving Snapshot:
 Surface.write_to_png takes one argument which must be a filename
 (str), file object, or a file-like object which has a 'write' method
 (like StringIO)". The problem was reported by Alex Kah. [David]

o The -V and --version options now show the platform Nmap was compiled
 on, which features are compiled in, the version numbers of libraries
 it is linked against, and whether the libraries are the ones that
 come with Nmap or the operating system.  [Ambarisha B., David]

o Fixed some inconsistencies in nmap-os-db reported by Xavier Sudre
 from netVigilance.

o The Nmap Win32 uninstaller now properly deletes nping.exe. [Fyodor]

o [NSE] Added a shortport.ssl function which can be used as a script
 portrule to match SSL services.  It is similar in concept to our
 existing shortport.http. [David]

o Set up the RPM build to use the compat-glibc and compat-gcc-34-c++
 packages (on CentOS 5.3) to resolve a report of Nmap failing to run
 on old versions of Glibc. [David]

o We no longer support Nmap on versions of Windows earlier than XP
 SP2.  Even Microsoft no longer supports Windows versions that old.
 But if you must use Nmap on such systems anyway, please see

https://secwiki.org/w/Nmap_On_Old_Windows_Releases.

o There were hundreds of other little bug fixes and improvements
 (especially to NSE scripts).  See the SVN logs for revisions 22,274
 through 24,460 for details.

To Download Nmap 5.59 BETA 1 Click HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...