Archive | August, 2007

PDF & Image Attachment Spam – The New Problem with E-mail

Don't let your data go over to the Dark Side!


The spam landscape has changed quite a lot in the last year or so with image spam and now the latest tactic is PDF and .zip attachments.

PDF’s of course being preferred by spammers as you don’t need to extract anything to view their spam, you just open it in your favourite PDF viewer and read all about viagra and cialis!

Of course there was some nasty exploits in PDF recently aswell with some other XSS issues associated.

Anyway the point is GFI has recently released a new white paper exploring PDF spam, which describes how spammers have changed their spamming tactics over the years and how the common PDF file format has been adopted to send image spam.

This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.

It’s quite an interesting read.

The white paper is freely available for download here:

Attachment spam – The latest trend [PDF]

No registration is required to access this white paper.

If you have any questions about this subject, GFI has said we can ask them anything we want about this subject – so we can basically conduct an interview online about image/pdf/attachment spam and spam fighting measures in general.

So, if you have any questions just leave them in the comments, or if you feel they are too long – use the Contact Darknet form.

Thanks!


Posted in: Spammers & Scammers

Tags: , , , , , , , , ,

Posted in: Spammers & Scammers | Add a Comment
Recent in Spammers & Scammers:
- Russian Cyber-Crime Market Doubled In 2011
- Android Trojan Targets Japanese Market – Steals Personal Data
- Ramnit Worm Stealing Facebook Account Passwords, E-mail Address & Bank Details

Related Posts:

Most Read in Spammers & Scammers:
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,696 views
- Pro ATM Hacker ‘Chao’ Gives Out ATM Hacking Tips - 36,282 views
- Twitter DM Phishing Scam - 28,940 views

Get 50% off your second year with our 2-year deal!


German Hacker Successfully Clones E-Passports

Don't let your data go over to the Dark Side!


So the latest news is that the RFID chips in electronically enabled passports are NOT encrypted, which bright spark came up with that idea?

Ok so you implement ‘more secure’ RFID passports, and leave all the data in plain text for anyone to tamper with – nice!

So what do you think they are gonna do about that? Probably nothing right?

A German computer security consultant has shown that he can clone the electronic passports that the United States and other countries are beginning to distribute this year.

The controversial e-passports contain radio frequency ID, or RFID, chips that the U.S. State Department and others say will help thwart document forgery. But Lukas Grunwald, a security consultant with DN-Systems in Germany and an RFID expert, says the data in the chips is easy to copy.

“The whole passport design is totally brain damaged,” Grunwald says. “From my point of view all of these RFID passports are a huge waste of money. They’re not increasing security at all.”

Complicated infrastructure stops people from doing something properly, that’s a pretty lame excuse.

Apparently these new super-duper RFID enabled passports are going to help cut down on forged documents…yeah when it’s not encrypted?

Although countries have talked about encrypting data that’s stored on passport chips, this would require that a complicated infrastructure be built first, so currently the data is not encrypted.

“And of course if you can read the data, you can clone the data and put it in a new tag,” Grunwald says.

The cloning news is confirmation for many e-passport critics that RFID chips won’t make the documents more secure.

“Either this guy is incredible or this technology is unbelievably stupid,” says Gus Hosein, a visiting fellow in information systems at the London School of Economics and Political Science and senior fellow at Privacy International, a U.K.-based group that opposes the use of RFID chips in passports.

Personally I’m on the side that that the technology is incredibly stupid.

Sometimes people amaze me, not in a good way.

Source: Wired and thanks to Daniel for the heads up on this one.


