<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8144177571624445356</id><updated>2024-09-14T02:37:01.732-07:00</updated><category term="windows hacking"/><category term="Linux Hacking"/><category term="Programming"/><category term="Tools"/><category term="Wireless Hacking"/><category term="social-engineering"/><category term="Apple"/><category term="Forensics"/><category term="Cryptography"/><category term="Password Hacking"/><category term="Virology"/><category term="Network"/><category term="Security"/><title type='text'>Hacking Base</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default?start-index=26&amp;max-results=25'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>161</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-1178534694379072319</id><published>2007-11-27T16:35:00.001-08:00</published><updated>2007-11-27T16:37:34.727-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virology"/><title type='text'>the Art of Virology 03h</title><content type='html'>&lt;p&gt;…finally after three months of inactivity (exams, parties and so) I made some time to write this virus and this article… so for the ones who read this series… ENjOY =)&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The Old School Virus&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Yeah, I gave up writting infant-b because even the [a] version was full of bugs, and had to logicaly restructure the code so I could implement the things I promised for this virus, which bears the name Old School (oldskl)…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;A mutant?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;I said that in this virus I’m going to implement and encryption scheme, xor based one and mutational (this I forgot to mention). The basics of the XOR is that when comparing two bits, if there are the same the result is 0 (zero) and if different (1).&lt;/p&gt; &lt;p&gt;&lt;code&gt;&lt;br /&gt;0 xor 0 = 0&lt;br /&gt;0 xor 1 = 1&lt;br /&gt;1 xor 0 = 1&lt;br /&gt;1 xor 1 = 0&lt;br /&gt;&lt;/code&gt;&lt;/p&gt; &lt;p&gt;Well also you could use other functions as rotate (left or right), increase/decrease, and, or, not and any other variation of these… The mutation of the virus happens before every infection. It simply adds 1 to the key (which is of dimension byte maxvalue = 255) until it reaches 0FFh (255), moment when it resets the key to 1, not 00 because then the virus would be no more encrypted. So it has 253 posible states (255 and 00 are out)…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The famous transversal infection (.. or Dot Dot)&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;I had to implement a multi-directory infector. Not all the files are in one single directory, so I implemented the dotdot technique, nothing fancy it works as a simple cd .. command… it’s a clasic …&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Multiple infections per run&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Simple implementation, but &lt;q&gt;heavy&lt;/q&gt; result…&lt;br /&gt;Some info on how it works… I used a tree type infection, just to make it funkier…&lt;/p&gt; &lt;p&gt;]The first infection wave infects 5 files, including itself (the first)…&lt;/p&gt; &lt;p&gt;]]The second file infects other 4 files&lt;/p&gt; &lt;p&gt;]]]The third file infects other 3&lt;/p&gt; &lt;p&gt;]]]]The fourth other 2&lt;/p&gt; &lt;p&gt;]]]]]The fifth just 1&lt;/p&gt; &lt;p&gt;When these infected files are executed, the above scheme starts over again, but decreasing from the number the have. So after another infection wave the second infected files infects other 4 files which infect as follows:&lt;/p&gt; &lt;p&gt;]The first 3 files&lt;/p&gt; &lt;p&gt;]The second 2 files&lt;/p&gt; &lt;p&gt;]The third 1 file&lt;/p&gt; &lt;p&gt;]The fourth 1 file&lt;/p&gt; &lt;p&gt;I think you got the idea… After going to 1 infections per run it stays there and infect just 1 file per run…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Stealth&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Actually semy stealth because it only saves the time and date of the file and save the attributes of the files (because it resets them)… Why does it reset the attributes of the files? Because this way it can infect read-only files…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;COM’s&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;You need some COM files to play with this baby… so I created a batch file which will automatically create you ten COM files per run (5 normal, 5 read-only)… Here is the code for the createCOM.bat:&lt;/p&gt; &lt;p&gt;&lt;code&gt;&lt;br /&gt;@echo off&lt;br /&gt;debug &lt;&gt; nul&lt;br /&gt;copy com.com 1.com &gt; nul&lt;br /&gt;copy com.com 2.com &gt; nul&lt;br /&gt;copy com.com 3.com &gt; nul&lt;br /&gt;copy com.com 4.com &gt; nul&lt;br /&gt;copy com.com 5.com &gt; nul&lt;br /&gt;copy com.com 6.com &gt; nul&lt;br /&gt;copy com.com 7.com &gt; nul&lt;br /&gt;copy com.com 8.com &gt; nul&lt;br /&gt;copy com.com 9.com &gt; nul&lt;br /&gt;copy com.com 10.com &gt; nul&lt;br /&gt;del com.com &gt; nul&lt;br /&gt;attrib +R 1.com&lt;br /&gt;attrib +R 3.com&lt;br /&gt;attrib +R 5.com&lt;br /&gt;attrib +R 7.com&lt;br /&gt;attrib +R 9.com&lt;br /&gt;@echo off&lt;br /&gt;&lt;/code&gt;&lt;/p&gt; &lt;p&gt;Besides of this BAT file you also need the following file named &lt;b&gt;gencom&lt;/b&gt; without any extension:&lt;/p&gt; &lt;p&gt;&lt;code&gt;&lt;br /&gt;a100&lt;br /&gt;mov ah, 4C&lt;br /&gt;int 21h&lt;br /&gt;nop&lt;br /&gt;nop&lt;br /&gt;nop&lt;br /&gt;nop&lt;br /&gt;nop&lt;br /&gt;nop&lt;/code&gt;&lt;/p&gt; &lt;p&gt;n com.com&lt;br /&gt;rcx&lt;br /&gt;A&lt;br /&gt;w&lt;br /&gt;q&lt;br /&gt;&lt;/p&gt; &lt;p&gt;I advice you to make 2 directories: one Virus and a subfolder Start… Place the virus you assemble in start, where you also run createCOM.bat, and also run createCOM.bat in the folder Virus… Atention if the file gencom isn’t in the same directory with the bat, then no com files will be created..&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Give me the virus&lt;/strong&gt;&lt;br /&gt;Again don’t spread this virus… It would an ok virus about 20 years ago, but not it’s god damn old for these times…&lt;/p&gt; &lt;p&gt;Oldskl by backbone: &lt;a href=&quot;http://www.darknet.org.uk/content/files/oldskl.asm&quot;&gt;oldskl.asm&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The ending of 03…&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;If you understand everything until now than you know the basics of computer viruses… If not don’t panic (i didn’t also understand viruses at the beginning) the following article will be a fully detailed one about every function we used… for the ones that have learned a bit of assembly… for the others: check my first article and get a good assembly book to learn…&lt;/p&gt; &lt;p&gt;EOF&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/1178534694379072319/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/1178534694379072319' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1178534694379072319'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1178534694379072319'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/art-of-virology-03h.html' title='the Art of Virology 03h'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-1173027069722418785</id><published>2007-11-27T16:35:00.000-08:00</published><updated>2007-11-27T16:36:53.711-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virology"/><title type='text'>the Art of Virology 02h</title><content type='html'>&lt;p&gt;This is the one and only (and first article) which will present you the source code of a virus on Darknet, and a lame one too &lt;img src=&quot;http://www.darknet.org.uk/wp-includes/images/smilies/icon_smile.gif&quot; alt=&quot;:)&quot; class=&quot;wp-smiley&quot; /&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Theory again…&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;First should mention a couple of things which haven’t been specified till now. This virus is going to be an appending virus:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt; An appending virus is a virus that writes all of his code to the end of the file, after which it writes a simple jump to the code at the start of the file &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;I will use this method, for first in the virus i’ll present here, maybe later I will adopt another technique as EPO:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Entry Point Obscuring is a method which inserts the entry point of the virus somewhere in the host file, where it can do an interception of the code for later replication, but not at the start. &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;…but definitely not overwriting viruses:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;An overwriting virus has a simple routine to overwrite the host file, thus being easily detected because of the fact that infected files in 99% of cases won’t run anymore &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;&lt;strong&gt;Back to reality&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;So my first virus is called infant-a, because it only does a single thing (like an infant); also it is a DOS COM infecter, so you won’t have much trouble with it. What to say more, the source if fully commented, and if you have read the book I have suggested you in the 00h article than you won’t have any problems in understanding it.It is not detected by Avira anti virus, check it with other anti viruses and tell me if it found and under which name, oh yeah Kaspersky doesn’t find it either. &lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;em&gt;BTW: don’t compile and infect other files (computers) with it because I will look lame not you&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;The brilliant (and simple code) follows: &lt;a href=&quot;http://www.darknet.org.uk/content/files/infant-a.asm&quot;&gt; infant-a&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;How to play with it?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Everything goes in 3 steps, or 2 depends on you…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;1st step - dummy com files&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Enter in DOS mode (run cmd from Windows run) and write the following lines:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&lt;br /&gt;C:\ &gt;debug&lt;br /&gt;-a100&lt;br /&gt;xxxx:0100 mov  ax,4c00&lt;br /&gt;xxxx:0103 int    21h&lt;br /&gt;xxxx:0105 ^C&lt;br /&gt;// this is a comment ^C means CTRL+C &lt;img src=&quot;http://www.darknet.org.uk/wp-includes/images/smilies/icon_smile.gif&quot; alt=&quot;:)&quot; class=&quot;wp-smiley&quot; /&gt;&lt;br /&gt;-rcx&lt;br /&gt;CX 0000&lt;br /&gt;:5&lt;br /&gt;-n dummy.com&lt;br /&gt;-w&lt;br /&gt;Writing 00005 bytes&lt;br /&gt;-q&lt;br /&gt;C:\&gt;copy dummy.com uninfectedFile.com&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;2nd step - compile the virus&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;For this one you need TASM &amp;amp; TLINK, google to get them; if you have them enter the following lines supposing infant-a.asm is the virus:&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&lt;br /&gt;C:\ &gt;tasm infant-a.asm&lt;br /&gt;C:\ &gt;tlink /t infant-a.obj&lt;br /&gt;//comment: /t tells tlink to make it a dos image file = com file&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;3rd step - optional&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Download &lt;a href=&quot;http://dosbox.sourceforge.net/&quot;&gt;DOSBox&lt;/a&gt;, install it and use the following commands (after starting DOSBox):&lt;/p&gt; &lt;pre&gt;&lt;code&gt;&lt;br /&gt;Z:\ &gt;mount C:\ Folder\ Where\ The\ Virus\ And\ Dummy\ COM\ Files\ Are\ Located c:&lt;br /&gt;//comment: c with : (c:) or without I don&#39;t remember exactly&lt;br /&gt;Z:\ &gt;C:&lt;br /&gt;C:\ &gt;&lt;br /&gt;//comment: and now your C drive (in DOSBox) is C:\ Folder\ Where\ The\ Virus\ And\ Dummy\ COM\ FIles\ Are\ Located&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;Let’s play&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;And now you can start the virus and see how it infects one file per run, the dummy COM files should have 6 bytes length, and after infection 161, you can’t miss them…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Are we done already?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Well 02h is over, but 03h is there waiting to be written; whats next? infant-b of course which will have:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;An encryption method (XOR)&lt;/li&gt;&lt;li&gt;A traversal infection (dotdot [..] method)&lt;/li&gt;&lt;li&gt;More infections per run&lt;/li&gt;&lt;li&gt;Stealth?&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Till then have fun with infant-a, and see you as soon as possible (if anybody reads this series).