Slavi 94 Master Poster Featured Poster

Hey guys,
I am debugging some random files trying to get into gdb and I came accross a question how many machine instructions are used for this :

double x, dx, ans;

I guess I could see based on memory addresses and the size of double that 3 variables are inititated but what about the number of instructions, how would one get it?

Slavi 94 Master Poster Featured Poster

Congratulations Mike, hard work pays back =]

Slavi 94 Master Poster Featured Poster

By the way it's a really good idea especialy if you want to perform some tasks on a remote server than you can just supply input to. Well I was thinking more math/business related stuff like charts, plots etc?

Slavi 94 Master Poster Featured Poster
Slavi 94 Master Poster Featured Poster

type ipconfig , the physical address is your mac

Slavi 94 Master Poster Featured Poster

Seems nice but it only has generic widges available. Are you planning on adding further stuff?

Slavi 94 Master Poster Featured Poster

or instead you could
from __future__ import division =))

Slavi 94 Master Poster Featured Poster

Nevermind, all I really needed was
import matplotlib.pyplot as plt :D

Slavi 94 Master Poster Featured Poster

Hey guys,
I am making a few gui programs and I was wondering on this code ..

class PaintChart(wx.Panel):
    def __init__(self, parent, data):
        self.data = data.split()
        wx.Panel.__init__(self, parent)
        self.SetBackgroundColour('BLACK')

        self.Bind(wx.EVT_PAINT, self.drawChart)

    def drawChart(self, e):
        dc = wx.PaintDC(self)
        dc.SetDeviceOrigin(30, 240)
        dc.SetAxisOrientation(True, True)
        dc.SetPen(wx.Pen('RED'))
        dc.DrawRectangle(1, 1, 300, 200)

Here I set the rectangular to fixed size, and if i resize the frame(This class is being called from another which holds a frame) then the frame and the panel would also resize but not the rectangular. However, I would want that to resize as well. How can I set the size of it to be technically (1,1, MATCHPARENT, MATCHPARENT) and it would also resize if the frame does?

Here's some photos:

Slavi 94 Master Poster Featured Poster

the temporary file is in memory (RAM) so that you can make modifications of. Once the file is closed (saved) the new version will be written on the hard disk and the temporary file will be removed as in the memory that was occupied by it will be free'd

Slavi 94 Master Poster Featured Poster

bsplayer

Slavi 94 Master Poster Featured Poster

base64 although that one doesn't mean anything.(first guess on those is always base64 as its using '=' as padding value). It should be 6 characters becahse base64 is 6 bits, ascii are 8 bits. Thus your 8 characters are equal to 48 bits, putting that in ascii(8 bits each) ends up being 6

Slavi 94 Master Poster Featured Poster

So I finally got rid of Elementary os Luna and installed Freya, expecting it not to have much difference. But honestly, it feels better performance wise. Definitely recommended!

Slavi 94 Master Poster Featured Poster

I haven't been into Android for awhile but I am pretty sure Click Here will be able to help you out

Slavi 94 Master Poster Featured Poster

frozen pizza(baked) and tea >.>

Slavi 94 Master Poster Featured Poster

LiME is the only decent option yh, problem with linux is that you need a profile of the exact system that you are running, and it's usually the case that you have to make that yourself(On a different machine so the RAM that you are trying to capture doesn't get changed). The process is a bit painful, especially when it comes to Kali .. But there are some already premade profiles on github open for download that include the most common distros althogh it's been awhile since it's been updated

Slavi 94 Master Poster Featured Poster

Whatever is in the ram should be on the image afterwards unless a corruption of some kind has occured(which is not that uncommon). You seem interested in volatile memory as you've asked stuff about volatility and now ram images. I would suggest you to take a look at a book called "The Art of Memory Forensics". It is by the developers of volatility, so the tool is used throughout the book. Moreover, the book covers ram images of different Windows operating systems, Linux and Mac as well. It is an incredable read and I am pretty sure if you want to get deeper in the field you would love it

Slavi 94 Master Poster Featured Poster

excuse me good sir, but I do believe you're not a windows hacker,

WRONG .. in fact I am ..

your beloved MS

Only time I run MS OS is when I need to test an exploit or reverse engineer usually malware(IDA PRO and few others dont run on linux)

(if anything tries to run, it has to get through me, Avast, and Comodo)

You are joking right?

