Monday, 24 June 2013

Common Ajax Security Vulnerabilities and How to Resolve Them



Ajax, or Asynchronous JavaScript + XML, to use its full, unabbreviated name, is a collection of web technologies that web designers and developers use in order to create applications for websites. Many mistake ajax for being a technology in itself, rather than a collection of technology platforms. Ajax is easy to implement and has a range of possibilities, which makes it one of the most popular solutions for anyone involved with web development and design. Using ajax applications also helps to boost the user experience of a site and increase website speed, which are both increasingly important factors for SEO and delivering online business growth.
However, as with all applications, ajax ones are vulnerable to attack; using ajax on your website won’t make you any more or less susceptible to cybercrime or malware attacks, for example.
The key to protecting yourself and your ajax applications from attack is to be aware of the vulnerabilities, and to take preventative action to prevent such attacks occurring.
What are the most common attacks and what preventative measures can you take?

Browser-based Attacks

This happens when a cybercriminal or hacker is able to get into the JavaScript of a website and run a variety of codes. A browser-based attack might take many forms, such as planting a virus on the system of anyone to access it, or redirecting pages of the website, usually the homepage, elsewhere.
The worst browser-based ajax attacks are designed to prevent malware from being accessed, meaning anyone falling victim to this has the double-whammy of not being able to do anything about their problem.
The easiest way to prevent this particular problem is to stop using JavaScript, but in doing so you’ll be removing the potential for potentially thousands of applications to run on your site. Instead, ensure firewalls and any software you use for your website is kept up to date, as these will feature the latest fixes and other security updates.

Cross-site Scripting (XSS)

XSS is an example of injecting malicious code into your site, which is then passed onto browsers without them realizing. Criminals and hackers might use XSS for various instances of cyber-fraud, including identity and data theft, the stealing of other confidential information, including company financial records, spying on users’ internet use, and more. This is clearly something that all website owners want to avoid hitting their website, as it has the potential to ruin their reputation as well as cost them a lot of money. Twitter was famously hit by an XSS attack in 2010.
There are several steps ajax developers can take to reduce the risk of XSS affecting them, including:

  •  Not using backslash encoding
  •  Using JavaScript hex and Unicode
  •  Using JSON.parse or json2.js libraries to parse JSON


Ajax Bridging

Ajax bridging is not a problem in itself, but there are vulnerabilities that can have catastrophic consequences if not protected against. The problem comes with websites that host third-party applications on their own website, hence ‘ajax bridging’ from one site to another.
Attacks, including XSS, can pass through these applications, meaning if you’re hosting an application that links to a site that has been attacked, you may be attacked, too. Hackers and criminals who target specific sites often use this method if they have been unable to exploit any other vulnerability, either within ajax or any other types of applications.
While the obvious solution might appear to be to avoid ajax bridging, it may be the case that it is a necessary feature of your website. With that in mind, ensure you audit any third party website that can access your own, and take steps to assure yourself their security features heavily minimize the likelihood of attack. Use scanning software, too, and ensure you can trust any website before you allow them to access your data or browsers.

Dealing with Ajax Vulnerabilities

The biggest thing to remember with ajax vulnerabilities is that they don’t present anything unique in terms of cyber-security, so can all be dealt with relatively easily. However, as with things such as SEO, it has to be stressed that dealing with ajax issues isn’t something that you merely do once; it is an on-going process that should be a central part of your web auditing and development. Having it on your agenda will ensure that, as your website grows, you’re always able to deal with any potential issues before they have the opportunity to occur.


ABout The Author:
Robert McKinley is an online technology expert who specializes in security, specifically with regards to online applications, VPS hosting and other web hosting solutions, third-party plug-ins, and online data protection.


Saturday, 22 June 2013

The Hidden Danger of QR Codes

This Article was written by Bhavesh Naik as a guest post, you can also contribute with guest posts in SecurityGeeks Learn More.