&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/1173027069722418785/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/1173027069722418785' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1173027069722418785'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1173027069722418785'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/art-of-virology-02h.html' title='the Art of Virology 02h'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-8466963525426447689</id><published>2007-11-27T16:34:00.000-08:00</published><updated>2007-11-27T16:36:23.536-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Virology"/><title type='text'>the Art of Virology 01h</title><content type='html'>&lt;p&gt;In this part we will discuss the basic framework of a computer virus… The basics of a virus consists of two elementary procedures (others will tell you three). These are:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;a search routine&lt;/li&gt;&lt;li&gt;a infection routine&lt;/li&gt;&lt;li&gt;[anti-detection routines]&lt;/li&gt;&lt;/ul&gt; &lt;h2&gt;The search routine&lt;/h2&gt; &lt;p&gt;This routine will have to be a more delicate one [but not hard to analyze at all], because as besides the search routine itself we will include file validation two, we will check within this routine if the file is read-only file, not as in some cases in which I saw that the virus search the file, found it and only when trying to infect it he realised that is read-only, and if no check done for it the virus would crash.&lt;/p&gt; &lt;h2&gt;The infection routine&lt;/h2&gt; &lt;p&gt;The trivial routine in a virus, because we do not need a search routine if we say for example we make a list of &lt;q&gt;wanted to infect files&lt;/q&gt;, this routine (in COM viruses) will only write the whole virus in the host program and write a jump to it at the start of the file… simple don’t you think?&lt;/p&gt; &lt;h2&gt;Pseudo-Code Virus&lt;/h2&gt; &lt;p&gt;I know it’s the second article and what do you get? only a pseudo-code virus, but be pacient because I’m not so trustful to think that you have already read the book I recommended you in the first part… so wait until the 02h will be out; till then let’s check out our &lt;q&gt;first virus&lt;/q&gt;:&lt;/p&gt; &lt;pre&gt;virusName &quot;infant-alfa&quot;     &lt;br /&gt;virusAuthor &quot;backbone&quot;    &lt;br /&gt;&lt;br /&gt;begin&lt;br /&gt;  SEARCH:&lt;br /&gt;     if find_com_file is true then INFECT&lt;br /&gt;     else SEARCH&lt;br /&gt;  INFECT:&lt;br /&gt;     if file_read_only then SEARCH&lt;br /&gt;     else OPEN_WRITE&lt;br /&gt;       OPEN_WRITE:&lt;br /&gt;          write_virus from virusName to FINISH&lt;br /&gt;          write jump to virusName at start_of_host_program&lt;br /&gt;&lt;br /&gt;          //jump in machine-code = 0e9h&lt;br /&gt;&lt;br /&gt;          if write_ok goto FINISH&lt;br /&gt;          else SEARCH&lt;br /&gt;  FINISH:&lt;br /&gt;end&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;If you don’t like it in pseudo-code, maybe you’ll like it in Pascal, so dowload &lt;a href=&quot;http://www.darknet.org.uk/content/files/dnvg.zip&quot;&gt;Dirty Nazi Virus Generator&lt;/a&gt; and create a virus to analyze… I didn’t try them out but in theory it should work fine… if you don’t have a pascal compiler you can try &lt;a href=&quot;http://www.freepascal.org/&quot;&gt;freepascal&lt;/a&gt;…&lt;/p&gt; &lt;h2&gt;What more do I need to know before actually starting to write viruses?&lt;/h2&gt; &lt;p&gt;This is an excellent question because even if the actual search and infect routine are simple to build in assembly, the DTA (Disk Transfer Area) is a little hard to understand so i’ll give you a book which will jump in your help (I advice you to read only the DTA part because the rest of it and even more I’ll treat them myself)…&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.darknet.org.uk/content/files/the-little-black-book-of-computer-viruses.zip&quot;&gt;The Little Black Book Of Computer Viruses&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt;Almost forgot to mention, the password to the archive is &lt;strong&gt;Ludwig&lt;/strong&gt; with the big L.&lt;/em&gt;&lt;/p&gt; &lt;h2&gt;Another bitter end…&lt;/h2&gt; &lt;p&gt;So this second part of &lt;strong&gt;the Art of Virology&lt;/strong&gt; which is a bit easier to diggest than the first one, has finally ended. See you next time and hope that by the next chapter you have learned asm and read about the DTA… till then take five…&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/8466963525426447689/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/8466963525426447689' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/8466963525426447689'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/8466963525426447689'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/art-of-virology-01h.html' title='the Art of Virology 01h'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-1548903387883393160</id><published>2007-11-25T18:15:00.000-08:00</published><updated>2007-11-25T18:46:13.332-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>Thousands Hooked by Malware from Big Sites</title><content type='html'>&lt;p&gt;If I recall this is not the first time this has happened, delivering viral payloads via banner ads and flaws in scripting.&lt;/p&gt; &lt;p&gt;It seems that malware peddlers are getting more aggressive though, it obviously shows there is actual monetary value in infecting people and stealing their data.&lt;/p&gt; &lt;p&gt;A subtle form of social engineering too, by leveraging on the trust a user gives to a big name site, they also pass that trust on to the banner ads displayed on that site.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Thousands of PC users have been duped into surrendering sensitive information and installing malicious software after falling victim to a complex scam that continues to plague well-known websites, a researcher warns.&lt;/p&gt; &lt;p&gt;The scam is the latest to piggyback on banner ads that are fed to high-traffic destinations. Malicious code hardwired into the ads prompts a pop-up that warns of a bogus security threat on the visitor’s machine. It offers to fix the problem in exchange for a fee and for credit card information. The ad then attempts to install a back door on the victim’s machine.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;There are thousands of sites with these malware infested banner ads running, so be careful. It seem you’re no longer safe even if you stay away from the seedier parts of the web.&lt;/p&gt; &lt;p&gt;I’d guess though the vast majority of readers here wouldn’t be stupid enough to download a prompted ’security’ fix which randomly appeared.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Jackson estimates the rogue ads have appeared on anywhere from “several hundred to 1,000″ sites, which tend to be related to television and entertainment. Based on unique signatures of the javascript used in the attack, which researchers have seen passing over the net, he estimates thousands of people have fallen for the ruse.&lt;/p&gt; &lt;p&gt;Jackson has managed to shut down at least two servers serving the bad ads, but warns at least two more are still operational. He declined to identify the servers or the websites by name.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;I hope they manage to shut down the rest and save all the witless morons surfing the web from more infestations and information leakage.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/1548903387883393160/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/1548903387883393160' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1548903387883393160'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1548903387883393160'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/thousands-hooked-by-malware-from-big.html' title='Thousands Hooked by Malware from Big Sites'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-2382933221653491427</id><published>2007-11-25T18:14:00.000-08:00</published><updated>2007-11-25T18:46:37.962-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>Doubleclick Involved in Malware Distribution</title><content type='html'>&lt;p&gt;We recently reported on &lt;a href=&quot;http://www.darknet.org.uk/2007/11/thousands-hooked-by-malware-from-big-sites/&quot;&gt;thousands of people being hooked by big sites distributing malware&lt;/a&gt;, it now seems Doubleclick was the one at fault.&lt;/p&gt; &lt;p&gt;It’s a pretty neat trick and a good spin on Social Engineering leveraging on the trustworthy nature of the sites.&lt;/p&gt; &lt;p&gt;CNN even?&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt; Rogue anti-spyware software that pushes fraudulent PC scans has found its way onto DoubleClick and legitimate sites, including CNN, The Economist, The Huffington Post and the official site of the Philadelphia Phillies.&lt;/p&gt; &lt;p&gt;DoubleClick officials told eWEEK that they have recently implemented a security monitoring system to catch and disable a new strain of malware that has spread over the past several months. This system has already captured and disabled about 100 ads, the company said in a statement, although it didn’t mention this episode in particular.&lt;/p&gt; &lt;p&gt;The bogus anti-spyware onslaught is only part of a bigger wave that’s also included porno ads being swapped for normal ads on sites such as The Wall Street Journal. It’s not yet clear whether the same fraudsters are behind both the porn and the fraudulent anti-spyware ads.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;I really hope they do put some serious measure in place that don’t just use a signature for this particular case…something a little more intelligent I hope.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Sunbelt Software has confirmed that Trojans were being downloaded from ads served by DoubleClick as recently as Nov. 11. This malware is the kind that repeatedly pops bogus warning messages about computer infections in users’ faces until they give up in despair and pay $30 to $40 for a junk “security” program.&lt;/p&gt; &lt;p&gt;“The stuff that’s installed is this rogue anti-spyware software that … gives you fake alerts, [such as] ‘Your computer is infected, you must run this.’ Basically it’s extortion. … They try to push you to buy their software,” Sunbelt President Alex Eckelberry told eWEEK.&lt;/p&gt; &lt;p&gt;The malware application is a variant on &lt;a href=&quot;http://en.wikipedia.org/wiki/Winfixer&quot;&gt;WinFixer&lt;/a&gt;, a piece of malware that pretends to be a diagnostic tool. &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;I hope we can educate people about these kind of things, sad to say as some of the comments mentioned in the previous post…a lot of people will fall for this - why? Simply because they don’t know any better.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/2382933221653491427/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/2382933221653491427' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2382933221653491427'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2382933221653491427'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/doubleclick-involved-in-malware.html' title='Doubleclick Involved in Malware Distribution'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-3884916357489963651</id><published>2007-11-25T17:58:00.000-08:00</published><updated>2007-11-25T18:15:01.282-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>Social Engineering Gets a Big Diamond Heist</title><content type='html'>&lt;p&gt;It just goes to show, sometimes the simple things are the most effective. A box of chocolates can defeat all the most hi-tech security systems if you add a little charm.&lt;/p&gt; &lt;p&gt;21 million Euros of diamonds, that’s one hell of a catch.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt; A thief has evaded one of the world’s most expensive hi-tech security systems, and made off with â‚¬21m (Â£14.5m) worth of diamonds - thanks to a secret weapon rarely used on bank staff: personal charm.&lt;/p&gt; &lt;p&gt;In what may be the biggest robbery committed by one person, the conman burgled safety deposit boxes at an ABN Amro bank in Antwerp’s diamond quarter, stealing gems weighing 120,000 carats. Posing as a successful businessman, the thief visited the bank frequently, befriending staff and gradually winning their confidence. He even brought them chocolates, according to one diamond industry official.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Sounds like a long term operation, very slickly done indeed!&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Mr Claes said of the thief: “He used no violence. He used one weapon -and that is his charm - to gain confidence. He bought chocolates for the personnel, he was a nice guy, he charmed them, got the original of keys to make copies and got information on where the diamonds were.&lt;/p&gt; &lt;p&gt;“You can have all the safety and security you want, but if someone uses their charm to mislead people it won’t help.”&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;My dear friend, education is the key..not more locks and bolts.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/3884916357489963651/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/3884916357489963651' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/3884916357489963651'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/3884916357489963651'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/social-engineering-gets-big-diamond.html' title='Social Engineering Gets a Big Diamond Heist'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-4059255258546873515</id><published>2007-11-25T17:57:00.000-08:00</published><updated>2007-11-25T17:58:45.159-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>Huge Online Loss by Swedish Bank Nordea - Claimed to be Biggest Loss?</title><content type='html'>&lt;p&gt;A massive online heist, some (like McAfee) claim it’s the biggest ever online sting involving a bank, it’s comes in at about half a million pounds or or $1.1 million USD.&lt;/p&gt; &lt;p&gt;Using some l33t0 custom trojan, it seems to be more a case of lack of education and the whole situation could have been avoided by using 2 factor authentication such as hardware tokens or SMS verification.