Jump to content

begood

Active Members
  • Posts

    3972
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by begood

  1. Australian customs officers have been given new powers to search incoming travellers' laptops and mobile phones for pornography, a spokeswoman for the Australian sex industry says. Fiona Patten, president of the Australian Sex Party, is demanding an inquiry into why a new question appears on Incoming Passenger Cards asking people if they are carrying "pornography". Patten said officials now had an unfettered right to examine travellers' electronic devices, marking the beginning of a new era of official investigation into people's private lives. She questioned whether it was appropriate to search people for legal R18+ and X18+ material. “Is it fair that customs officers rummage through someone's luggage and pull out a legal men's magazine or a lesbian journal in front of their children or their mother-in-law?” she said. "If you and your partner have filmed or photographed yourselves making love in an exotic destination or even taking a bath, you will have to answer 'Yes' to the question or you will be breaking the law." Customs confirmed the new reference to "pornography" on the Incoming Passenger Cards and the search powers, acknowledging that searches conducted by officers may involve the discovery of "personal or sensitive possessions". A spokesman said officers were trained to apply "tact and discretion" in their dealings with passengers. "Including an express reference to pornography is intended to enhance the interception of prohibited pornography at the border, by making passengers aware that some forms of pornography may be a prohibited import," the spokesman said. The "pornography" question has appeared on the cards since September last year. The change was only spotted by Patten earlier this month and it had received little to no coverage in the media. Colin Jacobs, chairman of the lobby group Electronic Frontiers Australia, said the change appeared to have sneaked under the radar "without any public consultation about the massive privacy issues". "It's hard to fathom what the pressing concern could be that requires Australia to quiz every entrant to the country on their pornography habits, as if visitors would be aware of the nuances of the Australian classification scheme," he said. "If this results in Customs trawling through more private information on laptops searching for contraband, I would say the solution is way worse than the problem." Patten said if the question was designed to stop child pornography being smuggled into the country then the question should have been asked about "child pornography", without encompassing regular porn. Hetty Johnson, chief executive of child protection group Bravehearts, agreed with Patten that the question was too broad. She said it should only apply to illegal pornography. "If it said child porn I'd be 100 per cent behind it - if you're carrying child pornography then you deserve everything you get," she said in a phone interview. The issue has echoes of the 1956 detention of famed British conductor and composer Sir Eugene Goossens who had his bag searched upon his return from Europe. He was carrying material that was considered, at the time, pornographic and his reputation was subsequently ruined, forcing him to flee the country. "The term pornography is not referred to at all in the federal Classification Act, which customs relies on to classify their material," Patten said. Travellers to be searched for porn
  2. The official Twitter application for the iPhone is now available for free on the iTunes App Store. The announcement made on Twitter's blog, the social networking site points out that unregistered users can use most of the main features on Twitter. New users to Twitter are able to sign up to the service within the app, without the need to visit the full website. The app is based off the previously popular 3rd party Twitter app, Tweetie, which was acquired by Twitter last month. Macworld is reporting that despite the anticipated release of the Twitter app, the iPad specific version is still unavailable. The newly released Twitter application generally follows the same appearance as the old Tweetie. However, the search page has been redesigned with searching tweets and users being combined into one screen. The app also includes the ability to search on phrases, based on your location, to find tweets around you. Top Tweets is again located on the search page and has a side-scrollable box from which users can browse the latest featured tweets. Users who register from within the app can immediately start following others with the Suggested Users list provided. A number of fixes were included in the release including a Retweet button, located on the main actions bar and tweet rendering reflects the way it appears on the main Twitter website. The official Twitter app is available on the iTunes App Store for new users whilst current Tweetie users can upgrade via the update section. Neowin.net - Official Twitter app released for iPhone
  3. mi lene fa. mi lene, m-a stors iubita refill in 2 ore, wait for it
  4. Ambele se misca in reluare. Ma enerveaza ca misc mouse-ul si am lag de cel putin o secunda. Mi se blocheaza la multimultitasking, nu-i place cu prea multe programe in memorie. La inceput, mi-am prins urechile de n ori cu instalarea noilor programe/compilatoare etc. Totul se petrece online, daca nu ai net si esti habarnist de ubuntu esti om mort. Ar trebui facut un help mai detaliat. Trebuie sa stii engleza ca sa poti gasi solutii pe forumuri de peste tot in lume. Trebuie sa ai macar putin habar de cum merge un sistem de operare, daca nu ai nici cunostiintele alea, din nou, esti om mort. Interfata nu e user-friendly ... nici pe departe. Daca un program o da in bara, ai foarte multe batai de cap incercand sa-l stergi de pe sistem, sa-l dezinstalezi. hai, sa va aud ! ce nu va place la ubuntu/kubuntu ?
  5. ma Synthesis, ai putea verifica in prealabil daca nu am postat deja eu ? http://rstcenter.com/forum/22787-carder-forums-0wned-happy-ninjas.rst ai mai facut greseala asta si ieri, aici te doare mana sa verifici daca e sau nu postat deja ? mai gresesti in felul asta, warn. pentru ce naiba faci spam ?
  6. neme-i pedofilu' fara victima. care se ofera ?
  7. allah damn it. black_death is a star again
  8. @krystake interesant, cred ca o sa incerc asta
  9. I have an admittedly limited view of the exploit dev world. However, from what I've seen devs have very few options: (Please correct me if I'm wrong) "Responsible Disclosure" => - Direct Contact => depending on the size of the vendor and their view on security, this could result in anything from a simple thanks, a reward, to a court hearing. - Exploit Broker => possibly sell, possibly not, depends on the broker. The vuln could die on the table or stolen due to too much information being given during negotiations. This route has the same financial risk as direct contact, but a lot less risk of getting sued. - ZDI (or other vuln clearing house) => "instant" cash, but admittedly less than an Exploit Broker could possible get based on the financial risk to ZDI. Close to zero risk of court time (they may come after you for selling the exploit). And a lot less financial risk since (IIRC) they pay up front. But then the vulns go to also undisclosed parties, potentially the highest bidder which is probably not the vendor. - "other" secretive groups who share vulns for different reasons... - Just to friends => No cash, no judicial risk, but you do risk them stealing/selling your exploit. "Full Disclosure" - Posting it to the web for all to see/user => Possible court time, but the definite upside is the vendor is forced to react. A very quick way to make enemies. - Releasing at a conference => Probable court time. "No Disclosure" - Keeping it to yourself => Working under the assumption that your the only one that has found that same bug is still semi relevant due to the incredibly small size of the exploit dev community. However, as Dave said, they'll be toasting to their sleeping dead 0days some day. "No More Free Bugs" - My stance on this is split, while I think people should get paid for their work, I relate this movement to mowing someone's lawn and then ringing their doorbell and asking for money. However I'm sure Robert Graham's punch in the face metaphor also works. // Like, I have stated above, I am far and away a newbie to the vuln disclosure world and this debate has been going on since before I owned my own computer, but with the brilliant minds working at it, why doesn't anyone offer up a solid solution to it? My solution? Create a standard, something that we all abide by. I know as hackers we rebel against such things but in the interest of getting better security out there (yes, that's what we are here for right?.... right?) we should should really work together on this. What sounds right? I mean, what is the right way to approach someone who's lawn you've mowed for the work you have done? Maybe free for open source projects, and a price based on exploitability and market share of the affected product? For reference: Vuln Trading Markets and You by Michal Zalewski (lcamtuf): => lcamtuf's blog: Vulnerability trading markets and you Vuln Disclosure is Rude by Robert Graham: => Errata Security: Vuln Disclosure is Rude No More Free Bugs movement by Charlie Miller, Alex Sotirov and Dino Dai Zovi: => No More Free Bugs …And You Will Know me by the Trail of Bits Dailydave Post by Dave Aitel: => [Dailydave] MS10-025 -- Rob Fuller | Mubix Room362.com - Blog - Vuln DisclosureSummarized
  10. begood

    Hallo

    Electronica - my first luv. Bun venit.
  11. Adobe is getting serious about their implementation of peer-to-peer technology to assist Flash-based video streaming and applications. The upcoming release of Adobe’s Flash Player 10.1 will enable publishers to dramatically reduce bandwidth costs by outsourcing media distribution to users. The Flash team from Adobe has been working on their P2P Flash implementation for a while, but with the release of the 10.1 player it can really make a difference for online media distribution. Kevin Towes, Product Manager of Adobe Flash Media Server told Beet.TV that the upcoming release of the Flash player will include new P2P technology that will “significantly change the way we think of media delivery.” According to Towes, this technology could in some cases completely eliminate bandwidth costs. The system Adobe is offering to support P2P Flash is called Stratus. It is offered to developers free of charge and can support both live and on-demand video streaming. Besides video, Stratus can also be used for Flash based multi-player games and other forms of real time communication. For broadcasters and video services, Stratus has the capacity to eliminate a significant amount of bandwidth costs. Instead of serving the media from a central server, users will provide the necessary bandwidth. Adobe’s Stratus system serves as an intermediary in this process, managing the communications between Flash players much like a BitTorrent tracker does for BitTorrent transfers. Towes explained that Stratus users will first have to agree to participate in a P2P-enabled Flash swarm, similar to how they are now asked to indicate whether Flash can use their webcam. If users do not want to share bandwidth, the broadcaster has the option to offer a regular stream, a degraded stream or no stream at all. Adobe’s Stratus project is not the first to combine P2P technology with Flash. Last year, during the inauguration of President Obama, CNN used P2P-assisted technology to send out the live stream to a million viewers worldwide. This required users to install a browser plugin called Octoshape, which then made the Flash video P2P compliant. Other initiatives to serve on-demand and live streaming have been showcased by the Triber research team, who use a BitTorrent-based solution that does not require any central servers. Tribler is currently working with several European TV-broadcasters to test this technology in the real world. The impact of Adobe getting seriously involved in P2P streaming could be a real game changer though. One of the main advantages Adobe’s Flash has is that nearly every computer has it installed, which should facilitate the adoption rate among content providers. One less hurdle to take, and a significant one. Adobe Flash To Eliminate Bandwidth Costs With P2P | TorrentFreak
  12. Over time, users have become more careful when handling removable, external drives and devices such as iPods and other MP3 players, flash drives, USB sticks, digital cameras and frames, and others. When it comes to removable drives, the biggest danger used to be the autostart procedure executed by Autorun.inf, but people learned their lesson and learned to disable AutoPlay or delete the malware in the device via command prompt then choosing the "Explore" option when they right-click on the drive. But, malware authors aren't easily deterred from finding ways to infect your computer, and they decided to use autorun.inf’s Action Key to make this happen. Action Key is one of the file's parameters, and it defines the text that appears in the AutoPlay dialog: Options such as "Open folder to view files" or "Open folder to view files using Windows Explorer" that appear in the menu become triggers that make the malware execute each time the drive is open via Windows Explorer - as you can see in the AutoRun code of the worm: AutoRun worms got "smarter"
  13. |\___/| -=[ISSUE - NO 1]=- =) ^Y^ (= -=[OF]=- \ ^ / )=*=( ______________________________ __ ____________ _ / \ |.-----.--.--.--.-----.-----.--| | ___ ___ _| || | | || _ | | | | | -__| _ | | . | | . || /| | | |\ ||_____|________|__|__|_____|_____| |__,|_|_|___|| \| | |_|/\ | | | ______ |__//_// ___/ __ | | | .-----.--.--.-----.| |.-----.--\_).--| || | | | | -__|_ _| _ || || ||__ --| -__| _ || | | | |_____|__.__| __|| || ||_____|_____|_____|| |_/ \__________________________|__|___| || |___________________| |______| FEATURING ~~~ |\ A present Germanys next Darkmarket ~~~ /()/ brought to you Carders.cc ~~~`\| by some happy ninjas / *//////{<>===[TABLE OF CONTENTS]=====================================- \ [================[ INTRO ]==-- [================[ OWNAGE ]==-- [================[ RM ]==-- [================[ PASSES ]==-- [================[ IP'S ]==-- [================[ OUTRO ]==-- / *//////{<>===[INTRO]=================================================- \ Many of you guys may have noticed this breeding German "underground" shit called carders.cc. For those who don't: Carders is a marketplace full of everything that is illegal and bad. Carding, fraud, drugs, weapons and tons of kiddies. They used to be only a small forum, but after we erased 1337-crew they got more power. The rats left the sinking ship. The voices told us to own them since carders is our fault and we had to fix our flaw. So we did. During the ownage they also gave us lulz by showing off their ridiculous configuration skills which had a specific impact on their security. They actually managed to chmod and chown nearly everything to 777 and www-user readable. Including their /root directory. ____________________________________________________________________ | __ __ | | .-----.--.--.-----.| |_.-----.| |--.-----.--.--. | | | _ | | | _ || _| -__|| _ | _ |_ _| | | |__ |_____|_____||____|_____||_____|_____|__.__| | |________|__|________________________________________________________| | | | Zagerus: Zusaetzlich schuetzen auch andere Applikationen wie | | beispielsweise "suhosin" die Scripte. | |____________________________________________________________________| Ya sure. However, to put it in a nutshell, here is what we've got. O and don't forget the uncensored database backup that we prepared, including private messages, passes and their holy priv8 3rd level. ____________________________________________________________________ | __ __ | | .-----.--.--.-----.| |_.-----.| |--.-----.--.--. | | | _ | | | _ || _| -__|| _ | _ |_ _| | | |__ |_____|_____||____|_____||_____|_____|__.__| | |________|__|________________________________________________________| | | | KRON0S: Seitdem Thanatos und ich hier das sagen haben , haben wir | | sehr viel auf DDos protection und Sicherheit gesetzt . | |____________________________________________________________________| \ ____________________________________________________________________ | __ __ | | .-----.--.--.-----.| |_.-----.| |--.-----.--.--. | | | _ | | | _ || _| -__|| _ | _ |_ _| | | |__ |_____|_____||____|_____||_____|_____|__.__| | |________|__|________________________________________________________| | | | THANAT0S: Nach wie vor werden hier keinerlei IPs geloggt, was euch | | jedoch nicht am Nutzen von VPNs hindern soll! | |____________________________________________________________________| We have good and bad news for you. The good news first: THANAT0S did not lie. Their access.log did not include real user ips and they overwrote $_SERVER['REMOTE_ADDR'] with a random ip. Now what's the bad news, you may ask. The Carders.cc admins seemded actually too dumb to disable ALL of the logging, giving us enough possibilites to get what we wanted. Even a LOT more than enough, means we got a lot more info than you might think. Sure, some of you maybe always used a proxy... Most of the administrators and moderators didn't. Did you? >>>ATTENTION! RETARDED PHP CODE ALERT!<<< ~$ cat checkit.php <?php @mysql_connect("localhost", "cms_carders_cc", "CSiUvqD2MeTOBDSLIR4Am0DJWnQidedYqoX4Cutn"); @mysql_select_db("smf_carders_cc"); $query_ip = @mysql_query("UPDATE carders_smf_members SET member_ip='0', member_ip2='0' WHERE CHAR_LENGTH(member_ip) >= 2 OR CHAR_LENGTH(member_ip2) >= 2"); ?> This is how they wipe their logs. Sweet huh? -=[ THANAT0S [ IP: 93.131.107.168 used at 11. May,2010,22:31:47 [ HOST: wprt-5d836ba8.pool.mediaWays.net [ LOCATION: DE, Germany [ ISP: 1&1 Internet AG Wuppertal, 07 - ]=- -=[ KRON0S [ IP: 80.226.14.32 used at 11.May,2010,23:32:47 [ HOST: ip-80-226-14-32.vodafone-net.de [ LOCATION: DE, Germany [ ISP: Vodafone D2 GmbH [ - [ IP: 79.221.31.254 used at 11. May,2010,22:16:31 [ HOST: p4FDD1FFE.dip.t-dialin.net [ LOCATION: DE, Germany [ ISP: Deutsche Telekom AG Frankfurt Am Main, 05 - ]=- -=[ Zagerus [ IP: 62.227.86.213 used at 11. May,2010,23:37:27 [ HOST: p3EE356D5.dip.t-dialin.net [ LOCATION: DE, Germany [ ISP: Deutsche Telekom AG Hesel, 06 - ]=- So all in all these nice addresses should teach you a lesson. Hope you all get some visits soon. / *//////{<>===[OUTRO]=================================================- \ ____________________________________________________________________ | __ __ | | .-----.--.--.-----.| |_.-----.| |--.-----.--.--. | | | _ | | | _ || _| -__|| _ | _ |_ _| | | |__ |_____|_____||____|_____||_____|_____|__.__| | |________|__|________________________________________________________| | | | Zagerus: Alle neuen privaten Nachrichten werden ab sofort | | verschluesselt in der Datenbank gespeichert. | |____________________________________________________________________| ~$ grep -ri -A 1 -B 1 base64_encode Sources/Subs-Post.php // Encode the message $message = base64_encode($message); $encoded = 1; Oh noes, blimey. We are screwed, they encoded their messages with base64. We had to surrender at this point. Their protection system was just too good. Nearly unbreakable. Like THANAT0S said: ____________________________________________________________________ | __ __ | | .-----.--.--.-----.| |_.-----.| |--.-----.--.--. | | | _ | | | _ || _| -__|| _ | _ |_ _| | | |__ |_____|_____||____|_____||_____|_____|__.__| | |________|__|________________________________________________________| | | | THANAT0S: Ein neuer Rootserver, mehr Protection! (Hosting in | | Moskau/Ukraine) | |____________________________________________________________________| To the carders.cc admins: Recommendation No.1 - THE ANAL PROBINATOR ______ / ____ \ ___________/_|----|_\_____________ _______/||/,-.\|||||||----|__ ____ .--' ,-| __/--' |o| `-----|____|-' | \ \ ( |___(o7 \4b\ | |___ >---< <`. >-| __/------.\4b\ ,---| |--' | /db`.> ( | (o7|||||||| |o| |||||----|____ | /d88[( `-|__/----,-""""""""">--|____|---' |__/d88P / <____/----------<___|____|_____________/ \ `----' / `------' AND NOW ITS TIME FOR OUR FIRST ... ______________________________________________________________________ IlapslapslapslapslapslapslapslapslapslapslapslapslapslapslapslapslapsI Isl_______l__slapslapslapsla_______a__lap__apslapslapslaps__pslap__apI Ip| __| |.