<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-18555569</id><updated>2024-09-06T16:36:38.194-03:00</updated><category term="Security"/><title type='text'>HEXALE (security &amp;amp; reverse engineering)</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>94</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-18555569.post-5207406689705219440</id><published>2015-01-27T17:19:00.002-03:00</published><updated>2015-01-27T17:21:19.487-03:00</updated><title type='text'>(CVE-2014-8826) OS X Gatekeeper Bypass Vulnerability</title><content type='html'>(CVE-2014-8826) OS X Gatekeeper Bypass Vulnerability
&lt;br&gt;&lt;br&gt;
(HTML) &lt;a href=&quot;http://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html&quot;&gt;http://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html&lt;/a&gt;&lt;br&gt;&lt;br&gt;
(TXT) &lt;a href=&quot;http://www.ampliasecurity.com/advisories/AMPLIA-ARA100614.txt&quot;&gt;http://www.ampliasecurity.com/advisories/AMPLIA-ARA100614.txt&lt;/a&gt;&lt;br&gt;&lt;br&gt;

Blog post: &lt;br&gt;
&lt;a href=&quot;http://www.ampliasecurity.com/blog/2015/01/27/bypassing_os_x_gatekeeper/&quot;&gt;Bypassing OS X Gatekeeper&lt;/a&gt;&lt;br&gt;

</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5207406689705219440/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5207406689705219440?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5207406689705219440'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5207406689705219440'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2015/01/cve-2014-8826-os-x-gatekeeper-bypass.html' title='(CVE-2014-8826) OS X Gatekeeper Bypass Vulnerability'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-4646239143017384203</id><published>2014-09-25T13:47:00.001-03:00</published><updated>2014-09-29T17:07:38.930-03:00</updated><title type='text'>CVE-2014-6271: Exploiting Bash Remote Code Execution Vulnerability</title><content type='html'>
Checkout ampliasecurity&#39;s exploit for the CVE-2014-6271 Bash Remote Code Execution Vulnerability against a simple #!/bin/bash CGI script running on Apache.&lt;br&gt;


&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=PLnvKsYJwiM&quot;&gt;(CVE-2014-6271) Exploiting Bash Remote Code Execution Vulnerability&lt;/a&gt;&lt;br&gt;

&lt;br&gt;


&lt;iframe width=&quot;420&quot; height=&quot;315&quot; src=&quot;//www.youtube.com/embed/PLnvKsYJwiM&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;

&lt;br&gt;
&lt;p&gt;
You can also read:

&lt;a href=&quot;http://www.ampliasecurity.com/blog/2014/09/24/exploiting_bash_remote_code_execution_vulnerability_CVE-2014-6271/&quot;&gt;Exploiting BASH Remote Code Execution Vulnerability (CVE-2014-6271)&lt;/a&gt;
&lt;br&gt;

&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/4646239143017384203/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/4646239143017384203?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4646239143017384203'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4646239143017384203'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2014/09/cve-2014-6271-exploiting-bash-remote.html' title='CVE-2014-6271: Exploiting Bash Remote Code Execution Vulnerability'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-6977621871437072494</id><published>2013-11-15T00:04:00.001-03:00</published><updated>2013-11-15T00:04:25.874-03:00</updated><title type='text'>WCE v1.42beta released (64bit)</title><content type='html'>WCE v1.42beta released (64bit)&lt;br&gt;
New in this version: improved support for unicode passwords, improved &quot;safe mode&quot; no code injection.&lt;br&gt;

&lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_42beta_x64.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_42beta_x64.zip&lt;/a&gt;
&lt;br&gt;

</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/6977621871437072494/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/6977621871437072494?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/6977621871437072494'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/6977621871437072494'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2013/11/wce-v142beta-released-64bit.html' title='WCE v1.42beta released (64bit)'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-2040923097720728349</id><published>2013-11-15T00:03:00.000-03:00</published><updated>2013-11-15T00:03:15.456-03:00</updated><title type='text'>WCE v1.42beta released (32bit)</title><content type='html'>
WCE v1.42beta released (32bit). This is a minor release.&lt;br&gt;
New in this version: bug fixes and improved support for unicode cleartext passwords.
&lt;br&gt;
&lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_42beta_x32.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_42beta_x32.zip&lt;/a&gt;

</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/2040923097720728349/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/2040923097720728349?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/2040923097720728349'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/2040923097720728349'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2013/11/wce-v142beta-released-32bit.html' title='WCE v1.42beta released (32bit)'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5397277680097074796</id><published>2013-07-18T11:52:00.002-03:00</published><updated>2013-07-18T11:55:02.389-03:00</updated><title type='text'>WCE v1.41beta released (minor release)</title><content type='html'>
WCE 1.41beta released. This is a minor release.
&lt;p&gt;
Universal binary: &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_41beta_universal.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_41beta_universal.zip&lt;/a&gt;&lt;br&gt;
32bit: &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_41beta_x32.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_41beta_x32.zip&lt;/a&gt;&lt;br&gt;
64bit: &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_41beta_x64.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_41beta_x64.zip&lt;/a&gt;&lt;br&gt;



