Archive for the ‘Linux Hacking’ Category

Maemo 5 supports python. But only the 2.5 version. People say that most Python Users haven’t even used Python features that are presented to newest Versions.

I disagree. Trying to Install some Python Modules, many times, I had these unexpected Syntax Errors while using/installing new Modules! Stable ones!

So, why not trying to install a newer Python Version? At first, there are difficulties but, then, it seems an easy Process if you are careful. Let’s see how to work this thing out…. (more…)

Let’s get away from the Hacky stuff for a moment. We have all seen Google Now with some great, innovative Features that could also be integrated to Artificial Intelligent Assistants like Siri.

Google Now uses Gmail Cards for Smart notifications like the one on the left.

And many people HAVE created such Assistants themselves. Including me.

Searching Google about how to use Notifications like Google Now was a Dead end. Especially when it came for the Gmail Cards.

So the idea was to Create that library myself, free and open source on Github, to access the Gmail Inbox and if there is any Gmail Card Available, convert it to Human-Readable Data.

(more…)

P0stH4x0r has been Updated to the Version 3.0.1!

A new Stealth Shell-Like Environment is presented to this Version. WTF is this?

It is a Shell Environment where P0stH4x0r Functions are initialized using specific commands, but also, Bash commands are accepted and are NOT logged to Bash History!

Here are more new Features of this Version: (more…)

Hello to Everyone!

As I told to another Comment of a Post I made, and because a Visitor of this Blog requested it, I will share with you some Methods on How to Root a Server when there isn’t any Local Root Kernel Exploit available!

(more…)

Mempodipper is a great Exploit that uses a Vulnerability found on ALL Linux kernels >=2.6.39 that haven’t been Patched, yet!

Extract from the Official Blog:

Mempodipper is an exploit for CVE-2012-0056. /proc/pid/mem is an interface for reading and writing, directly, process memory by seeking around with the same addresses as the process’s virtual memory space. In 2.6.39, the protections against unauthorized access to /proc/pid/mem were deemed sufficient, and so the prior #ifdef that prevented write support for writing to arbitrary process memory was removed. Anyone with the correct permissions could write to process memory. It turns out, of course, that the permissions checking was done poorly. This means that all Linux kernels >=2.6.39 are vulnerable, up until the fix commit for it a couple days ago. Let’s take the old kernel code step by step and learn what’s the matter with it.

(more…)

The New Version of P0stH4x0r has been released for about 5 minutes ago!

This New version has:

1. Log IP Spoofer

2. SUID File Finder (That can help you gain Root Privileges)

 

A lot of Bugs have been Fixed, also…

 
More information about P0stH4x0r here….