Upgrade Ubuntu 14.04 LTS to Ubuntu 16.04 LTS

11:24 PM Unknown 0 Comments



Introduction

With the release of Ubuntu 16.04 LTS now just a couple of days away you may be trying to decide whether to upgrade or not. Well, we’re here to complicate matters by showing you how to do it, both before this Thursday’s release and after it.  “Ask yourself: ‘Do I really need to upgrade right now?'” So if you’re wondering how to upgrade Ubuntu 14.04 LTS to Ubuntu 16.04 LTS, read on; we’re here to walk you through the process step-by-step.

Is Performing an LTS-to-LTS Upgrade Recommended?

Like the version you are upgrading from, Ubuntu 16.04 is a Long Term Support release. It will receive critical bug fixes and security updates from Canonical for 5 years. A device running Ubuntu 14.04 LTS will only tell you there is a new Ubuntu update after the first point release goes live. 
In Xenial’s case that’s July. In short: you won’t be notified of an upgrade this week. But you don’t have to wait until the system gets around to telling you. You can upgrade right now.Or you can download the ISO file .

Prerequisites

This guide assumes that you have a system running Ubuntu 14.04, configured with a non-root user with sudo privileges for administrative tasks.

1 .Back Up Your System

Before attempting a major upgrade on any system, you should make sure you won't lose data if the upgrade goes awry. The best way to accomplish this is to make a backup of your entire filesystem. Failing that, ensure that you have copies of user home directories, any custom configuration files, and data stored by services such as relational databases.

2 .Upgrade Currently Installed Packages

$ sudo apt-get update

Next, upgrade installed packages to their latest available versions:

$ sudo apt-get upgrade

This process may take some time. Once it finishes, use the dist-upgrade command, which will perform upgrades involving changing dependencies, adding or removing new packages as necessary. This will handle a set of upgrades which may have been held back by apt-get upgrade:

$ sudo apt-get dist-upgrade

3 .Use Ubuntu's do-release-upgrade Tool to Perform Upgrade

First, make sure you have the update-manager-core package installed:

$ sudo apt-get install update-manager-core

Start by running do-release-upgrade with no options:

$ sudo do-release-upgrade

4 .Check your version release now !

Run this option:

$ lsb_release -a


This is the screenshot form my computer it's now ubuntu 16.04 :D !

write your own facebook post BOT

6:36 PM Unknown 0 Comments

Introduction

Once ,I have attended a conferences about malware's and firmware exploitation and how it is important to keep yourself secure from this type of attacks ,but ,this actually ,have inspired me to start a new project and this time with BOT(s) ,In fact ,am looking for an advanced bot that can learn and act like humans ,however,the main question that has stacked in my mind is "How can be the ability of computers and robots if they learn the behavior of humans and act like them ?!" ,In addition ,with the machine learning today machines can learn things but,this is still limited for now .On the other hand ,how can hackers use this technique to their advantage by programming bots to do things without even get noticed by antivirus or firewall ,or IDS ! .

Abstract

This article shows you how to start writing your own facebook post bot without using any URL ,API,or external application ,Its an easy way to getting started with the technique to do the same thing .
watch DEMO

Main idea of the BOT

The main idea of the bot ,is to get the current coordination of the mouse pointer on the screen ,and through the current location we can get the couple of (X,Y) ,this helps us to locate any form or components on the screen ,so ,the bot simulate the mouse and the keyboard function . 

On facebook page we can get the coordination of the buttons ,form ,post field ........ and through this ,we focus on the component and execute commands . (this is only the first and the easiest part of the script we can go far with this and do anything almost ,just by developing some programs that can learn the user behavior and then act like them to do another thing :D {H4Ck3rs_L0VE_ThiS_StuFF} )

1.xdotool

What is xdotool? 

This tool lets you simulate keyboard input and mouse activity, move and resize windows, etc. It does this using X11's XTEST extension and other Xlib functions.

$ sudo apt-get install xdotool

2. Get the (X,Y) coordination

By using xdotool ,we can get the current position of the pointer on the screen .Move the pointer and focus on the field ,then execute xdotool with getmouselocation option .

now execute the xdotool tool to get the coordination

$ xdotool getmouselocation --shell



now we have all the coordination of the needed filed let's have fun

3. Bot script

You can download the script from my Github

#! /bin/sh
# This BOT developed by IhebBenSAlem@ihebskiSoft 
# Read more about the topic visit :https://nodeme.blogspot.com
# ContactME:ihebbensalem.isetcom@gmail.com
echo "------B0T_RUN_NOW--------"
xdotool mousemove --sync 868 114 #(x,y) fb home page 
xdotool click 1 
sleep 2
xdotool mousemove --sync 536 211 #select the post form
xdotool click 1
sleep 2 #wait ,timeout of refresh 
#---- Inject the message or text--------#
xdotool key i 
xdotool key h
xdotool key e
xdotool key b
xdotool key s
xdotool key k
xdotool key i
xdotool key B
xdotool key 0
xdotool key t
xdotool key T
xdotool key 3
xdotool key S
xdotool key t
#-----END TXT --------#
sleep 2
xdotool mousemove --sync 718  274 # post button
xdotool click 1
clear
echo "[=======================] 100%"
echo "------Done ! --------"
now ,execute the bash file ,and here is it :D ,it works !