</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5397277680097074796/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5397277680097074796?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5397277680097074796'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5397277680097074796'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2013/07/wce-v141beta-released-minor-release.html' title='WCE v1.41beta released (minor release)'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5841093350931987246</id><published>2013-05-30T22:56:00.000-03:00</published><updated>2013-05-30T22:56:31.673-03:00</updated><title type='text'>WCE v1.4beta released</title><content type='html'>
WCE v1.4beta released. Includes several bug fixes and support for Windows 8.&lt;br&gt;&lt;br&gt;
32bit version available at &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_4beta_x32.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_4beta_x32.zip&lt;/a&gt;
&lt;br&gt;
64bit version available at &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_4beta_x64.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_4beta_x64.zip&lt;/a&gt;
&lt;br&gt;
&quot;Universal Binary&quot; (works both on x32 and x64) available at &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_4beta_universal.zip&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_4beta_universal.zip&lt;/a&gt;


</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5841093350931987246/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5841093350931987246?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5841093350931987246'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5841093350931987246'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2013/05/wce-v14beta-released.html' title='WCE v1.4beta released'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5390507503519787427</id><published>2013-01-10T20:19:00.000-03:00</published><updated>2013-01-10T21:05:27.819-03:00</updated><title type='text'>Java 7 Update 10 0-Day RCE Exploit Demo (CVE-2013-0422)</title><content type='html'>
This is a demo of the Java 7 Update 10 0-Day Vulnerability made public on 01-10-2013 (CVE-2013-0422). 

&lt;a href=&quot;http://youtu.be/jyLAUESuLwU?hd=1&quot;&gt;Java 7 Update 10 0-Day RCE Exploit Demo (CVE-2013-0422)&lt;/a&gt;

&lt;p&gt;
Exploit made public by &lt;a href=&quot;http://www.twitter.com/Kafeine&quot;&gt;http://www.twitter.com/Kafeine&lt;/a&gt;&lt;br&gt;
Exploit code released publicly by Gdark - DamageLabs&lt;br&gt;
&lt;p&gt;
References:&lt;br&gt;
&lt;a href=&quot;http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html&quot;&gt;http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://pastebin.com/raw.php?i=cUG2ayjh&quot;&gt;http://pastebin.com/raw.php?i=cUG2ayjh&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422&quot;&gt;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422&lt;/a&gt;&lt;br&gt;
&lt;p&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5390507503519787427/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5390507503519787427?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5390507503519787427'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5390507503519787427'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2013/01/java-7-update-10-0-day-rce-exploit-demo.html' title='Java 7 Update 10 0-Day RCE Exploit Demo (CVE-2013-0422)'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-698357939930364605</id><published>2012-11-27T21:51:00.000-03:00</published><updated>2012-11-27T21:51:21.609-03:00</updated><title type='text'>New addition to the WCE FAQ: &quot;How can I prevent WCE dumping my logon password in cleartext?&quot;</title><content type='html'>
New addition to the WCE FAQ: &quot;How can I prevent WCE dumping my logon password in cleartext?&quot;
&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://www.ampliasecurity.com/research/wcefaq.html#preventcleartextpwddump&quot;&gt;http://www.ampliasecurity.com/research/wcefaq.html#preventcleartextpwddump&lt;/a&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/698357939930364605/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/698357939930364605?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/698357939930364605'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/698357939930364605'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2012/11/new-addition-to-wce-faq-how-can-i.html' title='New addition to the WCE FAQ: &quot;How can I prevent WCE dumping my logon password in cleartext?&quot;'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-4012093292818017234</id><published>2012-08-28T21:27:00.001-03:00</published><updated>2012-08-28T21:27:13.701-03:00</updated><title type='text'>Java 0-Day Vulnerability Exploit Demo (CVE-2012-4681)</title><content type='html'>&lt;p&gt;
This is a demo of the Java 0-Day Vulnerability made public on 08-26-2012 (now CVE-2012-4681): &lt;a href=&quot;http://youtu.be/HO4yO7_5sEc?hd=1&quot;&gt;http://youtu.be/HO4yO7_5sEc?hd=1&lt;/a&gt; (watch in HD)
&lt;/p&gt;
&lt;p&gt;
This vulnerability was found being exploited in the wild and discovered by Michael Schierl.
&lt;/p&gt;
&lt;p&gt;
This exploit was written based on the PoC published by @jduck1337 at &lt;a href=&quot;http://pastie.org/pastes/4594319/text&quot;&gt;http://pastie.org/pastes/4594319/text&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Tested on Windows 7 with Internet Explorer, Firefox and Chrome (keep in mind this affects Java on all platforms)
&lt;p&gt;
The exploit is extremely easy to implement, not much needs to be changed from the public PoC besides adding code to drop a payload. 
&lt;br&gt;
&lt;br&gt;
References:&lt;br&gt;&lt;br&gt;
&lt;a href=&quot;http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html&quot;&gt;http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html&quot;&gt;http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://immunityproducts.blogspot.com.ar/2012/08/java-0day-analysis-cve-2012-4681.html&quot;&gt;http://immunityproducts.blogspot.com.ar/2012/08/java-0day-analysis-cve-2012-4681.html&lt;/a&gt;&lt;br&gt;



