Saturday, December 21, 2013

MindBlowing Inventions.!

We are living in an era of science and technology,where inventions and innovations are inspiring us each day. Technology is making our life more easier and luxurious. Things which we only imagine today comes in to reality in other day. Science and technology is progressing day by day.
Here is a list of top 10 Mindblowing Upcoming Technologies that will take your breath away.

Google Glasses

Google Glasses are a part of Project Glass, a research and development program by Google to develop an augmented reality head-mounted display (HMD). These products would display information in smartphone-like format hands-free and could interact with the Internet via natural language voice commands. The prototype’s functionality and minimalist appearance has been compared to Steve Mann’s EyeTap. The operating system software used in the glasses will be Google’s Android.
Leap Motion

Leap Motion presents an entirely new way to interact with your computers. Put simply, Leap Motion is more accurate than a mouse, as reliable as a keyboard and more sensitive than a touchscreen. For the first time, you can control a computer in three dimensions with your natural hand and finger movements.
Google’s Self-Driving Cars
The Google driverless car is a project by Google that involves developing technology for driverless cars. The project is currently being led by Google engineer Sebastian Thrun, director of the Stanford Artificial Intelligence Laboratory and co-inventor of Google Street View.
Glasses-Free 3D TV

The MIT Media Lab system uses several layers of liquid-crystal displays (LCDs), the technology currently found in most flat-panel TVs. To produce a convincing 3-D illusion, the displays would need to refresh at a rate of about 360 times a second, or 360 hertz. Such displays may not be far off: LCD TVs that boast 240-hertz refresh rates have already appeared on the market, just a few years after 120-hertz TVs made their debut.
Air to Fuel
A British firm based on Teesside says it’s designed revolutionary new technology that can produce petrol using air and water. Air Fuel Synthesis in Stockton-on-Tees has produced five litres of petrol since August, but hopes to be in production by 2015 making synthetic fuel targeted at the motor sports sector. The company believes the technique could help solve energy supply problems and curb global warming.
Face Cloning
Disney Research has proposed a complete process for designing, simulating, and fabricating synthetic skin for an animatronics character that mimics the face of a given subject and its expressions. This process starts with measuring the elastic properties of a material used to manufacture synthetic soft tissue.
Form 1 3D Printer
The Form 1 combines great design and solid engineering to simplify the entire printing process. It utilizes Stereolithography (SL) technology to achieve the highest resolution available in 3D printing, blowing away plastic extrusion (FDM) performance.
Bio Technology
Bionic Hand controlled by brain signals. It does allow people without fingers to have fully functional hands that can pick up and handle delicate objects. It is completely controlled by the brain and requires no surgery. Touch Bionics, the company the produces the Pro Digits hand, is able to install the hand complete with “living skin,” a plastic covering resembling human skin, for under $50,000. A small price to pay for a new hand I think.
Invisible Bike Helmets
The device is a mobile airbag which will supposedly replace all those unstylish bicycle helmets. It’s contained in a scarf which is worn around your neck, and at the moment of impact it inflates and forms a protective cushion around your head.mThe Invisible Bike Helmet was created by Hovding, a Swedish technology company.
Face Scanners
The technology was developed by FaceFirst, and even in a crowd you can’t escape their watchful eye: FaceFirst can track each individual face on a camera feed and run matches at the same time – and all of this happens live. Here’s a quote from the CEO of FaceFirst, Joseph Rosenkrantz:
“Within just a couple of seconds whoever needs to know receives an email containing all the evidence and stats about the person identified along with the video clip of them passing the camera so they may be approached then and there.

Waht should you know for Network Pentesting.?

  • Information Gathering - OSINT, DNS, SNMP etc.
  • Pentesting Network Components - Router, Switch, Firewall, IDS/IPS
  • Pentesting Windows Environments - domain controllers, pass-the-hash, active directory etc.
  • Pentesting Linux Environments
  • Pentesting Mobile Application Backends
  • Attacking via the DMZ - Web, Email etc.
  • Post Exploitation on Windows, Linux and Mobile OSs
  • Data Exfiltration - tools and techniques
  • Privilege Escalation on Windows and Linux
  • Keeping Access - Backdoors and Rootkits
  • Web Application vulnerability to Shell
  • Scenario based Pentesting
  • Social Engineering Attacks - JAVA Applets, HID devices etc.
  • AV Evasion Techniques
  • Firewall and IDS Evasion

Cross-Site Scripting Vulnerabilities

Have you ever mistyped the address of a web site and received a message like “Error - page name could not be found” or “The page you requested: page name does not exist”? Certainly you have, and odds are you never gave it a second thought; you simply corrected the address or went to a different site altogether. It happens all the time. There are plenty of dead links, or links with typos to stumble upon. However, when you encounter an error message like the two listed above, you are actually witnessing a potential security breach—not necessarily against the site, but rather against you directly.
Suppose you entered the following valid URL:
http://www.example.com/FILENAME.html
If the document "FILENAME.html" did not exist, the web site could return an error message such as
<HTML> 404 page does not exist: FILENAME.html
.... </HTML>
Notice that "FILENAME.html" is a string that you entered. The web site has included it in the page returned straight through to your browser.
This may seem harmless, but now imagine that you are browsing through auctions on a popular site; let’s call it auctions.example.com. You come across several auctions that someone has posted and would like to see more items that the same person has for sale; let’s assume this person is a “bad guy” (though you don’t know it) and call him BG12345. You click on BG12345’s website and see a listing of his auctions. You click on a link on his page that interests you and are taken to auction.example.com’s site displaying that item. You scroll down to place a bid, and the auction site prompts you for your name and password to sign in. You enter all the information and hit the submit button. Everything looks fine, but in reality, the information that you submit is getting sent back to BG12345. How can this be? The answer is that auction.example.com has what is known as a cross-site scripting (CSS) vulnerability.
A CSS vulnerability is caused by the failure of a site to validate user input before returning it to the client’s web-browser. The essence of cross-site scripting is that an intruder causes a legitimate web server to send a page to a victim's browser that contains malicious script or HTML of the intruder's choosing. The malicious script runs with the privileges of a legitimate script originating from the legitimate web server. The two error messages mentioned earlier could be examples of such a situation. If instead of entering a page name, you entered an HTML or
1
script tag, the server would have returned that command to your browser, as well. Your browser would assume the HTML or script tag was from auction.example.com. It would run the script with the privileges that are set up for that site, and when you looked at the website, everything would appear to be normal.
BG12345 used the same method to deceive you. When you clicked on the link to BG12345’s auction, the link was actually to an invalid page. The link may have looked something like the example below, it used HTML and scripting to mimic the auction site’s page exactly. However, when you clicked submit, it used a form that passed your information back to BG12345. Now BG12345 can access your account, place bids, and change your information. BG12345 can also change your password and lock you out of your own account. Even worse, BG12345 can see the credit card number that you registered with.
So what did BG12345 do? BG12345’s web site offered a link to auction.example.com that looked something like this:
<A HREF=http://auction.example.com/<script>alert(‘hello’)</script>">Click Here</a>
The "FILENAME.html" submitted to auction.example.com was,
<script>alert(‘hello’)</script>
auction.example.com then used its ordinary routines to generate an error page to you that read,
<HTML> 404 page not found: <script>alert(‘hello’)</script>
.... </HTML>
In effect, BG12345 managed to "inject" a JavaScript program into the page returned to you by auction.example.com. The JavaScript ran as though it originated at auction.example.com, and could therefore process events in that document. It also maintained communication with BG12345 by virtue of scripting that BG12345 put in the link; this is the way a CSS vulnerability can be exploited to "sniff" sensitive data from within a web page, including passwords, credit card numbers, and any other arbitrary information you input. There are a number of variants to this problem. Odds are that bank.example.com also has the same vulnerability somewhere on its site. BG12345 could potentially access your bank account and transfer funds using the same process.
So what can be done?
2
• The best protection is to disable scripting when it isn’t required. However, even this does not prevent the injection of malicious HTML. You should also protect yourself by accessing security sensitive pages directly instead of following links from unknown sources, or untrusted sites. For example, don’t trust a link to your banking site that is in an email message. If you need to access your banking site, go there directly. And, as always, exercise caution when supplying personal information.
• Webmasters can also help. They can ensure that none of their pages return user input that has not been validated. They can also encourage users to disable scripting.
• Another solution is to have “signed scripting” such that any script with an invalid or untrusted signature would not be run automatically. Suggestions of this nature, however, would require changes to the current Internet standards and specifications. Such changes would have to be submitted for consideration to the World Wide Web Consortium (www.w3c.org) or the Internet Engineering Task Force (www.ietf.org).
• If you notice an instance of cross-site Scripting notify the webmaster of that site, and cc the CERT Coordination Center.
Unfortunately, security is often sacrificed in favor of functionality. But, if you browse the Internet with scripting enabled, there is very little you can do to protect your personal information. Cross-site scripting is easy to overlook, and simple to correct. However, it can cause significant damage–your passwords and credit card numbers can be unknowingly divulged to untrusted sources.

