Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting

Share This Post With Your Friends

Saturday, February 13, 2010

Prolific computer hacker gets 13 years in prison

One of the most prolific computer hackers in U.S. history was sentenced this morning to 13 years in federal prison for stealing nearly 2 million credit card numbers in a wire fraud case that cost banks an estimated $86 million.

Max Ray Vision, 37, of San Francisco, formerly known as Max Ray Butler, pleaded guilty this summer in U.S. District Court in Pittsburgh and admitted that he used encryption programs to disguise extensive hacking into financial institutions and data processing centers from a series of safehouses in California.

Mr. Butler, known online as "Iceman," "Digits" and other nicknames, has been in federal custody since 2007. In a letter to the judge, he said more prison time won't serve any purpose and asked that he be allowed to go free so he could use his expertise to help people. His family and friends also wrote letters to the judge saying nice things about him.

He had faced up to 30 years in prison, but prosecutors asked for a lighter sentence because he cooperated with them.

In addition to the prison term, he was ordered to pay $27.5 million in restitution.

SOURCE: http://www.post-gazette.com

Cyberwar: How China’s Hackers Threaten the U.S. Armed Forces

It is a universally recognized maxim that warfare is constantly changing and evolving, leaving those who fail to adjust vulnerable to those who embrace changes in tactics and technologies. Though undertaken through different methods, espionage and sabotage have always been utilized in warfare. The advent of the internet and its ubiquity in modern society has offered up opportunities for both states and nefarious actors to seek means through which to spy upon and destabilize their rivals. Thus the utilization of computer networks and the ability to hack into them by opponents today represents yet another step in the evolution of warfare.

This step presents a challenge for the U.S. armed forces as it embraces the concept of ‘network-centric’ warfare, loosely defined as a shared awareness of the battle-space amongst both commanders and soldiers through a linked information network. This ability to share timely and accurate information ideally allows for faster response times, an increased tempo of operations, lower casualties, and the improved lethality of the soldier in the field. Such core capabilities of network-centric warfare as C4I (command, control, communications, computers and intelligence) enable armed forces to utilize technology as a means to offset the need for mass on the battlefield.
However, a military dependence on network-centric warfare creates vulnerabilities for tech-savvy foes to exploit. Therefore cyber-security - which includes the use of firewalls and top secret data encryption - is of paramount importance to the U.S. Department of Defense. Pentagon expenditures on cyber-security are estimated to be at least $100 million and that level of investment should rise in the coming years under the current Quadrennial Defense Review (QDR).

Cyber threats emanate from a variety of actors, including states, terrorist organizations and criminals. Infiltration and attacks on government servers and computer networks are referred to as ‘cyberwarfare’ and are an important tool in the Chinese People’s Liberation Army (PLA) asymmetric toolkit. The PLA has long recognized that employing waves of hackers and attacking U.S. computer-dependent infrastructure provides an effective means to counter the sizable U.S. edge in technology. This fits into the philosophy of senior PLA officers, Qiao Liang and Wang Xiangsui, who outlined their ideas in the book which examined ways through which to defeat a technologically superior for such as the U.S.

Fore more visit @ http://thefastertimes.com

Friday, February 12, 2010

Internet Scams Increase Over Valentines Day

With the arrival of Valentine's Day come an increase in spam and internet scams. Dave Marcus, Director of Security Research with McAfee Labs says online frauds prey upon those who aren't as tech-savvy as them.

Marcus says that these criminals expect a failure rate of well over ninety percent due to spam and internet filters, but says that they still make a lot of money with the few consumers that do fall for their deceit. He says that these con-artists can make a lot of money with a very small investment. Several of these criminals can effectively hide their tracks by using other computers infected with spyware over the internet to carry out their crimes.

Marcus says with the spammers and scammers becoming increasingly tech-savvy, internet users must be vigilant and take all of the available steps to protect themselves. He concedes that there is no rock-solid way to make yourself one-hundred percent safe from online fraud, but that by taking some simple steps, your online security can go a long way. According to Marcus, the best way to protect yourself includes purchasing good anti-virus and internet protection software and updating it on a daily basis. He also points to some common sense approaches such as protecting your identity on line and to only purchase items from reputable sources.

For more information on internet security products from McAfee, visit them online at www.mcafee.com

The Best Penetration Testing and Vulnerability Exploitation Tool: Metasploit Framework

Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.

Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledge base for exploit developers and security professionals. This tool is provided for legal security research and testing purposes only. Metasploit is an open source project managed by Rapid7.

To download Metasploit Framework 3.3.3 CLICK HERE

Version 3.3.3 is the latest stable release of the Metasploit penetration testing framework and the recommended starting point for new users. Using the online update system, this version can be synchronized with the development tree to obtain the latest exploits and payloads. Please see the Release Notes for more information about this version.

The best vulnerability scanner software and assessment tool: Nessus

Nessus is a free, easy to use remote security scanner that is a client-server application. The application is hosted on a server (typically a Unix server), where the software can be kept up-to-date. Nessus scans any system, whether it runs Windows, Mac OS or Unix/Linux. A client server application such as nessus makes it possible to keep one easily-updatable software on a server and makes it easily accessible by as many clients as desired. Nessus also "doesn't take anything for granted" (nessus.org). No matter how your server or workstation is set up or what operating system it uses, it will scan for security vulnerabilities. For example, say your typical webserver is serving a site on port 8080 instead of the regular port 80. Nessus will scan all open ports, regardless of common and defaulted settings.

Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.
Tenable Network Security provides a suite of solutions that unify real-time vulnerability, event and compliance monitoring into a single, role-based, interface for administrators, auditors and risk managers to evaluate, communicate and report needed information for effective decision making and systems management.

Every audit in Nessus is coded as a plugin: a simple program which checks for a given flaw. There are currently 34060 different plugins used by Nessus, covering local and remote flaws.

For all Nessus Plugins: CLICK HERE

For Demonstration Videos of Nessus: CLICK HERE

For all Nessus documentation: CLICK HERE

To Download Free Nessus 4.2.0: CLICK HERE

Nessus Frequently Asked Questions (FAQ)

Q. What is included in the Nessus download?

A. When you download Nessus, you receive the Nessus 4.2 scanning engine (server) that includes a flash web-based client. To receive updates from Tenable under either a ProfessionalFeed or HomeFeed, you will need to register your scanner with Tenable through Nessus.org.

Q. What OS platforms does Nessus have builds for?

A. Nessus 4.2 is available and supported for a variety of operating systems and platforms:

Red Hat ES 4 (i386) and ES 5 (i386 and x86-64)
Fedora Core 10 (i386 and x86-64) [Compatible with Fedora 9]
Fedora Core 11 (i586 and x86-64)
Fedora Core 12 (i586 and x86-64)
Debian 5 (i386 and x86-64)
FreeBSD 7 (i386 and x86-64)
Ubuntu 8.04 (i386 and x86-64)
Ubuntu 8.10 (i386 and x86-64)
Ubuntu 9.10 (i386 and x86-64)
Mac OS X 10.4/10.5 (i386, x86-64, ppc)
Windows XP, Server 2003, Server 2008, Vista and 7 (i386 and x86-64)
SuSE 9.3 (i386)
SuSE 10.0 (i386 and x86-64)

Q. What does Nessus 4.2 cost?

A. The Nessus 4.2 scanner is available as a free download. To receive updates for new vulnerability checks, select the appropriate plugin Subscription from Tenable depending on the intended use.

Q. Can I use Nessus at work?

A. You must subscribe to the ProfessionalFeed to use Nessus outside of the home

Q. How does the Nessus license work in a VM (virtual machine) environment?

A. Each installation of Nessus requires Tenable's license whether it is stand-alone or in a virtual machine (VM) environment. The same is true for Subscription licensing.

Q. I'm a consultant, can I use Nessus 4.2 to conduct my clients audits?

A. Tenable permits you to use Nessus to audit the security of 3rd party networks but requires that you purchase a ProfessionalFeed Subscription. You must subscribe to the ProfessionalFeed to use it commercially with the latest updates and have access to technical support and knowledgebase articles. A HomeFeed cannot be used for consulting commercially.

A very common scenario for Tenable is to license several ProfessionalFeeds to a service provider who operates an equivalent number of Nessus scanners to check for vulnerabilities on their customers' systems and networks. The ProfessionalFeed license is tied to the Nessus scanner. If the Nessus scanner is mobile (such as on a laptop), then the license is mobile. We do not tie it to an IP address. There is no limitation to the amount of scans completed or IPs scanned. However, the Tenable Plugins are licensed only for use with Registered Nessus scanners obtained directly from www.nessus.org or www.tenablesecurity.com.