Posted in: Hardware Hacking, Legal Issues

Tags: , , , , , , ,

Posted in: Hardware Hacking, Legal Issues | Add a Comment
Recent in Hardware Hacking:
- Kid Gets Arrested For Building A Clock – World Goes NUTS
- The Jeep HACK – What You Need To Know
- Rowhammer – DDR3 Exploit – What You Need To Know

Related Posts:

Most Read in Hardware Hacking:
- Elevator/Lift Hacking !!!!! - 78,679 views
- Military Communications Hacking – Script Kiddy Style - 49,764 views
- Hackers Crack London Tube Oyster Card - 44,579 views

Get 50% off your second year with our 2-year deal!


rtpBreak – RTP Analysis & Hacking Tool

Cybertroopers storming your ship?


rtpBreak detects, reconstructs and analyzes any RTP [rfc1889] session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protocol. In particular, it doesn’t require the presence of RTCP packets (voipong needs them) that aren’t always transmitted from the recent VoIP clients.

The RTP sessions are composed by an ordered sequence of RTP packets. Those packets transport the Real Time data using the UDP transport protocol.

The RTP packets must respect some well defined rules in order to be considered valid, this characteristic allows to define a pattern on the single packet that is used to discriminate the captured network traffic from packets that can be
RTP and those that securely are not.

You can download rtpBreak here:

rtpbreak-1.0.tgz

Or read more here the English documentation is here.


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- Recon-ng – Web Reconnaissance Framework
- INURLBR – Advanced Search Engine Tool
- DNSRecon – DNS Enumeration Script

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,969,171 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,386,725 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 674,060 views

Get 50% off your second year with our 2-year deal!


Russian Elcomsoft Finds Backdoor in Quicken Passwords

Don't let your data go over to the Dark Side!


Elcomsoft is quite a well known firm when it comes to password ‘recovery’, I have used their products in the past when I was in a fix and I needed a password that had been, you know…lost.

They rose to fame in 2001 after cracking Adobe’s eBook format.

Recently they announced a fairly serious backdoor in Quicken product for accounting.

A Russian firm that provides password-recovery services says it has found a backdoor in the encryption mechanism that Quicken uses to secure password-protected files, a feature that makes millions of users of the personal finance program more vulnerable to government spooks or other highly determined snoops.

Elcomsoft, which made waves in 2001 after it circulated software that circumvented digital rights management protections in Adobe’s eBooks, said the latest version of its Advanced Intuit Password Recovery product allows users to remove password protection from Quicken files.

It’s a pretty serious case seen as though a lot of small and medium enterprises hold all of their accounting and payroll data in Quicken databases. It could lead to some serious theft, if Elcomsoft can work out the backdoor I’m sure the bad guys can too.

According to a statement issued by Elcomsoft, Intuit since 2003 has secured password-protected Quicken files using “strong encryption” that for practical purposes makes brute-force attacks impossible. But Elcomsoft said the strong encryption is accompanied by a backdoor that lets Intuit unlock encrypted files using a 512-bit RSA key that until recently was known only to Intuit. The key enabled Intuit to deliver retrieval service for customers who could no longer remember their password.

“It is very unlikely that a casual hacker could have broken into Quicken’s password protection regimen,” Vladimir Katalov, Elcomsoft’s CEO, said in a statement. “Elcomsoft, a respected leader in the crypto community, needed to use its advanced decryption technology to uncover Intuit’s undocumented and well-hidden back door, and to successfully perform a factorization of their 512-bit RSA key.”

The skeptics would indeed say the escrow or backdoor is there to allow Quicken to make more money from password recovery, the conspiracy theorists would say it’s there for FBI/CIA/Homeland access to people’s account.

I’m undecided personally.

Source: The Reg


Posted in: General Hacking, Password Cracking

Tags: , , , , , ,

Posted in: General Hacking, Password Cracking | Add a Comment
Recent in General Hacking:
- Dradis – Reporting Platform For IT Security Professionals
- Kid Gets Arrested For Building A Clock – World Goes NUTS
- Drones, Tor & Remailers – The Story Of A High-Tech Kidnapping

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,167,467 views
- Hack Tools/Exploits - 620,680 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 431,951 views

Get 50% off your second year with our 2-year deal!


