Reversing complex software quickly is challenging due to the lack of
professional tools that support collaborative analysis. The CrowdRE
project aims to fill this gap. Rather than using a live distribution of
changes to all clients, which has proven to fail in the past, it
leverages from the architecture that is being used with success to
organize source code repositories: a system that manages a history of
changesets as commit messages.
There’s a great video here, which explains more about CrowdRE and how to get started:
The central component is a cloud based server that keeps track of commits in a database. Each commit covers one or more functions of an analyzed binary and contains information like annotations, comments, prototype, struct and enum definitions and the like. Clients can search the database for commits of functions by constructing a query of the analyzed binary’s hash and the function offset. Different concurring commits for a function are possible; in such cases it is up to the user to decide which commit is better.
This basic concept is sufficient for a collaborative workflow on a per-function basis for a shared binary. One exciting feature is a similarity hashing scheme that considers the basic block boundaries of a function. Each function is mapped on a similarity preserving hash of fixed size. A database query for such a functions similarity hash returns a set of functions sorted by their similarity value, and the analyst can choose amongst them. This is extremely helpful when analyzing variants based on the same code or generations of a malware family, for example.
The CrowdRE client is now freely available as an IDA Pro plugin. CrowdStrike maintains a central cloud for the community to share their commits amongst each other. It is our goal to help building a public database of known, well annotated functions to speed up the analysis of standard components, somewhat similar to what BinCrowd (which is offline nowadays) offered but with support for multiple co-existing commits for the same function. We also supports list-based commit visibility to give users control over who else can see and import their contributions.
You can check out the service here:
https://crowdre.crowdstrike.com/sign-in
Sunday, September 30, 2012
Tuesday, September 4, 2012
Upgrade From BackTrack 5 R2 to BackTrack 5 R3
This is simple way to upgrade from BackTrack 5 R2 to BackTrack 5 R3:-
open your terminal and start typing the command:
1. apt-get update && apt-get dist-upgrade
With the dist-upgrade finished, all that remains is the install the new tools that have been added for R3. An important point to keep in mind is that there are slight differences between the 32-bit and 64-bit tools so make sure you choose the right one.
2.
32-bit install tools
64-bit install tools
That’s all there is to it! Once the new tools have been installed, you are up and running with BackTrack 5 R3. As always, if you come across any bugs or issues, please submit tickets via the BackTrack Redmine Tracker.
ok folks Happy hunting!!!
open your terminal and start typing the command:
1. apt-get update && apt-get dist-upgrade
With the dist-upgrade finished, all that remains is the install the new tools that have been added for R3. An important point to keep in mind is that there are slight differences between the 32-bit and 64-bit tools so make sure you choose the right one.
2.
32-bit install tools
apt-get install libcrafter blueranger dbd
inundator intersect mercury cutycapt trixd00r artemisa rifiuti2
netgear-telnetenable jboss-autopwn deblaze sakis3g voiphoney
apache-users phrasendrescher kautilya manglefizz rainbowcrack
rainbowcrack-mt lynis-audit spooftooph wifihoney twofi truecrack
uberharvest acccheck statsprocessor iphoneanalyzer jad javasnoop
mitmproxy ewizard multimac netsniff-ng smbexec websploit dnmap johnny
unix-privesc-check sslcaudit dhcpig intercepter-ng u3-pwn binwalk
laudanum wifite tnscmd10g bluepot dotdotpwn subterfuge jigsaw urlcrazy
creddump android-sdk apktool ded dex2jar droidbox smali termineter
bbqsql htexploit smartphone-pentest-framework fern-wifi-cracker
powersploit webhandler
64-bit install tools
apt-get install libcrafter blueranger dbd
inundator intersect mercury cutycapt trixd00r rifiuti2
netgear-telnetenable jboss-autopwn deblaze sakis3g voiphoney
apache-users phrasendrescher kautilya manglefizz rainbowcrack
rainbowcrack-mt lynis-audit spooftooph wifihoney twofi truecrack
acccheck statsprocessor iphoneanalyzer jad javasnoop mitmproxy ewizard
multimac netsniff-ng smbexec websploit dnmap johnny unix-privesc-check
sslcaudit dhcpig intercepter-ng u3-pwn binwalk laudanum wifite tnscmd10g
bluepot dotdotpwn subterfuge jigsaw urlcrazy creddump android-sdk
apktool ded dex2jar droidbox smali termineter multiforcer bbqsql
htexploit smartphone-pentest-framework fern-wifi-cracker powersploit
webhandler
ok folks Happy hunting!!!
