Saturday, March 10, 2012

Bugtraq-I : Distribution for Pentesting and forensics

Bugtraq-I+Distribution+for+Pentesting+and+forensics


Bugtraq system offers the most comprehensive distribution, optimal, stable and automatic security to date. Bugtraq is a distribution based on the 2.6.38 kernel has a wide range of penetration and forensic tools. Bugtraq can be installed from a Live DVD or USB drive, the distribution is customized to the last package, configured and updated the kernel. The kernel has been patched for better performance to recognize a variety of hardware, including wireless injection patches pentesting that other distributions do not recognize.
Some of the special features that you can appreciate are:
· Administrative improvements of the system for better management of services.
· Expanded the range of recognition for injection wireless drivers.
· Patching the kernel 2.6.38 to recognize 4 gigs of RAM in 32-bit.
· Tools perfectly configured, automated installation scripts and tools like Nessus, OpenVAS, Greenbone, Nod32, Hashcat, Avira, BitDefender, ClamAV, Avast, AVG, etc...
· Unique Scripts from Bugtraq-Team (SVN updates tools, delete tracks, backdoors, Spyder-sql, etc.)
· Stability and performance optimized: Enhanced performance flash and java and start purging unnecessary services. So that the user can use only the services you really want.
· It has incorporated the creation of the user in the installation, which is created with all system configurations.
· We are the distribution and Forensic Pentesting with more tools built and functional, well organized menu without repetition of the same to avoid overwhelming the user.


Duqu Trojan developed in unknown programming language

Duqu+Trojan+developed+in+unknown+programming+language
Researchers at Kaspersky have reached out for assistance after an investigation into the Duqu Trojan uncovered a section that is written in an unknown programming language.

The Russian security company says this new information could help them discover how the worm was able to communicate with its Command and Control (C&C) servers. The C&C servers essentially tell the worm what to do once it has accessed a system.

While the majority of Duqu is written in C++, the Framework was not and was not compiled with Microsoft’s Visual C++ 2008. Other languages ruled out include Python, Java, Objective C, Ada and Lua.“Given the size of the Duqu project, it’s possible that an entirely different team was responsible for creating the Duqu Framework as opposed to the team that created the drivers and wrote the system infection exploits,” said Alexander Gostev, chief security expert at Kaspersky Lab, in a statement.
The mysterious code could be the work of a separate collaborator, indiciating that multiple parties worked to develop the infection. Kaspersky is hoping that someone in the programming community will recognize it and come forward to identify it. Identification of the language could help analysts build a profile of DuQu’s authors, particularly if they can tie the language to a group of people known to use this specialized programming language or even to people who were behind its development.

Duqu first emerged in September 2011 and is thought to have been written by the same people behind the infamous Stuxnet worm, which targeted Iran's nuclear facilities and attempted to steal highly sensitive information. Duqu worked along the same lines; acting as a backdoor into a system to steal data.

Researchers have noted a number of similarities in the behaviour and spread of Duqu with the infamous Stuxnet malware, leading some researchers to dub Duqu as the successor to Stuxnet.