Geohot finally released his exploit so the world could see for itself exactly what the hack does and doesn’t accomplish.
According to the instructions, it involves compiling and running the kernel module and then pulsing a memory bus on the PS3′s motherboard.
“Try this multiple times,” his instructions state. “I rigged an FPGA button to send the pulse. Sometimes it kernel panics, sometimes it lv1 panics, but sometimes you get the exploit!! If the module exits, you are now exploited.”
While the idea is sound, this hack is clearly not for the faint of heart.
From there, PS3 users get full memory access, including ring 0 access from OtherOS, geohot, whose real name is George Hotz, said here. He’s now turning follow-on work to the PS3 community, directing members to report their findings to the psDevWiki.
His instructions conclude: “The PS3 is hacked, its your job to figure out something useful to do with it.”
Source: The Register
FindDomains is a multithreaded search engine discovery tool that will be very useful for penetration testers dealing with discovering domain names/web sites/virtual hosts which are located on too many IP addresses. Provides a console interface so you can easily integrate this tool to your pentest automation system.
It retrieves domain names/web sites which are located on specified ip address/hostname.
This tool is prepared by starting with Bing API 2.0 code sample.
In order to use FindDomains :
- Create an appid from “Bing Developers”, this link.
- It’ll be like that : 32AFB589D1C8B4FEC73D4BCB6EA0AD810E0FA2C7
- When you have registered an appid, enter it to the “appid.txt” which is on program directory.
Some outlines :
- Uses Bing search engine. Works with first 1000 records.
- Multithreaded on crawling and DNS resolution.
- Performs DNS resolution for extracted domains to eleminate cached/old records.
- Has a console interface so it can be very useful with some command-line foo.
- Works with Mono. But running under Windows is more efficient.
Sample usage :
1) FindDomains.exe 22.214.171.124
2) FindDomains.exe www.hotmail.com
1) NET Framework 3.5. Also working with Mono.
More Info: FindDomains Project Home
Researchers have decomposed a 768-bit number with 232 decimal places into its two prime factors and published a paper with their results. The number is the string released as “RSA-768″ under the now defunct RSA Challenge. As a result, RSA encryptions with 768-bit keys must, from now on, be considered cracked.
It took the team of researchers from Switzerland, Japan, Germany, France, the US and the Netherlands about two and a half years to perform the factorisation. The first step of the calculation, polynomial selection, required half a year on a cluster consisting of 80 PCs, while the second and considerably more labour-intensive sieving step took about two years on a cluster of several hundred computers. According to the researchers, a single Opteron processor with 2 Gbytes of RAM would have needed about 1,500 years to complete the sieving step.
As RSA-512 was cracked about a decade ago, the researchers assume that the computing power required to master RSA-1024 is likely to become available in about ten years. They therefore recommend that all 1024-bit RSA keys be decommissioned by 2014 at the latest.
Source: The H Security