</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/4012093292818017234/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/4012093292818017234?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4012093292818017234'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4012093292818017234'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2012/08/java-0-day-vulnerability-exploit-demo.html' title='Java 0-Day Vulnerability Exploit Demo (CVE-2012-4681)'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5761204875855141368</id><published>2012-06-13T15:08:00.001-03:00</published><updated>2012-06-13T15:10:35.212-03:00</updated><title type='text'>Exploiting MySQL Authentication Bypass Vulnerability (CVE-2012-2122)</title><content type='html'>via &lt;a href=&quot;http://www.twitter.com/ampliasecurity&quot;&gt;@ampliasecurity&lt;/a&gt;: This week in videos: Exploiting MySQL Authentication Bypass Vulnerability (CVE-2012-2122) &lt;a href=&quot;http://youtu.be/Mg5iUjOpusE?hd=1&quot;&gt;http://youtu.be/Mg5iUjOpusE?hd=1&lt;/a&gt;
&lt;p&gt;
Exploitation of this critical vulnerability is trivial and requires only to perform several authentication attempts with any password and a valid username until the MySQL server grants access. 
&lt;p&gt;
After successful exploitation this exploit dumps information from the target MySQL server such as: version, available databases, password hashes of MySQL users to be cracked later, dumps some system files, in this example, /etc/password, etc. Depending on the configuration of the target MySQL server and privileges of the user selected other actions can be performed.
&lt;p&gt;
More information:&lt;br&gt;
&lt;a href=&quot;http://seclists.org/oss-sec/2012/q2/493&quot;&gt;http://seclists.org/oss-sec/2012/q2/493&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://bugs.mysql.com/bug.php?id=64884&quot;&gt;http://bugs.mysql.com/bug.php?id=64884&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122&quot;&gt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122&lt;/a&gt;&lt;br&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5761204875855141368/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5761204875855141368?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5761204875855141368'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5761204875855141368'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2012/06/exploiting-mysql-authentication-bypass.html' title='Exploiting MySQL Authentication Bypass Vulnerability (CVE-2012-2122)'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-4084527106520108568</id><published>2012-06-01T15:49:00.002-03:00</published><updated>2012-06-01T15:49:37.362-03:00</updated><title type='text'>Exploiting Apache Struts ExceptionDelegator Vulnerability (CVE-2012-0391)</title><content type='html'>via &lt;a href=&quot;http://www.twitter.com/ampliasecurity&quot;&gt;@ampliasecurity&lt;/a&gt;:

This week in videos: Exploiting Apache Struts ExceptionDelegator Vulnerability (CVE-2012-0391) &lt;a href=&quot;http://youtu.be/YGCSJEZ7kPk?hd=1&quot;&gt;http://youtu.be/YGCSJEZ7kPk?hd=1&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/4084527106520108568/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/4084527106520108568?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4084527106520108568'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4084527106520108568'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2012/06/exploiting-apache-struts.html' title='Exploiting Apache Struts ExceptionDelegator Vulnerability (CVE-2012-0391)'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5293773982606570098</id><published>2012-03-14T18:22:00.000-03:00</published><updated>2012-03-14T18:22:08.806-03:00</updated><title type='text'>WCE v1.3beta 64bit released</title><content type='html'>WCE v1.3beta 64bit released. You can download it &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_3beta_x64.tgz&quot;&gt;here&lt;/a&gt;.