Q. I attempted to install Nessus via RPM, but I get an error. Why can't I install Nessus this way?

A. If you downloaded the Nessus RPM to a Windows system and then transferred it to your Unix system, the name of the Nessus RPM file will likely be something similar to Nessus-4[1].2.0-es4.i386.rpm. RPM cannot handle square brackets (i.e., [1]). Rename the file to Nessus-4.2.0-es4.i386.rpm and re-attempt the installation.

Q. How do I run Plugins from the command line and access a knowledge base?

A. You can have the NASL interpreter load the Knowledge Base (KB) for a specific host with the "-k" option. For example, you could test for the First4Internet CodeSupport ActiveX control by running:

$ nasl -k /opt/nessus/var/nessus//kbs/ \

-t codesupport_activex_code_exec.nasl

Note: this requires that you have access to the KB and that the KB has already been populated by any plugin dependencies.

Q. Can I write Custom Plugins for my Nessus Scanner?

A. Tenable Network Security encourages users of the Subscriptions to write and develop new Nessus plugins.

(i) If You feel custom plugins developed by You or Your organization will benefit the Nessus HomeFeed and ProfessionalFeed subscribers, You should consider submitting them to Tenable so that the plugins can be tested and distributed as part of the Subscription. Tenable may accept or reject plugin submissions based on code quality, relevance, performance and other factors. Submitted plugins may include copyright information about the authors, and Tenable will continue to include the copyright information in the plugin. Submitted plugins may not include any licensing terms, usage agreements or distribution clauses that would interfere with Tenable making the plugin available to subscribers to a Subscription, or would limit Tenable's right to modify the plugin if, for example, changes may be useful to improve its accuracy, performance, network impact or other parameters.

(ii) Custom Plugins. You may use the Tenable ".inc" files provided with the Subscription, as well as the built-in NASL functions to write custom plugins for Your internal use and internal redistribution, provided, however, that they may not be privately or publicly distributed, whether for free or for a fee.

(iii) Plugin writers should also be aware that many of the APIs available in the NASL language and various ".inc" libraries, may be used to write custom plugins, but such plugins may only be distributed within Your organization and may not be distributed publicly, whether for free or for a fee. For example, custom plugins that specifically make use of authenticated logins to remote systems via Secure Shell or Windows Domain, that use the libraries included in the Subscriptions or that have previously been distributed with the Registered Feed may not be publicly distributed. To ensure that Your custom plugins do not make use of a library that prohibits public distribution, You should audit them to see which libraries are being invoked and then read each corresponding license.

Q. How do I install my Activation Code?

A. Please view the Nessus Activation Code Installation document for instructions on installing the Activation Code you have received after registering for either the ProfessionalFeed or the HomeFeed.

When you first go into Google Buzz, it automatically sets you up with followers and people to follow.

A Google spokesperson tells us these people are chosen based on whom the users emails and chats with most using Gmail.

That's fine.

The problem is that -- by default -- the people you follow and the people that follow you are made public to anyone who looks at your profile.

In other words, before you change any settings in Google Buzz, someone could go into your profile and see the people you email and chat with most.

A Google spokesperson asked us to phrase this claim differently. Like this: "In other words, after you create your profile in Buzz, if you don't edit any of the default settings, someone could visit your profile and see the people you email and chat with most (provided you didn't edit this list during profile creation)."


When you first post to Google Buzz, there is a dialogue box that reads "Before participating in Buzz, you need a public profile with your name and photo."
It also says -- albeit in tiny gray letters against a white background, "Your profile includes your name, photo, people you follow, and people who follow you."

But it does not say that these publicly viewable follower lists are made up of people you most frequently email and chat with.

Even if it did say that, we doubt most users bother to read the text in the dialogue box before clicking "save profile and continue."

As per Mr.Rahul Avasthy, Google's BUZZ is the purani jeans in new packet with features:
  • Auto Following
  • Rich, Fast Sharing experience...
  • Support for public and private sharing....
  • In-box integration
  • Just the other stuff...
SOURCE: http://www.businessinsider.com

Thursday, February 11, 2010

Twitter was one of the ways protesters shared information with the outside world

Thursday 11 February 2010 is the 31st anniversary of Iran's Islamic revolution and it already looks as though it is going to be a major day of protests.

Government supporters and opponents are being called on to take to the streets.

News of the opposition protests will probably come via the web, from an army of citizen journalists.

Since the disputed presidential election in June last year, the role of social media in Iran has been evolving fast.

Cyber attack hits Australian Parliament websites again

The Australian Parliament website has again been shut down by hackers protesting against the Federal Government's plans to block certain internet sites.

The website and another linked to the Department of Broadband and Communications were shut down for long periods yesterday after their servers were overloaded.

