background preloader

Hacking

Facebook Twitter

Buffer Overflow Attack Tutorial - Backtrack 5. BlackHole Exploit Kit 2.0 released with more latest Exploits. According to release announcement on Pastebin by unknown developers in a Russian-language BlackHole Exploit Kit 2.0 released with more latest Exploits. BlackHole is one of the most dominant exploit toolkits currently available in the underground market. It enables attackers to exploit security holes in order to install malicious software on victim's systems. The new variant doesn’t rely on plugindetect to determine the Java version that’s installed, thus speeding up the malware download process.

Old exploits that were causing browsers to crash and “scary visual effects” have been removed. The exploit kit is offered both as a "licensed" software product for the intrepid malware server operator and as malware-as-a-service by the author off his own server. Some interesting claims by developer about new version: Finally, a number of “private tricks” have been implemented, which the author prefers to keep a secret because he fears that competitors and antivirus companies are “sneaking around.” Blackhole exploit kit. The supposedly Russian creators use the names "HodLuM" and "Paunch". It was reported on the October 7, 2013 that "Paunch" has been arrested.[5] Basic summary of how Blackhole works[edit] Defenses against the Blackhole exploit kit[edit] A typical defensive posture against this and other advanced malware includes, at a minimum, each of the following: First release on the Internet[edit] Blackhole exploit kit was released on "Malwox", an underground Russian hacking forum.

References[edit] Jump up ^ Howard, Fraser (March 29, 2012). Five Things To Know About DHCP Snooping. This is a new format of blog post I’m trying out. The idea is to put key points about a technology into easily digestible bullet points. I’ll draw from textbook knowledge and real-world experience to sum up the “what” and the “why”. If you know “what” and “why”, the “how” becomes an exercise in syntax which you can look up, so I probably won’t belabor individual coding steps as much.

I might also toss in a few things I learned from real-world deployments. This overview of DHCP snooping is in the context of Cisco Catalyst switches running IOS, although I suspect DHCP snooping in other vendors’ switches will function similarly. 1. 2. DHCP snooping will drop DHCP messages from a DHCP server that is not trusted. 3. 4.

%DHCP_SNOOPING-5-DHCP_SNOOPING_MATCH_MAC_FAIL messages are potentially safe to ignore. 5. Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Online security must be a priority for retailers - ICO news release. News release: 9 August 2011 Cosmetics retailer Lush breached the Data Protection Act after the security of its website was compromised for a four month period, the Information Commissioner’s Office (ICO) said today. The breach, which occurred between October 2010 and January 2011, meant that hackers were able to access the payment details of 5,000 customers who had previously shopped on the company’s website.

As a result of the breach, the ICO has required Lush to sign an undertaking to ensure that future customer credit card data will be processed in accordance with the Payment Card Industry Data Security Standard. The ICO is taking this opportunity to warn online retailers that if they do not adopt this standard, or provide equivalent protection when processing customers’ credit card details, they risk enforcement action from the ICO. Lush discovered the security lapse in January 2011 after receiving complaints from 95 customers who had been the victim of card fraud. Notes to Editors. Technology Lab. What’s a Trojan Horse virus? I came across this gem on the Visa website: Trojan Horse virus What’s a Trojan Horse virus?

A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database. Now, there are Trojan Horses and there are viruses, but there's no such thing as a Trojan Horse virus. In fact, the very definition of each precludes any chance of there being such a thing. The Visa description continues with, "A Trojan Horse is an email virus usually released by an email attachment. " Just what is a Trojan then? There are several different types of Trojans. But one thing you probably won't find a Trojan doing is scouring your hard drive for personal details, as the Visa description alleges. But why is it important to know the difference between a virus, a worm, and a Trojan? Hack This Site!

How to bypass strict firewalls on public wifi hotspots and restricted networks, by tunneling blocked ports and protocols - verot.net. Public wifi hotspots and restricted internet access More and more, you can find public wireless hotspots, in cities, train stations, airports... and even some public hotspots that are available with a subscription, accessible through a web login form. The thing is, most of the time, these hospots will have a reduced connectivity. Only some ports and protocols will be allowed. For instance, you may be restricted to HTTP, HTTPS, POP and SMTP. Not the best combination when one primarily uses SSH! This also applies to protected networks, such as libraries, schools and office environments, where your access to Internet is limited, and some ports and protocols are blocked.