Did you miss the magic? It's right there in your data storage.

Let's consider how we’ve become numb to the breadth with which technology has advanced. It's moving so fast that we barely have time to appreciate one advancement before the next one comes along.
 
It wasn't always like that. The black and white television was first demonstrated at the World's Fair in 1939. It was almost three decades later before most homes had a color television in 1967.
 
In the early 1990s, I carried a lunch-box size bag with a tetherd mobile phone that got lousy service and cost an arm and a leg. Today, I carry a $199 iPhone with more processing power than the $150,000 Apollo Guidance Computer.
 
Great comparison, right? Of course, most of us have probably heard that analogy. 
 
A few months ago, data storage vendor SanDisk sent me one of their latest backup devices, a wireless thumb drive. It blew my mind.
 
At first, I marveled at the hidden antenna technology that had become so miniaturized and high-speed that it could transmit millions of bits of data per second through the air from my computer or smart phone to a thumb drive in my pocket. Conversely, I could stream a movie from that thumb drive to my phone or tablet, never burdening my mobile device with the enormous capacity that a movie consumes.
 
Then, I noticed the thumb drive had a tiny slot for a removable microSD card – a storage device smaller than my thumbnail and slightly thinner than a credit card. I popped the microSD card out, and the number printed on it gave me pause.
 
The number was 32 followed by "GB".
 
I've covered data storage for 13 years, and over that time, co-workers would periodically needle me over being saddled with a boring news beat. I'd always retort that it was one of the most intersting beats I could imagine. I also cover 3D printing, and I don't consider that any more amazing than data storage.



(On the left is a 16MB SD card sold by Samsung in the early 2000s. On the right, a 32GB microSD card sold today by SanDisk)
 
This is how I see it. On that microSD card that is half the size of a postage stamp, there are thirty-two gigabytes of capacity. “So what,” you say? A gigabyte is roughly one billion bytes of data.
 
I have an advertisement pinned to the outside of my office cubicle from the mid-1980s. It’s a 10MB hard disk drive offered for the bargain price of $3,398. Today, you can buy that 32GB microSD card for $23.
 
Again, you may say, “well, that’s just the storage cousin of Moore’s Law and economy of scale. Technology advances, and the more you produce of something, the cheaper you can sell it."
 
You see? You just missed the magic -- the science that has created something so simple, and yet, has had such a profound effect on your life. Each bit-storing transistor inside that solid-state storage in your smartphone, in that microSD card, is about the size of an few atoms. The process for laying out the circuitry in a solid-state drive (SSD) is lithography, and today it's measure in nanometers. A nanometer is one-billionth of a meter.
 
Because of that microscopic circuitry, you can carry around tiny devices that store billions, even trillions of bytes of data -- that's a volume of information that just a couple of decades ago would have required the buildings of the Library of Congress to store.
 
Today, we carry smartphones with tens of gigabytes of capacity and hard drives smaller than a deck of playing cards that have three, even four terabytes of capacity and never stop to think: A terabyte. That's about a trillion bytes of data.
 
To illustrate the difference between a million and a billion, consider this: one million seconds is 11 days, one billion seconds is about 31.7 years. And a trillion seconds? Well, that’s 31,700 years.
 
Think about that the next you pull your smartphone out of your pocket.


(On the left is an RA81 disk drive beside a current 2.5-in, 2TB laptop hard drive. The R81, which was manufactured by Digital Equipment Corp. in 1982, was a marvel in its day. It offered up to 456MB of capacity, four times that of the R80, its predecessor. On the right, the 32GB microSD card)

 

What should you know for Web Application Pentesting...!