---.-.-----.| _ | |_| |_.---.-.----.| |--.| |aI Ia|__ | || _ | _ || | _| _| _ | __|| < |__|lI Il|_______|__||___._| __||___|___|____|____|___._|____||__|__||__|sI Islapslapslapslapsla|__|pslapslapslapslapslapslapslapslapslapslapslapI IpslapslapslapslapslapslapslapslapslapslapslapslapslapslapslapslapslaI Addressed to all the lamers out there DEIM0S - You get a SlapAttack since you were responsible for security we heard. You did a great job dude, n1. ____________________________________________________________________ | __ __ | | .-----.--.--.-----.| |_.-----.| |--.-----.--.--. | | | _ | | | _ || _| -__|| _ | _ |_ _| | | |__ |_____|_____||____|_____||_____|_____|__.__| | |________|__|________________________________________________________| | | | Juri: alles was von Deimos gemacht worden war ,war 100 % fach- | | maennisch und 1000% sicher. | |____________________________________________________________________| Zagerus - The "techadmin". Who taught you to be techadmin? You wrote this anti ddos script right? SlapAttack for you! $~ cat ipz.php <?php $logfile= './ddoslogz.html'; $IP = getenv("HTTP_X_FORWARDED_FOR"); $logdetails= date("F j, Y, g:i a") . ': ' . '<a href=http://dnsstuff.com/tools/city.ch?ip='.$IP.'>'.$IP.'</a>'; /*$fp = fopen($logfile, "a"); @fwrite($fp, $logdetails); @fwrite($fp, "<br>"); @fclose($fp);*/ echo "<center><h3>DDoS-Attacke</h3></center>\nWir stehen zur Zeit unter DDoS. Der Login blockt die Abfragen etwas ab.<br /><br />\n<strong>Bitte geben Sie als Benutzernamen und Passwort \"ddos\" ein.</strong><br /><br />Vielen Dank fuer Ihr Verstaendnis!"; ?> THANAT0S, KRON0S - Great admins, everyone should be like you. And btw you suck at choosing nicknames. SlapAttack! fred777 - You have actually not a lot to do with this, but you get a SlapAttack because we hate you. Ok not only for that... You are simply lame and dumb and you suck at almost everything you do. We recommend you to fuck off and take our orders at burger king THANX. So thats all actually. And btw to all the other supporters of pseudo German undergroud shit: The ninja guys piss on you and your half trained monkeys or whatever your leet underground team consists of. If you continue, you will be owned over again and rm'd twice. Also we will punch you in the face. Have a good day |\_ /()/ `\| and stay happy <3 http://www.pastie.org/966482.txt?key=9qnkkrnoqukzk4zl9g7og
  14. CNN's new series i-List takes you to a different country each month. In May, we visit Macedonia focusing on changes shaping the country's economy, culture and its social fabric. Skopje, Macedonia (CNN) -- A colorful mural runs along the outside the Blaze Koneski public school in Macedonia, but it's been vandalized by graffiti artists who spray their tags all over the school. There are metal bars on the windows and the building itself is run down and dilapidated. We are here to interview a "child prodigy" for CNN's i-List Macedonia. Marco Calasan is the youngest Microsoft systems engineer in the world, holds four Microsoft certificates and has written a 312-page book on Microsoft's Windows 7. As we enter the classroom a young boy with a warm smile and dark, curly shoulder length hair pulled back in a ponytail, extends his hand and introduces himself. Marco is just nine years old; he's an only child and a computer genius. He takes us on a tour of the school computer lab, as if it were his home. Marco only lives across the road but spends endless hours in here working away each day, well and truly after the school bell has rung. Asked why he loves computers so much, Marco responds sagely that, "with knowledge, everything is possible." He goes on to give a detailed explanation of IPTV - the content delivery network system that he set up all by himself. With his sweet, innocent voice, Marco explains how he streams high quality video throughout Macedonia and even provides a service for the country's disabled. Throughout the conversation, the word "Microsoft" peppers every single sentence and it becomes clear this child is obsessed with Bill Gates' creation. And while you'd think his impressive resume at such a young age would give him the right to be precocious, Marco is the complete opposite. He's humble, friendly and so very patient as I ask him to repeat and re-explain the computer jargon that flies over my head. I ask whether he sees himself as special and gifted. He tells me he's just a regular kid, and forgets that he has all this knowledge in his head when he plays with his friends. But Marco is anything but normal. He speaks three languages and is learning a fourth and while English is not his mother tongue, his command of the language and vocabulary is mind-boggling. In finite detail he explains the ins and outs of computers and the curriculum he's teaching his peers and adults. He even educates his own teachers. Later this month he's going to Montenegro where the government has asked him to give a presentation on his IPTV system. Marco's brain function is quite extraordinary. Professor Elena Achkovska-Leshkovska at the Institute of Psychology in Skopje tested Marco when he was seven years old. She found that his brain operated the same as a child over the age of 12. But just as fascinating was his high level of emotional and social skills. Something not normally found in such gifted children. As Marco chats away with the crew, his mother Radica stands proudly in the background. With her jet back hair, slender figure and smiling face, this pretty young mum watches as her son dazzles the room. Their bond is exceptionally close as they describe each other as best friends. Radica works seven days a week running a computer business to make ends meet and every cent she earns goes straight to Marco and furthering his education. Last month Radica had a health scare when she was diagnosed with breast cancer. She spent a week in hospital having the tumor removed and when she got home, Marco had printed off more than 200 pages of information on breast cancer treatments, and what his mom should eat to make a full recovery. Doctors have told Radica she must undergo chemotherapy but she's reluctant to do so because she's concerned she won't be able to care for her little boy. Her other concern is Marco's future. She knows he needs opportunities and an education system that exists only in expensive overseas schools. Something she cannot afford. Despite the obstacles and challenges that await them both, a sense of calm and optimism surrounds this little boy and his mother. They walk us out of the school and watch us leave, Radica with her arm lovingly around her gifted son. The 9-year-old Microsoft genius - CNN.com