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Swedish bank Nordea has told ZDNet UK that it has been stung for between seven and eight million Swedish krona â€” up to Â£580,000 â€” in what security company McAfee is describing as the “biggest ever” online bank heist.&lt;/p&gt; &lt;p&gt;Over the last 15 months, Nordea customers have been targeted by emails containing a tailormade Trojan, said the bank.&lt;/p&gt; &lt;p&gt;Nordea believes that 250 customers have been affected by the fraud, after falling victim to phishing emails containing the Trojan. According to McAfee, Swedish police believe Russian organised criminals are behind the attacks. Currently, 121 people are suspected of being involved.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;If it’s a custom trojan I don’t see how anti-viral software would have helped, but then…executives and corporates tend to talk a lot of crap when it comes to technical issues.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Nordea spokesman for Sweden, Boo Ehlin, said that most of the home users affected had not been running antivirus on their computers. The bank has borne the brunt of the attacks, and has refunded all the affected customers.&lt;/p&gt; &lt;p&gt;Ehlin blamed successful social engineering for the heist, rather than any deficiencies in Nordea security procedures.&lt;/p&gt; &lt;p&gt;“It is more of an information rather than a security problem,” said Ehlin. “Codes are a very important thing. Our customers have been cheated into giving out the keys to our security, which they gave in good faith.”&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;As always just be wary, no point preaching here as the people reading this site know not to open random executables sent from anywhere unless they are signed and md5 hashed &lt;img src=&quot;http://www.darknet.org.uk/wp-includes/images/smilies/icon_wink.gif&quot; alt=&quot;;)&quot; class=&quot;wp-smiley&quot; /&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/4059255258546873515/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/4059255258546873515' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/4059255258546873515'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/4059255258546873515'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/huge-online-loss-by-swedish-bank-nordea.html' title='Huge Online Loss by Swedish Bank Nordea - Claimed to be Biggest Loss?'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-5030334516355575433</id><published>2007-11-25T17:48:00.000-08:00</published><updated>2007-11-25T17:51:11.250-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>Domain Stealing or How to Hijack a Domain</title><content type='html'>&lt;p&gt;&lt;em&gt;Please note this is an old technique again, just for learning purposes, learn how the old techniques worked and why they worked, then try and discover new ways to do things.&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Summary&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;The sole purpose of the information contained in this advisory is to point out the flaws in InterNIC’s domain name handling system and is intended for educational use only. Since this is public knowledge, it should be also in everyone’s reach.&lt;/p&gt; &lt;p&gt;The technique described below involves an easy to follow procedure of stealing .com/.net/.org/.gov/.mil domain names.&lt;/p&gt; &lt;p&gt;This vulnerability has been publicly known for quite a while, and there are ways to prevent it. The procedure below enables an attacker to take over a domain name, enabling him or her to make the arbitrary web address (www.example.com) point to any desired web page on the Internet. This method of domain hijacking is constantly being used to hijack domain names, and to deface web sites.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;THIS DOCUMENT SHOULD NOT BE USED FOR ANY ILLEGAL ACTIVITY.&lt;/strong&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Details &lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Required ingredients:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Anonymous remailer or mail bomber that can spoof email addresses.&lt;/li&gt;&lt;li&gt;Social Engineering skills for timing the emails.&lt;/li&gt;&lt;li&gt;A fake email address at hotmail.com or any other free service.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Exploit:&lt;br /&gt;As an example for this advisory, we will take the domain name example.org. Go to http://www.networksolutions.com and click on the link that says ‘Who Is.’ Now enter the domain name (example.org in this case) in the search field and click on the ‘Search’ button. This would show you the WhoIs information, which will be similar to the one shown below:&lt;/p&gt; &lt;pre&gt;Registrant:&lt;br /&gt;Example (ex24-DOM)&lt;br /&gt;  Address details&lt;br /&gt;&lt;br /&gt;  Domain Name: EXAMPLE.ORG&lt;br /&gt;&lt;br /&gt;  Administrative Contact, Technical Contact, Zone Contact,&lt;br /&gt;  Billing Contact:&lt;br /&gt;     DOMAIN, ADMIN (ADM001) ADMINEMAIL@EXAMPLE.COM&lt;br /&gt;&lt;br /&gt;  Record last updated on 00-Jan-2000.&lt;br /&gt;  Record created on 00-Jan-2000.&lt;br /&gt;  Database last updated on 3-Feb-2000 14:29:53 EST.&lt;br /&gt;&lt;br /&gt;  Domain servers in listed order:&lt;br /&gt;&lt;br /&gt;  NS1.EXAMPLE.COM 1.2.3.4&lt;br /&gt;  NS2.EXAMPLE.NET 1.2.3.5&lt;/pre&gt; &lt;p&gt;Now you have two choices:&lt;/p&gt; &lt;p&gt;1) Either you could take full control of the domain by changing the Administrator’s handle information.&lt;/p&gt; &lt;p&gt;Or&lt;/p&gt; &lt;p&gt;2) You could simply point the domain to another host and let it recover in time by itself.&lt;/p&gt; &lt;p&gt;&lt;span id=&quot;more-348&quot;&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;Initiating the First Attack:&lt;/p&gt; &lt;p&gt;Let us first explain the InterNIC authentication system in case most of you would be the readers who do not have their own domain names. The problem with InterNIC authentication is that they do NOT send a confirmation email if the request is sent from the same email as the person owning the contact or the domain name itself! Therefore, utilizing this flaw one could spoof anyone’s email address and change any domain name’s information.&lt;/p&gt; &lt;p&gt;Although, a confirmation is required from the person to whom the domain is about to be transferred; and that shouldn’t be too hard as it would your own email address.&lt;/p&gt; &lt;p&gt;Here’s a step-by-step procedure:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Go to http://www.networksolutions.com/&lt;/li&gt;&lt;li&gt;Click on the link that says ‘Make Changes.’&lt;/li&gt;&lt;li&gt;Enter the domain name example.org&lt;/li&gt;&lt;li&gt;You should be presented with 2 blue buttons&lt;/li&gt;&lt;li&gt;Click on the one that says *Expert*&lt;/li&gt;&lt;li&gt;Next screen would have a heading ‘Select the form that meets your needs’&lt;/li&gt;&lt;li&gt;Click on the link that say ‘Contact Form’&lt;/li&gt;&lt;li&gt;Next you should see a form with 2 fields.&lt;/li&gt;&lt;li&gt;In the first field enter the admin’s handle (example.org admin is ADM001)&lt;/li&gt;&lt;li&gt;In the next field enter his/her email address (in this case it’s ADMINEMAIL@EXAMPLE.COM)&lt;/li&gt;&lt;li&gt; Change the option to ‘Modify.’&lt;/li&gt;&lt;li&gt;Now ‘Proceed to Contact Information.’&lt;/li&gt;&lt;li&gt;Select the MAIL-FROM option and click the ‘Go on to Contact Data Information.’&lt;/li&gt;&lt;li&gt; Now you should see all the information about the admin contact of domain&lt;br /&gt;name!&lt;/li&gt;&lt;li&gt;In the E-mail address field change the email to your own fake email. (in this case it’s evil@domain.com)&lt;/li&gt;&lt;li&gt; Now ‘Proceed to Set Authorization Scheme.’&lt;/li&gt;&lt;li&gt; Again choose MAIL-FROM and enter the email address of the admin (ADMINEMAIL@EXAMPLE.COM)&lt;/li&gt;&lt;li&gt;Leave the bottom option to ‘No’ and ‘Generate Contact Form.’&lt;/li&gt;&lt;/ul&gt; &lt;div align=&quot;center&quot;&gt; &lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;4027562844&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt; &lt;/div&gt; &lt;p&gt;Now you should see a template with all the information. Similar to this:&lt;/p&gt; &lt;pre&gt;******** Please DO NOT REMOVE Version Number ********&lt;br /&gt;&lt;br /&gt;Contact Version Number: 1.0&lt;br /&gt;&lt;br /&gt;******** Please see attached detailed instructions ********&lt;br /&gt;&lt;br /&gt;Authorization&lt;br /&gt;0a. (N)ew (M)odify (D)elete.: Modify&lt;br /&gt;0b. Auth Scheme.............: MAIL-FROM&lt;br /&gt;0c. Auth Info...............:&lt;br /&gt;&lt;br /&gt;Contact Information&lt;br /&gt;1a. NIC Handle..............: ADM001&lt;br /&gt;1b. (I)ndividual (R)ole.....: Individual&lt;br /&gt;1c. Name....................: DOMAIN, ADMIN&lt;br /&gt;1d. Organization Name.......: EXAMPLE&lt;br /&gt;1e. Street Address..........:&lt;br /&gt;1f. City....................:&lt;br /&gt;1g. State...................:&lt;br /&gt;1h. Postal Code.............:&lt;br /&gt;1i. Country.................:&lt;br /&gt;1j. Phone Number............:&lt;br /&gt;1k. Fax Number..............:&lt;br /&gt;1l. E-Mailbox...............: evil@domain.com&lt;br /&gt;&lt;br /&gt;Notify Information&lt;br /&gt;2a. Notify Updates..........: AFTER-UPDATE&lt;br /&gt;2b. Notify Use..............: AFTER-USE&lt;br /&gt;&lt;br /&gt;Authentication&lt;br /&gt;3a. Auth Scheme.............: MAIL-FROM&lt;br /&gt;3b. Auth Info...............: ADMINEMAIL@EXAMPLE.COM&lt;br /&gt;3c. Public (Y/N)............: NO&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;NOTE: Do NOT press the button at the bottom that says ‘Mail this contact form to me!’&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Copy and paste this message into your anonymous remailer or mailbomber and you are ready to go; but WAIT! It’s not that easy, now comes the HARD part! When you mail this message to hostmaster@networksolutions.com a message similar to the following would be sent to the admin email address:&lt;/p&gt; &lt;pre&gt;Subject: [NIC-000128.4r50] Your Mail&lt;br /&gt;______________________________________________________________&lt;br /&gt;This is an automatic reply to acknowledge that your message has been received by hostmaster@networksolutions.com. This acknowledgement is &quot;NOT&quot; a confirmation that your request has been processed. You will be notified when it has been completed.&lt;br /&gt;&lt;br /&gt;If you should have need to correspond with us regarding this request, please include the tracking number [NIC-000128.4r50] in the subject. The easiest way to do this is simply to reply to this message.&lt;br /&gt;&lt;br /&gt;If you have not already done so, please come and visit our site via www browser or ftp and pick-up the latest domain template or review the Domain Name Registration Service Agreement at the URL&#39;s:&lt;br /&gt;&lt;br /&gt;  Domain Name Registration Service Agreement&lt;br /&gt;     http://www.networksolutions.com/legal/service-agreement.html&lt;br /&gt;  Domain Name Registration Template&lt;br /&gt;     ftp://www.networksolutions.com/templates/domain-template.txt&lt;br /&gt;&lt;br /&gt;Regards,&lt;br /&gt;Network Solutions Registration Services&lt;br /&gt;&lt;br /&gt;***********************************************&lt;br /&gt;&lt;br /&gt;***********************************************&lt;br /&gt;IMPORTANT INFORMATION&lt;br /&gt;***********************************************&lt;br /&gt;On January 15, 2000, Network Solutions introduced Service Agreement, Version 6.0. All versions of the Service Agreement template will continue to be accepted and processed until January 31, 2000. On and after February 1, 2000, please use the Network Solutions Service Agreement, Version 6.0 template located at&lt;br /&gt;ftp://www.networksolutions.com/templates/domain-template.txt&lt;br /&gt;for all template requests.&lt;br /&gt;&lt;br /&gt;The terms and conditions of the Service Agreement are available on our Web site at: http://www.networksolutions.com/legal/service-agreement.html.&lt;br /&gt;************************************************&lt;br /&gt;&lt;br /&gt;The zone files, which make the Internet work, are normally updated twice daily, 7 days a week at 5:00 AM and 5:00 PM U.S. Eastern Standard Time. Requests that are completed before these times will be included in that 12-hour zone file update and will normally begin to take effect within 5-6 hours.&lt;br /&gt;&lt;br /&gt;Should you wish to modify or delete an existing domain name registration, you can do so online, using our Service Agreement. You can change the registrant&#39;s address, replace a contact/agent with a different contact/agent, or change primary and/or secondary name server information.&lt;br /&gt;&lt;br /&gt;To update information about an existing contact, such as postal address, e-mail address or telephone number, complete and submit the Contact Form to hostmaster@internic.net. This form is available on our Web site at www.networksolutions.com&lt;br /&gt;&lt;br /&gt;To register or update information about a name server, complete and submit the Host Form to hostmaster@internic.net. This form is also available on our Web site.&lt;br /&gt;&lt;br /&gt;Network Solutions Registration Services&lt;br /&gt;e-mail: help@networksolutions.com&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;You should now be thinking that this message could get you in trouble but there is a way of getting rid of this trouble. Here you’ll use your mailbomber to mailbomb the guy with 20-30 similar messages if you want your attack to be successful. The person would see 35 messages from the same address and therefore would delete all of them and you’d probably be safe. If he ‘would’ email someone then he would probably reply to the wrong tracking number. In the above case, the tracking number is [NIC-000128.4r50]. OK, here another hard part. You have to open your notepad and generate similar numbers actually come up with them.