<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-383300286802714993</id><updated>2024-08-29T15:20:54.153+03:30</updated><category term="AppScan"/><category term="Computer"/><category term="Denial of Service"/><category term="DoS"/><category term="SYN Cookie"/><category term="TCP"/><category term="book review"/><category term="elecomp meeting"/><category term="fingerprinting"/><category term="netcat"/><category term="netcat power tools"/><category term="obfuscate TCP stack"/><category term="osfuscate"/><category term="prevent web app scanner"/><category term="vulnerability scanner"/><category term="web app vuln scanner"/><title type='text'>my obfuscated mind close-up</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>10</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-68298277117207056</id><published>2009-07-02T16:36:00.001+04:30</published><updated>2009-07-02T16:45:59.294+04:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppScan"/><category scheme="http://www.blogger.com/atom/ns#" term="elecomp meeting"/><category scheme="http://www.blogger.com/atom/ns#" term="prevent web app scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="web app vuln scanner"/><title type='text'>Prevent Web Application Vulnerability Scanner</title><content type='html'>hi guys,&lt;br /&gt;at least i decided to take this blog out of magazine releases news fashion, and  pulled one of ideas out of my head, implement it, and write a little about it here.&lt;br /&gt;&lt;br /&gt;anyway,let&#39;s get on the subject.&lt;br /&gt;Certainly you have experience in working by WEB Application Vulnerability Scanners.They are all going to be improved and this is a big threat to all of web applications.both commercial and non-commercial web apps.&lt;br /&gt;although there is many false positive in their results but most of them make the way of attacking luminous to us.It&#39;s great that you can find most of hidden directory in the web sites, check for SQL injection, Cross Site Scripting, Cross Site Request Forgery and so on.&lt;br /&gt;This is great for pen-tester and a threat for security managers !&lt;br /&gt;umm, the question that i asked myself many times was: how to scape from these web app scanners?&lt;br /&gt;I scanned a Content management system(CMS) a few web application vulnerability scanners many many times.then sniffed the requests and the responses.after all i&#39;ve founded that there is an unique USER-AGENT for each of these web app vuln scanners.in some of them you can change the USER-AGENT value,but in some this options is not implemented.and of course many users of these softwares that allow you to change, do not change the default value of USER-AGENT. So this is a good way to identify the web app vuln scanner softwares. however this can not fool elite users of these softwares.&lt;br /&gt;It was still a possibility, not a fact. So i decided to examine this.&lt;br /&gt;I fired up IBM Rational AppScan. Then check the request that AppScan Sent to remote http server. It was &quot;Mozilla/4.0 (compatible; MSIE 6.0; Win32)&quot; .&lt;br /&gt;Also you can grab this USER-AGENT value by a short PHP code such as:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxxeStxUO479Fzl373i1IG1UqWPECPhitJAcoR_eszAdl0-dvJTeTmd_haDzkg306oKSn5v9kEkAPJ_XJUIOddKNs_0vUUGa4AQcy_Zva83_0DV45ZbpiUZZ6zk_jB5NjCXBIrMJ4Aays/s1600-h/code1.png&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 278px; height: 116px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxxeStxUO479Fzl373i1IG1UqWPECPhitJAcoR_eszAdl0-dvJTeTmd_haDzkg306oKSn5v9kEkAPJ_XJUIOddKNs_0vUUGa4AQcy_Zva83_0DV45ZbpiUZZ6zk_jB5NjCXBIrMJ4Aays/s400/code1.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5281634385466718178&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It will write down the USER-AGENT value of anything(browser, web app scanner and so on...) that request this page in data.txt besid itself.&lt;br /&gt;Well,this is a good idea to foolish these scanners. So we fake a 404 error page for them.ha?!&lt;br /&gt;ok let&#39;s write the code..&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguN5rociFhbNtQUU6BjIXUQ23tpA2KgjETTHzylYck6nnq6sO705y0VHWztzcBr4HUhBr27zMae_ZJnfqw6R8jW-dvusgM7CAk90Wv3TPhDXt5leu0obl4_2o28N8m1Pge3WUp26A_mfs/s1600-h/code2.png&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 152px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguN5rociFhbNtQUU6BjIXUQ23tpA2KgjETTHzylYck6nnq6sO705y0VHWztzcBr4HUhBr27zMae_ZJnfqw6R8jW-dvusgM7CAk90Wv3TPhDXt5leu0obl4_2o28N8m1Pge3WUp26A_mfs/s400/code2.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5281634702085451234&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;then i&#39;ve scanned this page by AppScan automatically and it just detected the 404 error. then found out Manual test in Scan menu.I send a query and again 404 !&lt;br /&gt;after all i saw AppScan Browser.I opend the page with it,and yes welcome message :-(&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWOtIaXv1bnQVxxiSVUlocKMjZvOhw3I9clZhmtTEOHwjRalrhpqdBXLFGl9yymvsR91gTkficBfxs0qVPMr2wHqfYA1fcHN62Z-LFPMU6K-_1iUYRUri2mpE8DYsErD6kW9mfyCW3xeU/s1600-h/manual-test.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 238px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWOtIaXv1bnQVxxiSVUlocKMjZvOhw3I9clZhmtTEOHwjRalrhpqdBXLFGl9yymvsR91gTkficBfxs0qVPMr2wHqfYA1fcHN62Z-LFPMU6K-_1iUYRUri2mpE8DYsErD6kW9mfyCW3xeU/s320/manual-test.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5281635637055245202&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;I checked it and found out that it use a different USER-AGENT, So i grab it and added in IF condition after an OR Logical Operator.then refreshed the page and finally 404 error :-)&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBTIi8x38tFpbPMQvWBBCc4Rj7BD26UpCRvSixYRel_tVZN5T45md65Pa3DNUzemsnVDTUO2Re6Z5H5PmU5nO5I2evOkeeTO5w7jqY39yjE48Vz1hyphenhyphen4-gG0FhuQx9w_WqwiNI08m5Q5Wo/s1600-h/appscan-browser.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 259px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBTIi8x38tFpbPMQvWBBCc4Rj7BD26UpCRvSixYRel_tVZN5T45md65Pa3DNUzemsnVDTUO2Re6Z5H5PmU5nO5I2evOkeeTO5w7jqY39yjE48Vz1hyphenhyphen4-gG0FhuQx9w_WqwiNI08m5Q5Wo/s320/appscan-browser.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5281636283959587650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;finaly the code goes something like this:&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR7l44sM-vJ2b94-N-rJ3pXuuBdAOXMGIwqkn9QpIpulhUckueGNCikkwpOQj4k_kqSp6x97c9to-wzaiXEuGeU1Ih_Y8d8J958obge1McFAEgEfAPtYv9d-9o4MTUkZODf_1T3mam_eQ/s1600-h/code3.png&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 247px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR7l44sM-vJ2b94-N-rJ3pXuuBdAOXMGIwqkn9QpIpulhUckueGNCikkwpOQj4k_kqSp6x97c9to-wzaiXEuGeU1Ih_Y8d8J958obge1McFAEgEfAPtYv9d-9o4MTUkZODf_1T3mam_eQ/s400/code3.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5281635225116024194&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;be careful about what USER-AGENT you are fil*ter*ing in your code.if you fil*ter a usual USER-AGENT , so many of  blameless visitors of your web site see 404 error page!!&lt;br /&gt;well,may be it&#39;s not the best way and writing a secure program is better, but always there is something that you forget,and there is someone else that [ab]use it to smash your web app ! so this can be a guard between you and the Artificial Intelligence of these Web App vuln scanners.though you can not foolish an elite user with these kind of tricks.;)&lt;br /&gt;&lt;/p&gt;&lt;p&gt;that was all..&lt;/p&gt;&lt;p&gt;P.s. : this post is old! more or less for 7 months ago, I took this in draft for some skit reasons but now decided to publish it.&lt;/p&gt;&lt;p&gt;comments are welcomed ;-)&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/68298277117207056/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/68298277117207056' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/68298277117207056'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/68298277117207056'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2008/12/prevent-web-application-vulnerability.html' title='Prevent Web Application Vulnerability Scanner'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxxeStxUO479Fzl373i1IG1UqWPECPhitJAcoR_eszAdl0-dvJTeTmd_haDzkg306oKSn5v9kEkAPJ_XJUIOddKNs_0vUUGa4AQcy_Zva83_0DV45ZbpiUZZ6zk_jB5NjCXBIrMJ4Aays/s72-c/code1.png" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-7748680398888557276</id><published>2009-05-15T18:21:00.003+04:30</published><updated>2009-05-15T18:50:02.938+04:30</updated><title type='text'>Snoop Magazine news Releases</title><content type='html'>Another Hi after a long time of silence on my blog. btw it&#39;s good, at least that&#39;s I&#39;m still alive!&lt;br /&gt;&lt;br /&gt;In this period of time we were working on Snoop Digital Security Magazine!&lt;br /&gt;&lt;br /&gt;Well we have released 2 version of magazine!&lt;br /&gt;one of them was No#2 of Snoop Magazine and contains below topics:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://snoopmag.net/images/cover_thumbnail2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 283px;&quot; src=&quot;http://snoopmag.net/images/cover_thumbnail2.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;- Deep Look at SEH Overwrite Exploitation Techniques&lt;br /&gt;                - One Attack, One Solution.. (GreenSQL DB Firewall)&lt;br /&gt;                - Deep into Metasploit - Part 2&lt;br /&gt;                - Surf Jacking&lt;br /&gt;                - Analysis of CVE-2009-0658&lt;br /&gt;                - Introduction to Honeypots&lt;br /&gt;                - Using Dynamic IP Restrictions in IIS7&lt;br /&gt;                - Introduction to Cisco Security Solutions and CS-MARS&lt;br /&gt;                - Top 100 Network Security Tools&lt;br /&gt;                - Downadup/Conficker Detection&lt;br /&gt;              - .Net/Java Code Obfuscation&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Next release was a special edition (No#2.5) for sake of releasing new ubuntu(9.04) and contains a couple of articles on (in)security aspects of this distro. topics are:&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://snoopmag.net/images/cover_thumbnail2.5.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 283px;&quot; src=&quot;http://snoopmag.net/images/cover_thumbnail2.5.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;- Your Distro is Insecure: Ubuntu&lt;br /&gt;                 - GnuPrivacyGuard HowTo&lt;br /&gt;                 - Securing Ubuntu Linux&lt;br /&gt;                 - Configure SSL in Ubuntu&lt;br /&gt;                 - Getting Start with Firewall Builder&lt;br /&gt;                 - OSX Tiger vs. Vista vs. Ubuntu&lt;br /&gt;&lt;br /&gt;you can download all of these releases from Snoop Magazine web-site:&lt;br /&gt;&lt;a href=&quot;http://snoopmag.net/archive.html&quot;&gt;http://snoopmag.net/archive.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;after all i want to thanks all of my friends and colleague at Snoop-Security such as : Adel Karimi, Shahriyar Jalayeri, Alireza Mohammadzade, Mohammad Sadegh Babaei, Vahid Amirian and other fellas..&lt;br /&gt;&lt;br /&gt;hope you find it useful.&lt;br /&gt;/aMIr</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/7748680398888557276/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/7748680398888557276' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7748680398888557276'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7748680398888557276'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2009/05/snoop-magazine-news-releases.html' title='Snoop Magazine news Releases'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-7592008031393600763</id><published>2009-03-22T03:07:00.002+04:30</published><updated>2009-03-22T03:14:14.213+04:30</updated><title type='text'>Happy Norooz and MS !exploitable extension review</title><content type='html'>hi guys,&lt;br /&gt;yep after all of these insomnia i&#39;m still alive.&lt;br /&gt;Microsoft today release a WinDbg Extension in the name of &quot;!exploitable&quot; and after some tests i review this on &quot;Snoop Security Researching Community&quot; blog and you can read this post here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.snoop-security.com/blog/?p=6&quot;&gt;http://www.snoop-security.com/blog/?p=6&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;another good news is that new issue of Snoop Security Magazine coming soon(cheers to Adel).&lt;br /&gt;oh i forgot it! happy norooz everyone. i wish a good year for you and your family in peace and luck.&lt;br /&gt;&lt;br /&gt;that was all&lt;br /&gt;/aMIr</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/7592008031393600763/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/7592008031393600763' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7592008031393600763'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7592008031393600763'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2009/03/happy-norooz-and-ms-exploitable.html' title='Happy Norooz and MS !exploitable extension review'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-4531033503484052098</id><published>2009-03-02T20:32:00.002+03:30</published><updated>2009-03-02T20:50:28.261+03:30</updated><title type='text'>I need INT3 on my life process</title><content type='html'>I know it&#39;s long time that i&#39;m not updating this blog, yep that&#39;s my bad.&lt;br /&gt;These days i&#39;m really confused and mixed up. I&#39;m in process of reading , researching, writing and blah blah blah..&lt;br /&gt;before the next season of year we&#39;ll release next number of Snoop-Secrity Digital Magazine. If you haven&#39;t downloaded the first release you can grab it at &lt;a href=&quot;http://www.snoopmag.net/&quot;&gt;www.snoopmag.net&lt;/a&gt; and feel free to contact us about the articles contents, sections, and everything you think can help growing the value of this release.And if you wanna write article contact me, however we have sufficient number of articles for this release and we save your article for the next season(spring) release.&lt;br /&gt;IMHO this coming release has more usefull stuffs. You can wait and see these changes in next release.&lt;br /&gt;As i said in the beginnig i&#39;am really confused and it&#39;s so much time that i&#39;m awake!&lt;br /&gt;God, please send INT3 on my life running process...</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/4531033503484052098/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/4531033503484052098' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/4531033503484052098'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/4531033503484052098'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2009/03/i-need-int3-on-my-life-process.html' title='I need INT3 on my life process'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-381983659857914024</id><published>2008-11-05T01:03:00.005+03:30</published><updated>2008-12-10T10:53:22.410+03:30</updated><title type='text'>Snoop Digital Security Magazine No. #1 Released</title><content type='html'>Hi Everyone;&lt;br /&gt;&lt;br /&gt;After a while from starting of this project finally our magazine released just right now.&lt;br /&gt;&lt;br /&gt;Indisputably it&#39;s in our native language( persian ) and included many good stuffs such as:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBkdLurrxKItfI4cB_GLR_C1mbQ6sx1Y6PQpR4lk2bm2ViLo6WwJVJcG3sPfWwh8k752BwUqKdOtC8aTCEqx6WXArFEcsY1ihGxr-1a4VgeNLAc13gwEljjF1cF74yDUNloa8bW68zoGU/s1600-h/cover.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 142px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBkdLurrxKItfI4cB_GLR_C1mbQ6sx1Y6PQpR4lk2bm2ViLo6WwJVJcG3sPfWwh8k752BwUqKdOtC8aTCEqx6WXArFEcsY1ihGxr-1a4VgeNLAc13gwEljjF1cF74yDUNloa8bW68zoGU/s200/cover.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5267496332079530450&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXU7GpGoz3o0pk0iastuIAQLTSXCnwMmVawDkTCcIwUJDsHYGHXsXSjKhWt3DQA208C-YB0L1VGw7vVEZPMqfWDnnaV9Uas-e_PqiJfumlJ3uWg4NhulEmyeQVB524iItJvZLCkjpoD_Y/s1600-h/content.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 142px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXU7GpGoz3o0pk0iastuIAQLTSXCnwMmVawDkTCcIwUJDsHYGHXsXSjKhWt3DQA208C-YB0L1VGw7vVEZPMqfWDnnaV9Uas-e_PqiJfumlJ3uWg4NhulEmyeQVB524iItJvZLCkjpoD_Y/s200/content.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5267496336701770850&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;An Inroduction To DNS And Kaminsky DNS Vulnerability&lt;br /&gt;Wireless Packet Injection With Airpwn&lt;br /&gt;Exploiting Office:MS08-011 Attacking using Malformed .WPS&lt;br /&gt;Security Tools Review: Nipper&lt;br /&gt;A Simple Reverse Engineering&lt;br /&gt;Hacking JSON&lt;br /&gt;Intrusion Prevention Systems&lt;br /&gt;Security Books Review: Security Power Tools&lt;br /&gt;Basic IPTables&lt;br /&gt;Deep Into Metasploit - Part 1&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://mag.snoop-security.com/&quot;&gt;http://mag.snoop-security.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;I hope you read it and find it useful.&lt;br /&gt;&lt;br /&gt;I wanna thank from Netw0rm, Snake, L0pht, Black Scorpion, amytis and…&lt;br /&gt;&lt;br /&gt;Snoop Security Researching Committee&lt;br /&gt;&lt;br /&gt;sCORPINo&lt;br /&gt;&lt;br /&gt;[UPDATE]:Because of low bandwidth of our site you can also download this number of magazine from below address:&lt;br /&gt;&lt;a href=&quot;http://scorpino.parsaspace.com/magazine/SnoopDigitalMagNo1.pdf&quot;&gt;http://scorpino.parsaspace.com/magazine/SnoopDigitalMagNo1.pdf&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/381983659857914024/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/381983659857914024' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/381983659857914024'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/381983659857914024'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2008/11/snoop-digital-security-magazine-no-1.html' title='Snoop Digital Security Magazine No. #1 Released'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBkdLurrxKItfI4cB_GLR_C1mbQ6sx1Y6PQpR4lk2bm2ViLo6WwJVJcG3sPfWwh8k752BwUqKdOtC8aTCEqx6WXArFEcsY1ihGxr-1a4VgeNLAc13gwEljjF1cF74yDUNloa8bW68zoGU/s72-c/cover.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-4122075028035798125</id><published>2008-10-20T19:41:00.009+03:30</published><updated>2008-10-22T15:32:55.681+03:30</updated><title type='text'>don&#39;t check my Y! ID nosy</title><content type='html'>A simple trick or just a light bulb on my curious mind.&lt;br /&gt;&lt;br /&gt;May be you have seen web sites that check a Y! ID for invisibility and avatar photo.I don&#39;t link to them,you can find them in WWW.&lt;br /&gt;I&#39;m just thinking about how they work and what is behind the screen.&lt;br /&gt;At beginning i was thinking that your online/invisible/offline status reported to Y! servers and these web sites robots check the invisibility and avatar photo from Y! servers and this is a full passive way to catch information about you and you can not do anything!&lt;br /&gt;I had been in curious mode and thinking about that, immediately a light bulb came out of my head.I quickly fired up my fave sniffer wireshark and started it to capture traffic on my Y! ID client(pidgin) listening port and i saw what i wanted.You can look it in the below picture and blah blah..&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZxuAGyyBQxfCSidO7RmWtEhXdwAD0AeobrqjPYmjqPOphLEbJ_e4TynJAkzXo3gYsBJezNfPuTL7sGojPAkgq1-GfsoFCdsawQ8vcH6cu53TeichJHhvO2DaiKgGJ4r3GbP-C95SQWJY/s1600-h/yahoo+inv+packet.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZxuAGyyBQxfCSidO7RmWtEhXdwAD0AeobrqjPYmjqPOphLEbJ_e4TynJAkzXo3gYsBJezNfPuTL7sGojPAkgq1-GfsoFCdsawQ8vcH6cu53TeichJHhvO2DaiKgGJ4r3GbP-C95SQWJY/s320/yahoo+inv+packet.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5259284598105772194&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;everything is clear..&lt;br /&gt;&lt;br /&gt;P.S:Today I accidentally see metallica new album which named &quot;&lt;a href=&quot;http://www.metallica.com/Media/Albums/albums.asp?album_id=12&quot;&gt;Death Magnetic&lt;/a&gt;&quot;.It was much better than previous album of this group.In the previous album i just loved Frantic but there is more lovely songs in this new album..</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/4122075028035798125/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/4122075028035798125' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/4122075028035798125'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/4122075028035798125'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2008/10/dont-check-my-y-id-nosy.html' title='don&#39;t check my Y! ID nosy'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZxuAGyyBQxfCSidO7RmWtEhXdwAD0AeobrqjPYmjqPOphLEbJ_e4TynJAkzXo3gYsBJezNfPuTL7sGojPAkgq1-GfsoFCdsawQ8vcH6cu53TeichJHhvO2DaiKgGJ4r3GbP-C95SQWJY/s72-c/yahoo+inv+packet.png" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-5064309875615677908</id><published>2008-10-15T23:04:00.012+03:30</published><updated>2008-12-10T10:55:08.692+03:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="fingerprinting"/><category scheme="http://www.blogger.com/atom/ns#" term="obfuscate TCP stack"/><category scheme="http://www.blogger.com/atom/ns#" term="osfuscate"/><category scheme="http://www.blogger.com/atom/ns#" term="TCP"/><title type='text'>Obfuscating Your OS TCP Stack or The Way To OSfuscate</title><content type='html'>Just another TCP post!&lt;br /&gt;There is many tools for TCP/IP Stack Fingerprinting to figure out the target Operation System.all these tools use fixed methods.Normally these software send an SYN and wait for SYN/ACK , when they receive that packet(or any response to their request) they analyze the packet for Flag&#39;s value and guess the OS.&lt;br /&gt;Fyodor listed TCP/IP stack Fingerprinting methods in his article(nmap fingerprinting) and that list contains below methods:&lt;br /&gt;The FIN probe, The BOGUS flag probe, TCP ISN Sampling, Don&#39;t Fragment bit, TCP Initial Window, ACK Value, ICMP Error Message Quenching, ICMP Message Quoting, ICMP Error message echoing integrity, Type of Service, Fragmentation Handling, TCP Options, SYN Flood Resistance&lt;br /&gt;&lt;br /&gt;these method supported by nmap.&lt;br /&gt;there is a picture from &lt;a href=&quot;http://sourceforge.net/projects/networkminer/&quot;&gt;Network Miner &lt;/a&gt;tool that show some active and passive fingerprinting result for a single IP address.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIbkGjoF96hKH0dMqD0GJxHlmtcYl-wQhJRFokllIXnFbCCktrcJf8I59D_duL-4iFNA3TxGddeA4CxdPDH5_pE429n9y-wuIz_gHRWWvSY6aq3S1RL71ofg8Oca3IZ-hotUvm9yr2ixM/s1600-h/networkminer-before1.PNG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIbkGjoF96hKH0dMqD0GJxHlmtcYl-wQhJRFokllIXnFbCCktrcJf8I59D_duL-4iFNA3TxGddeA4CxdPDH5_pE429n9y-wuIz_gHRWWvSY6aq3S1RL71ofg8Oca3IZ-hotUvm9yr2ixM/s200/networkminer-before1.PNG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5257789505205384626&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;It&#39;s currently a Vista BoX that is with it&#39;s default configuration.&lt;br /&gt;after some changes you can see that p0f and Ettercap can not detect the OS.although satori can detect by analyzing DHCP packets.It seems that windows does not allow you to modify it&#39;s DHCP packet configuration as well as TCP.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitUWynpfQQmCrqZ2wqoDNiQQ9FEqrEwyIcyfFvQxu0ux6C49gOfbFFYGdzQwDzZpf7EFNo51KMlcCoo-5pHumD4zLfkwVFkwBcZShyphenhyphenrH1pJymljQUBLI_ryBp_GNPmGCZZZeabnEtniiY/s1600-h/networkminer-after.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitUWynpfQQmCrqZ2wqoDNiQQ9FEqrEwyIcyfFvQxu0ux6C49gOfbFFYGdzQwDzZpf7EFNo51KMlcCoo-5pHumD4zLfkwVFkwBcZShyphenhyphenrH1pJymljQUBLI_ryBp_GNPmGCZZZeabnEtniiY/s200/networkminer-after.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5257789073708226114&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;this tool change some value in your windows registry that include these keys:&lt;br /&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DefaultTTL&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Tcp1323Opts&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\EnablePMTUDiscovery&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\TcpUseRFC1122UrgentPointer&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\TcpWindowSize&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\SackOpts&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\*\MTU&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;here you can see result of nmap OS fingerprinting scan before and after using this tool:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;before:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;nmap -T Aggressive -O 192.168.1.123&lt;br /&gt;PORT STATE SERVICE&lt;br /&gt;3389/tcp open ms-term-serv&lt;br /&gt;5357/tcp open unknown&lt;br /&gt;MAC Address: 00:1A:70:3C:A6:3D (Cisco-Linksys)&lt;br /&gt;Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port&lt;br /&gt;Device type: general purpose&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Running (JUST GUESSING) : FreeBSD 6.X (92%), OpenBSD 4.X (92%), &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Microsoft Windows Vista (86%)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Aggressive OS guesses: FreeBSD 6.2-RELEASE (92%), OpenBSD 4.3 (92%), Microsoft Windows Vista (86%), Microsoft Windows Vista Home Basic (86%)&lt;/span&gt;&lt;br /&gt;No exact OS matches for host (test conditions non-ideal).&lt;br /&gt;Network Distance: 1 hop &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;and after:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;nmap -T Aggressive -O 192.168.1.123&lt;br /&gt;PORT STATE SERVICE&lt;br /&gt;3389/tcp open ms-term-serv&lt;br /&gt;5357/tcp open unknown&lt;br /&gt;MAC Address: 00:1A:70:3C:A6:3D (Cisco-Linksys)&lt;br /&gt;Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port&lt;br /&gt;Device type: general purpose&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Running (JUST GUESSING) : FreeBSD 6.X (96%), OpenBSD 4.X (96%)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Aggressive OS guesses: FreeBSD 6.2-RELEASE (96%), OpenBSD 4.3 (96%)&lt;/span&gt;&lt;br /&gt;No exact OS matches for host (test conditions non-ideal).&lt;br /&gt;Network Distance: 1 hop&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;it&#39;s not a stable and complete tool, and by the way using this tool is at your own risk!!! it&#39;s recommended to use it on a virtual machine OS if you wanna try it out.&lt;br /&gt;&lt;br /&gt;it was just an introduce to this tool and real post is at &lt;a href=&quot;http://www.irongeek.com/i.php?page=security/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkminer-ettercap-nmap-and-other-os-detection-tools&quot;&gt;irongeek&lt;/a&gt;, check out and there you can download OSfuscate 0.3(current version).&lt;br /&gt;&lt;br /&gt;[update] : although all these works dizzy some tools,but still if your network use DHCP IP addressing,it&#39;s easy to figure out your OS by using satori.thanks Eric for the sake of reminding my mistake.I appreciate Eric and his good work;)&lt;br /&gt;I&#39;ll try to works on it more in my future free times.&lt;br /&gt;By the way anyone can access satoori from &lt;a href=&quot;http://myweb.cableone.net/xnih/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/5064309875615677908/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/5064309875615677908' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/5064309875615677908'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/5064309875615677908'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2008/10/obfuscating-your-os-tcp-stack-or-way-to.html' title='Obfuscating Your OS TCP Stack or The Way To OSfuscate'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIbkGjoF96hKH0dMqD0GJxHlmtcYl-wQhJRFokllIXnFbCCktrcJf8I59D_duL-4iFNA3TxGddeA4CxdPDH5_pE429n9y-wuIz_gHRWWvSY6aq3S1RL71ofg8Oca3IZ-hotUvm9yr2ixM/s72-c/networkminer-before1.PNG" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-7019809093160333245</id><published>2008-10-10T16:44:00.006+03:30</published><updated>2008-12-08T21:27:17.049+03:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Denial of Service"/><category scheme="http://www.blogger.com/atom/ns#" term="DoS"/><category scheme="http://www.blogger.com/atom/ns#" term="SYN Cookie"/><title type='text'>TCP SYN Cookie Juji-gatame</title><content type='html'>once upon a time,when the TCP/IP invented in 1979,no one thought that it&#39;s goping to knocked out late in 2008.&lt;br /&gt;If you are interested in computer security so you should heard about this big threat.&lt;br /&gt;though complete technical information does not disclosured but this can not be a hoax.because the men whom discovered this issue are not stupid ones.probably you have an experience with Unicornscan that is one of this netherlandish company which it&#39;s name is Outpost24.It seems that they have found this vulnerability in their deep digging in TCP/IP to accomplish developing the unicornscan. They dig the TCP protocol stacks and found out that something is wrong with SYN Cookies.&lt;br /&gt;well now if your system is available,you are on risk,so you should cut off an angle of security triangle(availability). This mean that your system security is absurd.&lt;br /&gt;each system have a limited connection slot,when all of them are in use the system goes out of service.the goal of DoS(Denial of Service) is to reach this.they wanna keep you busy in order to no one can get service from you.&lt;br /&gt;Outpost24 guys discovered this issue in 2005 and now they have written a TCP socket stress testing framework that named Sockstress.&lt;br /&gt;They just noticed that there is such kind of vulnerability in TCP and the is such a tools to defeat all kind of devices that use TCP,and there is no technical disclosure about this issue.they haven&#39;t speak straightforward about this problem yet,and they said we are cooperating with vendors to solve this issue.&lt;br /&gt;On the other side Fyodor, nmap programmer has disavow this and answered that this is not a new kind of vulnerability.He believes that they have rediscovered what he found in past years and performed in his private tools(Ndos).&lt;br /&gt;I have no idea about it&#39;s a kind of dislike that Fyodor feels about Outpost24 and their Unicornscan or not,but as i said these guys news can&#39;t be a hoax.&lt;br /&gt;they have offered some ways to defeat SYN Cookies and i mention them here as they told:&lt;br /&gt;&lt;br /&gt;- To defeat Server side SYN Cookies...&lt;br /&gt;   - Employ Client side SYN Cookies&lt;br /&gt;- Start with a random 32-bit number&lt;br /&gt;- XOR this number against Client side of a&lt;br /&gt;connection attempt (192.168.1.3:51242)&lt;br /&gt;- Use output as ISN for SYN packets&lt;br /&gt;- When Client receives SYN/ACK’s&lt;br /&gt;   - (Sequence Number - 1) XOR’d with 32-bit number reveals the client sending IP and port&lt;br /&gt;- Client can now complete a full 3 way handshake without ever tracking anything in a table.&lt;br /&gt;   - Client can also transmit data on this connection&lt;br /&gt;- No need on Client side to even keep a hash table. XOR is reversible.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;that was all.</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/7019809093160333245/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/7019809093160333245' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7019809093160333245'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7019809093160333245'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2008/10/tcp-syn-cookie-jujigatame.html' title='TCP SYN Cookie Juji-gatame'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-7468111502736236525</id><published>2008-10-05T18:47:00.010+03:30</published><updated>2008-12-08T21:23:09.148+03:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="book review"/><category scheme="http://www.blogger.com/atom/ns#" term="netcat"/><category scheme="http://www.blogger.com/atom/ns#" term="netcat power tools"/><title type='text'>Netcat Power Tools Book Review</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWEyXYS0iaKLlrRhaPr56WmkxrF_tq8J9JKp7G_ZZDvDMWyLqN0-s4AiME8HK-TUCbLJ2ZoIxSjgwQnU-Ogxr4jYoqZ4fg0yUTC64BNiyIaxqh-vrTg-gPwSggFfOae4Mn3wvShB3p_Q4/s1600-h/Netcat-Power-Tools.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWEyXYS0iaKLlrRhaPr56WmkxrF_tq8J9JKp7G_ZZDvDMWyLqN0-s4AiME8HK-TUCbLJ2ZoIxSjgwQnU-Ogxr4jYoqZ4fg0yUTC64BNiyIaxqh-vrTg-gPwSggFfOae4Mn3wvShB3p_Q4/s320/Netcat-Power-Tools.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5253690139996160434&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;I have seen this book approximately 2 weeks ago.I got it,but indeed i was not in mood to read it.so i leave it alone in a folder and continue reading my other incomplete books.2 days ago i have seen a &lt;a href=&quot;http://hkashfi.blogspot.com/2008/10/syngress-always-surprise-me.html&quot;&gt;post&lt;/a&gt; , and it abet me(why? i don&#39;t know!)to read this thin book.&lt;br /&gt;Yes,it just finished and i am dangling with something in this book!&lt;br /&gt;At first look it may give you an adventure feel for discovering netcat power tools! umm,I&#39;m not going to stop you from this feel,but i think this book could be better with a fair name and may be something more..&lt;br /&gt;In the beginning of book,i bet you get crazy with  repeating of two words: &quot;Server&quot; and &quot;Client&quot; . He has repeated these words over and over.It can repulse a new one who is going to read about a simple security tool such  Netcat.&lt;br /&gt;Next thing that must be mentioned is a huge headline in the first chapter.He almost said all of his book briefly in first chapter.&lt;br /&gt;He named netcat as an powerful Banner Grabbing tools! I think always there is more than a simple banner that you get by  connecting to a port from netcat.It&#39;s cool but not always.Sometimes banners are hidden and also sometimes spoofed,so you need more thing than netcat.Well in this situation netcat can be handy when you have a pattern from many known software that usually listen on a specific port(such as webservers on port 80).&lt;br /&gt;Author mentioned all about windows and Unix/linux version of netcat but it didn&#39;t see anything that he notify about absence of -q switch in windows version(you see?!).