Archive | May, 2007

Google Acquires Web Security Startup GreenBorder

Find your website's Achilles' Heel


More Google News this week after Google Launches Online Security & Malware Blog, now they have acquired a web security startup called GreenBorder.

Google Inc. said on Tuesday it has bought Internet security startup GreenBorder Technologies Inc., which creates secure connections to protect e-mail and Web users from malicious or unwanted computer code.

Terms of the deal, which closed in mid-May, were not disclosed, according to Google spokesman Aaron Zamost.

GreenBorder, a venture-backed startup founded in 2001 and based in Mountain View, California, where Google is also headquartered, offers security software that sets up temporary, virtual sessions each time a computer users surfs the Web, then discards the resulting data once the user is finished surfing.

The software allows technicians to insulate corporate networks so that malicious code hidden inside e-mail, instant messages or Web sites is automatically detected and contained.

It definitely seems like Google is moving heavily both into web applications and application security. They seem to have a specific focus on malware and malware defense.

GreenBorder has suspended new purchases or downloads of its software following the Google acquisition but continues to provide some support for existing customers on its site through the end of their current subscriptions, the site said.

When it unveiled its corporate product in 2005, GreenBorder charged a little under $100 per user. It also offered a free version for non-commercial users.

It’ll be interesting to see what happens to them after the acquisition and if they get merged into Google’s existing product folio (Google Toolbar?) or Google will develop it further.

Source: eWeek


Posted in: Countermeasures, Malware

Tags: , , , , , , , ,

Posted in: Countermeasures, Malware | Add a Comment
Recent in Countermeasures:
- Signal Messaging App Formal Audit Results Are Good
- Snort – Free Network Intrusion Detection & Prevention System
- SHA-256 and SHA3-256 Are Safe For the Foreseeable Future

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,367 views
- Password Hasher Firefox Extension - 117,974 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,775 views


OWASP – SQLiX Project – SQL Injection Scanner

Your website & network are Hackable


SQLiX, coded in Perl, is a SQL Injection scanner, able to crawl, detect SQL injection vectors, identify the back-end database and grab function call/UDF results (even execute system commands for MS-SQL). The concepts in use are different than the one used in other SQL injection scanners. SQLiX is able to find normal and blind SQL injection vectors and doesn’t need to reverse engineer the original SQL request (using only function calls).

SQLiX is a SQL Injection scanner which attempts to fill the gap between what commercial software available on the market can do and what can really be done to detect and identify SQL injection.

Current injection methods used by commercial web assessment software are based on error generation or statement injections.

Error Generation

The error generation method is quite simple and is based on meta characters like single quotes or double quotes. By injecting these characters in the original SQL request, you generate a syntax error which could result in an SQL error message displayed in the HTTP reply. The main issue with this technique is the fact that it’s only based on pattern matching. There is no way to handle multiple languages or complex behaviors when the error message is filtered by the server-side scripts.

Statement Injection

The second method used is statement injection. Let’s look at an example:

The target URL

The scanner will try to compare the HTML content of the original request with the HTML content of

If the request (1) provides the same result as request (0) and request (2) doesn’t, the scanner will conclude that SQL injection is possible. This method works fine, but is very limited by the syntax of the original request. If the original request contains parentheses, store procedures or function calls, this method will rarely work. Worse, if the variable is used by multiple SQL requests, all with different syntaxes, there is no automatic way to make them all work simultaneously.

Another global issue concerning SQL injection is the fact that pen testers frequently conclude that a given SQL injection vulnerability can’t be exploited. By concluding this incorrect statement they are inviting their customers to not patch the vulnerability.

You can download here:

OWASP SQLiX v1.0

Documentation and examples are here:

OWASP SQLiX Project


Posted in: Database Hacking, Hacking Tools, Web Hacking

Tags: , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment
Recent in Database Hacking:
- BBQSQL – Blind SQL Injection Framework
- DBPwAudit – Database Password Auditing Tool
- VTech Hack – Over 7 Million Records Leaked (Children & Parents)

Related Posts:

Most Read in Database Hacking:
- Pangolin – Automatic SQL Injection Tool - 77,660 views
- bsqlbf 1.1 – Blind SQL Injection Tool - 54,608 views
- SQLBrute – SQL Injection Brute Force Tool - 41,792 views


Commenter of the Month Competition

Your website & network are Hackable


From now on we will be having a commenter of the month competition here at Darknet to encourage quality comments and discussion.