&lt;/p&gt; &lt;p&gt;You should NEVER mailbomb the person with the same tracking number. What we mean&lt;br /&gt;is that you should never send more than one emails to him from [NIC-000128.4r50] in the next email, change the [NIC-000128.4r50] to [NIC-000127.5089] or something different. Here is a list of some numbers that we generated just to give you a good idea of how the scheme works.&lt;/p&gt; &lt;p&gt;[NIC-000127.5089]&lt;br /&gt;[NIC-000128.4rg7]&lt;br /&gt;[NIC-000128.523f]&lt;br /&gt;[NIC-000127.53d0]&lt;br /&gt;[NIC-000129.r609]&lt;br /&gt;[NIC-000128.3f6y]&lt;br /&gt;[NIC-000128.5d8t]&lt;br /&gt;[NIC-000127.r509]&lt;br /&gt;[NIC-000128.4r30]&lt;br /&gt;[NIC-000127.d307]&lt;/p&gt; &lt;p&gt;Remember to change the number at both places. In the subject as well as the email body!&lt;/p&gt; &lt;p&gt;In the case of example.org you will send the email messages to ADMINEMAIL@EXAMPLE.COM from hostmaster@internic.net. The message subject and body are already described above.&lt;/p&gt; &lt;p&gt;Stop after you have mailed him/her 10-15 messages! Now it’s time to email hostmaster@networksolutions.com with our fake email as ADMINEMAIL@EXAMPLE.COM So again, in this case the message will be sent to hostmaster@networksolutions.com from ADMINEMAIL@EXAMPLE.COM with the following template that we created above:&lt;/p&gt; &lt;pre&gt;******** Please DO NOT REMOVE Version Number ********&lt;br /&gt;&lt;br /&gt;Contact Version Number: 1.0&lt;br /&gt;&lt;br /&gt;******** Please see attached detailed instructions ********&lt;br /&gt;&lt;br /&gt;Authorization&lt;br /&gt;0a. (N)ew (M)odify (D)elete.: Modify&lt;br /&gt;0b. Auth Scheme.............: MAIL-FROM&lt;br /&gt;0c. Auth Info...............:&lt;br /&gt;&lt;br /&gt;Contact Information&lt;br /&gt;1a. NIC Handle..............: ADM001&lt;br /&gt;1b. (I)ndividual (R)ole.....: Individual&lt;br /&gt;1c. Name....................: DOMAIN, ADMIN&lt;br /&gt;1d. Organization Name.......: EXAMPLE&lt;br /&gt;1e. Street Address..........:&lt;br /&gt;1f. City....................:&lt;br /&gt;1g. State...................:&lt;br /&gt;1h. Postal Code.............:&lt;br /&gt;1i. Country.................:&lt;br /&gt;1j. Phone Number............:&lt;br /&gt;1k. Fax Number..............:&lt;br /&gt;1l. E-Mailbox...............: evil@domain.com&lt;br /&gt;&lt;br /&gt;Notify Information&lt;br /&gt;2a. Notify Updates..........: AFTER-UPDATE&lt;br /&gt;2b. Notify Use..............: AFTER-USE&lt;br /&gt;&lt;br /&gt;Authentication&lt;br /&gt;3a. Auth Scheme.............: MAIL-FROM&lt;br /&gt;3b. Auth Info...............: ADMINEMAIL@EXAMPLE.COM&lt;br /&gt;3c. Public (Y/N)............: NO&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;NOTE: Do NOT put anything in the Subject!&lt;/p&gt; &lt;p&gt;Just send one email! DO NOT bomb hostmaster@networksolutions.com with more than one email. That’s pretty much it. Now continue to bomb ADMINEMAIL@EXAMPLE.COM, changing the tracking number every time until your 30-35 tracking numbers are used up!&lt;/p&gt; &lt;p&gt;Now all you have to do is wait. After 24 hours you could go and change the domain information and no one would be there to stop you because now you are the admin of the domain name!&lt;/p&gt; &lt;p&gt;&lt;strong&gt;NOTE: This attack will only work on domains that have an admin contact different from their technical contact!&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Initiating the Second Attack:&lt;/p&gt; &lt;p&gt;This attack will be successful even if the technical and admin contact are the same.&lt;br /&gt;The procedure is basically the same apart from the fact that this time:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;Go to http://www.networksolutions.com/&lt;/li&gt;&lt;li&gt;Click on the link that says ‘Make Changes.’&lt;/li&gt;&lt;li&gt;Enter the domain name example.org&lt;/li&gt;&lt;li&gt;You should be presented with 2 blue buttons&lt;/li&gt;&lt;li&gt;Click on the one that says *Expert*&lt;/li&gt;&lt;li&gt;Next screen would have a heading ‘Select the form that meets your needs’&lt;/li&gt;&lt;li&gt;Click on the link that say ‘Service Agreement.’&lt;/li&gt;&lt;li&gt;Now when it asks for email address, enter your own.&lt;/li&gt;&lt;li&gt;Now you should see many fields, don’t panic!&lt;/li&gt;&lt;li&gt;Go to the technical contact and change the handle to freeservers, hypermart e.t.c.&lt;/li&gt;&lt;li&gt;Now come to ‘Nameserver Information.’&lt;/li&gt;&lt;li&gt;Change the nameservers to hypermart or freeserver nameservers.&lt;/li&gt;&lt;li&gt;If there’s anything in the ‘Optional Information’ after that then simply delete them.&lt;/li&gt;&lt;li&gt;Click on the button ‘Submit this form for processing.’&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;You are done, the form will be emailed to your email address. When the form arrives in your email, then simply take this part:&lt;/p&gt; &lt;div align=&quot;center&quot;&gt; &lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;4027562844&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt; &lt;/div&gt; &lt;pre&gt;**** PLEASE DO NOT REMOVE Version Number or any of the information below when submitting this template to hostmaster@networksolutions.com. *****&lt;br /&gt;&lt;br /&gt;Domain Version Number: 5.0&lt;br /&gt;&lt;br /&gt;******** Email completed agreement to hostmaster@networksolutions.com ********&lt;br /&gt;&lt;br /&gt;AGREEMENT TO BE BOUND. By applying for a Network Solutions&#39; service(s) through our online application process or by applying for and registering a domain name as part of our e-mail template application process or by using the service(s) provided by Network Solutions under the Service Agreement, Version 5.0, you acknowledge that you have read and agree to be bound by all terms and conditions of this Agreement and any pertinent rules or policies that are or may be published by Network Solutions.&lt;br /&gt;&lt;br /&gt;Please find the Network Solutions Service Agreement, Version 5.0 located at the URL href=&quot;http://www.networksolutions.com/legal/service-agreement.html&quot;&gt; http://www.networksolutions.com/legal/service-agreement.html.&lt;br /&gt;&lt;br /&gt;[ URL ftp://www.networksolutions.com ] [11/99]&lt;br /&gt;&lt;br /&gt;Authorization&lt;br /&gt;0a. (N)ew (M)odify (D)elete.........: M Name Registration&lt;br /&gt;0b. Auth Scheme.....................: MAIL-FROM&lt;br /&gt;0c. Auth Info.......................:&lt;br /&gt;&lt;br /&gt;1. Comments........................:&lt;br /&gt;&lt;br /&gt;2. Complete Domain Name............: example.org&lt;br /&gt;&lt;br /&gt;Organization Using Domain Name&lt;br /&gt;3a. Organization Name................: EXAMPLE&lt;br /&gt;3b. Street Address..................:&lt;br /&gt;3c. City............................:&lt;br /&gt;3d. State...........................:&lt;br /&gt;3e. Postal Code.....................:&lt;br /&gt;3f. Country.........................:&lt;br /&gt;&lt;br /&gt;Administrative Contact&lt;br /&gt;4a. NIC Handle (if known)...........: ADM001&lt;br /&gt;4b. (I)ndividual (R)ole?............: Individual&lt;br /&gt;4c. Name (Last, First)..............:&lt;br /&gt;4d. Organization Name...............:&lt;br /&gt;4e. Street Address..................:&lt;br /&gt;4f. City............................:&lt;br /&gt;4g. State...........................:&lt;br /&gt;4h. Postal Code.....................:&lt;br /&gt;4i. Country.........................:&lt;br /&gt;4j. Phone Number....................:&lt;br /&gt;4k. Fax Number......................:&lt;br /&gt;4l. E-Mailbox.......................:&lt;br /&gt;&lt;br /&gt;Technical Contact&lt;br /&gt;5a. NIC Handle (if known)...........: BDM002&lt;br /&gt;5b. (I)ndividual (R)ole?............: Individual&lt;br /&gt;5c. Name(Last, First)...............:&lt;br /&gt;5d. Organization Name...............:&lt;br /&gt;5e. Street Address..................:&lt;br /&gt;5f. City............................:&lt;br /&gt;5g. State...........................:&lt;br /&gt;5h. Postal Code.....................:&lt;br /&gt;5i. Country.........................:&lt;br /&gt;5j. Phone Number....................:&lt;br /&gt;5k. Fax Number......................:&lt;br /&gt;5l. E-Mailbox.......................:&lt;br /&gt;&lt;br /&gt;Billing Contact&lt;br /&gt;6a. NIC Handle (if known)...........: ADM001&lt;br /&gt;6b. (I)ndividual (R)ole?............: Individual&lt;br /&gt;6c. Name (Last, First)..............:&lt;br /&gt;6d. Organization Name...............:&lt;br /&gt;6e. Street Address..................:&lt;br /&gt;6f. City............................:&lt;br /&gt;6g. State...........................:&lt;br /&gt;6h. Postal Code.....................:&lt;br /&gt;6i. Country.........................:&lt;br /&gt;6j. Phone Number....................:&lt;br /&gt;6k. Fax Number......................:&lt;br /&gt;6l. E-Mailbox.......................:&lt;br /&gt;&lt;br /&gt;Prime Name Server&lt;br /&gt;7a. Primary Server Hostname.........: NS1.EXAMPLE.COM&lt;br /&gt;7b. Primary Server Netaddress.......: 1.2.3.4&lt;br /&gt;&lt;br /&gt;Secondary Name Server(s)&lt;br /&gt;8a. Secondary Server Hostname.......: NS2.EXAMPLE.NET&lt;br /&gt;8b. Secondary Server Netaddress.....: 1.2.3.5&lt;br /&gt;&lt;br /&gt;END OF AGREEMENT&lt;br /&gt;&lt;br /&gt;For instructions, please refer to:&lt;br /&gt;&quot;http://www.networksolutions.com/help/inst-mod.html&quot;&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;Now launch your anonymous remailer or mailbomber.&lt;/p&gt; &lt;ul&gt;&lt;li&gt;From: the domain admin (ADMINEMAIL@EXAMPLE.COM in this case).&lt;/li&gt;&lt;li&gt;To: hostmaster@networksolutions.com&lt;/li&gt;&lt;li&gt;Subject: (do not enter any subject, leave the field blank!)&lt;/li&gt;&lt;li&gt;Body: the template you created above.&lt;/li&gt;&lt;li&gt;You are ready to go but before you send this email to InterNIC, remember to bomb ADMINEMAIL@EXAMPLE.COM with similar emails but different tracking numbers as we did in the first procedure.&lt;/li&gt;&lt;li&gt;After sending 10-20 emails, send the above template to InterNIC.&lt;/li&gt;&lt;li&gt;Continue bombing your 40 messages. Remember to generate 40-50 tracking numbers.&lt;br /&gt;This is basically it.&lt;/li&gt;&lt;li&gt;The domain would be transferred to freeservers or hypermart and then you could simply activate it from there on your own email address. Remember to use a fake email.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Nameservers and Handles:&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Freeservers Technical Handle: FS4394&lt;br /&gt;Primary Nameserver: NS3.FREESERVERS.COM&lt;br /&gt;Primary Nameserver IP Address: 209.210.67.153&lt;br /&gt;Secondary Nameserver: NS4.FREESERVERS.COM&lt;br /&gt;Secondary Nameserver IP Address: 209.210.67.154&lt;/p&gt; &lt;p&gt;Hypermart Technical Handle: DA3706-ORG&lt;br /&gt;Primary Nameserver: NS1.HYPERMART.NET&lt;br /&gt;Primary Nameserver IP Address: 206.253.222.65&lt;br /&gt;Secondary Nameserver: NS2.HYPERMART.NET&lt;br /&gt;Secondary Nameserver IP Address: 206.253.222.66&lt;/p&gt; &lt;p&gt;______________________________________________________________&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Possible Fixes:&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Enable the CRYPT-FW password mechanism. This should prevent anyone without this password from changing your domain information (see the Internic contact form for more information)&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/5030334516355575433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/5030334516355575433' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/5030334516355575433'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/5030334516355575433'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/domain-stealing-or-how-to-hijack-domain.html' title='Domain Stealing or How to Hijack a Domain'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-7065849057515320547</id><published>2007-11-25T17:47:00.001-08:00</published><updated>2007-11-25T17:49:58.411-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>US Sailors Information Leaked on The Web</title><content type='html'>&lt;p&gt;Another HUGE information leak from the US government, seems they can’t help themselves.&lt;/p&gt; &lt;p&gt;Or perhaps people are just ramping up the efforts against them..&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;The Navy has begun a criminal investigation after Social Security numbers and other personal data for 28,000 sailors and family members were found on a civilian website.&lt;/p&gt; &lt;p&gt;The Navy said Friday the information was in five documents and included people’s names, birth dates and Social Security numbers. Navy spokesman Lt. Justin Cole would not identify the website or its owner, but said the information had been removed. He would not provide any details about how the information ended up on the site.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;They really need to step up their standards and training, and of course use some kind of file based or filesystem encryption, a stolen laptop shouldn’t yeild so much information.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;The breach regarding the Navy comes amid a rash of government computer data thefts, including one at the Agriculture Department earlier this week in which a hacker may have obtained names, Social Security numbers and photos of 26,000 Washington-area employees and contractors.