07 Apr

iOS 9.3 Jailbreak with Pangu

Lucky for everyone that is searching for a method to jailbreak iOS 9.3, pangu has made a beta tool to make it easy to jailbreak your device.

Although this works on 9.3, make no mistake, this wont work on 9.3.1.

A bit about the source:

Semi Jailbreak is also available for iOS 9.3 users.

Now Pangu browser based Jailbreak (Semi) is available for Jailbreak this iOS 9.3 version. Users can download the Cydia to iOS 9.3 using the Semi Jailbreak. SemiJB and TaiG 9 Jailbreak are only available options to Jailbreak iOS 9.3 at this time. Unfortunately, both of these processes don’t provide fully jailbreak functions to iOS 9.3 users.

How to jailbreak iOS 9.3:


Prepare to Jailbreak
Enable Airplane mode , disable touch id / passcode and Find My iPhone features as the previous jailbreak

Start the Jailbreak process

We recommend watching the video before start the process.
(1) Connect your device to the computer. It will detect your device as iOS 9.3
iOS 9.3 Pangu icon
(2) The process will start. Then Pangu app icon will create on your springboard.
Don’t tap it at this time.
(3) Then the device will reboot, and the process will continue.
(4) Ok. Now you have to open the Pangu app.
(5) You must allow Pangu app to access to your messages.
(6) Then tap the home button and open Pangu app again.
(7) iOS 9.3 jailbreak process will continue. Then your device will restart again.
(8) Finally red “jailbreak complete” message will display on the Pangu tool.
iOS 9.3 Jailbreak
(9) Now you have to setup the Cydia. Open the Cydia and wait few seconds.
(10) Connect your iOS 9.3 device to computer

Backup device data before starting process

Pangu 9.3 Cydia
03 Aug

Untethered iOS 8.4 jailbreak with TaiG on OSX

TaiG Jailbreak for Mac, currently at Mac version 1.0.0, is designed from the ground up to support versions of iOS mobile operating system from 8.1.3 to 8.4. You can download the tool from the project’s website.How to JailBreak your Device?

The process of jailbreaking the device is so easy; anyone can do it.

Download and Install the App

Disable ‘Find My iPhone’ on your device’s iCloud settings before proceeding

Plug your iPhone, iPad, or iPod Touch to the Mac Computer

Run the Jailbreak, and Install Cydia

A reboot or two later, and your device will be jailbroken

The method of TaiG jailbreak is Untethered – a jailbreak where your iOS devices do not require any reboot every time with a connection to an external device capable of executing commands on the device.

01 Jun

How To – Windows 10 Free Upgrade on Windows 7 and 8 (8.1)

If you run Windows 7, 8, 8.1 on your computer you might have noticed a windows icon on your task-bar probably today.

windows10 taskbar




When you click on this icon, you will get a popup screen of the following:

At which point you can then click on Reserve and put in your email address.

Windows 10 will then be downloaded to your computer for free when it comes out.

Somehow this is even coming up on pirated copies of Windows, so not sure if this a technique that Microsoft are using to keep track of the amount of people that would actually be using Windows, as sometimes it might be hard to keep track of number of users using pirated versions of Windows.

We are yet buffled the reason behind Microsoft releasing a free upgrade to Windows 10 though.

How would this work if your computer crashes and you need to reinstall windows? Will you get a license number for reinstallations?

04 Sep

Barclays Down by £500 Million Thanks to Spanish Division

Seems like Barclays is trying to reform and to do so they have done a clearout on their operations to Caixa.

Here is the report from The Guardian:

Barclays has made a loss of £500m on the sale of its Spanish banking division as it follows plans to shed unprofitable businesses.

The British bank has sold its retail banking, wealth, investment management and corporate banking business in Spain to Caixa Bank for €800m (£632m).

Caixa Bank, Spain’s third-largest lender, will take on 262 branches, 2,400 employees and 550,000 customers once the deal is completed this year. Barclays, however, will keep its investment banking operations and credit card business in Spain.

The sale is part of the turnaround strategy of chief executive Antony Jenkins, who wants to restore profitability by selling off some of its struggling European divisions and cutting costs.

“We were clear that this business, while not central to Barclays’ strategy, could be attractive to another owner and today’s announcement reflects that perspective,” Jenkins said. “We remain on track to rebalance Barclays as part of our strategy to deliver sustainable returns for our shareholders.”

Barclays confirmed it had also sold its UAE retail banking business to Abu Dhabi Islamic Bank. On this deal, Barclays is making a pre-tax gain of £119m on the sale of a portfolio of mortgages, unsecured credit and deposits.

Barclays will make a loss of £500m on the Caixa deal; £400m will be booked in the third quarter of 2014 and £100m in the final quarter.

Barclays expanded rapidly into Spain in the early part of the last decade, buying Banco Zaragozano for €1.1bn in 2003. The banks operated under a Barclays brand name but ran into problems when the Spanish housing market collapsed, prompting the deep recession.

According to Reuters, Barclays shut or sold 161 branches in Spain last year and cut around a third of its workforce in the country.

In May, Barclays announced it was cutting 19,000 jobs worldwide, including a dramatic reduction in its investment banking arm, to focus on areas where it had a competitive advantage.

04 Sep

Bypassing Firewall in 20 seconds with hwfwbypass

Hikit rootkit “creates a new network interface (like software firewalls do), ‘catches’ the traffic sent to the legit server service, and if the backdoor communication is found in the traffic, this data flow is handled differently, not by the legit service. At the hardware firewall level, the traffic will be allowed, as it is using the same destination TCP port as the legit service. The idea of the hwfwbypass tool was born.”

Attackers having admin privileges on Linux/Windows systems can mess with the hardware firewall between the attacker and the server, and use the same ports for backdoor communication as it is allowed in the firewall (e.g. 22, 80, 443, 3389, etc). First, the attacker has to exploit the server, and only after that can bypass the firewall. If you are looking for a tool to bypass a firewall before exploiting a server, this tool won’t help you.

Balazs released the “hwfwbypass” tool, a program can that bypass hardware firewalls. It is “a network filter kernel driver, based on the Windivert project. Admin level privileges are needed to install the tool. The kernel driver is digitally signed with a trusted signature, thanks to Nemea software development and the Windivert project.” There is also a Metasploit post module if you “are lazy.”

Balazs suggested:

Step one to bypass hardware firewall
  1. Drop malware into the RDP server.
  2. Bypass AppLocker, by modifying the AppLocker policies defined in the local Group Policy Object (GPO) in order to execute any code.
  3. Elevate to admin privileges.
  4. Bypass hardware firewall.

Benefits to using the hwfwbypass “solution” include:

  • It is using Windows supported network filter, thus this functionality will work in the future.
  • It ships with valid signed driver.
  • Any kind of backdoor traffic can be used with the tool. I have tested it with Netcat, Meterpreter TCP bind shell and a RAT with bind shell.
  • The server side does not need any specific tools, only the hwfwbypass and the RAT/bind shell. On the client side, one might need NetCat.

Lessons for the blue team defenders, Balazs said, include the knowledge that restricted remote desktop still presents a “real interface for malware infection.” He added that you should use a next-generation (application/protocol-aware) firewall instead of port based one. He advised blue team members not to trust your firewall logs.

For the red team attackers, he released two tools for post exploitation; one drops malware into the remote desktop. If you have admin privileges on a Windows server, you can bypass/fool hardware firewalls using his driver.

Balazs also noted, “If there is a network address translation (NAT) between the attacker and the server, the tool won’t work.”

Balazs said, “My tools are generic meaning that they work against Windows server 2012 and Windows 8, and they work with RDP or other remote desktops. The number of problems you can solve with them are endless, e.g., communicating with bind-shell on web server behind restricted DMZ.”

13 Aug

VMware Workstation Technology Preview 2014

I am a lover of VMware workstation, have been from the very start.

It is said that before anything is applied to VMWare ESX, everything will be applied to workstation and fusion first.

So here it is:

VMware Workstation Technology Preview 2014


Updated! The VMware Workstation team is excited to announce the VMware Workstation Technology Preview – July 2014 release! This is an update to the Technology Preview May 2014 release with numerous bug fixing and feature optimization, we would like to keep hearing your feedback on those changes.

What’s New

New OS Support – The popularity of Windows 8 is still growing especially after the Windows 8.1 release. We have been running the Windows 8.1 Update 1 since the date it was released and continuing to improve our support for it. We would appreciate  your comments and suggestions for making it easier to run the latest Windows 8 / 8.1 versions in a virtual machine. Of course we are running the latest Ubuntu, Fedora, RHEL, OpenSUSE and other Linux distros as well and we would appreciate your feedback on their performance too.

VMware Hardware Version 11 – This Technology Preview introduces hardware Version 11.  Hardware versions introduce new virtual hardware functionality and new features while enabling VMware to run legacy operating systems in our virtual machines.

CPU enablement – While this Technology Preview still supports creating and running virtual machines with up to 16 virtual CPUs, we extended the support of the latest generation of CPUs. The microarchitectures of both Intel Haswell and AMD Jaguar are fully supported, and those of Intel Broadwell and AMD Steamroller have been made to be compatible. We are interested in the feedback of creating and running virtual machines on those latest CPUs.

Virtual xHCI controller – virtual xHCI controller was added in virtual hardware version 8 and it conforms to version 0.96 of the Intel xHCI specification. In this version of virtual hardware, we updated it to be compliant with the latest version 1.0 of the specification. Better compatibility and performance of USB 3.0 devices is expected, we would love to see the results with your USB devices.

Dedicated graphics memory for guest operating system –  In order to make our customers be able to precisely control the memory allocation when there are multiple virtual machines up running, the new virtual hardware version makes the guest video memory backed by their own dedicated chunk, which could be allocated / configured by the user.

Graphics memory configuration – For those virtual machines with virtual hardware version 11, you can adjust the maximum graphics memory on a per virtual machine basis. Go to Virtual Machine Settings -> Hardware -> Display, you can see the graphics memory dropdown and make adjustment there. This allows user to gain better graphics performance if the host has large physical memory and the work being performed in the VM requires big graphics memory. In this latest Technology Preview release, the default Graphics memory is also updated base on the Guest OS you installed, in order to provide the best graphics performance.

Windows 8 Unity mode improvements – When you run a Windows 8 / 8.1 virtual machine on a Windows 8 / 8.1 host in Unity mode, the user experience has been improved especially when you try to go to the Start screen of the host or navigate to the Start screen of the guest.

Boot virtual machine with EFI – As an alternative of BIOS, EFI is supported by more and more operating systems including Windows 7, Windows 8/8.1 and many Linux distros. This Technology Preview version allows you to create and boot the guest operating system with EFI. In Technology Preview July 2014, user can choose booting with EFI during the VM creation instead of making the change after the VM creation. Select Custom (advanced) wizard when create new VM and follow the steps to select EFI instead of BIOS.

Experimental performance tuning for VM suspend and resume – In this Technology Preview release, you can enable an experimental performance tuning specifically improve the VM suspend and resume time consumption. To enable the feature, add the following lines to the VMX and ensure the VM is set to Hardware Version 11.



This performance improvement applies to both encrypted VM and non-encrypted VM. In our in-house testing, suspend and resume are improved up to 20% and 60% respectively. We highly recommend you to try this feature and leave your feedback.

Experimental support for running the vSphere Beta in a virtual machine – See this webpage for more details of the vSphere Beta Program.

General stability, application compatibility and usability

Installation Notice

If you are running workstation on Chinese or Japanese Windows host, please make sure entering the Tech Preview License Key during installation (see the 1st known issue listed below for more details).

To run this Technology Preview, you must uninstall previous versions of Workstation before installing this software.  Please note that the drivers included in this preview have NOT been signed and will prompt you accordingly during installation.

The system requirements for this Technology Preview are mostly same with those for Workstation 10, with the following differences:

  • All 32-Bit Host Operating Systems are no longer supported
  • Windows XP 64-Bit, Windows Vista 64-Bit, Windows Server 2003 64-Bit and Windows Server 2008 64-Bit (not including R2) are no longer supported as host operating system

See this VMware Workstation Document for more detailed system requirements.

In rare circumstances, it might be necessary to recreate a virtual machine created in this Technology Preview in a subsequent version of the product. This Technology Preview includes changes to the underlying virtualization platform, which is under active development. There are no guarantees that changes in this preview will be forward compatible with other VMware software, nor that these changes will be present in future supported releases of VMware Workstation.

Uninstallation Notice

To uninstall the VMware Workstation Technology Preview:

  1. Uninstall VMware Tools from each virtual machine used with the Technology Preview
  2. Ensure all virtual machines are downgraded to be compatible with an earlier version of VMware Workstation (VM > Manage > Change Hardware Compatibility…)
  3. Exit the VMware Workstation Technology Preview
  4. Remove VMware Workstation Technology Preview via standard application uninstallation procedures

Known Issues

  • On a Chinese or Japanese Windows host, Workstation can’t be properly launched if a valid Tech Preview license key wasn’t entered during installation
  • When you create a RHEL 7 virtual machine, manual installation is required
  • Easy Install for some Linux Guests with virtual EFI doesn’t work properly
  • Graphic memory configuration can not be adjusted for Shared VM
  • In RHEL 6.5 virtual machine, VMware Tools cannot be updated if you have the Technology Preview version installed already, a guest reboot is needed
  • Unable to detect smart card in the USB Passthrough mode on Linux host
  • When creating an ESXi VM the list of supported ESXi versions is incorrect
  • This release has not been localized, only US English is supported
  • Additional checks (debugging) have been enabled to aid troubleshooting. Performance of this release is likely to be significantly slower than shipping versions of VMware Workstation.