Both websites were offline again this morning.

A group of hackers calling itself Anonymous has claimed responsibility for the interruptions, which it has called Operation Titstorm.

Anonymous claims the attacks are also to highlight moves by the Government to ban the import of pornograhy featuring female ejaculation as well small-breasted women, over fears such films were simulating child pornography.

Critics say the Government's internet filter amounts to censorship and will slow down internet speeds.

The Government says the filter is necessary to block websites containing child pornography and other criminal activity.

Microsoft Security Updates February 2010

Microsoft has released a total of 14 security updates on yesterday’s patch day. The updates are, as usual, for several Microsoft software products including the Microsoft Windows operating system and Microsoft Office.

Five of the updates have received a critical rating by Microsoft, the highest security rating. Seven were ranked as important which is the second highest rating and one as moderate. The security ratings can vary depending on the operating system and Office version used.

Microsoft Windows 7 users for instance will notice that the security updates have all received an important rating for their operating system while Windows 2000 or Windows XP users will notice that their operating systems have received the largest amount of critical ratings.

For more details CLICK HERE

China Looks to Increase Capacity for Cyber War

The Chinese Communist Party is devoting an unprecedented level of resources to growing China’s cyber war capabilities, according to an article in Asian Times. The issue of cyber war and cyberspace espionage is featured heavily in the drafts of the 12th Five Year Plan, which is being drafted by the government and the People’s Liberation Army (PLA).

Hu Jintao, president and commander-in-chief of the People’s Republic of China, has said that offensive and defensive capabilities in cyberspace is a top priority within the next decade. The new impetus behind expanding the Chinese capabilities in cyberspace stem from two major considerations. The first is a desire to catch up to the US capabilities, who is widely seen to have the greatest range of capabilities in cyberspace.

Wednesday, February 10, 2010

Political Hacktivists turn to web attacks

Political activists are increasingly using net attacks as a means of protest, reveals a report.

Since late 2009, environmental, political and ideological groups have become significant users of attacks that swamp sites with data.

The groups are well resourced and use innovative techniques said Prolexic, a security firm that combats the attacks.
Its findings come as cyber-activists block Australian government websites in protest at plans to filter content.

Prolexic estimates about a total of nine million computers are used to mount the data flooding attacks.

"The last three months have been pretty interesting," said Paul Sop, chief technology officer of Prolexic.

For years, said Mr Sop, organised crime gangs had been the main users of so called Distributed Denial of Service (Ddos) attacks which try to knock websites offline.


New techniques

Such gangs typically hire someone who runs a network of hijacked machines, a botnet, and asks them to flood a target with data on their behalf.

The tactics and techniques they used remained unchanged for a long time, he said.

"Then something strange was starting to happen," he said. "New players started to enter the field involved with ideological, political and environmental activism."

In one attack both large and small perfume firms were hit in an apparent attempt, said Mr Sop, by green activists to express their disquiet with the way the companies made and tested their products.

These players also used techniques that had never been seen before, he said.

"We've seen the new code base to test the new capabilities and the new weaponry," he said.

These techniques are far removed from those favoured by organised criminals. Some targeted databases behind a website in a bid to swamp that with bogus login attempts or lengthy search requests that would knock out the server and take out the website too.

"We asked ourselves what's changed?" he said. "What's the most likely rationale behind these attacks?"

Often when a site employed defence measures those carrying out the attacks backed off. This was not the case with the novel attacks which kept battering away at their targets.

It became obvious who was behind these attacks, said Mr Sop, when Prolexic looked at the organisations being hit which included banks, newspapers and free speech forums.

How Hackers Hack TATA website tcs.com: Chronic Weaknesses in the Security

TCS – Tata Consultancy Services has restored its website www.tcs.com after hackers changed the domain name and then tried to flog it.

Tata is India's largest software company and hackers had changed the IP address of its website from 216.15.200.140 to 205.178.152.154. They did this by breaking into the registrar account.

The changed domain ID, 205.178.152.154, shows the ISP name as Network Solutions which is the registrar of www.tcs.com.

The hackers had put up the domain name 'tcs.com' for sale and even provided their e-mail id as ''.

The case is deeply embarrassing for Tata as it shows up chronic weaknesses in the outfit's security.

Monday, February 8, 2010

How the .NET framework enforces security controls

The .NETMon tool monitors the .NET common language runtime enabling developers to conduct detailed analysis of how the .NET framework enforces security controls, including setting custom profiling filters and logging of specific events.