Internet Explorer

You're right, quite some exploits and zero days but good thing is most of them are not available to skiddies like you(yet)

I've spent years looking into this stuff, so don't think I don't know ;)

say what? Seems like you would need to spend some more years

Slavi 94 Master Poster Featured Poster

xp has so many exploits out there .. many of which are freely available. If you still use XP as your OS you deserve to be punished and banned from the internet :D

Slavi 94 Master Poster Featured Poster

I would use RamCapturer from belkasoft or FTKImager, think it has an option ot extract ram as dd image as well

Slavi 94 Master Poster Featured Poster

Oh, this is a good one. I remember it when my high school teacher was telling us the story!

Slavi 94 Master Poster Featured Poster
  • No reason for it not to be able to work with 8TB one

  • what do u mean by transfer memory? Speed with which you can write to a hard drive?

Slavi 94 Master Poster Featured Poster

It is wrong to say that there is no way to find the key, in reallity it is just practically impossible(Currently) to do so.Just be aware for next time, randomware has significantly increased as cyber criminals see it as an easy payday because quite some people would actually pay the ransom to decrypt their personal files. A way around is to have everything back up'd , so if that happens just do a pure reinstall

Slavi 94 Master Poster Featured Poster

Could be dependnt on quite some things .. even Man In the Middle attack. The red thing basically says this identity with the provided public key associated with it could not be verified or does not have public audic records. I've neve heard of Bitdefender, I would advice you to try Avast or AVG
Not even sure if that is a legitamate antivirus really or if it is you could have also downloaded an infected binary executable ... really many posibilities

Slavi 94 Master Poster Featured Poster

You should get on to Click Here and test your connection. If you get 60-70 mbps/down and 10mbps up, won't really require you to change it. But try it once with wifi, try it then again with an ethernet cable and comapre the results. Pretty sure you can judge by yourself on it whether it would be worth it or not

Slavi 94 Master Poster Featured Poster

@Reverend , IP addresses in 2015 ... least thing they could do is use Tor if they wanted to be keep anonimity against the ABUSIVE mods !!

Slavi 94 Master Poster Featured Poster

Can you give an example of the text or if you want to split it by every occurance of "?" then you can use the split method of String

Slavi 94 Master Poster Featured Poster
Slavi 94 Master Poster Featured Poster

Sweet =)

Slavi 94 Master Poster Featured Poster

I've never installed that but looking into 'incorrect function' makes me think that there is something wrong with the installation file itself, well the integrity of it. Try checking MD5 checksum of the file on your pc and the server that you downloaded it from(They must've provided one there)

Slavi 94 Master Poster Featured Poster

Practically implemented (limited to) the address space is 2^48 as far as I remember in numbers, which was something like 400TB?(can't remember) but will definitely be enough for awhile (y)

rubberman commented: Probably until the heat-death of the universe! :-) +13
Slavi 94 Master Poster Featured Poster

Technically what he said ^ is one of the reasons why 64 bit computing is needed, in increases the linear space, systems such as Windows XP cannot address more than 4GB ram 2^32, although that was increased by using a 'hack' on 32 bit systems of the following operating systems afterwards such as windows 7 to support 2^36 space but the difference is the size of the instructions and as you 'know' about processors, i guess you know that it won't work if you try sending 64 bit instructions to a 32 bit processor. Then the instructions themselves depend on different architectures etc ..

However since Intel and such are all about compatability, the opposite, having a 32 bit system on a 64 bit cpu architecture is supported

Slavi 94 Master Poster Featured Poster

What I've done is install unix commands to CMD, i think the packet is called gnu commands for windows or something similiar, and as far as I remember I actually made a post about it in the geeks lounge some time ago(I am a terminal kind of guy, that pack came as a miracle to me for those times when I have to go to windows)

Although cygwin is the ultimate solution so to speak, I've been trying to avoid it

EDIT: Found the link Click Here

Slavi 94 Master Poster Featured Poster

I wouldn't say Linux doesn't get such stuff but the probability of that happening is significantly lower. Although, if you think about it userland 'nasties' would definitely increase if the amount of Linux users increases xD

Slavi 94 Master Poster Featured Poster

If it's a ransomware it should lock up your desktop screen and just display a message that you have to pay a certain amount if you want to get the key to decrypt your files, and usually there isn't a way around it as they use RSA 2048 encryption, practically impossible to bruteforce through.