With the huge popularity in mobile devices like the smartphone and tablets, two dimensional barcodes, or the so-called QR codes are beloved by marketers. QR codes or Quick Response codes were designed for automotive industry in Japan. Now, QR codes have become popular outside the industry due to greater reliability and greater storage space.

Originally designed for industrial application, the QR code has gained popularity in advertising industry.


Now lets see how they operate on mobile platforms.

QR codes can be used in iOS devices like iPhone/iPad/iPod and Google’s Android operating system, as well as the 3rd party applications like the ‘Google Goggles’.

The browsers in these devices support URI redirection, allowing the metadata from the QR code to the existing applications on the device.

Fig. QR code

It is believed that by the use of this advertising technique, marketers can use the behavior of scanning to get consumers to buy, causing it to have a better impact on the business.

But this huge popularity in the marketing and business world invites some nasty and gruesome evil, malicious hackers. These attackers depend on human curiosity and the innate obfuscation of the QR codes to craft an attack. If people see a random code that is not connected to anything, maybe just a sticker on the wall, they are going to scan it just because they want to know.

The biggest risk is that people cannot control their curiosity and hence they face severe consequences.

This is what a pro-American hacker, Jester, was banking on when he decided to change his Twitter avatar to a QR code to craft an attack.

In his blog, he said that anyone who scanned the QR code on his twitter page was redirected to a jolly little greeting via their default web browser on their mobile device on some free web hosting.

The greeting on the page featured the word ‘Boo!’ directly below it.

He claimed that he has exploited the open source Webkit built into the device’s default browser. This is the same vulnerability which was exploited in “Mobile Rat, turning android mobile into ultimate spy tool” as was demonstrated at the RSA conference.

This curiosity pwned the cat thing went on for 5 days without being noticed. During these 5 days, the QR code was scanned nearly over 1200 times and over 500 devices reverse shelled back to the server on the listening mode.
According to Tom Teller, a security evangelist at Checkpoint said, “It is a drive by download attack, where a user scans a bar code and is redirected to an unknown website. Once the website is visited, the modified exploits will affect the system software and additional malware will get deployed such as keyloggers.”

If you think this is the end, you are wrong. Attackers have gone ahead with exploiting vulnerabilities on mobile platform by misusing the various protocols and invoking service set commands on the mobile device. This art of attack is called ‘Telpic attack‘.

Telpic attack uses similar technique of using QR code as an attack vector. As described in Tech Experiments, “It is a malicious way of tricking an android user into reading a QR code through mobile camera redirecting it to malicious URL.” This technique is not just limited to malicious URLs but also executing USSD or the ‘Unstructured Supplementary Service Data‘, which is a vendor-specific command.

There are tons of service list commands starting from displaying the IMEI number to executing a factory reset command. Google it and you will find plenty of service list commands for various platforms and various models.



e service list commands are executed by exploiting the vulnerability of the ‘tel‘ protocol available on mobile platforms. You must have seen various mobile websites offering call button option, and when you click on one of those, you are redirected to the dialer of your phone. Here is where the tel protocol is used to call the number from the mobile phone’s dialer.

If an attacker generates a QR code embedding this protocol with a factory reset service command, think what havoc it may cause! As soon as the victim scans the QR code, the tel protocol will be invoked, followed by the service command to reset the mobile phone, and thus your entire settings and data from your device will be wiped in a matter of seconds. Detailed instruction about restoring deleted objects can be found in the iPhone forensics course offered by the InfoSec institute.
These kinds of malicious codes can spread though scanning a QR code, a catchy URL, a Near field communication (NFC) sharing, etc. When tested on Samsung Galaxy’s android platform 2.2 (Froyo), I was able to execute the service set command to display IMEI just by scanning the QR code. While on Sony Xperia, with android 4.0.4 (ICS), the service command did not get executed. While on an iPhone, the dialer didn’t seem to execute the command automatically. The user has to click the send button before making any USSD requests. There are plenty of devices that are vulnerable, you just need to find one. Some mobile phones have received a patch to fix this bug. The most threatening USSD code is the factory reset code.
The next time you see a QR code in the wild, think twice before scanning. Do not let your curiosity cloud your judgment.
What is the antidote ?

1. First of all you need to verify if you are susceptible to the vulnerability. Open the following link on your mobile’s default browser:
http://mobtest.indianhans.org
If you see your IMEI number, go to step number 2.
2. Install a dialer other than the default one, thus stopping the auto execution of any malicious USSD code. After installing the new dialer follow step 1 again to ensure that the new installed dialer is safe to use.


About The Author:
Bhavesh Naik is a security researcher for the InfoSec Institute. He is a Certified Ethical hacker and is interested in cyber forensics, pentesting and information security. His upcoming goal for the future is to become a CISSP.


Sunday, 16 June 2013

How Fiber Optics are Changing the way the Internet Works for Us

About 20 years ago, companies which provide telecommunications services, particularly Internet providers, realized the immense potential of fiber optic cables. These foresighted companies began installing fiber optic cables everywhere, and for a long time the cost of these services was too high for the average consumer. However, as these companies recoup their massive installation costs as more customers sign up for service, the costs are now affordable even for small businesses and home users. Here's how fiber optics are changing the Web, and indeed, the world.

What Fiber Optics Are
Image via Flickr by Savannah River Site


Fiber optics technology transmits signals, including information and images, across an optical fiber cable. These signals are transmitted as light pulses, and are in digital form. The advantages of fiber optics include the ability to transmit large amounts of data over vast distances with virtually no loss to the quality of the information.

What Fiber Optics Offer

The differences in fiber optic Internet services, as opposed to the older copper wire technology used by dial-up Internet services, are significant. First, users never have to worry about a poor quality connection causing loss of service. Second, fiber optics eliminate the lengthy wait times for Web pages to load, messages to be transmitted, or images to upload.
Fiber optics are ideal for an interconnected world such as ours, because it allows for real-time experiences on social media sites, such as Facebook, YouTube, Limewire, Skype, and other sites heavy on audio and video. It also has practical and useful business applications.

Who Benefits from Fiber Optics

Personal and home users get excellent service from fiber optics when they engage in apps that require lots of bandwidth. This is awesome for gamers, social media enthusiasts, video streaming, music streaming, talking to friends and family on Skype, and other such activities.
Fiber optic Internet ISPS is even more profound in the world of business. Companies live or die nowadays according to the online experience they can offer their users. If the company can offer a visually appealing website with fast interface and high usability, they're far ahead of competitors that produce websites which are slow to load and difficult to navigate due to high latency.
Other business uses for fiber optics include the superior security offered by fiber optics. This is especially true of companies and organizations which handle highly sensitive data, such as consumer credit information, medical information on patients, banking information, data which might be a target for cyber terrorism, and sensitive government data on defense.

Why Fiber Optics Beats the Alternatives

The alternative to fiber optics for most consumers and businesses is copper wiring. Copper wires are susceptible to the weather, electrical currents, and magnetic pulses. Copper is also slower, works reliably over a much shorter distance, and can't come close to providing the high level of security required for today's online transactions.
Clearly, fiber optics is the future of Internet services. As companies continue to invest in fiber optic cable installation, more people choose these faster, more reliable, more secure solutions. This, in turn, continues to drive fiber optic Internet services down, making it a viable alternative for all users.

About The Author:

Jake Fisher is a culture geek from Tampa, FL. He loves to write about tech, DIY, culture and anything geek related. Follow him @jakemfisher


Monday, 10 June 2013

How to Make a .ONION Website Using Tor Network

Not a lot of people know about .onion websites, not many people actually use it. .ONION websites are used by people who want to stay anonymous. In addition, .onion websites are the first layer of the Deep Web. Which is basically described in the picture bellow


As many websites say, the Deep Web is about 96% of the WWW content. It's full of illegal things, for example, drug dealers, private information sellers, and child p0rn websites. Plus, some people say that you can find hit-men and assassins there! 

You can search about the deep web if you want to know more,  but as an advise, don't access it much. This tutorial is just for educational purposes, and for you to know about this.

First of All let's start with the requirements:
  1. Tor Installed (Windows) OR Downloaded and extracted (Linux)
  2. A Server like Apache. (Windows users are advised to use XAMPP and Linux users, you can simply install Apache2 on your machine.)
  3. Text Editor.
If you have all the above, then you're ready to go!

First of all run Tor to make sure it's working:

If it's working, then that's good you're good to go for the next step.
Stop and close Tor for now,

Then Open the following file:

WINDOWS:
C:\Tor Browser\Data\Tor\torrc
Linux:
open the extracted folder from tor > Data > Tor > torrc

Then add the following text at the bottom of the file:

WINDOWS:

# Hidden Service

HiddenServiceDir C:\Users\UserName\tor_service

HiddenServicePort 80 127.0.0.1:80

Linux:

# Hidden Service

HiddenServiceDir /root/tor_service

HiddenServicePort 80 127.0.0.1:80

You can change from root to any user you are using.


Now make the directory in the path you added in torrc (tor_service)


Now start you apache server and make sure it's working!


If it's working, start Tor!
Check Log Message to check that there was no error starting it!


No errors! Now check the folder that you created "tor_service" You will find two files!

Open the file "hostname" and you will find you .onion link!!


This link is now working and ONLY ACCESSIBLE for Tor users!
Want to test it? Open tor, and access it!



Friday, 7 June 2013

How To Find Out If You Have A Keylogger Installed On Your Computer

Sometimes, there is a downside to the fact that the internet makes everything so easy. Case in point: cybercrime. Without ever seeing you, total strangers can access passwords and information that will give them access to your funds, credit and even your identity. In short, any personal data that you have access to online, from bank accounts to sensitive emails, can fall prey to a hacker.

One of the most common ways of internet fraud is through the use of keylogging or the use of spyware to monitor every keystroke you make. Such criminal technology is all the more sinister in that it can be difficult to detect; however, if you are vigilant, it doesn’t take a tech whiz to keep the keyloggers at bay.

Here are some reliable guidelines to prevent your information from getting hacked, to know if you are being keylogged, and what to do if you know you’re being compromised:

Image Courtesy of Wikimedia Commons



Prevention and detection


  • Know your control panel. This sounds simple, but keeping track of your authorized programs may be all you need to do. If there’s a mystery guest on your panel, check it out ASAP—this may even include hardware that your computer sees, but simply does not exist!
  • Regularly “do the sweeps.” A number of routine security precautions are also reliable ways of routing out spyware. Do regular scans with a reliable virus protector to find possible trojans, and always make sure your firewall is up. You should also inspect all running programs from time to time by pressing the “control”, “alt” and “delete” keys to consult your task manager.
  • Always consider the source. In short, never open a file from someone you don’t know—this includes pop-ups from mystery contacts. Most of all, never respond to pop-ups or emails requesting you to update your ID’s or passwords; it’s almost certainly a scam. Finally, while this may seem slightly overboard, make a habit of intermittently checking the web addresses of the sites you visit. Dummy sites used to harvest vital information may be perfect facsimiles, but they will have suspicious-looking urls.
  • Use the big guns. If you regularly access particularly sensitive materials or you have reason to suspect you are a repeated target, it would be wise to take special precautions. Certain programs, such as Microsoft’s Process Monitor or Hijack This, will find any invaders. You may also consider running from a virtual PC so you can leave fewer trails for hackers to follow.