June Commenter of the Month Competition Winner Daniel and his Prizes

Cybertroopers storming your ship?


Daniel has received his prices for winning the June competition.

Doesn’t he look smart!

Daniel and Prizes

He’s happy! I want a silver PSP too *sigh* so sad they give it to other people haha.

Daniel and Prizes

So keep commenting guys and keep up the good discussion, in the world of blogs you ‘tip’ the author by leaving comments. It makes us happy and when we happy we post more good stuff.

You can stand a chance to win something cool, backbone won in July and August competition is still on-going.

And of course many thanks again to GFI for sponsoring these great prizes!


Posted in: Site News

Tags: , , , , , , , , , , ,

Posted in: Site News | Add a Comment
Recent in Site News:
- A Look Back At 2015 – Tools & News Highlights
- A Look Back At 2014 – Tools & News Highlights
- Yes – We Now Have A Facebook Page – So Please Like It!

Related Posts:

Most Read in Site News:
- Welcome to Darknet – The REBIRTH - 36,563 views
- Get the ball rollin’ - 18,990 views
- Slashdot Effect vs Digg Effect Traffic Report - 12,250 views

Get 50% off your second year with our 2-year deal!


mssql-hax0r v0.9 – Multi-purpose MS-SQL injection script

Don't let your data go over to the Dark Side!


mssql-hax0r v0.9 is a Multi-purpose MS-SQL injection attack tool for advanced Microsoft SQL Server exploitation. Three modes of operation are currently available: info (Information Gathering), dump (Record Dump), and brute (Brute Force).

You may need to tweak the code a bit to make it fit your needs (i.e. modifying the injection string and/or the language used by the RDBMS).

TODO (v1.0):

  • fix italian language support (test platform needed)
  • info mode: add logins target (master..sysxlogins) [name,dbname,password]
  • brute mode: automatic login grabbing feature?
  • info mode: add sys target (xtype=’S’)?
  • info mode: implement better types/keys dumping
  • add a command execution mode via master..xp_cmdshell?
  • add a privileged testing mode for post-auth vulnerabilities

It’s a fairly early version, I’ve been watching it since v0.1 – it’s a little more polished now but it’s still definitely a tool for more advanced users.

I’m sure some of you will find it useful.

Grab it here:

mssql-hax0r


Posted in: Database Hacking, Hacking Tools, Web Hacking

Tags: , , , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment
Recent in Database Hacking:
- Onapsis Bizploit v1.50 – SAP Penetration Testing Framework
- OAT – Oracle Auditing Tools For Database Security
- ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security

Related Posts:

Most Read in Database Hacking:
- Pangolin – Automatic SQL Injection Tool - 75,978 views
- bsqlbf 1.1 – Blind SQL Injection Tool - 54,296 views
- SQLBrute – SQL Injection Brute Force Tool - 40,553 views

Get 50% off your second year with our 2-year deal!


NASA Hacker Gary McKinnon Wins Right to Lords Appeal Extradition Hearing

Cybertroopers storming your ship?


As we followed the Gary McKinnon case quite closely whilst it was happening, here’s the latest update.

At least he seems to be getting a break in the case as he’s won the right to have his extradition case heard by the House of Lords.

Gary McKinnon, the ex-systems administrator accused of conducting the biggest military hack of all time, has won the right to have his case against extradition to the US heard by the House of Lords.

The decision gives McKinnon and legal team a fresh chance to challenge the extradition, having argued previously that the US authorities acted in an “oppressive” manner to secure his removal from the UK.

McKinnon has always maintained that, since the alleged offences took place in the UK, the UK is where he should stand trial. No date has been set for the House of Lords hearing and he remains on bail.

The last time we head about the case he was about to be extradited to the US under the terrorism act, bad news. At least it looks like he might get a fair trial.

McKinnon has always maintained that, since the alleged offences took place in the UK, the UK is where he should stand trial. No date has been set for the House of Lords hearing and he remains on bail.