&lt;/p&gt; &lt;p&gt;As many as 26.5 million veterans and current military troops may have been affected by the theft of a laptop computer containing their Social Security numbers and birth dates. The computer was taken from the home of a Veterans Affairs Department employee in early May, and officials waited nearly three weeks before notifying veterans on May 22 of the theft.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;That’s a hell of a lot of people to be effected..&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/7065849057515320547/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/7065849057515320547' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7065849057515320547'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7065849057515320547'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/us-sailors-information-leaked-on-web.html' title='US Sailors Information Leaked on The Web'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-8309104362206590893</id><published>2007-11-25T17:47:00.000-08:00</published><updated>2007-11-25T17:49:45.339-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>How to get Ops and takeover a channel on IRC Hack Hacking</title><content type='html'>&lt;p&gt;I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they were written like 10 years ago and don’t work anymore. The method I’m presenting here DOES work, but it takes practice, patience, and careful reading.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tools needed&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;An IRC script that can do mass deops quickly and easily (preferibly one that lets you press an F# (function) key to do mass deops, or one that automatically mass deops once you gain ops). You don’t want to have to start going through popup menus since you have to do this quickly.&lt;/p&gt; &lt;p&gt;An IRC script that can do mass CTCP versioning. I’ll explain later.&lt;/p&gt; &lt;p&gt;A wingate scanner. These aren’t too hard to find. Check &lt;a href=&quot;http://packetstorm.linuxsecurity.com/wingate-scanner/&quot;&gt;http://packetstorm.linuxsecurity.com/wingate-scanner/&lt;/a&gt;&lt;/p&gt; &lt;p&gt;A few ‘war’ programs to exploit irc clients, nuke, flood, etc. When I say flood, I don’t mean like a ping flood in mIRC, I mean like a real ICMP flooder. Try to find Final Fortune, it’s a program I made myself… very effective.&lt;/p&gt; &lt;p&gt;A lot of patience.&lt;/p&gt; &lt;p&gt;A brain.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Process&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Find a channel you want to takeover. This method will NOT work on Dalnet or any other networks with anything like ChanServ. Also, this won’t work if all of the ops in the channel are bots (unless they’re VERY badly programmed). OK, so once you’re in the channel, do a Version CTCP on all of the ops in there. Look for exploitable scripts (some versions of ircN, mIRC 5.3x, mIRC 5.4, etc.). Now, let’s say you find someone with nick ‘DumbOP’ and he’s using a script that you know you can exploit and disconnect him from IRC (but don’t crash him yet!).&lt;/p&gt; &lt;div align=&quot;center&quot;&gt; &lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;4027562844&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt; &lt;/div&gt; &lt;p&gt;/dns DumbOP to find his IP. Now take your handy wingate scanner. Plug in his IP and search for a similar one with the scanner. If you can’t find one in the same Class C range, try Class B if you have to, but make sure it resolves to something close to DumbOP’s IP.&lt;/p&gt; &lt;p&gt;Good, so now you have a wingate IP similar to DumbOP’s. If you couldn’t find an IP close to his, try this with another op with an exploitable script. Do a /whois DumbOP to find the IRC server he’s on and his ident (the thing before the @ip). So now that you have the wingate IP, what do you do with it? I’ll assume you never wingated before, and I’ll explain how to do it with mIRC. For&lt;br /&gt;the example, let’s say the wingate IP is 1.2.3.4, DumbOP’s ident is ‘opident’, and DumbOP’s irc server is ‘irc.server.net’.&lt;/p&gt; &lt;p&gt;Open a new instance of mIRC, and in the status window, do the following:&lt;/p&gt; &lt;p&gt;/server 1.2.3.4 23&lt;/p&gt; &lt;p&gt;You’ll see it say “WinGate&gt;NICK (some nick)”&lt;/p&gt; &lt;p&gt;Right after you see this, type:&lt;/p&gt; &lt;p&gt;/quote irc.server.net 6667&lt;/p&gt; &lt;p&gt;You’ll probably then see something like&lt;/p&gt; &lt;p&gt;“Connecting to host USER…Host name lookup for USER failedirc.server.net 6667&lt;br /&gt;Connecting to host irc.server.net…connected”&lt;/p&gt; &lt;p&gt;You might see more than this, you might see less. The important thing to watch for is:&lt;/p&gt; &lt;p&gt;” -1.2.3.4- *** Looking up your hostname…&lt;br /&gt; -1.2.3.4- *** Checking Ident&lt;br /&gt; -1.2.3.4- *** Found your hostname&lt;br /&gt; -1.2.3.4- *** Got Ident response ”&lt;/p&gt; &lt;p&gt;Once you see that, type:&lt;/p&gt; &lt;p&gt;/quote user opident opident opident opident&lt;br /&gt;/quote nick DumbOP1&lt;/p&gt; &lt;p&gt;You don’t have to use ‘DumbOP1′, just use any temporary nick you want. Also, you can use ‘/raw’ instead of ‘/quote’ if you wish.&lt;/p&gt; &lt;p&gt;If you did everything correctly, you’ll see the MOTD for the irc server, and you’ll be connected. If by chance 1.2.3.4 is k-lined from irc.server.net, you’ll have to go through the whole process again with a different server. This makes your “spoofing” (it’s not REALLY spoofing) attempt less realistic looking, but if you have to use a different server, then do it.&lt;/p&gt; &lt;div align=&quot;center&quot;&gt; &lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;4027562844&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt; &lt;/div&gt; &lt;p&gt;Once you’re online, everything works like normal. Do a /whois DumbOP1 to see your info. It should be close to DumbOP’s.&lt;/p&gt; &lt;p&gt;You’re halfway there! The next thing to do (not necessary, but recommended) is to try to find out some info on DumbOP. I recommend trying “nbtstat -A ” at the dos prompt, that might provide you with a name or two if you’re lucky. This is just some useful information that might&lt;br /&gt;come in handy. Also, try searching ICQ for his nick and check his info, you might find good stuff in there.&lt;/p&gt; &lt;p&gt;The next step is to disconnect DumbOP from IRC. Either use an exploit, or nuke him (Click is sometimes useful (if you don’t know what Click is, it’s a program made by Rhad to have an IRC server ‘nuke’ a person… it sometimes works)), or ICMP flood him. Do anything you have to to disconnect him. By the way, you should have your original IRC session still open, with your&lt;br /&gt;wingated IRC session running as a different instance of mIRC (you should have 2 ‘versions’ of mIRC running at the same time now, one with your original nick, info, etc., and the other with the DumbOP1 stuff). While you’re attacking DumbOP, monitor the channel with your original session of mIRC and wait for DumbOP to disconnect. Immediately after you see that, rename DumbOP1 to DumbOP (/nick DumbOP) and join the channel! Don’t say anything! If you’re lucky, a stupid op will op you. Then mass deop. If nothing happens for about 5 or 6 minutes, mass message the ops, saying something like “what happened? why am I not opped?”. You might get into a conversation. Remember to keep calm, and talk like an op. Don’t freak out and demand for them to op you. The “useful information” might come in handy now. Often the ops will tell you to get ops from the bots. Just say something like you’re desynched from the bots because of your ping timeout.&lt;/p&gt; &lt;p&gt;If your impersonation is good enough, 9/10 times they’ll op you. Like I said before, IMMEDIATELY do a mass deop. If possible, bring AT LEAST two bots (real bots, not just simple clones) into the channel to hold it and protect it.&lt;/p&gt; &lt;p&gt;If you followed all these steps thoroughly, you should be able to takeover most channels as long as there are at least 2 human ops (1 of which you’ll be ’spoofing’, the other you’ll be messaging to op you). &lt;/p&gt; &lt;p&gt;Good luck and have fun!&lt;/p&gt; &lt;p&gt;&lt;em&gt;Originally by St0rmer from EFNet, updated by Darknet.&lt;/em&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/8309104362206590893/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/8309104362206590893' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/8309104362206590893'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/8309104362206590893'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/how-to-get-ops-and-takeover-channel-on.html' title='How to get Ops and takeover a channel on IRC Hack Hacking'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-3799310738617043169</id><published>2007-11-25T17:31:00.003-08:00</published><updated>2007-11-25T17:47:05.532-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>Kevin Mitnick Interview on Social Engineering</title><content type='html'>&lt;p&gt;There’s a good interview with Kevin Mitnick on Social Engineering.&lt;/p&gt; &lt;p&gt;Well afterall, that is where his skill lies, not in technical hacking.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Arrested by the FBI in 1995 and convicted of breaking into the systems of Fujitsu Siemens, Nokia and Sun Microsystems, Mitnick served five years in prison–eight months of it in solitary confinement.&lt;/p&gt; &lt;p&gt;In his days on the wrong side of the law, Mitnick used so-called social-engineering techniques to fool users into handing over sensitive information. Rather than overt technical hacks, he was able to convince employees to hand over information that enabled him to hack systems, while redirecting telephone signals to avoid detection by the authorities. &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;As always the answer to social engineering is education!&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;&lt;strong&gt;Are you seeing any new attack methods?&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;Mitnick:&lt;/em&gt; They use the same methods they always have–using a ruse to deceive, influence or trick people into revealing information that benefits the attackers. These attacks are initiated, and in a lot of cases, the victim doesn’t realize. Social engineering plays a large part in the propagation of spyware. Usually, attacks are blended, exploiting technological vulnerabilities and social engineering.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;What can businesses do to safeguard themselves?&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;Mitnick:&lt;/em&gt; Businesses should train people to try to recognize possible attacks. &lt;/p&gt;&lt;/blockquote&gt; The interview is a good read anyway, do check it out. You can also check out Mitnicks book on Social Engineering</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/3799310738617043169/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/3799310738617043169' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/3799310738617043169'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/3799310738617043169'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/kevin-mitnick-interview-on-social.html' title='Kevin Mitnick Interview on Social Engineering'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-7845153569070532394</id><published>2007-11-25T17:31:00.002-08:00</published><updated>2007-11-25T17:47:02.136-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>‘Free’ USB Drives Defeat Company Security</title><content type='html'>&lt;p&gt;This is an excellent case of Social Engineering, you could also consider it playing on human greed/ignorance/stupidity.&lt;/p&gt; &lt;p&gt;Whatever you want to label it really &lt;img src=&quot;http://www.darknet.org.uk/wp-includes/images/smilies/icon_wink.gif&quot; alt=&quot;;)&quot; class=&quot;wp-smiley&quot; /&gt; &lt;/p&gt; &lt;p&gt;USB drives are a real security risk..&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;We recently got hired by a credit union to assess the security of its network. The client asked that we really push hard on the social engineering button. In the past, they’d had problems with employees sharing passwords and giving up information easily. Leveraging our effort in the report was a way to drive the message home to the employees.&lt;/p&gt; &lt;p&gt;The client also indicated that USB drives were a concern, since they were an easy way for employees to steal information, as well as bring in potential vulnerabilities such as viruses and Trojans. Several other clients have raised the same concern, yet few have done much to protect themselves from a rogue USB drive plugging into their network.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;They had to think up something a little different though as they had to bait employees that were already on high alert as they knew they were being audited.&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;I made my way to the credit union at about 6 a.m. to make sure no employees saw us. I then proceeded to scatter the drives in the parking lot, smoking areas, and other areas employees frequented.&lt;/p&gt; &lt;p&gt;Once I seeded the USB drives, I decided to grab some coffee and watch the employees show up for work. Surveillance of the facility was worth the time involved. It was really amusing to watch the reaction of the employees who found a USB drive. You know they plugged them into their computers the minute they got to their desks. &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;The stats are amazing, out of 20 drives, 15 were found…out of the 15 found &lt;strong&gt;ALL FIFTEEN&lt;/strong&gt; were plugged into company computers.