Image Courtesy of Phydeaux460/Flickr.com

Removal

If one of the methods above sends up the red flag, getting rid of the keylogger will only take a few steps:

  • Go to the task manager and click “end process”. If you share a computer, make sure that the program you’re removing is indeed a spy implant.
  • Remove the spy program by downloading a free software removal tool—obviously, you won’t want to make an online purchase while you’re being monitored! PC Whiz is a good user-friendly option.
  • Reboot your computer and play it safe by updating your anti-spyware arsenal. Most of them are reasonably priced or even free, but make sure you’re using a reputable provider: some of the most devious hackers find their targets by offering fake spyware detection.

In some cases, spyware can be so pernicious that you’ll need a computer professional to debug your computer; however, even the most casual computer user can take care of things on their own. Again, the best solution is prevention, so use the above tips to make sure you never have a problem in the first place.

About The Author:

Marcela De Vivo is a freelance writer and internet entrepreneur from Southern California whose writing covers everything on technology, home security, gaming and marketing. She keeps her computer well-protected through the use of various programs.


Thursday, 6 June 2013

Local File Inclusion To Shell Tutorial Part 2


Hello Guys,

Today we have another tutorial from Foloox Csl,
On how to upload a shell in LFI with user-agent changing method, a new one.

Please subscribe to him



Video Available in HD!


Monday, 3 June 2013

Python Tutorial - How to create A Server and client using python


Hello guys,

Here is our first python video tutorial made by Oltjano Terpollari
The video is uploaded on his youtube channel, please subscribe to him.

This tutorial will show you how to make a server, and a client to connect with each other!



About The Author: 
Oltjano is pursuing Computer Engineering from Polytechnic University of Tirana. He is passionate about Information Security, Computer Forensics , game development and drawing. Website:http://thisisoltjano.blogspot.com




Sunday, 2 June 2013

Aircrack-ng Updated After 3 Years





Finally after 3 long Years, Our favorite weapon of choice got an update. A lot of fixes and improvements on all tools and documentation have been made.In addation few new tools and scripts including distributed cracking tool are also included.The Complete change log can be viewed below.
Complete Aircrack-ng Changelog Version 1.2 beta 1

Version 1.2-beta1 (changes from aircrack-ng 1.1) – Released 25 May 2013:

