Wednesday, 4 July 2012

Adding TOR Into Chrome

On this independence day, here is a quick tutorial on how to add TOR into Google Chrome.

TOR will allow you browse the internet privately & anonymously.

For this to work, you will need the Tor Browser bundle installed, you can find that here

Download and install, save the folder it extracts to somewhere you can access easily like the Desktop.

You will also need Proxy Switchy addon for Chrome, which you can find here

Once both are installed, make sure you are connected to the TOR network.



Once you are, open the Proxy Switchy options (should automatically open once the addon is installed). Make the profile name TOR like you see in the image below.



Make sure you are set to manual configuration, set your HTTP Proxy to 127.0.0.1 and the port to 8118 & tick the box that says Use the same proxy server for all protocols and press Save.

Now jump over to the General tab, tick the box to activate Quick Switch. Next, Binary Switch will already be ticked, but both drop down boxes below will be set to [Direction Connection]

Set Profile 2 to your TOR profile & press Save.



Now in Chrome, you can switch between normal browsing, or browsing under TOR using the addons button in your top right.

Independence Day!

Even though I'm not American - Happy Independence Day to all US people.

Now that's out of the way, just a quick blog post to celebrate the victory over ACTA.

Today the European Parliament ruled ACTA out and democracy in following all the protests on ACTA running up till today.

ACTA as a bill is far too vague and would put freedom of information on the internet at risk.



More on the whole story here

Friday, 22 June 2012

State Sponsored Malware

Obama just dug himself into a serious hole. A very deep hole. After the past two weeks of state sponsored malware news, I want to have a quick take on it.

As much as I hate the US govs, you have to say Obama has really fucked up attacking Iran with Stuxnet, and now it was confirmed Flame was written by the US govs too, and to make it worse, US intelligence agencies have infiltratered Microsoft to write Flame.

I'll keep this short, but does Obama think Iran won't react to this? That they won't develop their own malware?

This can only end well for Obama. The people he's supposed to protect are now in danger on the highest level, attacks from countries with nukes - well done Obama.

Friday, 18 May 2012

Microsoft Digging Their Own Grave?

Saw this article posted at ComputerWorld last week and just got round to posting this now.
Microsoft are going to disallow Firefox *and* Chrome on Windows 8, and Mozilla respond by saying "it probably isn't worth it to build a W8 version of Firefox as it would be "crippled".

I can only see it ending badly for MS, and pulling a stunt like this makes me think just how do Microsoft propose to attract consumers to windows 8? I myself use Ubuntu and it really makes me think, are Microsoft digging their own grave? Take note in the mobile device world, Android is dominating due to its open source nature.

Now look at MS - UEFI/Secure Boot that may disable users from dual booting with Linux, and now locking out Firefox and Chrome? Well done MS, keep alienating what customers you have left.

I sense a lot of anti-competitive and anti-trust lawsuits heading their way, although other 3rd party developers may go with Mozilla on this and just don't bother with MS and Windows anymore. Sure MS and Windows will always be the bigger OS, but they are slowly pushing their more techy customers away.

Saturday, 12 May 2012

Facebook & Censorship

Facebook is starting to become more trouble than its worth - the thing that made me want to wrote this blog post is the whole thing with employers wanting access to employees personal Facebook accounts. I know I'm not alone when I say that is a total violation of a persons right to privacy, and thankfully congress is passing a new bill/act that will prohibit employers from doing this.

 On a similar subject, news also appeared recently of school teachers wanting to know what students are up to outside of school grounds, again using Facebook to do so. Again this is in violation to students privacy and has nothing to do with teachers once students are outside school grounds.

Something else I saw on the BBC News website, an article about bouncers wanting to check peoples phones to logon to Facebook as a way of ID. I can't be alone when I say that Facebook has had its day and needs to just roll over and die, its becoming far more trouble than its actually worth.

Anyhow, that's just my view on Facebook, its creating far too many messy legal situations and I think it needs to stop. Now, onto my second subject of this blog post - internet censorship.

Its been all over internet news websites about ISP's being ordered to block their users from accessing The Pirate Bay, so far its mostly started happening in the UK, so far Orange and Virgin Media have blocked users from accessing TPB.

TalkTalk apparently have also blocked it but this has yet to be confirmed. Its still early to tell what effect this will have on TPB long term but so far the only effect its had is increase traffic surge on TPB. However there are a few sites out there sharing tips and tools that can be used to circumvent censorship - the high courts are also trying to censor sites that help users circumvent these censors which is wrong. I can understand "maybe" wanting to block TPB due to piracy, bit blocking sites that fight for internet freedom is wrong, these sites are not doing any wrong, so I'll be this blog post on this note.

To all ISP's & the high court, as long as things like VPN's exist and TOR browser then you will NEVER censor everyone no matter how hard you try.

Friday, 13 April 2012

Android Fragmentation & Secure Android

News broke today that the Vodafone SGS2 ICS update is rolling out, and it kinda hit close to home with it since I'm still using the slightly older (original) SGS phone on Vodafone.

To say Samsung are leading the Android world, they are so slow when it comes to updates. The 1 thing that is killing off stock roms is how bloated they are, and how stubborn carriers are. TouchWiz is so bloated that the TouchWiz in ICS can only be run on GS2 and not Galaxy S, yet both can run CyanogenMod9 perfectly fine. I love Samsung devices, they are of very good quality, but Samsung suck when it comes to supporting their devices. If they'd listen to what the people want and get rid of TouchWiz instead of thinking about only themself, LOTS of other Samsung devices could already have Ice Cream Sandwich right now. Think about it, the original galaxy tab 7 & 8.9 & 10.1 can ALL run CM9 without problems, even lower end phones like Galaxy Ace CAN run CM9.

To me, all they do with this is push people away from stock roms and push them over to CyanogenMod. Stock is just so bloated with TouchWiz it's beyond stupid. I've seen posts like this across several other forums and the main reason companies like Samsung aren't doing this is the whole money issue. If they supported EVERY device, then they wouldn't make as much as they could with upcoming future devices and I agree, but this is nothing but greed.

Some of the devices released recently like the Galaxy Nexus and a few other phones rocking the NFC chip is a good move forward, but NFC has yet to be adapted around the UK so it's not much use, only in a minority of places.

However, Samsung should still adapt their slightly older devices, the original Galaxy S is only 2yrs old and it's been proven it can run CM9 ICS (Team Hacksung CM9 build 17, Team ICSSGS 4.0.3 , etc) perfectly fine minus a few bugs from missing kernel code, but again, Samsungs fault. Samsung should be adapting their the OS to their devices, not forcing customers to upgrade needlessly.

There is absolutely no reason why companies can't adapt current CM9 builds around their devices, Android is open source so theres no copyright issues to worry about. I KNOW for a fact XDA & the Cyanogen team would happily work with carriers to make ROM's better, that's what the Android community is all about.

In more recent news, Boeing are moving forward to develop a "super secure Android phone" for military use. There isn't much detail so far, but I would love to know what they mean exactly when they say "super secure" - I assume this means it will have some kind of root protection, but when it comes to Android, no phone is secure against being rooted. As quoted in a thread on XDA, "it CAN and WILL be rooted".

Don't get me wrong, I like the fact that US military are adopting to the Android system, but "super secure"? hardly. A military level secure phone might be harder to tinker with, but it is possible with all the various Android hacking tools out there.

Wednesday, 21 December 2011

Sophospuzzle answers

Yesterday Sophos introduced a small Christmas challenge, and I took part it in, it was definitely a fun learning experience.

