«
Expand/Collapse
66 items tagged "intel"
Related tags:
symantec [+],
intel cpu [+],
cpu [+],
virtualization [+],
shell [+],
security [+],
multiple [+],
BackTrack [+],
osx [+],
alert management [+],
alert [+],
smep [+],
read [+],
mcafee [+],
hdcp [+],
agn [+],
Supporto [+],
Newbie [+],
Area [+],
working [+],
windows [+],
vulnerability exploitation [+],
txt [+],
tcp [+],
target system [+],
system message [+],
shellcode [+],
setuid [+],
problema [+],
ppc [+],
os x intel [+],
os x [+],
news [+],
mac os x [+],
mac os [+],
intel pro [+],
intel c [+],
hacks [+],
hacker [+],
digital content protection [+],
debugger [+],
darknet [+],
cpu cache [+],
core [+],
completes [+],
code execution [+],
classic security [+],
cache controller [+],
buffer overflow vulnerabilities [+],
bt4 [+],
atom [+],
Wireless [+],
General [+],
zte [+],
xscale [+],
wlan [+],
with [+],
wifi [+],
whitepaper [+],
wep [+],
way [+],
wants [+],
vulnerability [+],
virtual machines [+],
update [+],
una [+],
u.s. [+],
tutti [+],
technology authors [+],
technology [+],
symantec products [+],
super [+],
strikes [+],
sony laptop [+],
simple [+],
service vulnerability [+],
service denial [+],
service [+],
security specialist [+],
secrets [+],
scheda [+],
same time [+],
salve [+],
salutation [+],
safer use [+],
sacco [+],
riesco [+],
research [+],
remote buffer overflow vulnerability [+],
remote buffer overflow [+],
realtek [+],
random number generator [+],
random number generation [+],
rafal wojtczuk [+],
question [+],
protection code [+],
protection [+],
poc [+],
paul otellini [+],
panel [+],
os x x86 [+],
number [+],
niche companies [+],
new dell [+],
nbsp nbsp nbsp nbsp nbsp [+],
nbsp [+],
n270 [+],
master key [+],
management [+],
man in the middle attack [+],
letto [+],
leaked [+],
kernel 2 [+],
joanna rutkowska [+],
investigates [+],
intel architecture [+],
intel agencies [+],
intel 945 [+],
intel 4965 [+],
injection [+],
initial acquisition [+],
infineon [+],
human lie detectors [+],
hospitals [+],
high bandwidth [+],
haswell [+],
handler [+],
hacker attack [+],
graphic card [+],
google [+],
goldi [+],
gma [+],
generation [+],
frequent topic [+],
fews days [+],
faced [+],
express [+],
execve [+],
execution technology [+],
ether [+],
engineered [+],
driver [+],
digital surveillance [+],
digital [+],
design flaw [+],
dell mini [+],
dell inspiron b130 notebook [+],
dell inspiron [+],
dell [+],
debutant [+],
deal [+],
crypto [+],
creating [+],
cracken [+],
copy protection [+],
compromised [+],
common base [+],
command execution [+],
claims [+],
ciao [+],
chopchop [+],
chipsatz [+],
chips [+],
china [+],
che [+],
carte [+],
card [+],
bull mountain [+],
buffer overflow vulnerability [+],
breakpoint [+],
bin [+],
b mcafee [+],
awus [+],
audio [+],
attacking [+],
arp requests [+],
architecture matter [+],
ams [+],
alfa [+],
aircrack [+],
acquisition [+],
acquires [+],
abilitazioni [+],
Support [+],
NON [+],
Espace [+],
Ecke [+],
Countermeasures [+],
Angolo [+],
Anfnger [+],
3 things [+],
privilege escalation vulnerability [+],
local privilege escalation [+],
Hardware [+]
-
-
12:33
»
Packet Storm Security Recent Files
This paper provides an overview of a new hardware security feature introduced by Intel and covers its support on Windows 8. Among the other common features it complicates vulnerability exploitation on a target system. But if these features are not properly configured all of them may become useless. This paper demonstrates a security flaw on x86 version of Windows 8 leading to a bypass of the SMEP security feature.
-
12:33
»
Packet Storm Security Misc. Files
This paper provides an overview of a new hardware security feature introduced by Intel and covers its support on Windows 8. Among the other common features it complicates vulnerability exploitation on a target system. But if these features are not properly configured all of them may become useless. This paper demonstrates a security flaw on x86 version of Windows 8 leading to a bypass of the SMEP security feature.