  • Airmon-ng: Added chipset information for ar9170usb, wl, rt2800usb, ar9271, wl12xx, RT3070STA, ath9k_htc, r871x_usb_drv, ath5k, carl9170 and various Intel drivers.
  • Airmon-ng: Fixed chipset information ipw2200.
  • Airmon-ng: Fixed output for r8187 driver.
  • Airmon-ng: Improved chipset information for a few drivers.
  • Airmon-ng: Support for displaying information about ath9k.
  • Airmon-ng: Added ‘check kill’ to automatically kill services that could interfere.
  • Airmon-ng: Fixed issues with Intel chipsets detection.
  • Airmon-ng: Updated iw download link.
  • Airmon-ng: Better mac80211 handling
  • Airmon-ng: Added detection for WiLink TI driver, rtl819xU, iwlwifi.
  • Airmon-zc: Improved version of Airmon-ng with more detailled information.
  • Airdecap-ng: Fixed decoding QoS frames (Closes: #667 and #858).
  • Airgraph-ng: Use Aircrack-ng Makefile instead of its own.
  • Airbase-ng: Fixed bug using clients list.
  • Airbase-ng: Fixed issue with QoS (ticket #760).
  • Airbase-ng: Fixed sending beacons with null SSID.
  • Airbase-ng: Allow non ASCII ESSID
  • Airodump-ng: Fixed buffer overflow (ticket #728).
  • Airodump-ng: Fixed channel parsing.
  • Airodump-ng: Fixed FreeBSD battery reading.
  • Airodump-ng: Renamed “Packets” column to “Frames” (“Packets” was not correct).
  • Airodump-ng: Fixed XML bugs when outputting NetXML: ESSID containing ‘&’ or chinese characters, when multiple encryption are used.
  • Airodump-ng: Add alternative paths for Airodump-ng OUI file.
  • Airodump-ng: Added GPSd 2.92+ support (JSON).
  • Airodump-ng: Add option –manufacturer to display manufacturer column on airodump-ng.
  • Airodump-ng: Add feature to show APs uptime (–uptime) based on the timestamp.
  • Airodump-ng-OUI-update: Fixed OUI URL and allow CURL redirect (ticket #829).
  • Airdrop-ng: removed .py from file names.
  • Airdrop-ng: Fixed bug in installer.
  • Airdrop-ng: Fixed OUI lookup.
  • Airdrop-ng: Fixed bug when several BSSID have the same ESSID.
  • Airdrop-ng: Doesn’t constantly parse anymore, wait 5 seconds each time it parses.
  • Airdrop-ng: Fixed crash when failing to get channel or when rules file didn’t exist.
  • Airdrop-ng: Fixed to use lorcon.py/lorcon2 libs.
  • Airdrop-ng: Updated README.
  • Airdrop-ng: Fixed error preventing update to work.
  • Versuck-ng: New script to do the same thing as the kismet autowep plugin from the CLI.
  • Aircrack-ng: Fixed counter display error when cracking WPA.
  • Aircrack-ng: Added output of the WPA handshake to EWSA project file.
  • Aircrack-ng: Added output of the WPA handshake to oclhashcat+ project file.
  • Aircrack-ng: Added benchmark option, -S.
  • Aircrack-ng: Fixed -u option.
  • Aircrack-ng: PIC fix for hardened systems from Francisco Blas Izquierdo Riera (klondike)
  • Aircrack-ng: Allow dictionaries larger than 2Gb.
  • Aircrack-ng: Give a better message when there’s an error with the dictionary.
  • Aircrack-ng: Prevent a buffer overflow from happening (Wojciech Waga).
  • Aireplay-ng: Added migration mode attack from Leandro Meiners and Diego Sor from Core Security (BlackHat Las Vegas 2010)
  • Aireplay-ng, Airodump-ng: Added option to ignore issue with -1 channel.
  • Airserv-ng: Fixed crash when clients disconnect.
  • Besside-ng-crawler: Added EAPOL Crawler.
  • Airdecloak-ng: Fixed bug when using pcap files with PPI headers.
  • dcrack: Distributed cracking server/client
  • wifi-detect.sh: reference script for testing wifi card detection using iwconfig vs ls /sys/class/net
  • WPA Clean: Tool to merge and clean WPA capture files.
  • Wireless Panda: C# Library to parse Airodump-ng output files (and added example project).
  • OSdep (Linux): Setting fixed bitrates on mac80211 2.6.31 and up.
  • OSdep (Linux): Added support for nl80211 thanks to impulse32. Use ‘make libnl=true’ to add netlink support (Ticket #1004).
  • Manpages: Improvement and fixes for Airgraph-ng, Airodump-ng, packetforge-ng, Aircrack-ng
  • Manpages: Fixed various spelling issues and single quote issues.
  • Makefiles: Added tests for the different tools.
  • Makefiles: Various fixes and improvements.
  • Makefiles: Added support for libgrypt instead of OpenSSL via parameter.
  • Patches: Added a few patches.
  • Removed useless script: patchchk.
  • Finally fixed licensing issues.
  • Fixed endianness issues in most of the tools.
  • Fixed cppcheck errors (Ticket #957).
  • Fixed various compilation issues on Linux and Cygwin, GNU/Hurd, Darwin (OSX) and Sparc.
  • Fixed compilation on recent gcc versions on Linux, Cygwin.
  • Added instructions for Travis CI: Free Hosted Continuous Integration Platform for the Open Source Community.
  • Various other small bug fixes.


DOWNOAD LINK: 
http://download.aircrack-ng.org/aircrack-ng-1.2-beta1.tar.gz