We hope to get more interactive here and we will be giving out prizes sponsored by GFI such as PSP’s iPods and other cool stuff bundled with goodies from GFI such as mugs, key-chains and t-shirts.

So make sure you comment!

Comments will be judged on frequency and quality so get involved, start some discussions on interesting articles and take some time to download and test the tools we mention and let us know if they are useful to you.

It will also let us tailor the blog better for you, our readers and give you more of the things you are interested in.

We have almost 10,000 RSS readers now and 4000 unique visitors a day, so I know you are out there, it’s time to build some interactivity.

So if you are interesting in a new PSP or iPod kindly sponsored by GFI – Start commenting!


Posted in: Site News

Tags: , , , , , , , , ,

Posted in: Site News | Add a Comment
Recent in Site News:
- A Look Back At 2015 – Tools & News Highlights
- A Look Back At 2014 – Tools & News Highlights
- Yes – We Now Have A Facebook Page – So Please Like It!

Related Posts:

Most Read in Site News:
- Welcome to Darknet – The REBIRTH - 36,635 views
- Get the ball rollin’ - 19,007 views
- Slashdot Effect vs Digg Effect Traffic Report - 12,276 views


Technitium Free MAC Address Changer v4.5 Released

Find your website's Achilles' Heel


Technitium MAC Address Changer v4.5 has been released.

Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box.

Technitium MAC Address Changer v4.5 is coded in Visual Basic 6.0.

Features

+= Changes MAC address of Network Interface Card (NIC) including Wireless LAN Cards, irrespective of its manufacturer or its drivers.

+= Has list of all known manufacturers (with corporate addresses) to choose from. You can also enter any MAC address and know which manufacturer it belongs to.

+= Allows you to select random MAC address from the list of manufacturers by just clicking a button.

+= Restarts your NIC automatically to apply MAC address changes instantaneously.

+= Allows you to create and edit Configuration Presets, which saves all your NIC settings and makes it very simple to switch between many settings in just a click and hence saves lot of time.

+= Has command line interface which allows you to perform all the tasks from the command prompt or you can even create a DOS batch program to carry out regular tasks.

+= Allows you to export a detailed text report for all the network connections.

+= Displays all information you would ever need about your NIC in one view like Device Name, Configuration ID, Hardware ID, Connection Status, Link Speed, DHCP details, TCP/IP details etc.

+= Displays total bytes sent and received through the NIC.

+= Displays current data transfer speed per second.

+= Allows you to configure IP Address, Gateway and DNS Server for your NIC quickly and instantaneously.

+= Allows you to enable/disable DHCP instantaneously.

+= Allows you to Release/Renew DHCP IP address instantaneously.

+= Displays DHCP lease obtained and lease expires time.

+= Allows you to configure Interface Metric instantaneously.

+= Quick keyboard shortcuts for most operations.

+= Supports all Microsoft(R) Windows(TM) NT based versions in all languages.

+= All reported bugs in previous 4.0 version removed. (Thanks to all your feedbacks)

Visit http://tmac.technitium.com for more information and download links.


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- Netdiscover – Network Address Discovery Tool
- Kautilya – Human Interface Device Hacking Toolkit
- Advanced IP Scanner – Fast Lightweight Free Windows Port Scanner

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,000,230 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,508,646 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 691,616 views


Consulting Licence Offer From Redseal – Security Risk Manager (SRM)

Your website & network are Hackable


Redseal is launching a free offer next week for security consultants, pen testers and auditors.