The same functionality recently added to the 32bit version was added to the 64bit version.</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5293773982606570098/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5293773982606570098?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5293773982606570098'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5293773982606570098'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2012/03/wce-v13beta-64bit-released.html' title='WCE v1.3beta 64bit released'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-523523105506282914</id><published>2012-03-08T20:28:00.000-03:00</published><updated>2012-03-11T12:05:50.367-03:00</updated><title type='text'>WCE v1.3beta 32bit released</title><content type='html'>WCE v1.3beta 32bit released. You can download it &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_3beta.tgz&quot;&gt;here&lt;/a&gt;.
&lt;br&gt;&lt;br&gt;
&lt;b&gt;Changelog for Windows Credentials Editor (WCE) 32-bit version&lt;/b&gt; 
&lt;br&gt;&lt;br&gt;
version 1.3beta:&lt;br&gt;
March 8, 2012
&lt;li&gt;Bug fixes&lt;br&gt;
&lt;li&gt;Extended support to obtain NTLM hashes without code injection&lt;br&gt;
&lt;li&gt;Added feature to dump login cleartext passwords stored by the Digest Authentication package&lt;br&gt;
&lt;br&gt;&lt;br&gt;
Example:&lt;br&gt;
&lt;br&gt;
    * Dump cleartext passwords stored by the Digest Authentication package
&lt;br&gt;&lt;br&gt;
C:\&amp;gt;wce -w&lt;br&gt;
WCE v1.3beta (Windows Credentials Editor) - (c) 2010,2011,2012 Amplia Security -&lt;br&gt;
 by Hernan Ochoa (hernan@ampliasecurity.com)&lt;br&gt;
Use -h for help.&lt;br&gt;
&lt;br&gt;&lt;br&gt;
test\MYDOMAIN:mypass1234&lt;br&gt;
NETWORK SERVICE\WORKGROUP:test&lt;br&gt;
&lt;br&gt;&lt;br&gt;
The cleartext passwords dumped include passwords used to login to the Windows box interactively.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;What is WCE?&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
Windows Credentials Editor (WCE) v1.3beta allows you to&lt;br&gt;
&lt;br&gt;
NTLM authentication:&lt;br&gt;
&lt;br&gt;
* List logon sessions and add, change, list and delete associated credentials (e.g.: LM/NT hashes)&lt;br&gt;
* Perform pass-the-hash on Windows natively&lt;br&gt;
* Obtain NT/LM hashes from memory (from interactive logons, services, remote desktop connections, etc.) which can be&lt;br&gt;
used to authenticate to other systems. WCE can perform this task without injecting code, just by reading and decrypting information stored in Windows internal memory structures. It also has the capability to automatically switch to code injection when the aforementioned method cannot be performed&lt;br&gt;
&lt;br&gt;
Kerberos authentication:&lt;br&gt;
&lt;br&gt;
* Dump Kerberos tickets (including the TGT) stored in Windows machines&lt;br&gt;
* Reuse/Load those tickets on another Windows machines, to authenticate to other systems and services&lt;br&gt;
* Reuse/Load those tickets on *Unix machines, to authenticate to other systems and services&lt;br&gt;
&lt;br&gt;
Digest Authentication:&lt;br&gt;
&lt;br&gt;
* Obtain cleartext passwords entered by the user when logging into a Windows system, and stored by the Windows Digest Authentication security package&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;b&gt;Supported Platforms&lt;/b&gt;&lt;br&gt;
Windows Credentials Editor supports Windows XP, 2003, Vista, 7 and 2008.&lt;br&gt;
&lt;br&gt;
Video (watch in 720p):
&lt;center&gt;
&lt;iframe width=&quot;480&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/tJ0VJVrhwTE?rel=0&amp;hd=1&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/center&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/523523105506282914/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/523523105506282914?isPopup=true' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/523523105506282914'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/523523105506282914'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2012/03/wce-v13beta-32bit-released.html' title='WCE v1.3beta 32bit released'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/tJ0VJVrhwTE/default.jpg" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-2771087168873785066</id><published>2012-02-28T20:41:00.000-03:00</published><updated>2012-02-28T20:41:00.248-03:00</updated><title type='text'>WCE v1.21 64-bit version released</title><content type='html'>I just released WCE v1.21 64bit. This is a minor release, only for the x64 version of WCE.&lt;br&gt;
It fixes some minor issues with the tool when run on Windows Server 2008.&lt;br&gt;
&lt;p&gt;
You can download it &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_21_x64.tgz&quot;&gt;here&lt;/a&gt;.
&lt;/p&gt;
If you have any questions, please don&#39;t hesitate to contact me at hernan[[at]]ampliasecurity.com. &lt;br&gt;
&lt;br&gt;
For any issues you may have, please send me an email instead of leaving your issues as comments; I can&#39;t answer your
questions properly if you do, and you&#39;ll most likely not get your problem solved. Email me and I&#39;ll solve your issue.</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/2771087168873785066/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/2771087168873785066?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/2771087168873785066'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/2771087168873785066'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2012/02/wce-v121-64-bit-version-released.html' title='WCE v1.21 64-bit version released'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5878242032531595072</id><published>2011-08-23T10:46:00.000-03:00</published><updated>2011-08-23T10:46:45.802-03:00</updated><title type='text'>WCE v1.2 64-bit version released</title><content type='html'>&lt;br /&gt;
You can find the 64-bit version of WCE v1.2 &lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_2_x64.tgz&quot;&gt;here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
