VBS Encoder

VBScript방식으로 인코드된 다음 코드는 scrdec18.exe[1]을 이용해 디코딩이 가능 하다. <%#@~^j28BAA==@#@&@#@&ifb:PDt�)mD~~/:khnBPlk2nmYtB~n\bVKmOlsS,/OD~Cm0fGGM~PWdK(SPkCo~~S/o@#@&@#@&idKb:nP{PPrs+D@#@&dDt+z^O’,I�;;+dOvJOt�)

Advertisements

Ubuntu Xwindow Installation

Ubuntu Xwindow Installation

By | Published August 19, 2012

Which one would work for me?

 

This blog helped me. http://blog.naver.com/ssamba/163333072

 

==================

sudo apt-get install xinit
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install ubuntu-desktop

 

======================

 

[soriel01@localhost] sudo su –   (관리자모드로 변환)
password :                               (root 권한 password 입력)
[root@localhost] apt-get update  (새로운 업데이트 확인)
[root@localhost] apt-get dist-upgrade     (업데이트)
[root@localhost] apt-get install xorg gdm (Graphic Mode 설치)
[root@localhost] apt-get install gnome-session gnome-menus gnome-panel metacity nautilus
(Gnome 설치)
[root@localhost] apt-get install [다음 Package 설치]
gnome-applets
gnome-control-center
gnome-volume-manager
libsmbclient
gnome-screensaver
menu
network-manager-gnome
gnome-utils
gnome-system-tools
gnome-netstatus-applet
gnome-nettool
libgnomevfs2-extra
——-<다음은 유용한 Package>
gnome-terminal
gedit
firefox
——-<다음은 데스크탑 테마 Package>
ubuntu-artwork
ubuntu-sounds
human-theme
usplash-theme-ubuntu

[root@localhost] apt-get install gnome-app-install update-manager restricted-manager
(패키지 관리자 설치)

[root@localhost] /etc/init.d/gdm start   (그래픽 모드로 고고씽)

KasperskKaspersky is asking for help?

The Mystery of Gauss : Kaspersky needs help Decrypting Gauss Malware

Posted by EHN Reporter on Wednesday, August 15, 2012 | 0 comments 

       

Researchers at Kaspersky Lab are asking the public for help in cracking encryption of the recently discovered malware Gauss.

“Perhaps the most interesting mystery is Gauss’ encrypted warhead. Gauss contains a module named ‘Godel’ that features an encrypted payload. The malware tries to decrypt this payload using several strings from the system and, upon success, executes it. Despite our best efforts, we were unable to break the encryption. ” Securelist blog post reads.

“So today we are presenting all the available information about the payload in the hope that someone can find a solution and unlock its secrets. We are asking anyone interested in cryptology and mathematics to join us in solving the mystery and extracting the hidden payload.”

The payload is delivered to machines via an infected USB stick that uses the .lnk exploit to execute the malicious activity. In addition to the encrypted payload, infected USB sticks deliver two other files that also contain encrypted sections that Kaspersky has been unable to crack.

 
“The code that decrypts the sections is very complex compared to any regular routine we usually find in malware,” Kaspersky writes. Kaspersky believes one of these sections may contain data that helps crack the payload.If you are a world class cryptographer or if you can help kaspersky with decrypting them, you can contact Kaspersky by e-mail: theflame@kaspersky.com.