&lt;/p&gt; &lt;p&gt;A neat way to get in eh, next time you are asked to push the social engineering buttons during a penetration test or vulnerability assessment perhaps you can do this.&lt;/p&gt; &lt;p&gt;All you need is a few cheap USB drives and a custom trojan.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/7845153569070532394/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/7845153569070532394' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7845153569070532394'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7845153569070532394'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/free-usb-drives-defeat-company-security.html' title='‘Free’ USB Drives Defeat Company Security'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-2243764709900886089</id><published>2007-11-25T17:30:00.001-08:00</published><updated>2007-11-25T17:44:36.790-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="social-engineering"/><title type='text'>The Enemy Within The Firewall</title><content type='html'>&lt;p&gt;I’ve seen similar figures from other organisations and countries, so the stats don’t suprise me.&lt;/p&gt; &lt;p&gt;My peers and I have always called this Armadillo security, hard on the outside, soft on the inside.&lt;/p&gt; &lt;p&gt;Firewall, IDS, etc…all protecting the exterior of the network, only edge devices, nothing inside, not much policies, not much privelege segregation, anyone inside can wreak havoc.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Employees are now regarded as a greater danger to workplace cyber security than the gangs of hackers and virus writers launching targeted attacks from outside the firewall.&lt;/p&gt; &lt;p&gt;That is the perception of 75 per cent of Australian information technology managers who took part in an international IBM security survey.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Also e-mail and instant messaging is becoming increasingly pervasive, with the advent of things like Google Talk capabilities in the GMail interface, sending information outside the protective layer of the company is getting easier and easier.&lt;/p&gt; &lt;p&gt;From my professional experience, I do know some companies have extremely strict standards which are audited regularly (these include rules about removable media, BIOS passwords and OS hardening standards).&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;While 32 per cent of survey respondents were intent on upgrading firewalls, only 15 per cent planned to invest in awareness and education training for employees and only 10 per cent restricted the use of mobile devices such as wireless handheld computers not specifically sanctioned by the IT staff.&lt;/p&gt; &lt;p&gt;“Organisations need to understand what are the key pieces of information that need to be protected and be able to track who has had access to them,” she said.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;Sounds normal, good intent, but no action. Time for companies to sort themselves out I think.&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;A recent security report from antivirus company Symantec said cybercrime represented today’s greatest threat to consumers’ digital lifestyle and to online businesses in general.&lt;/p&gt; &lt;p&gt;“While past attacks were designed to destroy data, today’s attacks are increasingly designed to silently steal data for profit without doing noticeable damage that would alert a user to its presence,” the company said.&lt;/p&gt;&lt;/blockquote&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/2243764709900886089/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/2243764709900886089' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2243764709900886089'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2243764709900886089'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/enemy-within-firewall.html' title='The Enemy Within The Firewall'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-7325451120490962180</id><published>2007-11-24T04:26:00.000-08:00</published><updated>2007-11-24T04:27:01.348-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Pass-The-Hash Toolkit v1.1 Available for Download</title><content type='html'>&lt;p&gt;The concept of passing the hash on Windows came about a while ago, now there’s a tool for it in it’s second revision (which fixed some problems with foreign language Windows versions and Windows 2003).&lt;/p&gt; &lt;p&gt;The Pass-The-Hash Toolkit contains utilities to manipulate the Windows Logon Sessions mantained by the LSA (Local Security Authority) component. These tools allow you to list the current logon sessions with its corresponding NTLM credentials (e.g.: users remotely logged in thru Remote Desktop/Terminal Services), and also change in runtime the current username, domain name, and NTLM hashes (YES, PASS-THE-HASH on Windows!).&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Utilities in the toolkit:&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;IAM.EXE:&lt;/strong&gt; Pass-The-Hash for Windows. This tool allows you to change your current NTLM credentials withouth having the cleartext password but the hashes of the password. The program receives a username, domain name and the LM and NT hashes of the password; using this it will change in memory the NTLM credentials associated with the current windows logon session.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;WHOSTHERE.EXE:&lt;/strong&gt; This tool will list logon sessions with NTLM credentials (username,domain name, LM and NT hashes). Logon sessions are created by windows services that log in using specific users, remote desktop connections, etc.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;GENHASH.EXE:&lt;/strong&gt; This is a small utility that generates LM and NT hashes using some ‘undocumented’ functions of the Windows API. This is a small tool to aid testing of IAM.EXE.&lt;/p&gt; &lt;p&gt;You can download Pass-The-Hash Toolkit v1.1 here:&lt;/p&gt; &lt;p&gt;Source:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://oss.coresecurity.com/pshtoolkit/release/1.1/pshtoolkit_src_v1.1.tgz&quot;&gt;pshtoolkit_src_v1.1.tgz&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Binaries:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://oss.coresecurity.com/pshtoolkit/release/1.1/pshtoolkit_v1.1.tgz&quot;&gt;pshtoolkit_v1.1.tgz&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Or you can read more &lt;a href=&quot;http://oss.coresecurity.com/projects/pshtoolkit.htm&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/7325451120490962180/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/7325451120490962180' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7325451120490962180'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7325451120490962180'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/pass-hash-toolkit-v11-available-for_24.html' title='Pass-The-Hash Toolkit v1.1 Available for Download'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-7496795936410728204</id><published>2007-11-24T04:21:00.001-08:00</published><updated>2007-11-24T04:26:35.473-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Download pwdump6 and fgdump version 1.6.0 available now.</title><content type='html'>&lt;p&gt;New versions of the excellent pwdump6 and fgdump have been released (1.6.0 for both!). &lt;/p&gt; &lt;p&gt;For those that don’t know what pwdump or gfdump are..&lt;/p&gt; &lt;p&gt;pwdump6 is a password hash dumper for Windows 2000 and later systems. It is capable of dumping LanMan and NTLM hashes as well as password hash histories. It is based on pwdump3e, and should be stable on XP SP2 and 2K3. If you have had LSASS crash on you using older tools, this should fix that.&lt;/p&gt; &lt;div align=&quot;center&quot;&gt; &lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;4027562844&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt; &lt;/div&gt; &lt;p&gt;fgdump is a more powerful version of pwdump6. pwdump tends to hang and such when antivirus is present, so fgdump takes care of that by shutting down and later restarting a number of AV programs. It also can dump cached credentials and protected storage items, and can be run in a multithreaded fashion very easily. I strongly recommend using fgdump over pwdump6, especially given that fgdump uses pwdump6 under the hood! You’ll get everything pwdump6 gives you and a lot more.&lt;/p&gt; &lt;p&gt;Darknet definately DOES recommend fgdump, super cool update of the old favourite pwdump.&lt;/p&gt; &lt;p&gt;The primary change in both packages for version 1.6.0 is that they will once again, for the time being, sneak by antivirus more easily. This is strictly to allow the majority of the userbase, who are legitimate pen-testing users, to carry out their work unfettered.&lt;/p&gt; &lt;p&gt;fgdump was also fixed to correct a problem when running locally - if you’ve received the infamous “error 2″ message before, you should find that no longer occurs! As always, for pwdump6 users, I recommend highly that you switch to fgdump - I doubt you will regret it. &lt;img src=&quot;http://www.darknet.org.uk/wp-includes/images/smilies/icon_smile.gif&quot; alt=&quot;:)&quot; class=&quot;wp-smiley&quot; /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div align=&quot;center&quot;&gt; &lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 336; google_ad_height = 280; google_ad_format = &quot;336x280_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;4027562844&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt; &lt;/div&gt; &lt;p&gt;fgdump is targetted at the security auditing community, and is designed to be used for good, not evil. &lt;img src=&quot;http://www.darknet.org.uk/wp-includes/images/smilies/icon_smile.gif&quot; alt=&quot;:)&quot; class=&quot;wp-smiley&quot; /&gt; Note that, in order to effectively use fgdump, you’re going to need high-power credentials (Administrator or Domain Administrator, in most cases), thus limiting its usefulness as a hacking tool. However, hopefully some of you other security folks will find this helpful.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://swamp.foofus.net/fizzgig/pwdump/downloads.htm&quot;&gt;Get pwdump here&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://swamp.foofus.net/fizzgig/fgdump/downloads.htm&quot;&gt;Get fgdump here&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/7496795936410728204/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/7496795936410728204' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7496795936410728204'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7496795936410728204'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/download-pwdump6-and-fgdump-version-160_24.html' title='Download pwdump6 and fgdump version 1.6.0 available now.'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-1296224575189106419</id><published>2007-11-24T04:21:00.000-08:00</published><updated>2007-11-24T04:25:45.667-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Vista Security Feature - Teredo Protocol Analysis</title><content type='html'>&lt;p&gt;Teredo is a platform-independent protocol developed by Microsoft, which is enabled by default in Windows Vista. Teredo provides a way for nodes located behind an IPv4 NAT to connect to IPv6 nodes on the Internet. However, by tunneling IPv6 traffic over IPv4 UDP through the NAT and directly to the end node, Teredo raises some security concerns.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;Primary concerns include bypassing security controls, reducing defense in depth, and allowing unsolicited traffic. Additional security concerns associated with the use of Teredo include the capability of remote nodes to open the NAT for themselves, benefits to worms, ways to deny Teredo service, and the difficulty in finding all Teredo traffic to inspect.&lt;/p&gt; &lt;p&gt;You can find the report here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.symantec.com/avcenter/reference/Teredo_Security.pdf&quot;&gt;Teredo Security [PDF]&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;We have completed an analysis of the Teredo protocol based on a reading of the RFC (and apart from any implementation). In this section, we highlight some of the more significant security implications of the protocol; that is, ways in which Teredo positively or negatively impacts the IPv4 and IPv6 portions of the Internet.&lt;/p&gt;&lt;/blockquote&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/1296224575189106419/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/1296224575189106419' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1296224575189106419'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1296224575189106419'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/vista-security-feature-teredo-protocol.html' title='Vista Security Feature - Teredo Protocol Analysis'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-1375495032967457285</id><published>2007-11-24T04:20:00.000-08:00</published><updated>2007-11-24T04:21:00.650-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Vista Security Claims Debunked - Figures Skewed</title><content type='html'>&lt;p&gt;Ah more news about the insecurity of Vista and something we are all pretty aware of…the skewing of figures by Microsoft.&lt;/p&gt; &lt;p&gt;Microsoft apparently still hasn’t learned that counting vulnerabilities doesn’t establish some kind of ’security level’.