The first step is deciphering this: =ImYndmbn1ieiBnLmJWdjJmZ

As soon as I saw it I knew it looked familiar but it doesn't decrypt straight away, it's in the wrong order. Swap the lettering around including the = sign, so it should now be ZmJjdWJmLnBiei1nbmdnYmI=

You'll need this to decode it. http://www.opinionatedgeek.com/dotnet/tools/base64decode/

Input the fixed lettering into the calculator and decode it safely as text and you'll get this: fbcubf.pbz-gnggbb

Still doesn't make a lot of sense does it? ah well, lets decode it again. It's encoded using rot13, rot short for rotate, it rotates any letters 13 letters forwards or backwards in the alphabet. http://rot13.com/index.php when it's decoded, you'll get sophos.com-tattoo, remove the - and replace it with /.

* Note, remember "rot13", you'll need it later.

That was rather easy. Now use that URL and get to the second stage.
http://www.sophos.com/en-us/security-news-trends/security-trends/tattoo-puzzle.aspx

======================================================

Second stage:

This is a much harder stage and you'll want either Python or C programming language experience. I went with C and wrote a short little program for this step.

Anyway, download the text file and read the instructions. Now you'll need to decode the block of text.



Now ignore the ascii art in there, it doesn't mean anything towards this, it just looks nice. Start at the top and analyze the code, we can see 504b code, which is code for zip, so we can safely assume this is a zip file.

Now this is where you'll want either Python or C to help out. As I said, I used C, so here is a pastebin or my coding for my program.

http://pastebin.com/LeMpAkSP

It's also worth me mentioning a little extra thing about that block of text. It's hex code, so you can run it through a hex to ascii translator, and you'll be able to decipher some of the real text, you'll also get a hint of what it inside that zip file.

Use my program to strip out any characters that shouldn't be there and put the zip file back together. Once you have the zip file, you'll need to extract the zip file and get the image from inside it, but first, you'll need the password for it. Remember I said you'll need rot13? that's the zip password, so now you can extract the image.

Now once it's extracted, have a peek at it and play around with it. It's just a pink block, that's all you'll see till you open it up. The block actually has some hidden text in it, but your not supposed to know that till later on.

What I mean by that is, open the gif file in Notepad (or whatever word editing program you prefer, Notepad++ personally), now remember these 2 things: Since when was pink a shade of gray? & GIF89a

You'll need those 2 hints later.

Now we can open up the image file and reverse engineer it. Not everyone will be able to do this, but I can because I'm on Windows XP. I used the debugging program through the command line.

cd C:\
cd gif
debug theimage.gif

You'll get just a dash when you open the debugging program, so now you'll want to dump the memory, press d & enter.

Next, you'll notice that GIF89a has re-appeared, I said you'll want to remember that along with the next bit I'll talk you through. Once you dumped the memory, it will come to the - mark again, so press d and do another dump of the memory to get the important part. (-d)

This second block of code has the important bit, you'll see some more bytes of data. F1 BB ED



That's where the hidden text is, there's more than 1 pink in the paint palette and that's why you can't see it normally, no matter what you do. Okay so we now have the bytes where that hidden text is, so we need to change the colour to be able to see it. Back at the - mark, this time type "e 34d", and press enter to edit the data.

You'll see F1 come up, and I changed it to 80 (gray) so I could see it, and I did this for all 3 bytes of text. Type 80 next to the F1, press space, Do the same for BB & ED.

Now you've changed the colour of all 3, press enter to get back to the - mark, type w and press enter to write the new data. 429 bytes of data should be written now, and you can now close the command prompt by typing q at the - mark.

Now open the gif file again and you can see the hidden text. Spy Bounty Recurs? what does that mean?

It's an anagram, this step is somewhat easier. Run it through an online anagram solver, however the last word wont come out right, but from what letters are left, you could work it out. You could also do this manually and go look at NakedSecurity site, the hint is to do with travel and USB's.

ENCRYPT YOUR USBS

Is the answer. Hope you all had fun. :)