  15. Enterprises are becoming subjected to increasingly targeted DDoS attacks that do not simply use brute force to take down a network, but are targeted instead at individual applications, according to Verisign, the internet registry that also provides managed DDoS services for businesses. Verisign warned that whereas most DDoS attacks in the past were random, now they are more likely to focus on causing damage to particular businesses. “Attacks are becoming easier to perpetrate and harder to detect,” said Matt Bruun, UK sales director, Verisign, speaking to Security Vibes. Bruun said Verisign was now increasingly seeing application layer threats aimed at taking down business-critical applications, either off-the-shelf or bespoke, as well as the more traditional brute force approach against businesses as a whole. He declined to mention which applications were being most actively targeted. The company added that application layer attacks often mimicked legitimate traffic, operating within an application’s normal thresholds, which made them harder to detect. The attacker typically then forces an unperceived increase in network traffic, triggering the denial of service. Verisign said these attacks are usually targeted at either the most critical or the weakest application. Verisign’s assertions about the increasing severity of DDoS attacks appear to be backed up by survey data from Forrester Research, the analyst company. In a July 2009 survey of 400 security professionals in the US and Europe, 74 per cent said their business had been targeted by at least one DDoS attack in the last year. That figure has risen sharply from 49 per cent in 2008. Just over half of those affected (58 per cent) said the attacks they had faced were partly or totally targeted against them. As a consequence, DDoS had become the top security issue, ahead of web application security, the survey found, with 58 per cent of respondents saying they were “extremely concerned” about DDoS attacks. Verisign has published a whitepaper describing best practice for enterprises in defending against DDoS attacks. Among its recommendations, Verisign said businesses should: Centralise monitoring so traffic patterns across the network can be seen in one place Understand what normal traffic patterns look like Define who will respond in case of attack Develop contingency plans in case the worst does happen Use a multi-layered verification process to maximise the flow of legitimate traffic while being able to guard against malicious traffic Build in on-demand capacity and load balancing Establish how infrastructure will cope under attack Address common application vulnerabilities Consider procuring a managed DDoS service Verisign argued that traditional preventative measures were not enough. It said that over-provisioning of bandwidth would not be cost effective nor very efficient. Firewalls, IDS and IPS systems may not keep out DDoS attacks, it said. And relying on an ISP to offer protection against DDoS could result in problems if the ISP itself did not have the right defensive measures in place. ISPs were frequently victims of DDoS too, Verisign said in the report. DDoS attacks get more cunning - SecurityVibes Community
  16. Cryptographic Tunnel ctunnel is a command line program for tunneling and/or proxying TCP or UDP connections via a cryptographic tunnel. ctunnel can be used to secure any existing TCP or UDP based protocol, such as (but not limited to) HTTP, Telnet, FTP, RSH, MySQL, VNC, SSH, XDMCP and NFS. ctunnel can also proxy connections, effectivly bouncing a cryptographic tunnel via any number of intermediary hosts (at a loss of speed of course). Why ctunnel? ctunnel vs ssh forwarding or stunnel First. UDP Stunnel and SSH do not support the UDP protocol There are other methods (like using a vpn) to encrypt UDP traffic and tunnel it over TCP, however sometimes this is like killing a mouse with a hand-grenade or using a dump truck to move your couch. Second. Certificates Second. Certificates SSH, Stunnel, OpenSSL's BIO interface and GNU TLS all use certificate based authentication to setup a tunnel over TCP. This is arguably more secure, however they don't offer UDP. Ctunnel is light, very fast, and extremly flexible. Ctunnel allows you to setup a secure, encrypted tunnel for ANY protocol in minutes. With ctunnel you can setup an encrypted tunnel for other encrypted protocols. (i.e., you can tunnel SSH through ctunnel) Unlike SSH, ctunnel does not have it's own underlying transport protocol, so there is no network overhead other than the encrypted traffic generated by the software you are tunneling. Ctunnel does not relay on public keys, PAM authentication or any other 3rd party authentication. It rely's solely on OpenSSL/libgcrypt's cryptography, and allows you to choose the encryption cipher. http://nardcore.org/ctunnel/
  17. Using Twitter as a Command and Control channel - this is one hack I really wanted to do before anyone else, but @digininja beat me to it by releasing KreiosC2 KreiosC2 is a proof of concept bot which uses Twitter as its Command and Control channel. As Twitter is getting more and more popular, this is going to become the Hacker's platform of choice. The best thing about Twitter, is that it is accessible over the web and does not need any ports to be opened on the firewall. This makes it very attractive to botnet authors as now the bots can be behind a firewall with only port 80 and 443 allowed, but still under his full control. In this video, Tom Eston shows a demo of KreiosC2 in action. Twitter as a Command and Control Channel using KreiosC2 Tutorial
  18. Organized crime is estimated to be costing Australia $15 billion annually, according to The Age. Cyber crime alone account for nearly $70 million stolen each year. The major avenues for cyber crime are hacking and identity theft that defrauds the Australian government, companies and private citizens of millions annually. The United States and Australia are working closely together to combat the cyber threat and each government is increasing its efforts to curtail the growing rates of cyber crime and cyber espionage. Both the United States and Australia are currently pushing to build out their respective cyber workforces. The Australian Department of Defence has also opened a new cybersecurity center in Canberra and the U.S. Congress recently confirmed Lt. Gen. Keith Alexander as the head of U.S. Cyber Command, which will be responsible for all Department of Defense networks. Australian Cyber Crime Nets $70 Million Annually :: Hack In The Box :: Keeping Knowledge Free
  19. A cyber crime friendly Internet service provider (ISP) has been knocked offline on Friday after its upstream provider had its service cut off, according to Zeus Tracker. PROXIEZ-NET, a Russian based ISP that hosted at least 13 known Zeus command and control channels, lost its connection after its upstream provider, DIGERNET, had its Internet connection cut. It was withdrawn from Internet routing tables, according to an AS Report. PROXIEZ-NET has often been accused of being a haven for cyber criminals. It is unclear how this will impact the botnets that utilize PROXIEZ-NET, as previously disrupted servers have merely found new hosts to reconnect with the infected computers they control. Russian Crime Friendly ISP Offline :: Hack In The Box :: Keeping Knowledge Free
  20. )))))))))))))))))))))))))) asta-i de ne0h.