Redseal develops a product called Security Risk Manager (SRM), it does the following – (non sales overview)

  1. Imports firewall and router configuration files
  2. Audits and checks them for errors, mis configurations, redundant rules, checks against best practices etc
  3. Draws a network topography map from the configs (you can move this around, save layouts, export to Visio)
  4. Builds a network blueprint of all permitted traffic flows which you can query (i.e. can traffic from internet get to my PCI servers etc)
  5. Built in “inference intelligence” auto populates what applications are running on the network and gives them asset values (you can customize and define as much as you want)
  6. Has a built in Threat Reference Library to provide vulnerability info, currently over 23,000 and updated on a weekly basis (you can also load in Nessus, Qualys and Foundstone scan data if you have it as well)
  7. Analyzes the network and security data to identify what vulnerabilities are the most important to fix based on network access and importance.
  8. Shows unique graphical ways to quickly view and drill down through huge sets of data to find the most important information.

The product has been referenced by some consultants as the first way to perform a passive pen test as it is completely unobtrusive, you just need to load in configs, no scanning required.

Redseal has launched a license for Consultants to use out in the field and to promote it they are offering security consultants and auditors free and full use of the product for 30 days. They are keen for consultants to use the product and prove out it’s capabilities and values in the field and they want to hear feedback and so if anyone would like to take us up on this offer please email consultants@redseal.net to sign up for the program, it’s quick, easy and free.

Some of the latest news is below:

Red Seal Press Releases

There is also a short white paper here.


Posted in: Countermeasures, Security Software

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment
Recent in Countermeasures:
- Signal Messaging App Formal Audit Results Are Good
- Snort – Free Network Intrusion Detection & Prevention System
- SHA-256 and SHA3-256 Are Safe For the Foreseeable Future

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,367 views
- Password Hasher Firefox Extension - 117,974 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,775 views


Foundstone Blast – TCP Network Service Stress Test Tool

Your website & network are Hackable


Foundstone Blast v2.0 is a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers.

Features:

/trial switch adds the ability to see how the buffer looks before sending it
/v switch adds verbose option – off by default
/nr switch turns off initial receive after initial connect – HTTP services don’t send and initial response, Mail services do
The /nr switch fixes the effect of HTTP timeouts when sending GET strings
/dr adds double LF/CR’s to buffers(useful for GET requests) off by default

Usage:

blast xxx.xxx.xxx.xxx port startsize endsize /t rcvtimeout /d senddelay /b beginmsg /e endmsg /noret

Examples:

blast 134.134.134.4 110 600 680 /t 7000 /d 300 /b user
blast 134.134.134.4 110 600 680 /t 7000 /d 300 /b user /e endchars
blast 134.134.134.4 110 600 680 /noret


/t == timeout delay in milliseconds to wait for server response
/d == delay before each send
/noret means to send raw data with no newline chars that a pop server expects at end
/b is a way to add cust text to begin of buf
/e is an alternate way to end each buf
/v switches on verbose output – off by default
/nr turns off initial receive after initial connect (useful for HTTP GET)
/dr adds double LF/CR’s to buffers (useful for HTTP GET)

You can read more and find Founstone Blast for download here:

Foundstone Blast v2.0


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- Netdiscover – Network Address Discovery Tool
- Kautilya – Human Interface Device Hacking Toolkit
- Advanced IP Scanner – Fast Lightweight Free Windows Port Scanner

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,000,230 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,508,646 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 691,616 views


Google Launches Online Security & Malware Blog

Find your website's Achilles' Heel


Another to add to your list and your RSS feedreader, Google Online Security Blog.

Google Security Blog

Online security is an important topic for Google, our users, and anyone who uses the Internet. The related issues are complex and dynamic and we’ve been looking for a way to foster discussion on the topic and keep users informed. Thus, we’ve started this blog where we hope to periodically provide updates on recent trends, interesting findings, and efforts related to online security. Among the issues we’ll tackle is malware, which is the subject of our inaugural post.

You can find the RSS feed here:

Google Online Security Blog Feed


Posted in: General News

Tags: , , , , , , , ,

Posted in: General News | Add a Comment
Recent in General News:
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,465 views
- eEye Launches 0-Day Exploit Tracker - 85,853 views
- Seattle Computer Security Expert Turns Tables On The Police - 44,724 views


Nemesis – Packet Injection Suite

Find your website's Achilles' Heel


Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting.

Nemesis can natively craft and inject packets for:

  • ARP
  • DNS
  • ETHERNET
  • ICMP
  • IGMP
  • IP
  • OSPF
  • RIP
  • TCP
  • UDP

Using the IP and the Ethernet injection modes, almost any custom packet can be crafted and injected.