I will explain here two different solutions to break free of these restrictions: SSH tunneling and SOCKS servers. What do we need? You do need the following: HTTPS access through the firewall. You may want to use a free shell provider such as SilenceIsDefeat as your server, but make sure you can access SSH through port 443. Sniffer - Mobile numbers capture and transmit data - IT Security. Yes, You can build a GSM basestation using an USRP and the OpenBTS. What you do, is announce that you are a basestation for i.e. AT&T, and if you have better signal power than other basestations in the area, AT&T cellular phones will start connecting to your basestation. Normally, the mobile phones would encrypt the sent data using keys that only AT&T knows, but if you tell the phones not to encrypt, they gladly oblige.

At this point, you will be acting as their basestation. You can intercept calls and SMS's. And you can of course also send SMS's to the phones associated with your basestation. You will not be sending messages to their phone numbers, but you will sending it to their ISMI's. More random links: Airprobe, Monitoring Gsm Traffic With Usrp (Har 2009) - Gsm Srsly (Shmoocon 2010) - Gsm Security At Brucon 2010 -

Hack and / - Forensics with Ext4. Learn from my mistakes as I figure out how to gather forensics data on an ext4 filesystem. One great thing about writing technical articles is that you have a nice collection of documentation you can turn to. I tell people that I probably reference my books and articles more than anyone else, because although I may not always remember specific steps to perform a task, I do always remember whether I wrote about how to do it. One article I find myself referring to now and then is the "Introduction to Forensics" article I wrote in Linux Journal back in the January 2008 issue (my first feature article in Linux Journal).

In that article, I walk through how to use Autopsy, a front end to Sleuthkit, to perform your own forensics investigation on a server that has been hacked. Recently, I had to perform an investigation on a server that fell victim to an SSH brute-force attack (use SSH keys!) The Victim The Problem $ sudo mount -o loop /path/to/image /mnt/image Like Ext3 Plus One More. Hack and / - Password Cracking with GPUs, Part I: the Setup.

Bitcoin mining is so last year. Put your expensive GPU to use cracking passwords. When the Bitcoin mining craze hit its peak, I felt the tug to join this new community and make some easy money. I wasn't drawn only by the money; the concepts behind Bitcoin mining intrigued me, in particular the new use of graphics processors (GPUs). With a moderately expensive video card, you could bring in enough money to pay off your initial investment and your electricity bill in a relatively short time. Then Bitcoin tanked. Legitimate Reasons to Crack Passwords Before I get started, let's admit that there are some pretty shady reasons to crack passwords. That said, like with lock picking, there are legitimate reasons to crack passwords, particularly for a sysadmin or Webmaster: Test local users' password strength.

In fact, many Linux systems will run a basic dictionary attack when you change your password to evaluate how weak it is. An Introduction to Password Hashes How Password Cracking Works. Mitmproxy - home. Security Assessment - Home. Mitigating the BEAST attack on TLS | Qualys Security Labs. Update (19 March 2013): This blog post advises to use RC4 to migitate the BEAST attack, but RC4 has recently been discovered to be weaker than previously known. At this point the attacks against RC4 are still not practical. The only fully safe choice at the moment is the AES-GCM suites supported only in TLS 1.2. You can find out more in this new blog post. During the summer rumours about a new attack against SSL started circulating. As it turns out, the attack itself was conceived years ago, deemed impractical, but it was nevertheless fixed in TLS 1.1. In terms of mitigation, I expect this problem will be largely addressed on the client side, despite a potential compatibility problem that may cause some TLS sites to stop working.

Just as an example, here's one way to do the above in Apache: SSLHonorCipherOrder OnSSLCipherSuite RC4-SHA:HIGH:! Not everyone likes RC4, even though there is little to no evidence that it is insecure in the context of SSL/TLS. Home Of PaulDotCom Security Podcast.