I'm proud to announce the release of libhijack 0.6.1 for FreeBSD and Linux. This is mainly a maintenance release with one new feature for FreeBSD users. This release fixes bugs relating to writing data to the child process via ptrace. The new feature for FreeBSD users is the ability to resolve the RTLD's symbols. This wasn't properly being done before. You can download the new release from GitHub by going to the Tags page and downloading the 0.6.1 tarball or right from SoldierX. Read below if you want a technical reason for the new feature for FreeBSD.
While I've been lurking in the shadows, I've been working hard on my hobby projects. I've recently fixed a number of bugs and ported my test suites from 32bit linux to 64bit FreeBSD in libhijack. I will be speaking at BSDCan this weekend about runtime process infection and I'll be releasing a new maintenance release of Libhijack. For those who don't know, BSDCan is a conference held in Ottawa, Ontario, Canada. The presentations focus mostly on BSD-centric topics. My presentation will include a lot of the same material from Defcon 19 plus additional material regarding the challenges porting libhijack to FreeBSD. I'm excited to speak and if you're in the area, come see my presentation.
We are now online from the new server. I have disabled the web IRC client at the moment for security reasons. I am now performing various tests on the site to make sure that it is faster than ever. If you find any problems, please don't hesitate to post them as a comment or contact me.
We have yet another server being rolled out next week. This one has 32 cores, 32 GB of RAM, and SAS solid state hard drives. This server should be enough to keep up with our current and (hopefully) future traffic for at least the next few years. On a related note, due to the server work - we will be delaying the wallpaper contest for another month. The winner will be announced at the end of the May. Please keep those submissions coming, I will be getting them online soon
As most of you know, we just returned from a day long CISPA blackout. While this bill has very little chance of passing, we still felt it important to go black as not many sites went black in opposition today. Unfortunately, due to CISPA not being bad for business like SOPA and PIPA were - there are a number of companies supporting it. Those companies include (but are not limited to) Comcast, AT&T, Verizon, McAfee, and Oracle, Technet (members include Facebook and Google), and Microsoft. It's sad that these companies only look out for #1 and don't stick up for the people.
Look for us to have an active summer as most of us will have way more free time after May.
...and thus, another April Fools day has come and gone for our part of the world. We hope you enjoyed a bit of light humor this year. Usually I do come up with the annual post, but this year I was bedridden and drawing a blank on what we should do so RaT came up with something and we ran with it.
As many of you know, Amp has been a huge fan of music games for a very long time (see this and this). Most of the crew knew something was wrong when Amp was still keeping gamer hours (6pm-6am), but nobody expected it to lead to this. At approximately 10:00am EST today, Amp was found dead in his apartment. The cause of death was a move the music gaming community refers to as "speed balling". No, not mixing heroine and cocaine - but rather mixing masturbation and music games. The game of choice is believed to be DDR, but there was a beat mania controller nearby as well - so police are still investigating the matter. Let this be a warning to all parents to keep a close lookout for a combination of music games and hentai.
Edit: We received a message from the person who found Amp dead today. They are clearly shaken by this ordeal and have wished to remain anonymous.
"Today I was supposed to meet Amp to finish work on some code. When I stopped by his apartment, I saw his door was cracked open and he was on the ground lifeless. Recently, he was withdrawing more, but still was more than willing to work with other people. We could tell something was wrong, but we didn't know that he had these issues. I'm very shaken by what happened as he had so much potential and its all essentially been thrown away. Today, I lost a great team player and a friend as his vices finally caught up with him."
As much as this isn't newsworthy, I think it's funny enough to share with everybody. Our own lame VB/Vzone/Veronica/veromegafree just doesn't give up with the same lame DoS attack that was apparently given to it (he/she) by ChannelZeroYT (see twitter). At an almost daily to weekly rate, VB hits us with the same attack. Clearly the attack stopped working after the first time (3 minutes of outage), but this lamer just keeps trying. VB had left the site for several weeks after TheFixer hacked their ISP and setup a remote pcap (many lulz were had). Please take a moment out of your day to laugh at the failed efforts of VB. Again I pose the question, will a real hacker with 0day please stand up?
Most recent log snippet: