Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.
The solution of this problem is to format the Memory Card again with FATfile system through computer because your mobile cant read it any more so you cannot format it from your Mobile.
To format your Memory Card with FAT (FAT16) file system :
Plug-in your Memory Card into your computer.
Wait till computer detects the Memory Card.
Now note down the Drive Letter of your Memory Card
Note: In this tutorial we will assume that drive letter of your Memory Card is I: but you should replace it with actual drive letter of your memory card.
Now run Command Prompt by Typing CMD and hitting Enter in Start>>Run or by typing CMD and hitting Enter key after pressing WinKEY+R.Windows 7 and Vista users should type CMD in Start’s Search Box when Command Prompt appear, right click on it and run as administrator.
Once Command Prompt launches, Type I: /fs:FAT and hit enter.
Please note that in above tutorial we assumed that I: is drive letter of memory card but this could not be same in your case so make sure to replace I: with actual drive letter of your Memory Card. Also Please note that if you format anything your data will be erased.
Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays.
A new tool presented at the Black Hat DC 2009 conference by Moxie Marlinspike proves to be a formidable foe against secure login schemes. Always trying to stay on top of the game, Click Death Squad decides to give this tool a whirl and see what the buzz is all about. This attack is particularly crafty because it acts as a Man in the Middle, keeping an eye on HTTPS requests and then mapping them to HTTP look alike setups. If a person were operating on a wireless access point that had been broken into, the results can be devastating. You have a box running sslstrip which has port forwarding enabled and is actively spoofing ARP on a LAN. This computer is the jump off point, which will fake out the wireless router into redirecting HTTPS requests, modifying them and passing them on to the victim. Features include a fake "lock" icon and selective logging capabilities, which provide great flexibility when sniffing traffic. The example we use shows how a MySpace "secure" login can be easily captured using this attack. Props to Moxie Marlinspike for making this tool available to the public.
Add support for 2048 and 4096 bit Diffie-Hellman Fix syslog error messages Fix threading issues in daemon mode . Fix address family check in netfilter NAT lookup Fix build on recent glibc systems Minor code and build process improvements