As always, all feedback is welcome, email me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thank you!&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5878242032531595072/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5878242032531595072?isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5878242032531595072'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5878242032531595072'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2011/08/wce-v12-64-bit-version-released.html' title='WCE v1.2 64-bit version released'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5835852772362464933</id><published>2011-08-17T14:15:00.000-03:00</published><updated>2011-08-17T14:15:28.043-03:00</updated><title type='text'>&quot;Post-Exploitation with WCE&quot; Presentation</title><content type='html'>&lt;br /&gt;
This presentation describes the techniques WCE brings to penetration testers and how these can be used in different scenarios. Although originally targeted to college students studying information security, you might find useful information you didn&#39;t know about even if you are an experienced user of WCE or penetration tester. &lt;br /&gt;
&lt;br /&gt;
Direct links:&lt;br /&gt;
&lt;a href=&quot;http://www.ampliasecurity.com/research/wce12_uba_ampliasecurity_spa.pdf&quot;&gt;Post-Exploitation with WCE (SPANISH)&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.ampliasecurity.com/research/wce12_uba_ampliasecurity_eng.pdf&quot;&gt;Post-Exploitation with WCE (ENGLISH)&lt;/a&gt; </content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5835852772362464933/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5835852772362464933?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5835852772362464933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5835852772362464933'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2011/08/post-exploitation-with-wce-presentation.html' title='&quot;Post-Exploitation with WCE&quot; Presentation'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-1426796440375018630</id><published>2011-08-03T23:19:00.000-03:00</published><updated>2011-08-03T23:19:44.252-03:00</updated><title type='text'>Windows Credentials Editor (WCE) FAQ released</title><content type='html'>I find myself answering a lot of questions about WCE and related matters all the time; for this reason I decided to create a WCE FAQ to try to provide a centralized source of information and answers to all the questions.&amp;nbsp;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;You can find it here&amp;nbsp;&lt;a href=&quot;http://www.ampliasecurity.com/research/wcefaq.html&quot;&gt;http://www.ampliasecurity.com/research/wcefaq.html&lt;/a&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;The FAQ is still work in progress and I will continue to update it regularly with new information, attack scenarios, different ways to use the features provided by the tool, etc.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;If you have a question in particular that you want answer, please don&#39;t hesitate to contact me, I&#39;ll answer you personally and also add the question and answer to the FAQ.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/1426796440375018630/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/1426796440375018630?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/1426796440375018630'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/1426796440375018630'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2011/08/windows-credentials-editor-wce-faq.html' title='Windows Credentials Editor (WCE) FAQ released'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-4368366953021836600</id><published>2011-04-18T11:42:00.004-03:00</published><updated>2011-04-18T11:44:45.145-03:00</updated><title type='text'>Windows Credentials Editor (WCE) v1.2 released</title><content type='html'>Windows Credentials Editor v1.2&lt;br /&gt;
&lt;br /&gt;
New features in this version:&lt;br /&gt;
-g&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Generate LM &amp;amp; NT Hash.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Parameters: &lt;password&gt;&amp;lt;password&amp;gt;.&lt;br /&gt;
-K&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dump Kerberos tickets to file (unix &amp;amp; &#39;windows wce&#39; format)&lt;br /&gt;
-k&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Read Kerberos tickets from file and insert into Windows cache&lt;br /&gt;
&lt;br /&gt;
Description:&lt;br /&gt;
Windows Credentials Editor (WCE) allows to list logon sessions and add, change, list and delete associated credentials (ex.: LM/NT hashes and Kerberos tickets). This can be used, for example, to perform pass-the-hash on Windows, obtain NT/LM hashes from memory (from interactive logons, services, remote desktop connections, etc.) which can be used to perform further attacks, obtain Kerberos tickets and reuse them in other Windows or Unix systems.&lt;br /&gt;
&lt;br /&gt;
WCE v1.2 supports obtaining logon sessions and NTLM credentials just by reading&lt;br /&gt;
memory without performing code injection.&lt;br /&gt;
&lt;br /&gt;
Dumping Kerberos tickets and adding them to the Windows cache was tested on Windows 7; your feedback is welcome.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Download:&lt;br /&gt;
&lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_2.tgz&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_2.tgz&lt;/a&gt; &lt;br /&gt;
&lt;/password&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/4368366953021836600/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/4368366953021836600?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4368366953021836600'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4368366953021836600'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2011/04/windows-credentials-editor-wce-v12.html' title='Windows Credentials Editor (WCE) v1.2 released'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-3580717223302915189</id><published>2011-03-09T06:58:00.000-03:00</published><updated>2011-03-09T06:58:02.157-03:00</updated><title type='text'>RootedCON 2011 &quot;WCE Internals&quot; presentation available at slideshare</title><content type='html'>Check out my presentation on &quot;WCE Internals&quot; (based on WCEv1.1) available at slideshare (posted by RootedCON):&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.slideshare.net/rootedcon/hernan-ochoa-wce-internals-rootedcon-2011&quot;&gt;http://www.slideshare.net/rootedcon/hernan-ochoa-wce-internals-rootedcon-2011&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