  • HTTP/HTTPS protocol basics
  • Understanding Web Application Architectures
  • Lab setup and tools of the trade
  • Converting your browser into an attack platform
  • Traffic Interception and Modification using Proxies
  • Cross Site Scripting
    • Types
      • Reflected
      • Persistent
      • DOM based
    • Filtering XSS
    • Evading XSS filters
    • Cookie stealing and session hijacking
    • Self-XSS
    • BeeF
  • SQL Injection
    • Error based
    • Blind
    • Second order injections
  • Broken authentication and session management
    • session id analysis
    • custom authentication
  • Security misconfigurations
    • Web and database server
    • Application framework
  • Insecure direct object reference
  • Cross-site Request Forgery
    • GET and POST based
    • JSON based in RESTful Service
    • Token Hijacking via XSS
    • Multi-Step CSRF
  • Insecure cryptographic storage
  • Clickjacking
  • File upload vulnerabilities
    • Bypassing extension, content-type etc. checks
  • RFI and LFI
  • Web to Shell
    • Web Shells
    • PHP meterpreter
  • Analyzing Web 2.0 applications
    • AJAX
    • RIAs using Flash, Flex
  • Attacking Caching servers
    • Memcached
    • Redis
  • Non Relational Database Attacks
    • Appengine Datastore
    • MongoDB, CouchDB etc.
  • HTML5 Attack Vectors
    • Tag abuse and use in XSS
    • Websockets
    • Client side injection
    • Clickjacking
  • Web Application firewalls
    • Fingerprinting
    • Detection Techniques
    • Evading WAFs
  • … more additions will be made as course evolves

Do you know how much google earns?


Do you know how much Google earns?
Google generates $691.27 per second! Isn't it
crazy?
And the annual revenue is
$21,800,000,000 . If you have taken 5
seconds to
read this post then Google would have
already
made around $3456.34 in between.

Thursday, December 19, 2013

Apple iPhone 6 Rumors: Analyst Says 2014 iPhone Model Could Feature 4.8-Inch Screen


As the popularity of bigger smartphones, dubbed phablets, is on the rise, Apple (NASDAQ:AAPL) too is rumored to be working on a bigger iPhone, and if the latest claims of an analyst are to be believed, the 2014 model of the flagship smartphone, unofficially called the iPhone 6, will sport a larger screen.
Peter Misek, an analyst at Jefferies, has predicted, after meeting Apple’s Asian suppliers last week, that next year’s iPhone 6 will be redesigned to incorporate a bigger 4.8-inch screen, compared to the 4-inch screen featured in the existing iPhone 5s.
According to a report from CNET, Misek did not reveal any reasons behind his prediction about the next iPhone iteration's screen size except to say that a bigger screen would attract more customers to upgrade to the new model.
"We think the 85M iPhones eligible for an upgrade when the iPhone 6 launches (we think Apple is targeting Sep 2014) could be boosted by another 5-10M from people who skipped the 5S/5C cycle," Misek wrote in a note to investors.

In the last quarter, around 50 percent of smartphones shipped worldwide had a screen size bigger than 4 inches. During the same period last year, only 20 percent of the smartphones shipped had bigger screens, CNET reported.
Reports about a bigger iPhone 6 have been around for quite some time now even though predictions about the actual size of the phone's screen seem to fluctuate a bit.
Korea’s ETNews also reported last week that the iPhone 6 in 2014 could sport a bigger screen of up to five inches. The report also said that the iPad also would come with a bigger screen of 12.9 inches in 2014.
A Wall Street Journal report recently said that Apple was testing iPhones with screen sizes ranging from 4.8 inches to 6 inches, while KGI Securities analyst Ming-Chi-Kuo predicted that the iPhone 6 in 2014 would feature a screen size between 4.4 inches and 5 inches.
Reuters reported, in June, that the iPhone iteration in 2014 may come with at least two bigger screen sizes -- 4.7-inches and 5.7-inches -- as Apple is considering expanding its flagship smartphone range.
Analysts also believe that Apple needs to diversify its iPhone line-up as the company’s handset is at risk of losing more market share to its competitors, especially to main rival, Samsung (KRX:005935).
“Apple’s first priority should be a premium-tier phablet with a 5-inch screen because that is where the largest new revenue pool is located,” Neil Mawston, executive director at Strategy Analytics, recently told TechCrunch.