Posts

Showing posts from October, 2017

Ubuntu 17.10 Beta 2 Released, This Is What’s New

Image
Right you, it’s time to fumble for the nearest USB thumb drive, stick the kettle on, and lean back in that chintzy IKEA chair of yours because Ubuntu 17.10 Beta 2 is now available to download. This is the  first official testing milestone  that the regular version of Ubuntu desktop has taken part in during the ‘Artful Aardvark’ development cycle (it sits out the alpha round of testing). That makes this beta download your first formal chance to go hands on and help test everything that’s included. And boy is there a lot of it! Other Ubuntu flavors like Ubuntu MATE and Ubuntu Budgie have also released new beta builds today. We’ve covered their releases in a separate post. For those of you who prefer your distribution to arrive fully baked, the finished stable version of  Ubuntu 17.10 is released on October 19 , 2017. What’s New in Ubuntu 17.10 (Beta 2) What’s new in Ubuntu 17.10? Well, quite frankly, what  isn’t  new?! U If you pay close attention to social medi

Detect and Recognize Faces with Luxand FaceSDK

Image
    FaceSDK enables Microsoft Visual C++, C#, Objective C, VB, Java and Delphi developers to build 32-bit and 64-bit applications for Web, Windows, Linux, macOS, iOS and Android with face recognition and face-based biometric identification functionality. Download Now>>     FaceSDK is used in hundreds of applications for identifying and authenticating users with webcams, looking up matching faces in photo databases, automatically detecting facial features in graphic editors, and detecting faces on still images and video streams in real-time. FaceSDK has been used for building secure identification, surveillance, time and attendance control systems. Detect Human Faces and Facial Features Luxand’s patent pending technology detects facial features quickly and reliably. The SDK processes an image, detects human faces within it, and returns the coordinates of 70 facial feature points including eyes, eye contours, eyebrows, lip contours, nose tip, and so on. Detect

CREDENTIAL HARVESTING VIA MITM – BURP SUITE TUTORIAL

Image
    In this step by step tutorial we will discuss some of the more advanced use cases for the Burp Suite.  Credential harvesting through Man In The Middle attack vectors can be your saving grace during an otherwise uneventful penetration test. This guide is intended to be educational as well as entertaining.  The author does not condone or encourage illegal hacking activities. ENABLE ROUTING     The first thing you’ll want to do is enable your attacking machine to route traffic.  This way, when your victim machine makes a request to an external HTTP server you will forward the request and intercept the server’s response.  This behavior is necessary for credential harvesting attacks. If it helps, you can think of yourself as an interception proxy much like the one we are using in this tutorial. $ echo 1 > /proc/sys/net/ipv4/ip_forward #ProTip  When you try this on your own and things inevitably don’t work as easily as I have described them, check this first! CON