&lt;/p&gt; &lt;p&gt;You can read the report here:&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.csoonline.com/pdf/6_Month_Vista_Vuln_Report.pdf&quot;&gt;Vista 6 Month Vuln Report [PDF]&lt;/a&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;The Microsoft “researcher” claims that Windows Vista is exponentially less vulnerable than many Linux distributions and Mac OS X. It may be true that the default Vista installation has had less public vulnerability reports, and that Linux has had many more, but this is due to the nature of Open Source. Jeff does not include any “silently fixed” vulnerabilities that have been patched since Vista was released and Microsoft has not disclosed such vulnerabilities publicly. &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;The methodology used was deeply flawed, as I briefly mentioned before, bugs in Firefox and other software like emacs count as a flaw for Linux whilst IE bugs get ignored for Vista.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;The conclusions that are drawn are built on a lack of understanding by the Microsoft researcher. I highly encourage him to go back and take another look, and pare down the results to essential information that is absolutely critical to the conclusions, rather than just “Other OS’s have more bugs, see, look at my graphs”… &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Good PR, but bad research? Seems par for the course.&lt;/p&gt; &lt;p&gt;And perhaps it could backfire PR wise, as the clued in people get pushed further away from Vista.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/1375495032967457285/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/1375495032967457285' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1375495032967457285'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/1375495032967457285'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/vista-security-claims-debunked-figures.html' title='Vista Security Claims Debunked - Figures Skewed'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-817222836844842957</id><published>2007-11-24T04:19:00.000-08:00</published><updated>2007-11-24T04:20:32.190-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>PowerShell - More than the command prompt</title><content type='html'>&lt;p&gt;For this article you should thank Patrick Ogenstad and his comment on &lt;a href=&quot;http://www.darknet.org.uk/2007/07/piping-data-in-dos-on-windows-video/&quot;&gt;my post&lt;/a&gt; , because I did not know about PowerShell until he mentioned about it… so a white point for him =)&lt;br /&gt;The parts that will follow are snippets from the Getting Started document that comes with it…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Windows PowerShell™ is a new Windows command-line shell designed especially for system administrators. The shell includes an interactive prompt and a scripting environment that can be used independently or in combination. &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Introducing Windows PowerShell&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Most shells, including Cmd.exe and the SH, KSH, CSH, and BASH Unix shells, operate by executing a command or utility in a new process, and presenting the results to the user as text. Over the years, many text processing utilities, such as sed, AWK, and PERL, have evolved to support this interaction.&lt;br /&gt;These shells also have commands that are built into the shell and run in the shell process, such as the typeset command in KSH and the dir command in Cmd.exe. In most shells, because there are few built-in commands.many utilities have been created.&lt;br /&gt;Windows PowerShell is very different.  &lt;/p&gt; &lt;ul&gt;&lt;li&gt;Windows PowerShell does not process text. Instead, it processes objects based on the .NET platform.  &lt;/li&gt;&lt;li&gt;Windows PowerShell comes with a large set of built-in commands with a consistent interface.&lt;/li&gt;&lt;li&gt;All shell commands use the same command parser, instead of different parsers for each tool. This makes it much easier to learn how to use each command.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Best of all, you don’t have to give up the tools that you have become accustomed to using. You can still use the traditional Windows tools, such as Net, SC, and Reg.exe in Windows PowerShell.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Windows PowerShell Cmdlets &lt;/strong&gt;&lt;/p&gt; &lt;p&gt;A cmdlet (pronounced “command-let”) is a single-feature command that manipulates objects in Windows PowerShell. You can recognize cmdlets by their name format — a verb and noun separated by a dash (-), such as Get-Help, Get-Process, and Start-Service.&lt;/p&gt; &lt;p&gt;In traditional shells, the commands are executable programs that range from the very simple (such as attrib.exe) to the very complex (such as netsh.exe).&lt;/p&gt; &lt;p&gt;In Windows PowerShell, most cmdlets are very simple, and they are designed to be used in combination with other cmdlets. For example, the “get” cmdlets only retrieve data, the “set” cmdlets only establish or change data, the “format” cmdlets only format data, and the “out” cmdlets only direct the output to a specified destination.&lt;br /&gt;Each cmdlet has a help file that you can access by typing:&lt;/p&gt; &lt;p&gt;&lt;code&gt;get-help  -detailed&lt;/code&gt;&lt;/p&gt; &lt;p&gt;The detailed view of the cmdlet help file includes a description of the cmdlet, the command syntax, descriptions of the parameters, and example that demonstrate use of the cmdlet.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;…and more&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Besides the above mentioned things, powerShell also includes: a new scripting language (not the lame-ass batch), processes objects, object pipelines, interaction, etc. If you are interested take a look at &lt;a href=&quot;http://microsoft.com/powershell&quot;&gt;microsoft.com/powershell&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Once again thanks to Patrick….&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/817222836844842957/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/817222836844842957' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/817222836844842957'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/817222836844842957'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/powershell-more-than-command-prompt_24.html' title='PowerShell - More than the command prompt'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-7829470562158513963</id><published>2007-11-24T04:13:00.001-08:00</published><updated>2007-11-24T04:19:09.363-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>VBootkit Bypasses Vista’s Digital Code Signing</title><content type='html'>&lt;p&gt;At Black Hat Europe (in Amsterdam) security experts from India (Nitin and Vipin Kumar of NV labs) demonstrated a special boot loader that gets around Vista’s code-signing mechanisms. Known as VBoot and launching from a CD and booting Vista it can make on-the-fly changes in memory and in files being read.&lt;/p&gt; &lt;p&gt;In a demonstration, the “boot kit” managed to run with kernel privileges and issue system rights to a CMD shell when running on Vista RC2 (build 5744), even without a Microsoft signature.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Experts say that the fundamental problem that this highlights is that every stage in Vista’s booting process works on blind faith that everything prior to it ran cleanly. The boot kit is therefore able to copy itself into the memory image even before Vista has booted and capture interrupt 13, which operating systems use for read access to sectors of hard drives, among other things.&lt;/p&gt; &lt;p&gt;As soon as the NT Boot sector loads Bootmgr.exe, VBootkit patches the security queries that ensure integrity and copies itself into an unused area of memory. Something similar is done with the subsequent boot stages of Winload.exe and NTOSKrnl.exe so that the boot kit is running in the background when the system is finally booted; at no time are Vista’s new security mechanisms, which were intended to prevent unsigned code from being executed with kernel privileges, set off. &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Interesting eh, seen as though Microsoft touts &lt;a href=&quot;http://www.darknet.org.uk/tag/vista&quot;&gt;Vista&lt;/a&gt; as so secure…and it’s already been taken apart.&lt;/p&gt; &lt;p&gt;It might lead to some interesting workarounds for &lt;a href=&quot;http://www.darknet.org.uk/tag/drm&quot;&gt;DRM&lt;/a&gt; and video content protection.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;From the &lt;a href=&quot;http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Kumar&quot;&gt;Black Hat release&lt;/a&gt;:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Vboot kit is first of its kind technology to demonstrate Windows vista kernel subversion using custom boot sector. Vboot Kit shows how custom boot sector code can be used to circumvent the whole protection and security mechanisms of Windows Vista. The booting process of windows Vista is substantially different from the earlier versions of Windows. The talk will give you:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;details and know abouts for the Vista booting process.&lt;/li&gt;&lt;li&gt;explain the vboot kit functionality and how it works.&lt;/li&gt;&lt;li&gt;insight into the Windows Vista Kernel. &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;We will also review sample Ring 0 Shell code (for Vista). The sample shellcode effectively raises the privileges of certain programs to SYSTEM. A live demonstration of vboot kit POC will be done.&lt;/p&gt;&lt;/blockquote&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/7829470562158513963/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/7829470562158513963' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7829470562158513963'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7829470562158513963'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/vbootkit-bypasses-vistas-digital-code.html' title='VBootkit Bypasses Vista’s Digital Code Signing'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-2928700237197657879</id><published>2007-11-24T04:13:00.000-08:00</published><updated>2007-11-24T04:19:03.223-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Piping Data in DOS on Windows - Video</title><content type='html'>&lt;p&gt;Well this is my last week of exams, and today I got a free day, tomorrow it will be maths… Anyway while waiting for somebody I got bored and decided to make a small (tiny) video about piping data under windows, you know | … &lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;In Unix-like computer operating systems, a pipeline is the original software pipeline: a set of processes chained by their standard streams, so that the output of each process (stdout) feeds directly as input (stdin) of the next one.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;More at &lt;a href=&quot;http://en.wikipedia.org/wiki/Pipeline_%28Unix%29&quot;&gt;Wikipedia - Pipeline (UNIX)&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;object height=&quot;350&quot; width=&quot;425&quot;&gt; &lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/UrGrTpKGAKs&quot;&gt; &lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/UrGrTpKGAKs&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/p&gt; &lt;p&gt;As always a link on youtube (better quality than the last 2 videos): &lt;a href=&quot;http://youtube.com/watch?v=UrGrTpKGAKs&quot;&gt;Tips&amp;amp;Tricks About Piping Data&lt;/a&gt;&lt;br /&gt;A download link: &lt;a href=&quot;http://www.mediafire.com/?8gjqjmbd2lt&quot;&gt;Piping_data.wmv&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://youtube.com/dblackshell&quot;&gt;My youtube channel&lt;/a&gt; =) &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/2928700237197657879/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/2928700237197657879' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2928700237197657879'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2928700237197657879'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/piping-data-in-dos-on-windows-video.html' title='Piping Data in DOS on Windows - Video'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-2471267455837627167</id><published>2007-11-24T04:11:00.000-08:00</published><updated>2007-11-24T04:13:11.562-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Fake NetBIOS Tool - Simulate Windows Hosts</title><content type='html'>&lt;p&gt;Some cool free tools made by folks from the French Honeynet Project.&lt;/p&gt; &lt;p&gt;FakeNetBIOS is a family of tools designed to simulate Windows hosts on a LAN. The individual tools are:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;FakeNetbiosDGM (NetBIOS Datagram)&lt;/li&gt;&lt;li&gt;FakeNetbiosNS (NetBIOS Name Service)&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;Each tool can be used as a standalone tool or as a honeyd responder or subsystem.&lt;/p&gt; &lt;p&gt;FakeNetbiosDGM sends NetBIOS Datagram service packets on port UDP 138 to simulate Windows hosts bradcasts. It sends periodically NetBIOS announces over the network to simulate Windows computers. It fools the Computer Browser services running over the LAN and so on.&lt;/p&gt; &lt;p&gt;FakeNetbiosNS is a NetBIOS Name Service daemon, listening on port UDP 137. It responds to NetBIOS Name requests like real Windows computers: for example ‘ping -a’, ‘nbtstat -A’ and ‘nbtstat -a’, etc.