BackTrack 5 R3 adds tools for Arduino and Teensy attacks
The third release of version 5 of the BackTrack Linux security distribution fixes several bugs discovered since the R2 release in March and adds over 60 new tools. Several of the new tools were released as part of presentations at the recent Black Hat and DEFCON conferences. The distribution has also added a completely new category of software for "physical exploitation". This category includes libraries and an IDE for the Arduino and the Kautilya toolkit which provides payloads for the Teensy USB development board.
BackTrack can be run as a live CD for added security and flexibility or can be permanently installed on a system. The distribution is developed with security researchers and penetration testers in mind and offers one of the most comprehensive collections of Linux-based security software. Development of the distribution is sponsored by Offensive Security.
BackTrack 5 R3 is available with a choice of KDE and GNOME desktops for 32- and 64-bit machines and the project also provides a pre-built VMware image. ISO images can be downloaded directly from the distribution's mirrors or via BitTorrent. Information on how to install and use BackTrack is available from the project's wiki.
thanks to the H-Security for the news
BackTrack can be run as a live CD for added security and flexibility or can be permanently installed on a system. The distribution is developed with security researchers and penetration testers in mind and offers one of the most comprehensive collections of Linux-based security software. Development of the distribution is sponsored by Offensive Security.
BackTrack 5 R3 is available with a choice of KDE and GNOME desktops for 32- and 64-bit machines and the project also provides a pre-built VMware image. ISO images can be downloaded directly from the distribution's mirrors or via BitTorrent. Information on how to install and use BackTrack is available from the project's wiki.
thanks to the H-Security for the news
BackTrack 5 R3 - Release
Hello there!! sorry because long time not update any new material in this blog, maybe not to late to tell the good news to all Backtrack lovers that the team has release the new Backtrack 5 R3 and ready to try..ok this is the story:-
------------------------------------------------------------------------------------------------------------
The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.
------------------------------------------------------------------------------------------------------------
The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.
Building, testing and releasing a new BackTrack revision is never an easy task. Keeping up-to-date with all the latest tools, while balancing their requirements of dependencies, is akin to a magic show juggling act. Thankfully, active members of our redmine community such as backtracklover and JudasIscariot make our task that much easier by actively reporting bugs and suggesting new tools on a regular basis. Hats off to the both of you.
We would like to thank Offensive Security for providing the BackTrack dev team with the funding and resources to make all of this happen. Also, a very special thanks to dookie, our lead developer – for building, testing and packaging most of the new tools in this release.
Together with our usual KDE and GNOME, 32/64 bit ISOs, we have released a single VMware Image (Gnome, 32 bit). For those requiring other VM flavors of BackTrack – building your own VMWare image is easy – instructions can be found in the BackTrack Wiki.
Lastly, if you’re looking for intensive, real world, hands on Penetration Testing Training – make sure to drop by Offensive Security Training, and learn the meaning of “TRY HARDER“.
For the insanely impatient, you can download the BackTrack 5 R3 release via torrent right now. Direct ISO downloads will be available once all our HTTP mirrors have synched, which should take a couple more hours. Once this happens, we will update our BackTrack Download page with all links.
- BT5R3-GNOME-64.torrent (md5: 8cd98b693ce542b671edecaed48ab06d)
- BT5R3-GNOME-32.torrent (md5: aafff8ff5b71fdb6fccdded49a6541a0)
- BT5R3-KDE-64.torrent (md5: 981b897b7fdf34fb1431ba84fe93249f)
- BT5R3-KDE-32.torrent (md5: d324687fb891e695089745d461268576)
- BT5R3-GNOME-32-VM.torrent (md5: bca6d3862c661b615a374d7ef61252c5)
Subscribe to:
Posts (Atom)