  21. After five months of development, version 3.4.0 of the Metasploit Framework has been released. Since the last major release (3.3) over 100 new exploits have been added and over 200 bugs have been fixed. This release includes massive improvements to the Meterpreter payload; both in terms of stability and features, thanks in large part to Stephen Fewer of Harmony Security. The Meterpreter payload can now capture screenshots without migrating, including the ability to bypass Session 0 Isolation on newer Windows operating systems. This release now supports the ability to migrate back and forth between 32-bit and 64-bit processes on a compromised Windows 64-bit operating system. The Meterpreter protocol now supports inline compression using zlib, resulting in faster transfers of large data blocks. A new command, "getsystem", uses several techniques to gain system access from a low-privileged or administrator-level session, including the exploitation of Tavis Ormandy's KiTrap0D vulnerability. Brett Blackham contributed a patch to compress screenshots on the server side in JPG format, reducing the overhead of the screen capture command. The pivoting backend of Meterpreter now supports bi-directional UDP and TCP relays, a big upgrade from the outgoing-only TCP pivoting capabilities of version 3.3.3. This is the first version of Metasploit to have strong support for bruteforcing network protocols and gaining access with cracked credentials. A new mixin has been created that standardizes the options available to each of the brute force modules. This release includes support for brute forcing accounts over SSH, Telnet, MySQL, Postgres, SMB, DB2, and more, thanks to Tod Bearsdley and contributions from Thomas Ring. Metasploit now has support for generating malicious JSP and WAR files along with exploits for Tomcat and JBoss that use these to gain remote access to misconfigured installations. A new mixin was creating compiling and signing Java applets on fly, courtesy of Nathan Keltner. Thanks to some excellent work by bannedit and Joshua Drake, command injection of a cmd.exe shell on Windows can be staged into a full Meterpreter shell using the new "sessions -u" syntax. This marks the first major released developed under the Rapid7 label and coincides with general availability of Metasploit Express, our first commercial product.. We hope you enjoy using the framework as much as we like working on it. Metasploit Penetration Testing Framework - Downloads //get it while it's warm !
  22. If you have been worried lately about what information that you have included in your Facebook account might be accessible to people other than your Facebook friends, wonder no more. Here are a couple of simple tools that check your privacy settings and report back. Privacy Check is a Facebook application that calculates your privacy score: Facebook does not let you hide all you information, so a perfect 21/21 score is impossible. Most people who have locked down a lot of the information will get a 15/21 score - if you don't have any "friends", you didn't specify your gender or "liked" anything, you can score higher. While the last two mentioned type of information is really not required, if you haven't got any friends on Facebook - why did you set up an account in the first place? The application offers also some helpful links regarding privacy on Facebook (DOs and DONTs, Facebook's privacy guide and tools, etc.). Every type of data has also a handy "view raw data" link that lets you see just what particular data is exposed. Facebook Privacy Scanner is an independent and open tool for scanning your Facebook privacy settings. The scanner checks if you are opted-out of the Instant Personalization feature; who can see your personal and contact information, friends, tags and connections; check if your friends are able to accidentally share your personal information; and if there is an application you use that could leak your information: Armed with this information you can effectuate changes that will allow you to reclaim your privacy. Conclusion For those people who know exactly what they are doing on the Internet at all times, these tools will not reveal much. On the other hand, for people who don't know the first thing about privacy or security on the Internet, they can be a valuable wake-up call. Check the privacy level of your Facebook account
  23. Recently, I was given the opportunity to work with an embedded Linux OS that was locked down to prevent unauthorized access. I was able to obtain a shell fairly quickly, but then I ran into a number of security mechanisms. Fortunately, I found creative ways to overcome each of them. Here's the list of the biggest problems I encountered, in the order that I overcame them: The user account couldn't 'ls' most folders due to lack of privileges Process management tools (like ps) didn't work (thanks to the missing 'ls') The user account could only write to designated areas, in spite of file permissions Architecture was PowerPC, which I have no experience with netstat, ifconfig, arp, and other tools were disabled I can't talk about how I actually obtained a shell, unfortunately, because the nature of the device would be too obvious. But I will say this: despite all their lockdowns, they accidentally left netcat installed. Oops If you've been in similar situations and found some other tricks, I'd like to hear about them! Implementing ls Unfortunately, I was only able to obtain user access, not root. Despite permissions to the contrary, I couldn't run 'ls' against any system folders: $ cd / $ ls /bin/ls: cannot open directory .: Permission denied $ cd /bin $ ls /bin/ls: cannot open directory .: Permission denied $ find / / $ find . . And so on. I could, however, run ls on /home/user, /tmp, and subfolders thereof. As a side effect, I couldn't run the 'ps' command because it didn't have permission to read /proc: $ ps Error: can not access /proc. But I'll get to that later. After struggling a little, I was happy to discover that the 'which' command was enabled! Great luck! I wrote a script on my personal laptop that would find every executable: # find / -perm /0111 -type f | # Find all executable files grep -v '^/home' | # Remove files stored on /home grep -v '\.so$' | # Remove libraries grep -v '\.a$' | # Remove libraries grep -v '\.so\.' | # Remove libraries sed 's|^.