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;You can download the tools here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://honeynet.rstack.org/tools/FakeNetBIOS-0.91.zip&quot;&gt;FakeNetBIOS-0.91.zip&lt;/a&gt;&lt;/p&gt; &lt;p&gt;There are a few others things here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://honeynet.rstack.org/tools.php&quot;&gt;http://honeynet.rstack.org/tools.php&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/2471267455837627167/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/2471267455837627167' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2471267455837627167'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2471267455837627167'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/fake-netbios-tool-simulate-windows_24.html' title='Fake NetBIOS Tool - Simulate Windows Hosts'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-7854142029429587453</id><published>2007-11-24T04:10:00.001-08:00</published><updated>2007-11-24T04:12:41.383-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Netstat Revealed!</title><content type='html'>&lt;p&gt;Another video in 2-3 days… I think i this becoming like a mania for me… Anyway in this video i played around with netstat so that for those who do not play with it could see the possibilities it offers to us… no more tutorials like:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt; netstat -a&lt;br /&gt;to view all you connections&lt;br /&gt;the end &lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;… because I have seen to many of this of tuts when they speak about netstat… anyway check it out and tell me your opinion… you know it… youtube for lame quality mediafire for good quality (i got a channel)&lt;/p&gt; &lt;p&gt;&lt;object height=&quot;350&quot; width=&quot;425&quot;&gt; &lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/XoE2KBSm4fs&quot;&gt; &lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/XoE2KBSm4fs&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; height=&quot;350&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/p&gt; &lt;p&gt;Video: &lt;a href=&quot;http://www.youtube.com/watch?v=XoE2KBSm4fs&quot;&gt;netstat revealed&lt;/a&gt;&lt;br /&gt;Channel: &lt;a href=&quot;http://youtube.com/dblackshell&quot;&gt;my youtube channel&lt;/a&gt;&lt;br /&gt;Download: &lt;a href=&quot;http://www.mediafire.com/?2wzz1nfbbte&quot;&gt;netstat.avi&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/7854142029429587453/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/7854142029429587453' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7854142029429587453'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/7854142029429587453'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/netstat-revealed.html' title='Netstat Revealed!'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-4353993979528597978</id><published>2007-11-24T04:10:00.000-08:00</published><updated>2007-11-24T04:12:02.690-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>stealth techniques - syn</title><content type='html'>&lt;p&gt;Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Intro&lt;/strong&gt;&lt;br /&gt;This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques you’d better get a copy of hping.&lt;br /&gt;This method is invoked when you add nmap the -sS parameter… so let’s start…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;3 Way Handshake&lt;/strong&gt;&lt;br /&gt;If you didn’t know a tcp connection is based on a method called the three way handshake, that goes like this:&lt;/p&gt; &lt;p&gt;[host] syn flagged packet ———&gt; [destination] receives packet&lt;br /&gt;[destination] syn-ack flagged packet ———&gt; [host] receives packet&lt;br /&gt;[host] ack flagged packet ———&gt; [destination] receives packet [connection established]&lt;/p&gt; &lt;p&gt;This is the methodology of a TCP connection, just upon a successful execution of this section a real connection is done… You probably can see a weak point in this method, can’t you. For every sent packet the host (and destination) waits a period of time for the next packet. If you can send really fast spoofed syn packets you can DoS a target in no time, this is the oldest DoSing method ever known to man (and women) =)&lt;/p&gt; &lt;p&gt;&lt;strong&gt;SYNner&lt;/strong&gt;&lt;br /&gt;Firstly let’s see what happens if we hit a closed port, try out the following command (and result after it):&lt;/p&gt; &lt;pre&gt;C:\\&gt;hping -p 81 -S lx.ro&lt;br /&gt;HPING (XPSP2) lx.ro (SiS 900 PCI Fast Ethernet Adapter -&lt;br /&gt;Packet Scheduler Miniport 81.181.218.80): S set, 40 headers + 0&lt;br /&gt;data bytes&lt;br /&gt;&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=81 flags=RA seq=0&lt;br /&gt;win=0 rtt=70.0 ms&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=81 flags=RA seq=1&lt;br /&gt;win=0 rtt=20.0 ms&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=81 flags=RA seq=2&lt;br /&gt;win=0 rtt=30.0 ms&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=81 flags=RA seq=3&lt;br /&gt;win=0 rtt=40.0 ms&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;As you can see on an unsuccessful port scan we get a &lt;strong&gt;R&lt;/strong&gt;eset-&lt;strong&gt;A&lt;/strong&gt;cknowledge , which tels us, as already mentioned, that we hit a closed port…&lt;br /&gt;Now for the moment we all were waiting for:&lt;/p&gt; &lt;pre&gt;C:\\&gt;hping -p 80 -S lx.ro&lt;br /&gt;HPING (XPSP2) lx.ro (SiS 900 PCI Fast Ethernet Adapter -&lt;br /&gt;Packet Scheduler Miniport 81.181.218.80): S set, 40 headers + 0&lt;br /&gt;data bytes&lt;br /&gt;&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=80 flags=SA seq=0&lt;br /&gt;win=5840 rtt=30.0 ms&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=80 flags=SA seq=0&lt;br /&gt;win=5840 rtt=0.0 ms&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=80 flags=SA seq=1&lt;br /&gt;win=5840 rtt=50.0 ms&lt;br /&gt;len=46 ip=81.181.218.80 ttl=54 DF id=0 sport=80 flags=SA seq=0&lt;br /&gt;win=5840 rtt=0.0 ms&lt;br /&gt;&lt;/pre&gt; &lt;p&gt;As you can see we hit an open port… If you weren’t attentive till now a syn-ack flag means an open port, half-way connected…&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Epilogue&lt;/strong&gt;&lt;br /&gt;Nowadays this method isn’t as stealthy as it was years ago, because now firewalls most often drop unwanted packets or sees them as pre-DoS syn packets…&lt;/p&gt; &lt;p&gt;More info about TCP :: &lt;a href=&quot;http://www.rhyshaden.com/tcp.htm&quot;&gt;www.rhyshaden.com&lt;/a&gt;&lt;br /&gt;(first useful link that I have found with google)&lt;/p&gt; &lt;p&gt;Next &gt;&gt; Xmas/Fin/Null&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/4353993979528597978/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/4353993979528597978' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/4353993979528597978'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/4353993979528597978'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/stealth-techniques-syn_24.html' title='stealth techniques - syn'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-2699098464807188611</id><published>2007-11-24T04:09:00.001-08:00</published><updated>2007-11-24T04:10:56.670-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Zalewski (lcamtuf) Strikes Again - More Vulnerabilites in IE and Firefox</title><content type='html'>&lt;p&gt;Our Polish friend and expert security researcher, Michal Zalewski (lcamtuf), known for his endless stream of vulnerabilities in all manners of software, has struck again.&lt;/p&gt; &lt;p&gt;This time with some pretty serious flaws in both Internet &lt;del fancytooltip=&quot;5 months and 3 weeks&quot; gmttime=&quot;Tue, 05 Jun 2007 22:03:42 GMT&quot; datetime=&quot;2007-06-06T05:03:42+00:00&quot;&gt;Exploder&lt;/del&gt; Explorer and Firefox. This time it’s 4, 2 in IE and 2 in Firefox.&lt;/p&gt; &lt;p&gt;The first which effects fully patched IE6 and IE7 is pretty serious and can result in cookie theft, cooking setting, page hijacking or memory corruption.&lt;/p&gt; &lt;p&gt;It’s based on a page update Race Condition (aka bait and switch vuln).&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;When Javascript code instructs MSIE6/7 to navigate away from a page that meets same-domain origin policy (and hence can be scriptually accessed and modified by the attacker) to an unrelated third-party site, there is a window of opportunity for concurrently executed Javascript to perform actions with the permissions for the old page, but actual content for the newly loaded page&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;The demo can be found here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://lcamtuf.coredump.cx/ierace/&quot;&gt;http://lcamtuf.coredump.cx/ierace/&lt;/a&gt;&lt;/p&gt; &lt;p&gt;The more serious of the two Firefox flaws is marked MAJOR and not CRITICAL and deals with the way the browser handles IFRAMEs (Cross-site IFRAME hijacking)&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Javascript can be used to inject malicious code, including key-snooping event handlers, on pages that rely on IFRAMEs to display contents or store state data / communicate with the server.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;A demo can be found here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://lcamtuf.coredump.cx/ifsnatch/&quot;&gt;http://lcamtuf.coredump.cx/ifsnatch/&lt;/a&gt;&lt;/p&gt; &lt;p&gt;The full e-mail with details of his vulnerabilities can be found here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063712.html&quot;&gt;[Full-disclosure] Assorted browser vulnerabilities&lt;/a&gt;&lt;/p&gt; &lt;p&gt;You can also read more at &lt;a href=&quot;http://www.theregister.co.uk/2007/06/05/browser_vulns_identified/&quot;&gt;The Register&lt;/a&gt; or &lt;a href=&quot;http://www.eweek.com/article2/0,1759,2141952,00.asp&quot;&gt;eWeek&lt;/a&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/2699098464807188611/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/2699098464807188611' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2699098464807188611'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/2699098464807188611'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/zalewski-lcamtuf-strikes-again-more.html' title='Zalewski (lcamtuf) Strikes Again - More Vulnerabilites in IE and Firefox'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8144177571624445356.post-830528766704012202</id><published>2007-11-24T04:09:00.000-08:00</published><updated>2007-11-24T04:10:21.747-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows hacking"/><title type='text'>Nemesis - Packet Injection Suite</title><content type='html'>&lt;p&gt;Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;Nemesis can natively craft and inject packets for:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;ARP&lt;/li&gt;&lt;li&gt;DNS&lt;/li&gt;&lt;li&gt;ETHERNET&lt;/li&gt;&lt;li&gt;ICMP&lt;/li&gt;&lt;li&gt;IGMP&lt;/li&gt;&lt;li&gt;IP&lt;/li&gt;&lt;li&gt;OSPF&lt;/li&gt;&lt;li&gt;RIP&lt;/li&gt;&lt;li&gt;TCP&lt;/li&gt;&lt;li&gt; UDP&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Using the IP and the Ethernet injection modes, almost any custom packet can be crafted and injected.&lt;/p&gt; &lt;p&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!-- google_ad_client = &quot;pub-3033787195489589&quot;; google_alternate_ad_url = &quot;http://www.darknet.org.uk/google_adsense_script.html&quot;; google_ad_width = 468; google_ad_height = 60; google_ad_format = &quot;468x60_as&quot;; google_ad_type = &quot;text&quot;; google_ad_channel =&quot;9647861209&quot;; google_color_border = &quot;FFFFFF&quot;; google_color_bg = &quot;FFFFFF&quot;; google_color_link = &quot;df6f0b&quot;; google_color_url = &quot;df6f0b&quot;; google_color_text = &quot;000000&quot;; //--&gt;&lt;/script&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt; &lt;/script&gt;&lt;/p&gt; &lt;p&gt;Unix-like systems require: &lt;a href=&quot;http://www.packetfactory.net/libnet/dist/deprecated/libnet-1.0.2a.tar.gz&quot;&gt;libnet-1.0.2a&lt;/a&gt;, and a C compiler (GCC)&lt;br /&gt;Windows systems require: &lt;a href=&quot;http://prdownloads.sourceforge.net/nemesis/libnet-1.0.2g.zip?download&quot;&gt;libnetNT-1.0.2g&lt;/a&gt; and either &lt;a href=&quot;http://windump.polito.it/misc/bin/2.3-WinPcap.exe&quot;&gt;WinPcap-2.3&lt;/a&gt; or &lt;a href=&quot;http://winpcap.polito.it/install/bin/WinPcap_3_0.exe&quot;&gt;WinPcap-3.0&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Download it here:&lt;/p&gt; &lt;p&gt;Source code: &lt;a href=&quot;http://prdownloads.sourceforge.net/nemesis/nemesis-1.4.tar.gz?download&quot;&gt;nemesis-1.4.tar.gz (Build 26)&lt;/a&gt;&lt;br /&gt;Windows binary: &lt;a href=&quot;http://prdownloads.sourceforge.net/nemesis/nemesis-1.4.zip?download&quot;&gt;nemesis-1.4.zip (Build 26)&lt;/a&gt; (&lt;strong&gt;includes LibnetNT&lt;/strong&gt;)&lt;/p&gt; &lt;p&gt;You can read more here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://nemesis.sourceforge.net/&quot;&gt;Nemisis at Sourceforge&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hackingbases.blogspot.com/feeds/830528766704012202/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/8144177571624445356/830528766704012202' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/830528766704012202'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8144177571624445356/posts/default/830528766704012202'/><link rel='alternate' type='text/html' href='http://hackingbases.blogspot.com/2007/11/nemesis-packet-injection-suite_24.html' title='Nemesis - Packet Injection Suite'/><author><name>neo</name><uri>http://www.blogger.com/profile/10419444913051709925</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>