I&#39;ll publish the .pdf on &lt;a href=&quot;http://www.ampliasecurity.com/research/&quot;&gt;http://www.ampliasecurity.com/research/&lt;/a&gt; next week.&lt;br /&gt;
&lt;br /&gt;
You can find all the RootedCON 2011 presentations here:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.slideshare.net/rootedcon/&quot;&gt;http://www.slideshare.net/rootedcon/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Some presos are in Spanish and some in English.&lt;br /&gt;
&lt;br /&gt;
Go check them out!</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/3580717223302915189/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/3580717223302915189?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/3580717223302915189'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/3580717223302915189'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2011/03/rootedcon-2011-wce-internals.html' title='RootedCON 2011 &quot;WCE Internals&quot; presentation available at slideshare'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-1942847683079967233</id><published>2011-03-07T10:12:00.000-03:00</published><updated>2011-03-07T10:12:05.133-03:00</updated><title type='text'>WCE v1.1 is out!</title><content type='html'>WCE v1.1 is out!&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.ampliasecurity.com/research/wce_v1_1.tgz&quot;&gt;http://www.ampliasecurity.com/research/wce_v1_1.tgz&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
README:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Windows Credentials Editor v1.1 &lt;br /&gt;
(c) 2010, 2011 Amplia Security, Hernan Ochoa &lt;br /&gt;
written by: hernan@ampliasecurity.com &lt;br /&gt;
http://www.ampliasecurity.com &lt;br /&gt;
------------------------------------------------------------- &lt;br /&gt;
&lt;br /&gt;
Abstract &lt;br /&gt;
---------- &lt;br /&gt;
Windows Credentials Editor (WCE) allows to list logon sessions and add, change, list and delete associated credentials (ex.: LM/NT hashes). This can be used, for example, to perform pass-the-hash on Windows and also obtain NT/LM hashes from memory (from interactive logons, services, remote desktop connections, etc.) which can be used in further attacks. &lt;br /&gt;
&lt;br /&gt;
WCE v1.1 supports obtaining logon sessions and NTLM credentials just by reading &lt;br /&gt;
memory without performing code injection. &lt;br /&gt;
&lt;br /&gt;
Supported Platforms &lt;br /&gt;
------------------- &lt;br /&gt;
Windows Credentials Editor supports Windows XP, 2003, Vista, 7 and 2008 &lt;br /&gt;
&lt;br /&gt;
Requirements &lt;br /&gt;
------------- &lt;br /&gt;
This tool requires administrator privileges. &lt;br /&gt;
&lt;br /&gt;
Options &lt;br /&gt;
-------- &lt;br /&gt;
Windows Credentials Editor provides the following options: &lt;br /&gt;
&lt;br /&gt;
Options:&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -l&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; List logon sessions and NTLM credentials (default). &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -s&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Changes NTLM credentials of current logon session. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Parameters: &lt;username&gt;:&lt;domainname&gt;:&lt;lmhash&gt;:&lt;nthash&gt;. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -r&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Lists logon sessions and NTLM credentials indefinitely. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Refreshes every 5 seconds if new sessions are found. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Optional: -r&lt;refresh interval=&quot;&quot;&gt;. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -c&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Run &lt;cmd&gt; in a new session with the specified NTLM credentials. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Parameters: &lt;cmd&gt;. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -e&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Lists logon sessions NTLM credentials indefinitely. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Refreshes every time a logon event occurs. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -o&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; saves all output to a file. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Parameters: &lt;filename&gt;. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -i&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Specify LUID instead of use current logon session. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Parameters: &lt;luid&gt;. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -d&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Delete NTLM credentials from logon session. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Parameters: &lt;luid&gt;. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -a&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Use Addresses. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Parameters: &lt;addresses&gt; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -f&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Force &#39;safe mode&#39;. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -v&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; verbose output. &lt;br /&gt;
&lt;br /&gt;
Examples: &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * List current logon sessions &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -l &lt;br /&gt;
WCE v1.0 (Windows Credentials Editor) - (c) 2010 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com) &lt;br /&gt;
Use -h for help. &lt;br /&gt;
&lt;br /&gt;
meme:meme:11111111111111111111111111111111:11111111111111111111111111111111 &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * List current logon sessions with verbose output enabled &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -l -v &lt;br /&gt;
WCE v1.0 (Windows Credentials Editor) - (c) 2010 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com) &lt;br /&gt;
Use -h for help. &lt;br /&gt;
&lt;br /&gt;
Current Logon Session LUID: 00064081h &lt;br /&gt;
Logon Sessions Found: 8 &lt;br /&gt;
WIN-REK2HG6EBIS\auser:NTLM &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:0006409Fh &lt;br /&gt;