*/||' # Remove the path And redirected the output from this script to a file. Then, I uploaded the file to the device using netcat and, after adding the sbin folders to the $PATH, I ran the following command: $ export PATH=/sbin:/usr/sbin:/usr/local/sbin:$PATH $ cat my-programs.txt | xargs which | sort | uniq > installed-programs.txt Which returned a list that looked like: $ head installed-programs.txt bin/arch /bin/bzip2recover /bin/cpio /bin/dmesg /bin/fusermount /bin/hostname /bin/ipmask /bin/kill /bin/killall /bin/login And finally, if you want more information: $ cat installed-programs.txt | xargs ls -l > installed-programs-full.txt Which, of course, gives you this type of output: $ head installed-programs-full -rwxr-xr-x 1 root root 2896 2008-03-31 16:56 /bin/arch -rwxr-xr-x 1 root root 7696 2008-04-07 00:42 /bin/bzip2recover -rwxr-xr-x 1 root root 52800 2007-04-07 12:04 /bin/cpio -rwxr-xr-x 1 root root 4504 2008-03-31 16:56 /bin/dmesg -rwsr-xr-x 1 root root 19836 2008-03-07 19:52 /bin/fusermount -rwxr-xr-x 1 root root 9148 2008-03-31 23:10 /bin/hostname -rwxr-xr-x 1 root root 3580 2008-03-31 23:10 /bin/ipmask -rwxr-xr-x 1 root root 8480 2008-03-31 16:56 /bin/kill -rwxr-xr-x 1 root root 14424 2006-12-19 18:07 /bin/killall -rwxr-xr-x 1 root root 44692 2008-03-24 15:11 /bin/login Success! Now I have a pretty good idea of which programs are installed. I could collect samples from a wider variety of machines than just my laptop, potentially turning up more interesting applications, but I found that just the output from a single Linux system was actually a good enough sample to work with. Remember, with the full 'ls -l' output, keep your eye out for 's' in the permissions. Implementing ps As I mentioned earlier, the ps command fails spectacularly when you can't ls folders: $ ps Error: can not access /proc. The first thing I tried was an experimental 'cat', which worked nicely: $ cat /proc/1/status Name: init State: S (sleeping) [...] Which tells me that the /proc filesystem is there, and that I have access to their accounting information. The only reason I can't list them is because 'ls /proc' (or the equivalent thereof) is failing. An investigation also told me that /proc/cpuinfo and /proc/meminfo also exist, which were helpful. So, I threw together a quick script to bruteforce the list: for i in `seq 1 100000`; do # Take the first 100,000 PIDs #(experimentally determined) if [ -f /proc/$i/status ]; then # Check if the status file exists CMDLINE=`cat /proc/$i/cmdline | # Read the commandline sed 's/|//g' | # Remove any pipes (will break things) sed "s/\x00/ /g"`; # Replace null with space cat /proc/$i/status | # Get the process details grep 'Name:' | # We only want the name cut -b7- | # Remove the prefix "Name: " sed "s|$| ($CMDLINE)|"; # Add the commandline to the end fi; done The output for this will look like: init (init [3] ) kthreadd () [...] udevd (/sbin/udevd --daemon ) syslogd (/usr/sbin/syslogd ) klogd (/usr/sbin/klogd -c 3 -x ) So now I have a pretty good list of the running processes. Win! Another option would be to write a patch for procps that implements a bruteforce listing, but that was beyond what I really wanted to do. Writing to protected areas This one, I want to be careful with. The reason is, I don't understand what was happening, or why. In any case, in spite of permissions, I couldn't write to most folders, including /home/user. How they locked it down, I don't know, but I can't touch, cat, grep, etc them. After some poking, though, I discovered that I could rm files and read/write them using redirection. So, oddly, it would look like this: $ touch test touch: cannot touch `test': Permission denied $ echo "TEST DATA" > test $ cat test cat: test: Permission denied $ cat < test TEST DATA $ mv test test2 mv: cannot move `test' to `test2': Permission denied $ cat < test > test2 $ rm test That's all I can really say about that one. This bug let me write to some sensitive folders and modify settings I shouldn't have been able to. PowerPC The architecture of this device turned out to be PowerPC, which presented an interesting challenge. I've never done any cross compilation before, and I didn't even know where to start. So, I was going to skip it altogether. Then, this past weekend, my friend brought over a device called WD HD Live. After installing Linux on it, I discovered that, like our old friend WRT54g, it had a MIPS core. So I took a couple hours out and learned how to cross compile for MIPS. By Monday, I knew everything one or two things about cross compiliation, and was ready to get started! I downloaded Hobbit's Netcat from Debian and compiled it with the crosstool commands (note: I have *no* idea whether or not this is the right way to cross compile; all I know is, it worked ): $ export PATH=/opt/crosstool/gcc-4.1.0-glibc-2.3.6/powerpc-860-linux-gnu/powerpc-860-linux-gnu/bin:$PATH $ wget http://ftp.de.debian.org/debian/pool/main/n/netcat/netcat_1.10.orig.tar.gz $ wget http://ftp.de.debian.org/debian/pool/main/n/netcat/netcat_1.10-38.diff.gz $ tar -xvvzf netcat_1.10.orig.tar.gz $ gunzip -v netcat_1.10-38.diff.gz $ patch -p0 < netcat_1.10-38.diff $ patch -p0 < netcat-1.10.orig/debian/patches/glibc-resolv-h.patch $ cd netcat-1.10.orig $ make linux CC=gcc I successfully copied the new netcat to the device and ran it, to prove that the cross compile worked. Obviously, using netcat to copy netcat to the device makes very little sense. But the point was to prove that cross compilation works, not that I could do something interesting with it. No networking tools Finally, I was dismayed to find out that netstat, ifconfig, arp, and others all returned a "Permission denied" error when I tried to run them. How am I supposed to figure out the system state without them? Fortunately, none of them require setuid to run, so I downloaded the latest net-tools package, compiled it with the PowerPC toolchain, uploaded them with netcat, and tried them out: $ ./netstat-ron -an Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN tcp 0 0 192.168.155.11:39002 192.168.155.105:3306 TIME_WAIT tcp 0 0 192.168.155.11:41992 192.168.155.105:3306 ESTABLISHED tcp 