-
-
16:01
»
Hack a Day
It’s been a little while since we talked about HDCP around here, but recent developments in the area of digital content protection are proving very interesting. You might remember that the Master Key for HDCP encryption was leaked last year, just a short while after Intel said that the protection had been cracked. While Intel [...]
-
-
9:01
»
Hack a Day
Random number generation is a frequent topic of discussion in projects that involve encryption and security. Intel has just announced a new feature coming to many of their processors that affect random number generation. The random number generator, which they call Bull Mountain, marks a departure from Intel’s traditional method of generating random number seeds [...]
-
-
23:40
»
SecuriTeam
The Intel Alert Handler service (hndlrsvc.exe) fails to correctly process the 'CommandLine' field in the AMS request.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
12:29
»
SecDocs
Authors:
Tsukasa Ooi Tags:
virtualization virtual machine Event:
AVTokyo 2009 Abstract: This session will talk about 3 things: 1 - Algorithms to make virtual machines having security-enhanced features such as invisible instruction breakpoint and hooks of system I/Os. 2 - Differences between Intel VT-x and AMD-V and influences that these differences brings security-enhanced virtual machines. 3 - New method for virtualization of x86 architecture.
-
-
11:00
»
Hack a Day
Intel says that HDCP has been cracked, but they also say that it’s unlikely this information will be used to unlock the copying of anything. Their reasoning for the second statement is that for someone to make this work they would need to produce a computer chip, not something that is worth the effort. We [...]
-
-
16:01
»
Wirevolution
Unlike its perplexing McAfee move, Intel had to acquire Infineon. Intel must make the Atom succeed. The smartphone market is growing fast, and the media tablet market is in the starting blocks. Chips in these devices are increasingly systems-on-chip, combining multiple functions. To sell application processors in phones, you must have a baseband story. Infineon’s RF expertise is a further benefit.
As Linley Gwennap said when he predicted the acquisition a month ago, the fit is natural. Intel needs 3G and LTE basebands, Infineon has no application processor.
Linley also pointed out Intel’s abysmal track record for acquisitions.
Intel has been through this movie before, for the same strategic reasons. It acquired DSP Communications in 1999 for $1.6 Bn. The idea there was to enter the cellphone chip market with DSP’s baseband plus the XScale ARM processor that Intel got from DEC. It was great in theory, and XScale got solid design wins in the early smart-phones, but Intel neglected XScale, letting its performance lead over other ARM implementations dwindle, and its only significant baseband customer was RIM.
In 2005, Paul Otellini became CEO; at that time AMD was beginning to make worrying inroads into Intel’s market share. Otellini regrouped – he focused in on Intel’s core business, which he saw as being “Intel Architecture” chips. But XScale runs an instruction set architecture that competes with IA, namely ARM. So rather than continuing to invest in its competition, Intel instead dumped off its flagging cellphone chip business (baseband and XScale) to Marvell for $0.6 Bn, and set out to create an IA chip that could compete with ARM in size, power consumption and price. Hence Atom.
But does instruction set architecture matter that much any more? Intel’s pitch on Atom-based netbooks was that you could have “the whole Internet” on them, including the parts that run only on IA chips. But now there are no such parts. Everything relevant on the Internet works fine on ARM-based systems like Android phones. iPhones are doing great even without Adobe Flash.
So from Intel’s point of view, this decade-later redo of its entry into the cellphone chip business is different. It is doing it right, with a coherent corporate strategy. But from the point of view of the customers (the phone OEMs and carriers) it may not look so different. They will judge Intel’s offerings on price, performance, power efficiency, wireless quality and how easy Intel makes it to design-in the new chips. The same criteria as last time.
Rethink Wireless has some interesting insights on this topic…
-
-
13:26
»
remote-exploit & backtrack
I am having the same problem as the person in a post in the "wireless" area (thread name:
Low #/s) - that is, a problem with gathering enough packets.
I'm on a brand new Dell Studio 1555 (core i5, 4GB RAM) with an Intel wireless card with an Intel 4965/5xxx chipset (according to airmon-ng). From what I've heard, the card only recently got its driver added to the kernel, but it works fine with bt4 out of the box. I've run injection tests, and they have worked fine.
Here is the output from airmon-ng:
Code:
Interface Chipset Driver
wlan0 Intel 4965/5xxx iwlagn - [phy0]
I first stop my wireless:
Code:
root@bt:~# airmon-ng stop wlan0
Interface Chipset Driver
wlan0 Intel 4965/5xxx iwlagn - [phy0]
(monitor mode disabled)
I then enable it with monitor mode:
Code:
root@bt:~# airmon-ng start wlan0 6
Interface Chipset Driver
wlan0 Intel 4965/5xxx iwlagn - [phy0]
(monitor mode enabled on mon0)
I test injection and it works fine.