WIN-REK2HG6EBIS\auser:NTLM &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:00064081h &lt;br /&gt;
NT AUTHORITY\ANONYMOUS LOGON:NTLM &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:00019137h &lt;br /&gt;
NT AUTHORITY\IUSR:Negotiate &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:000003E3h &lt;br /&gt;
NT AUTHORITY\LOCAL SERVICE:Negotiate &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:000003E5h &lt;br /&gt;
WORKGROUP\WIN-REK2HG6EBIS$:Negotiate &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:000003E4h &lt;br /&gt;
\:NTLM &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:0000916Ah &lt;br /&gt;
WORKGROUP\WIN-REK2HG6EBIS$:NTLM &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LUID:000003E7h &lt;br /&gt;
&lt;br /&gt;
00064081:meme:meme:11111111111111111111111111111111:11111111111111111111111111111111&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Change NTLM credentials associated with current logon session &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -s auser:adomain:99999999999999999999999999999999:99999999999999999999999999999999 &lt;br /&gt;
WCE v1.0 (Windows Credentials Editor) - (c) 2010 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com) &lt;br /&gt;
Use -h for help. &lt;br /&gt;
&lt;br /&gt;
Changing NTLM credentials of current logon session (00064081h) to: &lt;br /&gt;
Username: auser &lt;br /&gt;
domain: admin &lt;br /&gt;
LMHash: 99999999999999999999999999999999 &lt;br /&gt;
NTHash: 99999999999999999999999999999999 &lt;br /&gt;
NTLM credentials successfully changed! &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Add/Change NTLM credentials of a logon session (not the current one) &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -i 3e5 -s auser:adomain:99999999999999999999999999999999:99999999999999999999999999999999&amp;nbsp; &lt;br /&gt;
WCE v1.0 (Windows Credentials Editor) - (c) 2010 Amplia Security - by Hernan Och &lt;br /&gt;
oa (hernan@ampliasecurity.com) &lt;br /&gt;
Use -h for help. &lt;br /&gt;
&lt;br /&gt;
Changing NTLM credentials of logon session 000003E5h to: &lt;br /&gt;
Username: auser &lt;br /&gt;
domain: admin &lt;br /&gt;
LMHash: 99999999999999999999999999999999 &lt;br /&gt;
NTHash: 99999999999999999999999999999999 &lt;br /&gt;
NTLM credentials successfully changed! &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Delete NTLM credentials associated with a logon session &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -d 3e5 &lt;br /&gt;
WCE v1.0 (Windows Credentials Editor) - (c) 2010 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com) &lt;br /&gt;
Use -h for help. &lt;br /&gt;
&lt;br /&gt;
NTLM credentials successfully deleted! &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Run WCE indefinitely, waiting for new credentials/logon sessions. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Refresh is performed every time a logon event is registered in the Event Log. &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -e &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Run WCE indefinitely, waiting for new credentials/logon sessions &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Refresh is every 5 seconds by default. &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -r &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; * Run WCE indefinitely, waiting for new credentials/logon sessions, but refresh every 1 second (by default wce refreshes very 5 seconds) &lt;br /&gt;
&lt;br /&gt;
C:\&amp;gt;wce -r5 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
GETLSASRVADDR.EXE &lt;br /&gt;
----------------- &lt;br /&gt;
This tool can be used to obtain automatically needed addresses for WCE &lt;br /&gt;
to be able to read logon sessions and NTLM credentials from memory. &lt;br /&gt;
&lt;br /&gt;
Addresses obtained can then be used with WCE using the -A switch. &lt;br /&gt;
&lt;br /&gt;
This tool requires the dlls symsrv.dll and dbghelp.dll available from the &lt;br /&gt;
&quot;Debugging Tools for Windows&quot; package. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/addresses&gt;&lt;/luid&gt;&lt;/luid&gt;&lt;/filename&gt;&lt;/cmd&gt;&lt;/cmd&gt;&lt;/refresh&gt;&lt;/nthash&gt;&lt;/lmhash&gt;&lt;/domainname&gt;&lt;/username&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/1942847683079967233/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/1942847683079967233?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/1942847683079967233'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/1942847683079967233'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2011/03/wce-v11-is-out.html' title='WCE v1.1 is out!'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-5907521036316532832</id><published>2010-12-28T13:35:00.000-03:00</published><updated>2010-12-28T13:35:23.126-03:00</updated><title type='text'>Amplia Security at H2HC Cancun</title><content type='html'>Amplia Security at H2HC Cancun :)&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEsorLNhwyAvdNKdMXCLN0gotl9nRe8btbtm7oak1YNcuHTbMS5DAa6oTFgj7pxD-q0cS2Fj5bICdtZ4NJ7ygdZ2LqIpQsj_zfOgISjvTWzjhuCgvA4kYRaa5maqVDY1NBwNg/s1600/AmpliaSecurity_H2HC_Cancun.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEsorLNhwyAvdNKdMXCLN0gotl9nRe8btbtm7oak1YNcuHTbMS5DAa6oTFgj7pxD-q0cS2Fj5bICdtZ4NJ7ygdZ2LqIpQsj_zfOgISjvTWzjhuCgvA4kYRaa5maqVDY1NBwNg/s320/AmpliaSecurity_H2HC_Cancun.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/5907521036316532832/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/5907521036316532832?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5907521036316532832'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/5907521036316532832'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2010/12/amplia-security-at-h2hc-cancun.html' title='Amplia Security at H2HC Cancun'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEsorLNhwyAvdNKdMXCLN0gotl9nRe8btbtm7oak1YNcuHTbMS5DAa6oTFgj7pxD-q0cS2Fj5bICdtZ4NJ7ygdZ2LqIpQsj_zfOgISjvTWzjhuCgvA4kYRaa5maqVDY1NBwNg/s72-c/AmpliaSecurity_H2HC_Cancun.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-2850892460173347862</id><published>2010-10-30T14:19:00.001-03:00</published><updated>2010-10-30T14:21:59.818-03:00</updated><title type='text'>Contributing author of Hacking Exposed Web Applications 3rd. Edition</title><content type='html'>Shamless plug alert!&lt;br /&gt;
