Centry

Status
Not open for further replies.

Myna

Level 10
Thread author
Verified
Jan 16, 2014
452
Centry
WARNING: THIS IS EXPERIMENTAL SOFTWARE. IT IS LIKELY TO CONTAIN BUGS.

Updates
If you have already installed Centry, please run git pull to update to the latest version. The latest updates make it much more secure against replay attacks.

Introduction
Centry is a panic button intended to protect users against Cold Boot Attacks, Direct Memory Access Attacks and other live system threats. Centry is most effective when deployed on systems with Full Disk Encryption and without a swap/page file. The panic function can be activated through the GUI or through a network request (through browser, smartphone, etc). Upon recieving the panic instruction, Centry will attempt to remove sensitive keys from memory, securily overwrite the RAM and then force a shutdown.



Features
  • User-friendly GUI interface
  • When in panic mode, Centry can:
    • Lock the screen
    • Unmount all Truecrypt disks and clear the password/keyfile cache
    • Write zeros to RAM using sdmem (on UNIX-like systems)
    • Force an ACPI shutdown (equivilent holding down the power button)
    • Propogate the panic signal to all other nodes in the network
  • Settings to improve security on ECC-enabled systems
  • Extensively customizable
  • Compatable with Linux and Mac OS; with significantly more security in Linux.
Installation
Linux
For significantly improved security install the secure-delete package. On Ubuntu/Debian:

sudo apt-get install secure-delete

Then download and run Centry as root:

git clone https://github.com/0xPoly/Centry.git
sudo python centry.py "password"

Contributors and License
This is a free open-source program distirbuted under the GNU General Public License. Comments, suggestions and pull requests are all heartily encouraged.


Product Homepage: https://github.com/0xPoly/Centry
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top