The Remote Exploit Team is ecstatic to announce the public release of BackTrack 4 Pre Final (codename “pwnsauce“). A VMWare Image of BT4 will be released in a few days. We have major changes in BackTrack, and have tried to document and summarize them as best as possible. See the BackTrack Guide PDF for more info.Read More
There goes our Information Security
This is part 2 of our previous post about the Itunes exploit for windows.
…little did we know that all the payloads being sent have to be pure AlphaNumeric (printable ASCII). The first thing to do is find a Alphanum friendly return address, which was found at 0x67215e2a
When masochism just isn’t enough
Our new AWE course is about to go live for the first time, in BlackHat Vegas. We chose the most interesting exploitation cases we’ve encountered, and dove really deep into them. We had many exploits to choose from, some were too easy, and believe it or not, some were just too hard. This blog post is going to be a multipart post, describing our exploitation process of the recent iTunes overflow described here.Read More
We’ve just pushed CUDA and ATI Stream packages to the repo, including many updates and upgrades. Although the nvidia and ATI drivers are not included by default on the livecd, they can be apt-getted, and are working out of the box. Big thanks once again to pure_hate and KMDave for this wonderful feature!
Lastly, a quick screenshot from pure_hate showing 3 dual GTX 295’s in action. Ph33r.Read More
If you prefer running your BackTrack4 system in “secure mode” and not always have to type your password … fingerprinting can help you!
In the new BackTrack repository, the packages required to get this running are all in place:Read More
Some really exciting stuff going on in the world of CUDA on backtrack 4. We have updated to cuda 2.2 and will be offering the complete developers environment. This will include every thing you need to write some of your own tools with CUDA if the need arises. If you don’t know what CUDA is then you should read this to get familiar with the topic. CUDA
Pyrit will be included in bt4 and is now featuring multi card support.
One of the downsides of leaving the linux live scripts and moving to non lzma enabled squashfs, is that we loose the wonderful and convenient setup for modifying the BackTrack LiveCD on our own. We use to be able to pop in a LZM file into the “optional” directory, and that’s it – but no more.
Actually, customizing a casper based ISO isn’t that difficult, just different. I put up this quick guide on how to edit your own livecd and add various tools,Read More
BackTrack 4 Pre Final available to Informer IHS subscribers
BackTrack 4 development is coming along nicely. We will be releasing a BackTrack “pre-release sneak peek” version to Informer subscribers this week. If you don’t know what Informer is, you’re missing out.Read More
Long overdue, our live course “Cracking the Perimeter” (CTP) is finally going online. Our ETA for the live course is the 3rd of June, 2009. We have an outstanding waiting list for CTP online, so it might take a while for registration to open to the public.
This course is especially exciting, as there is nothing similar to it in the security training arena today. We’ve combined our most interesting penetration testing scenarios,Read More
There have been many changes introduced into BackTrack 4 – most notably, our move to an Ubuntu Intrepid base. We now maintain our own full repositories with modified Ubuntu packages in addition to our own penetration testing tools.
Another significant change is the updated kernel version, currently at 126.96.36.199. This new kernel brought an onset of internal changes, which have greatly changed the structure of BackTrack.