0 0 192.168.155.11:37288 192.168.155.105:3306 ESTABLISHED tcp 0 0 192.168.155.11:38736 192.168.155.105:3306 ESTABLISHED tcp 0 0 192.168.155.11:38652 192.168.155.105:3306 ESTABLISHED $ ./ifconfig-ron lo lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:1285090 errors:0 dropped:0 overruns:0 frame:0 TX packets:1285090 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:130762797 (124.7 MiB) TX bytes:130762797 (124.7 MiB) $ ./arp-ron Address HWtype HWaddress Flags Mask Iface 192.168.155.1 ether 00:0C:29:7E:21:63 C eth0 192.168.155.105 ether 00:50:56:C0:00:00 C eth0 192.168.155.144 ether 00:0C:29:42:B7:1B C eth0Done! Conclusion So, I managed to overcome the lockdown on the embedded device. Once I had shell I could do pretty anything I could normally do, in spite of the attempted lockdown. Therefore, I concluded that, in its current state, the lockdown was nearly useless. I plan to work with the vendor, of course, to help them resolve these issues. Now, your turn! Have you ever had to use makeshift tools on a locked down system? Any interesting stories? SkullSecurity Blog Archive Defeating expensive lockdowns with cheap shellscripts
  24. A Dutch open source developer is building a version of Firefox that uses the HTML5 video tag in tandem with the H.264 codec. Mozilla's official Firefox incarnation handles HTML5 video solely with the free and open Ogg Theora codec, sidestepping H.264 because it's a patented technology that carries license fees in certain countries. But with a project dubbed Wild Fox, the Netherlands-based Maya Posch - aka "Elledan" - seeks to offer an H.264-equipped version of the browser in countries where the patents don't apply. The project also seeks to include additional tools that are missing from Firefox due to patent issues. "The Firefox project has opted to exclude certain features due to software patents, patents which are only valid in a small number of countries," Posch writes on the Wild Fox project page, recently launched at Sourceforge. "This means that decisions have been made due to patents which do not apply in most parts of the world. The Wild Fox project aims to rectify this by releasing builds with these features included, builds which will of course only be available to those not in software patent-encumbered countries." On the project page and in a post to Slashdot, Posch calls on other Firefox-friendly developers to join the effort. Two other devs have already jumped on board, Posch tells The Reg, and a Mozilla staffer is assisting with the project as well. The idea is to start with the current stable version of the Firefox open source code - version 3.6.3 - and modify it with a new decoder. Posch tells us the project will include the open source GStreamer media framework, and this will likely handle H.264 decoding via the open GST ffmpeg codec. The still-gestating HTML5 spec does not specify a video codec for use with the new video tag. The big name browser makers couldn't agree on one. Apple uses H.264 with Safari, and Microsoft will do the same with Internet Explorer. Mozilla and Opera use Ogg Theora. And Google's Chrome browser bundles both. Apple and Microsoft say they've chosen H.264 because other codecs are vulnerable to patent suits, with Steve Jobs recently claiming that a patent pool is being put together to "go after" Ogg Theora. It's unclear whether Apple would be part of this pool. Both Apple and Microsoft are part of the group of patent holders that license H.264, and this group, the MPEG LA, has questioned whether Ogg violates the codec's patents. But Mozilla is adamant that because of its license fees, it will not include H.264 in Firefox. "These license fees affect not only browser developers and distributors, but also represent a toll booth on anyone who wishes to produce video content," Shaver wrote in a personal blog post in January. "And if H.264 becomes an accepted part of the standardized web, those fees are a barrier to entry for developers of new browsers, those bringing the web to new devices or platforms, and those who would build tools to help content and application development." This means that Firefox - like Opera - will not play HTML5 video coded with H.264. According to a recent study from research outfit MeFeedia, 26 per cent of all web video is now available for playback with the HTML5 video tag and the H.264 codec, and MeFeedia tells us that Ogg is at around one per cent. At the moment, even Google is opting for H.264 with the experimental HTML5 player it offers with YouTube. The company doesn't rate the performance of Ogg. But the rumor is that Google will soon open source the high-performing codecs it nabbed with the acquisition of On2 Technologies earlier this year. Mike Shaver and Mozilla have excluded H.264 from Firefox in part because they don't want to promote its use. They don't want it morphing into a de facto standard, forcing license fees on the world at large. Wild Fox will avoid those license fees in the short term, but you could also argue that it could push the codec closer to the sort of de facto standard that Shaver fears. For Maya Posch, this is nothing but a good thing. "First of all, software patents are a rarity in the world and I think it's pointless to have everyone suffer because two or maybe three countries have software patents," she tells us. "I also am convinced that if there's enough at stake, piles of patents will appear which Theora and other 'open' codecs will infringe upon, forcing everyone to pay license fees after all. "The only proper thing to do at this point is to make a stand - for those in software-patent encumbered countries, and for those at risk of introducing such patents in the future, including the EU." If Google open sources On2's VP8 codec, it may solve any performance issues it has with Ogg, she says, but an open VP8 will face the same patent problems. "I'm convinced some big companies would be able to slap [an open VP8] silly with patent infringement claims as well if it were to take off. The nasty thing about software patents, especially in the US, is that virtually everything can be patented." Dev goes 'Wild' with H.264 Firefox ? The Register
  25. e public. de ce crezi ca se posteaza sursa ? "kinderii" nu stiu compila
×
×
  • Create New...