&lt;br /&gt;Repeating of fixed headline make me bored from this book.For example he has repeated port scanning in chapter 1, 2, 3 and 7.They are almost all alike!&lt;br /&gt;Author has filled many pages with base of some simple protocol and this is not good.He could reference them.&lt;br /&gt;I think this book could name &quot;Computer forensics tools tips and tricks&quot;.It could be a graceful name for this book.&lt;br /&gt;Huge list of tips and tricks are great but not plenty.for example it could include the trick of using netcat as an simple web server.it comes very handy.this can be implemented by using bash same this(i can&#39;t put code in blog post!why?!):&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz7_EOz9X82lXyK-SAqdMtxE2tpelVVXlO3m8CzT94JX1jzqCxfpf992P2fObn_lSEOQLsTfPUVmBWqTp0vsOIs4cPQTnyMRPXdZGOf681qgMrUBE2zJmJDM6v9pB5Ij-20VAMlXShzK0/s1600-h/code.png&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz7_EOz9X82lXyK-SAqdMtxE2tpelVVXlO3m8CzT94JX1jzqCxfpf992P2fObn_lSEOQLsTfPUVmBWqTp0vsOIs4cPQTnyMRPXdZGOf681qgMrUBE2zJmJDM6v9pB5Ij-20VAMlXShzK0/s320/code.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5253775098618091666&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Simple and useful;)&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;There is some strange headline in this book such as using nmap and etc.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;But a good inform about cryptcat is so good.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;anyway i appreciate the author because of writing books for starter, however there are many blame on him.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/7468111502736236525/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/7468111502736236525' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7468111502736236525'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/7468111502736236525'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2008/10/netcat-power-tools-book-review.html' title='Netcat Power Tools Book Review'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWEyXYS0iaKLlrRhaPr56WmkxrF_tq8J9JKp7G_ZZDvDMWyLqN0-s4AiME8HK-TUCbLJ2ZoIxSjgwQnU-Ogxr4jYoqZ4fg0yUTC64BNiyIaxqh-vrTg-gPwSggFfOae4Mn3wvShB3p_Q4/s72-c/Netcat-Power-Tools.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-383300286802714993.post-3741140121706807507</id><published>2008-10-04T15:31:00.003+03:30</published><updated>2008-12-08T21:18:54.685+03:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><title type='text'>Computer comes with exception</title><content type='html'>Computers are sometimes exceptional.their act make us wonderful.&lt;br /&gt;for example doing some work with computer is your daily job and always you do a routine task.It always seems normal and after many many times it sounds a good way to do this task.but very chancy one time that you are doing this routine job,something go wrong!&lt;br /&gt;yes you try to fire up your intelligence mind and solve this problem.may be it get a long time to solve this problem to you,and may be it will be solved with a lil trick.absolutely it depends on your experience and may be your fortune.&lt;br /&gt;&lt;br /&gt;But there is many many occasion that not computer logic exceptional.because many events are based on concepts.concepts always forced by us to computers.some concepts are documented and some not.some are intentional and some not.&lt;br /&gt;I believe the exceptional that i said at beginning of this post is a kind of inadvertent undocumented concepts.They forced to the computer by writing the codes from programmer.The computer never disobeys from programmer in normal mode,because it&#39;s logic is based on the obey.&lt;br /&gt;So we must try to be careful about any concept that we are learning to computer!&lt;br /&gt;yes,this is very important.If we want,we can teach computer to disobey us.we can force computers to disobey us,and this may be the last obey of computer from us.They can learn from us to be our malicious foe.&lt;br /&gt;So,be careful about what concept you are learning to your computer...</content><link rel='replies' type='application/atom+xml' href='http://snoopsec.blogspot.com/feeds/3741140121706807507/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/383300286802714993/3741140121706807507' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/3741140121706807507'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/383300286802714993/posts/default/3741140121706807507'/><link rel='alternate' type='text/html' href='http://snoopsec.blogspot.com/2008/10/computer-comes-with-exception.html' title='Computer comes with exception'/><author><name>sCORPINo</name><uri>http://www.blogger.com/profile/09851091476158546487</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjq2UeJgJs3w5QwTtpCzQPIA0qC4ghUCOUxG_-tTv-ReEOgUzd7jO5loAeT3E7cFHYg5bB-9JkQfFxMl4Nl6ilWjUTIqlLb_Qt0hwA0DLHqBy_Kj4R_C4WrnvnrmMtaAQ/s220/hacker.JPG'/></author><thr:total>1</thr:total></entry></feed>