&lt;br /&gt;
Hacking Exposed Web Applications 3rd. Edition is out! and I&#39;m a contributing author! Check it out!&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;a href=&quot;http://www.amazon.com/HACKING-EXPOSED-WEB-APPLICATIONS-3/dp/0071740643/ref=sr_1_1?ie=UTF8&amp;amp;qid=1288459138&amp;amp;sr=8-1&quot;&gt;http://www.amazon.com/HACKING-EXPOSED-WEB-APPLICATIONS-3/dp/0071740643/ref=sr_1_1?ie=UTF8&amp;amp;qid=1288459138&amp;amp;sr=8-1&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/2850892460173347862/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/2850892460173347862?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/2850892460173347862'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/2850892460173347862'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2010/10/contributing-author-of-hacking-exposed.html' title='Contributing author of Hacking Exposed Web Applications 3rd. Edition'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-4823852715710369957</id><published>2010-10-20T12:39:00.000-03:00</published><updated>2010-10-20T12:39:40.103-03:00</updated><title type='text'>MS10-070 ASP.NET Auto-Decryptor File Download PoC exploit</title><content type='html'>This is another exploit part of the MS10-070 saga :)&lt;br /&gt;
&lt;br /&gt;
It is not the same as our other &lt;a href=&quot;http://www.ampliasecurity.com/research/aspx_po_chotext_attack.rb&quot;&gt;previously released exploit&lt;/a&gt;, this one uses another information leak. On average, this exploit should allow you to do the same as the previous one but faster (which is important/desirable in this scenario).&lt;br /&gt;
&lt;br /&gt;
You can find it here:&lt;br /&gt;
http://www.ampliasecurity.com/research/aspx_ad_chotext_attack.rb</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/4823852715710369957/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/4823852715710369957?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4823852715710369957'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4823852715710369957'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2010/10/ms10-070-aspnet-auto-decryptor-file.html' title='MS10-070 ASP.NET Auto-Decryptor File Download PoC exploit'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-3933655695697204952</id><published>2010-10-14T22:42:00.000-03:00</published><updated>2010-10-14T22:42:56.160-03:00</updated><title type='text'>MS10-070 ASP.NET Padding Oracle attack PoC exploit video</title><content type='html'>Yesterday, Agustin Azubel from &lt;a href=&quot;http://www.ampliasecurity.com/&quot;&gt;Amplia Security&lt;/a&gt; released a proof-of-concept exploit implementing a Padding Oracle attack against ASP.NET (MS10-070) that allows an attacker to download a file from the remote web server. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today we released a video showing how the PoC exploit works.&lt;br /&gt;
&lt;br /&gt;
You can find it here:&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt;&lt;a class=&quot;tweet-url web&quot; href=&quot;http://vimeo.com/15856549&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://vimeo.com/15856549&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt;and also, here:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a class=&quot;tweet-url web&quot; href=&quot;http://www.youtube.com/ampliasecurity#p/u/0/2jvmT5lmIIM&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.youtube.com/ampliasecurity#p/u/0/2jvmT5lmIIM&lt;/a&gt;&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;If you don&#39;t feel like installing IIS/ASP.NET and creating a sample application or don&#39;t have an already vulnerable ASP.NET application to test the PoC exploit on, the video will give you an idea on how the exploit works.</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/3933655695697204952/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/3933655695697204952?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/3933655695697204952'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/3933655695697204952'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2010/10/ms10-070-aspnet-padding-oracle-attack_14.html' title='MS10-070 ASP.NET Padding Oracle attack PoC exploit video'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18555569.post-4209006904656225265</id><published>2010-10-13T15:31:00.000-03:00</published><updated>2010-10-13T15:31:19.675-03:00</updated><title type='text'>MS10-070 ASP.NET Padding Oracle Attack to download web.config or other files</title><content type='html'>&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;You can find it here: &amp;nbsp;                   &lt;span class=&quot;entry-content&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt;&amp;nbsp;&lt;a class=&quot;tweet-url web&quot; href=&quot;http://www.ampliasecurity.com/research/aspx_po_chotext_attack.rb&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.ampliasecurity.com/research/aspx_po_chotext_attack.rb&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt;A proof-of-concept attack against MS10-070, this PoC is an implementation in Ruby of a Padding Oracle attack and allows you to download the &#39;Web.config&#39; file or any other file from a vulnerable ASP.NET installation.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt;It was written by Agustin Azubel (aazubel [ at ]&amp;nbsp; ampliasecurity.com).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;status-content&quot;&gt; &lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://hexale.blogspot.com/feeds/4209006904656225265/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18555569/4209006904656225265?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4209006904656225265'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18555569/posts/default/4209006904656225265'/><link rel='alternate' type='text/html' href='http://hexale.blogspot.com/2010/10/ms10-070-aspnet-padding-oracle-attack.html' title='MS10-070 ASP.NET Padding Oracle Attack to download web.config or other files'/><author><name>hernan</name><uri>http://www.blogger.com/profile/12754761735106237455</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>