System Requirements
Windows .NET Framework (Click here to download now.)

DOWNLOAD HERE

How the .NET framework enforces security controls

The .NETMon tool monitors the .NET common language runtime enabling developers to conduct detailed analysis of how the .NET framework enforces security controls, including setting custom profiling filters and logging of specific events.

DOWNLOAD HERE

SOURCE: http://www.foundstone.com

How to build secure and reliable .NET software applications

The Foundstone SASS (Software Application Security Services) .NET Security Toolkit is designed to help application developers and architects to build secure and reliable .NET software applications. The new toolkit is comprised of the Validator.NET, .NETMon and SecureUML template tools which help developers validate, debug and analyze vulnerabilities during the design and development of .NET applications.

System Requirements
Windows .NET Framework (Click here to download now.)

DOWNLOAD HERE

SOURCE: http://www.foundstone.com

How to identifies the insecurely bound sockets using SOCKET SECURITY AUDITOR V1.0

Application developers need to be aware that attackers can target these same client-server applications by "hijacking" the server socket. Insecurely bound server sockets allow an attacker to bind his / her own socket on the same port, gaining control of the client connections and ultimately allowing the attacker to successfully steal sensitive application user information as well as launch denial of service attacks against the application server.

Foundstone Socket Security Auditor identifies the insecurely bound sockets on the local system preventing hackers from stealing valuable information.

System Requirements:
  • Foundstone Socket Security Auditor requires the use of the Microsoft .NET framework version 1.1 or later. These prerequisites may be obtained using Windows update or by visiting the website http://msdn.microsoft.com/en-us/netframework/default.aspx
  • Foundstone Socket Security Auditor has been tested on Windows XP, Windows 2000 workstations and Windows 2003 server running .NET v1.1. While it has not been tested on other versions of Windows, it should execute successfully on all Windows operating systems that can support the .NET framework v1.1 or higher
DOWNLOAD HERE

SOURCE: http://www.foundstone.com

Learn how to do the application security using HACME BOOKS V2.0

Hacme Books™ is a learning platform for secure software development and is targeted at software developers, application penetration testers, software architects, and anyone with an interest in application security. As a full-featured J2EE application, Hacme Books is representative of real-world J2EE scenarios and demonstrates the security problems that can potentially arise in these applications.

This training tool is used extensively as part of Foundstone’s Writing Secure Code - Java (J2EE) class. Click here for information about this class.

System Requirements
Java Development Kit (JDK) 1.4.x or greater
Windows XP or higher

DOWNLOAD HERE
SOURCE CODE

SOURCE: http://www.foundstone.com

Assess the strength of SSL servers using SSLDIGGER V1.02 RELEASED 8/26/2004

SLDigger v1.02 is a tool to assess the strength of SSL servers by testing the ciphers supported. Some of these ciphers are known to be insecure.

System Requirements
Windows .NET Framework (can be installed using Windows Update)

DOWNLOAD HERE

SOURCE: http://www.foundstone.com

SiteDigger 3.0 searches Google’s cache to look for vulnerabilities, errors, configuration issues, proprietary information, and interesting security nuggets on web sites.

What's New in SiteDigger 3.0
  • Improved user interface, signature update and results page.
  • No longer requires Google API License Key.
  • Support for Proxy and TOR.
  • Provides results in real time.
  • Configurable result set.
  • Updated signatures.
  • Ability to save signature selection and result set.

How To Use SiteDigger
  • Select the signatures from the tree
  • Provide the license key at the bottom-right box on the tool.
  • Enter the domain / sub-domain information.
  • Hit the Scan Button.
  • Save signatures and results for future analysis.

DOWNLOAD HERE

SOURCE: http://www.foundstone.com

Learn how to create secure software using HACME BANK V2.0 RELEASED on 5/19/2006

Hacme Bank™ is designed to teach application developers, programmers, architects and security professionals how to create secure software. Hacme Bank simulates a "real-world" web services-enabled online banking application, which was built with a number of known and common vulnerabilities. This allows users to attempt real exploits against a web application and thus learn the specifics of the issue and how best to fix it. The web services exposed by Hacme Bank are used by our other testing applications including Hacme Books and Hacme Travel.

System Requirements
Windows .NET Framework v1.1 (can be installed using Windows Update)
Microsoft IIS
MSDE or Microsoft SQL Server 2000
Microsoft Internet Explorer 6.0

DOWNLOAD HERE
SOURCE CODE

SOURCE: http://www.foundstone.com
Newer Posts Older Posts Home