4.Security threads ?!

the reason behind this title that this method can be really dangerous ,if it's manipulated by hackers because the bash script simulates the legal peripherals of the computer (Mouse ,Keyboard) so ,the attack can not be detected by any protection software such as Antivirus ,Firewall ,IDS....IPS ..... or even the most advanced one with the latest updates ! .With the machine learning, this can be really dangerous because ,the machine can manipulate their self by just analyze the users behavior and this leads to getting some credential things or open ports , download files,malware from the internet or other .

5 .What's next ?!

now it is your turn to write some advanced bot through this basic script ,python have a dozen of libraries helps you to write the most sophisticated script to build powerful bots on the internet .This only the start

6. Note

THIS IS FOR EDUCATIONAL AND INFORMATIONAL PURPOSES ONLY.

Chinese malware has infected 10 million android devices

12:40 AM Unknown 0 Comments


Specialists assumed that more than 10 million android devices all over the world are infected by a virus caused by a Chinese company. A cybersecurity specialist at Check Point has discovered the malware which is called HummingBad. 

 Check point has published a report that shown that the malware contains multistage attack chain with two major components which infect androids when people surf certain websites. 

 The first part tries to gain root access on the device using rootkit; a software that seize various weaknesses, if the access went successful, attackers will get a full access to the device, otherwise, the second part will request the HummingBad system-level permission of the user to update their device system without letting the user notice that it’s a fake one. 

 As reported by Check-Point, Yingmob, a mobile advertising agency located in Beijing is behind the malware. It employs teams who develop legal tracking and ad platforms. The development Team for Overseas Platform is responsible for developing the malware components. 

 Cybersecurity mentioned in its report that Yinmob was using the malware in order to generate about $402,000 as profits from clicking ads as well as downloading apps.

How can you notice if your device is infected ?!

Fortunately, cybersecurity experts tend to detect the malware using different protective software such as : Check Point’s Zone Alarm, 360 Security’s Antivirus Boost, Avira Antivirus Security. These softwares aim to notify users of the existence of bad actors while using their devices

How can you respond to this Malware?

This malware becomes a reason to worry about on the coming days, so here are few methods to follow in order to get rid of the last. 

  1. Doing a persistent search of the malware and remove it manually. This is useful for experts in mobile apps. 
  2. The safest option yet it might be annoying since you’re going to lose all your data which is a factory reset of the phone

Hackers declared DDoS knocked Pokémon GO offline

5:37 PM Unknown 0 Comments


If you’re a technophile, you would definitely know about the recent released game Pokémon GO that has been a success since its launch. The story behind this game went back to April 2014 fool when google sprinkled all the original 151 Pokémon around its map. At that time Niantic started working with the Pokémon Company to turn it into reality. Pokémon GO makes you cruise the real world while hunting Pokémon and locating gyms in which you will fight others! .

The first thing that comes to Niantic’s mind is that this game should aim to debilitate server issues. He was obliged to impede its global rollout so it provides additional server capacity, yet there still some days when the game won’t connect. This might be due to a hacking group called OurMine who claimed responsibility for the downtime. 

 It’s unbelievable that Pokémon GO is spreading faster day by day to the extent that some people will fall in a hole while they’re concentrating playing it in the street for example. It becomes an addiction for some. Niantic put out the game over additional 26 countries over the weekend which many criticized the problems caused by this over-spread release; The game actually was unreachable mostly on Saturdays, bringing up server errors whenever players tried to connect. As a result of this, OurMine carried out a DDoS attack on Niantic’s servers as a blame for the outage.



A stated by the representative of OurMine, the group’s main objective is to protect Niantics’s severs . So the best way to do so is to overflow the traffic. OurMine mentions that it will stop to attack Pokémon GO once someone from Niantic contacts them otherwise the attacks will remains until they get bored. They should be taught how to protect their servers, says OurMine. What’s happening with Niantic is similar to Lizard Squad hacks that attacked Xbox Live and PSN. 

 Niantic’s engineers are not likely to crawl back to some internet security rogues for security tips. Far from OurMine, PoodleCorp, a separate group , decided to schedule a Pokémon GO DDOs for august 1st hoping that Niantic will make a move toward controlling its servers .