I then start collecting packets, and find that I have a really low rate, and really low power (generally around -30) so I try to do packet injection. I get the "Association successful :-)" notification and plenty of ARP requests, and it says that I'm sending out loads of packets.
The rate of collection, however, remains completely unchanged.
I then go back to test injection, and it no longer works.
In other words, it's completely identical to the problem that the person in the thread I mentioned above has.
Help would be greatly appreciated.
-
-
16:39
»
remote-exploit & backtrack
Hello,
I have an Intel WiFi Link 5100 AGN in my Sony laptop. It works in BT4 but in BT3 it doesn't show up for airmon-ng.
Anybody know why?
Thanks
-
-
23:03
»
remote-exploit & backtrack
I tried every possible way I can to get this graphic card work on BT 4 but no luck. Please help!
-
-
3:56
»
remote-exploit & backtrack
salve a tutti, oggi stavo pensando che sono stufo di usare il la scheda di rete intel e che vorrei cambiarla in una realtek.. è una cosa possibile?
come posso verificare la compatibilita delle schede? grazie
-
-
20:59
»
remote-exploit & backtrack
One simple Question. I have a dell inspiron b130 notebook it has a IPW 2200 wireless card. Can I hack a wep network with BT4 final?? Thats all I want to know
-
6:24
»
remote-exploit & backtrack
Salve a tutti. Io ho un acer 6930g con scheda wifi intel 5100agn. Utilizzo backtrack live su USB. Il mio problema è che non riesco a utilizzare nessun WEP Attacks (no-client), quando mando il chopchop o il fragmentation rimangono con la scritta "Read xxxx packets..." (xxxx sta per il numero), e le rare volte che vanno, si bloccano dopo poco e mi compare una lista di possibili cause del problema.... C'è un modo per risolvere il problema? grazie a tutti in anticipo.. ciao
-
-
1:09
»
remote-exploit & backtrack
Ciao a tutti! Ho letto molti articoli interessanti sullo sniffing, ma la mia scheda wifi intel3945 vede solo il traffico del mio pc. Ho seguito un sacco di guide su internet su abilitazioni di monitor mode o compat-wireless ma le cose non cambiano. Posso risolvere il prblema o devo rassegnarmi? Utilizzo ubuntu 9.10.
Grazie! :)
-
-
15:01
»
remote-exploit & backtrack
Hi,
I tried my best to read about how to install the driver for my intel 5300 agn on my lenovo ideapad y550p machine on BT4 but in vain.
When I do a ifconfig -a, it says there are no devices, so that means the OS has not recognized the card's existence.
I am using a USB bootup. I have the latest kernel 2.6.31...and the driver from intellinuxwireless.org.
Could someone please guide me as to how i need to install this particular driver on my system.
Many many thanks, I am sure this is going to help many users.
Thanks,
Raqeeb
-
-
0:40
»
remote-exploit & backtrack
Salve a tutti,
ho installato da poco backtrack ma non riesco a far funzionare il wifi...
cosa ho saltato? devo installare la scheda?
-
-
13:50
»
remote-exploit & backtrack
Hey Leute!
Bin Linux noob ^^
habe mich (zu grob) in die wardriving welt eingearbeitet und habe auch vor mich diesbezüglich weiter zu bilden..
Aber ersteinma hab ich nur rumgespielt.
Habe versucht meinen router(linksys mit original fw, also kein openwrt) mit WEP verschlüsselung zu cracken.
Das haperte allerdings beim Packet Injection test. (0/30)
(benutze die Gerix GUI)
Wüsstet ihr was der grund sein könnte? Zwangsläfig am Chipsatz?
MfG.
Goldi
-
-
6:15
»
remote-exploit & backtrack
Hey
I have a Intel 4965 but it seems that this card is good but not perfect so Im thinking of buying a USB 802.11 b/g Alfa AWUS036H. I heard it is a GREAT card for aircrack-ng/BT and supports all its features. Id just like a extra thumbs up from the BT community to confirm that this is true.
The reason I post this is that I thought when I bought the Intel 4965 it was going to be the shit but it turns out that it is very buggy, short range and doesnt support all the features of aircrack-ng.
Thank you
-
4:24
»
remote-exploit & backtrack
Bonjour tout le monde, j'aimerai savoir si quelqu'un sait faire tourner compiz avec une carte graphique intel 945 express chipet family ( oui je sais elle pu du cul cette carte, mais on fait ce qu'on peu ;))
j'ai un peu cherché et ça me semble un peu compliqué.
Merci pour vos reponse, salutation.