12 Aug

Robin Williams commits suicide at the age of 63

Everone has heard by now that Robin Williams in dead, he committed suicide by the age of 63.

Some people have been nice enough to send messages and spread the word around the globe about his passing away and left nice messages, but there are yet to be some people that would say opposite things, such as:

  • He was a pedophile and should be dead.
  • He wasnt a very funny man
  • He was an angry man
  • Very hard to deal with

And other comments that would be propagated around the internet.

I think its rather strange that a lot of his movies contained parts of production where either his wife and son in scene would commit suicide during their roles. Now the case turns true but on his associated real life.

To me, he was a great entertainer – comic of the era.

I do agree that not all of his movies were great, but I do have to admit that the majority of them were great, specially the ones that were not supposed to be comical, those are the ones when you really saw what Robin Williams was like.

Movies such as:

  • Insomnia
  • One Hour Photo (specially this one, he was a depressed man)
  • The final cut

He was obviously filming other movies during the period of this year which I can imagine that would get canceled, as you can see from the IMDB link: http://www.imdb.com/name/nm0000245/

Either way, you will be missed Robin, whatever people say, the good and bad of you, you were great in your own way, some loved you and some hated you, but thats life, you cant get everyone to like you.

Rest in peace.

12 Aug

Microsoft Video Technology Smooths Moving Camera

We present a method for converting first-person videos, for example, captured with a helmet camera during activities such as rock climbing or bicycling, into hyper-lapse videos, i.e., time-lapse videos with a smoothly moving camera. 

At high speed-up rates, simple frame sub-sampling coupled with existing video stabilization methods does not work, because the erratic camera shake present in first-person videos is amplified by the speed-up. 

Scene Reconstruction
Our algorithm first reconstructs the 3D input camera path as well as dense, per-frame proxy geometries. We then optimize a novel camera path for the output video (shown in red) that is smooth and passes near the input cameras while ensuring that the virtual camera looks in directions that can be rendered well from the input.
Next, we compute geometric proxies for each input frame. These allow us to render the frames from the novel viewpoints on the optimized path.

Proxy Geometry

Stitched & Blended
Finally, we generate the novel smoothed, time-lapse video by rendering, stitching, and blending appropriately selected source frames for each output frame. We present a number of results for challenging videos that cannot be processed using traditional techniques.

We are working hard on making our Hyperlapse algorithm available as a Windows app.
Stay tuned!


PDF (35.0 MB)

Click here
High-res Video
Demo (148 MB)
Technical (287 MB)

This video provides a more technical explanation of our system: 


Tag: Microsoft Video Technology Smooths Moving Camera

12 Aug
nokia 130

Microsoft Nokia 130 Dual-Sim for £15 To be Released

Microsoft has decided to release in the near future a phone that you would have used a couple of years ago.

Positive points:

  • Small
  • Cheap
  • Dual-Sim
  • Stable
  • MicroSD cards accepted

Negative points:

  • No internet connection
  • Released only in a few countries (China, Egypt, India, Indonesia, Kenya, Nigeria, Pakistan, the Philippines and Vietnam)



Tag: Microsoft Nokia 130 Dual-Sim for £15

16 Jul

CNET user database on sale for 1 Bitcoin – $600

Russian hacker (arent they just the best? :)) w0rm has decided to release the cnet database for a sale of 1 bitcoin which is currently worth roughly $600.

w0rm is widely known for hacking companies such as Adobe and BBC back in 2013.

Initially he mentioned he would like to make the internet a safer place and advice cnet how to secure their servers.

Cnet had no comment about it, so it seems he has decided to sell the database to interested buyers.


Like w0rm I used to go around finding holes in systems and advice the companies how to close them, the only problem is the people that run the companies have huge egos and dont like to know that there are holes in their system, so instead of grabbing free advice they threaten hackers with lawyers.

Companies should instead take free advice from hackers and secure their systems, rather than have an attitude of no-one is to find our holes.

It can simply be put as follows:

You are at your house and left the door open.

A person walking down your street, notices you left the door open and rings the bell to let you know that you left the door open for others to just come in a steal your things.

You as the owner should therefor be thankful to that nice person and make sure that you shut your door! And dont make the same mistake twice.

Rather than shout at the person that was being nice and telling them to f*ck off.


OK grunt over 🙂

Read more at cnet