Pyramid Linux

pyramidlinux – Pyramid Linux – Google Project Hosting.

Pyramid is binary linux distro for use on x86 embedded platforms. It is primarily focused on wireless applications however people have found many great uses for it. We primarily develop and test Pyramid for Metrix Kits, but it works well on other x86 based hardware as well. Check the WorkingHardware page for more info or add to it if you find hardware not listed that works with Pyramid.

‘Anonymous’ hackers intercept conversation between FBI and Scotland Yard on how to deal with hackers

The recording, which was posted on Youtube, refers to the on-going court case against Ryan Cleary, arrested last June for his alleged role in the group LulzSec, and reveals legally sensitive information.

via ‘Anonymous’ hackers intercept conversation between FBI and Scotland Yard on how to deal with hackers – Telegraph.

I’d like to hear more as to how this was done.

MQTT: MQ Telemetry Transport

MQTT stands for MQ Telemetry Transport. It is a publish/subscribe, extremely simple and lightweight messaging protocol, designed for constrained devices and low-bandwidth, high-latency or unreliable networks. The design principles are to minimise network bandwidth and device resource requirements whilst also attempting to ensure reliability and some degree of assurance of delivery. These principles also turn out to make the protocol ideal of the emerging “machine-to-machine” (M2M) or “Internet of Things” world of connected devices, and for mobile applications where bandwidth and battery power are at a premium.

via FAQ – Frequently Asked Questions | MQTT: MQ Telemetry Transport.

I see RIM phones using this.

Are there standard ports for MQTT to use?

Yes. TCP/IP port 1883 is reserved with IANA for use with MQTT. TCP/IP port 8883 is also registered, for using MQTT over SSL.

VMware Player – Virtual Network Editor

The Virtual Network Editor (vmnetcfg.exe) is not extracted during the installation and it is really needed if you want to mess around with the virtual network settings on the host OS.

It is a problem if you have different network adapters installed, like eg Bluetooth, WiFi, Hamachi etc

Extract cab files

You can extract all files from the installation by using the option /e and a destination folder is supplied

C:\Download\vmware>VMware-player-3.1.3-324285.exe /e .\extract

Change to the subfolder and find the file network.cab, open it in eg Izarch and extract vmnetcfg.exe to the vmware player installation folder. You can also create a shortcut in your list of program files if needed

Currently rated 4.6 by 8 people

via Look sharp | VMware Player – Virtual Network Editor.

This worked.  I didn’t have to install izarch either — 7-zip extracted the .cab files just fine.  I can’t believe vmware didn’t just install the network editor for the player.  What’s up with that?

AirTraf > Home

It is my pleasure to announce that AirTraf project has resulted in founding of a new company, Elixar, Inc.

via AirTraf > Home.

802.11b network analyzer.

Also, from http://www.elixar.com/corporate/history/airtraf-1.0/airtraf_download.php

AirTraf 1.0 is available under the GNU GPL license. If you are not familair with the terms of this license please read it before downloading.  Also please note that AirTraf is currently being released only for the linux operating system.

Offensive Mobile Forensics

There are many different locations containing interesting data on iOS devices. Data often resides in SQLite databases, the chosen format for local storage on mobile devices. The next best place to find sensitive information is in plist, or property list files – these are the primary storage medium for configuration settings in iOS, and they are also a fantastic source of sensitive information. User credentials are often stored here, instead of inside the KeyChain where they should be. Rounding out the top three data sources are binary or binary-encoded files, such as the device’s keyboard cache and pasteboard. Although storage locations commonly change with the release of new iOS firmware, it is fairly simple to poke around the general area and find what you’re looking for.

via Offensive Mobile Forensics.

Similarly to the configuration files for iOS, the XML files storing preferences for Android applications commonly include user credentials and other sensitive information.