In any case, If I were you I would indeed go for restore point or complete reinstall to make sure that everything is wiped out of the system.

As of your question 'how did you get it' usually those are spread through phishing emails containing infected file attachments

Slavi 94 Master Poster Featured Poster

Separate each line by spaces into words, then run each word against english dictionary

Slavi 94 Master Poster Featured Poster

System restore before those updates

Slavi 94 Master Poster Featured Poster

I think what Rubben said will work out, and just to add, if you are not comfortable with dd , boot from live Linux like ubuntu and run gparted, it is a graphical tool for formatting etc

Slavi 94 Master Poster Featured Poster

Fun fact it wasn't vulnerable to ms15-034 like sever2k8 and 2k12 lol

Slavi 94 Master Poster Featured Poster

Have you tried with a different browser?
Also when you tried with your phone, was it from the same IP address?-> this will give info whether it is IP issue or something related to that specific device that you are using

Slavi 94 Master Poster Featured Poster

Out of the blue my guess would be manage-bde -status (Drive Letter): , this should include bitlocker version in the response (don't have windows nearby to test it right now but you can and get back if doesn't work)

Example: manage-bde -status C:

Slavi 94 Master Poster Featured Poster

Hey guys,
It's not exactly trouble with coding that I am facing more like trouble with understanding what I have to implement ..

Quick background .. I am trying to implement statistical-saturation attack on block ciphers. The piper that describes the attack has the following algorithm that is used against the block cipher PRESENT(that's what about the paper is)

input: a 8-bit subkey guess sk and the 8-bit input distribution distrib_in[256]
output: the 8-bit output distribution distrib_out[256]

initialize distrib_out[256] to the all-zero state
for each 8-bit values text do
        for each 8-bit values rand do
                fix the 8-bit trial to text and xor with sk
                fix the 8-bit non trial to rand
                apply the sboxes
                apply the permutation
                evaluate the value of the 8 bit trial out
                update distrib_out[out]=distrib_out[out]+distrib_in[text]/256
        end for
end for

So I tried implementing that in python and I get the following:

================= Python code implementing it =====================
===== Fixed bits for simplicity now are 1234????

def algorithm1(sk4bit):
        text = ["".join(seq) for seq in itertools.product("01", repeat=4)] # generate all possible fixed inputs
        rand = ["".join(seq) for seq in itertools.product("01", repeat=4)] # generate all possible rand inputs
        sk4bit = getHexFromBinaryNibble(sk4bit)

        #fixed bits the ****????       
        for t in text:
                for r in rand:
                        # fix and xor text with sk
                        left = xor_strings(getHexFromBinaryNibble(t),sk4bit)
                        #fix rand -> don't need to as nothing is changed to other positions

                        #apply sboxes
                        left = sBox(left)
                        right = sBox(getHexFromBinaryNibble(r))

                        #permutation , 4th bit of left is going to 1st bit …
Slavi 94 Master Poster Featured Poster

yeah it's not something with the kernel I would think, if you were to upgrade it, theres a newer version 3.18 but shouldn't make much difference .. what drivers do you get as option under the "Drivers" option in system settings?
I've had similiar issues on my home pc with elementary os Luna( was awhile back) but i just selected the newest one that was available in that "drivers" window and worked out of the box ..

Slavi 94 Master Poster Featured Poster

what do you get when you run uname -r?

Slavi 94 Master Poster Featured Poster

which drivers do you have listed under "Drivers" ?

Slavi 94 Master Poster Featured Poster

I think you just print out all the keys in the dictionary and not those with lowest occurance in your display results

Slavi 94 Master Poster Featured Poster

tar.gz

Slavi 94 Master Poster Featured Poster

If you are into that kind of stuff (^Advanced AI) I recommend reading Superintelligence by Nick Bostrom

Slavi 94 Master Poster Featured Poster

Why wouldn't the wifi work? I tried it on virtual box as well, still got the old one installed on my pc though. The UI is pretty similiar as it was on the old(guess to much more to think of in matters of upgrading it). I am a terminal kind of guy, and the first thing I did was to open it and noticed that there wasn't an option to change the transparancy, so I sent them a tweet, not a good design if that's not availalbe xD considering my highly customized Kali filled with aliases lol

Slavi 94 Master Poster Featured Poster

It got released today -> Enjoy