Unix-like systems require: libnet-1.0.2a, and a C compiler (GCC)
Windows systems require: libnetNT-1.0.2g and WinPcap

Download it here:

Source code: nemesis-1.4.tar.gz (Build 26)
Windows binary: nemesis-1.4.zip (Build 26) (includes LibnetNT)

You can read more here:

Nemisis at Sourceforge


Posted in: Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking

Tags: , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment
Recent in Hacking Tools:
- Netdiscover – Network Address Discovery Tool
- Kautilya – Human Interface Device Hacking Toolkit
- Advanced IP Scanner – Fast Lightweight Free Windows Port Scanner

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,000,230 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,508,646 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 691,616 views


Cisco IOS FTP Backdoor Ripe for Hackers

Find your website's Achilles' Heel


Another flaw in Cisco’s IOS, this time a problem with FTP, the mechanism used to update the firmware on Cisco devices (routers & switches mostly).

You really don’t want someone playing around with your configuration files on your router do you?

IOS FTP, which comes disabled by default in IOS, is used to upload IOS software images and other software to routers and switches remotely. However, Cisco says attackers could exploit a vulnerability in the FTP server to gain access to the file system of an IOS-based router or switch and affect configuration settings.

“Unauthorized users could retrieve the device’s startup-config file from the filesystem,” Cisco says.”This file may contain information that could allow the attacker to gain escalated privileges.”

You can shutdown the FTP service on the IOS for the moment to be safe, and wait for the update.

The command is detailed below:

You could also setup an access control list to limit access to FTP.

In the meantime, Cisco says users should shut down IOS FTP if they are running the server on an affected system. (The command to do this is ‘ftp-server enable’.) The company says users can upload software to IOS devices through other methods, such as the ‘Secure Copy’ feature in the software. Users can also set up access control lists to restrict FTP access to a router or switch, Cisco adds.

The affected IOS versions are: 11.3, 12.0, 12.1, 12.2, 12.3 and 12.4. Cisco’s IOS XR is not vulnerable, and non-IOS Cisco devices are also safe.

So be careful if you are using Cisco kit, this is quite a bad hole.

Source: Network World


Posted in: Exploits/Vulnerabilities, Network Hacking

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Network Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Mirai DDoS Malware Source Code Leaked
- mimikittenz – Extract Plain-Text Passwords From Memory
- Massive Yahoo Hack – 500 Million Accounts Compromised

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 236,465 views
- AJAX: Is your application secure enough? - 120,367 views
- eEye Launches 0-Day Exploit Tracker - 85,853 views


pwdump6 1.5.0 as well as fgdump 1.5.0 Released for Download

Find your website's Achilles' Heel


A while ago some updates of pwdump and fgdump were released, namely pwdump6 1.5.0 as well as fgdump 1.5.0.

Version 1.5.0 of both programs takes advantage of some changes which makes them less likely to be detected by antivirus, at least as of today. This will be particularly helpful to those of you dealing with recent, more aggressive AV solutions. The README file for pwdump6 has also been updated to give some examples, as it seems some folks were having a hard time figuring out how to get started with it.

If you don’t know what pwdump and fgdump are..

pwdump6 is an updated version of the classic Windows password hash dumper pwdump3e. It has been updated to circumvent DEP which caused crashes on newer operating systems, and has also had several features added to make it more usable.

fgdump is a more powerful version of pwdump6 that performs cached credential dumps of a target host as well as stopping several brands of antivirus while the dumps are running. It is also fully multi-threaded and supports several means of targeting large numbers of hosts.

We at Darknet highly recommend using fgdump for most pen-test activities, very effective indeed.

Get pwdump here

Get fgdump here


Posted in: Hacking Tools, Password Cracking, Windows Hacking

Tags: , , , , , , ,

Posted in: Hacking Tools, Password Cracking, Windows Hacking | Add a Comment
Recent in Hacking Tools:
- Netdiscover – Network Address Discovery Tool
- Kautilya – Human Interface Device Hacking Toolkit
- Advanced IP Scanner – Fast Lightweight Free Windows Port Scanner

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,000,230 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,508,646 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 691,616 views