“Gary McKinnon is delighted to learn of this important development,” said his barrister, Ben Cooper.

McKinnon, who is accused of causing £475,000 worth of damage to computers by hacking into systems belonging to the Pentagon, Nasa and the US military from his home in North London, could face a life sentence in jail with no chance of repatriation if he is extradited to the US.

At a hearing in February that went against McKinnon, his lawyers claimed that under human rights law he had a right to be tried in the UK.

If you are not familiar with this case you can catch up on our first post here:

British Hacker Gary McKinnon Fears Guantanamo

And why he got busted:

Gary McKinnon Busted Because he Forgot the Time Difference

Source: Computer World


Posted in: General News, Legal Issues

Tags: , , , , , ,

Posted in: General News, Legal Issues | Add a Comment
Recent in General News:
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,365 views
- eEye Launches 0-Day Exploit Tracker - 85,455 views
- Seattle Computer Security Expert Turns Tables On The Police - 43,618 views

Get 50% off your second year with our 2-year deal!


XSS Warning – A Security Extension/Add-on for Firefox

Cybertroopers storming your ship?


XSS Warning is a extension/add-on for Firefox that filters malicious values to prevent Cross Site Scripting (XSS) attacks by malicious URLs (assuming you have Javascript enabled).

XSS Warning

XSS Warning 0.1.8 beta protect from:

  • URL attack
  • Redirect attack
  • Link code injection

Compatible with Firefox: 1.5 – 2.0.0

You can install and read more about XSS Warning here:

http://www.gianniamato.it/project/extension/xsswarning/


Posted in: Countermeasures, Security Software

Tags: , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment
Recent in Countermeasures:
- Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response
- PEiD – Detect PE Packers, Cryptors & Compilers
- NAXSI – Open-Source WAF For Nginx

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 119,984 views
- Password Hasher Firefox Extension - 117,691 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,696 views

Get 50% off your second year with our 2-year deal!


The Homeland Security Department Suffered More Than 800 Successful Hack Attacks

Cybertroopers storming your ship?


Not just attempts, but 844 successful intrusions over the past two years, quite a scary statistic no?

They are actually having a subcommittee hearing entitled “Hacking the Homeland”.

This includes all kinds of intrusions including web site hacks, viruses, worms and other kinds of intrusion.

DHS and its constituent agencies have suffered more than 800 serious computer security incidents from 2005 through 2006, including compromised agency Web sites, unchecked computer virus and worm infections, and digital intruders that were quietly transmitting stolen data out of government networks. The panel also will examine reports of system compromises that lead to “classified data spills” within DHS.

House Homeland Security Committee Chairman Rep. Bennie Thompson (D-Miss.) said what DHS is doing on its own networks speaks so loud that its message on the importance of securing computer systems and networks is not getting across to anybody else.

They’ve spent a lot of money on security, perhaps in all the wrong places. I guess it’s time they hire people like us to tell them what to do eh?

It’s definitely a case of “Do what I say, not what I do” – a recipe for disaster.

The committee also is expected to quiz department leaders on spending such a small amount of its total information technology budget on security. According to data handed over to the committee, DHS’s chief information security officer’s budget shrank or remained stagnant over the past three years, even in the face of persistent security problems at the agency. In 2005, DHS allocated just $17.5 million for its CISO office, a figure that fell to just $15 million in FY2007.

Like several other agencies this year, DHS earned a grade of “D” on meeting federal cyber-security requirements. But many critics of that grading process say the law that the marks are based upon – the Federal Information Security Management Act (FISMA) – more accurately measures how adroitly agencies can tackle paperwork exercises, not necessarily the strength of each agency’s network and computer defenses.

I’m sure everyone is interested to hear exactly what is going on at Homeland.

This story seems to have been pulled off a number of original sources too, which I find a little odd – I had to hunt a little to find another version.

Source: Tech Target


Posted in: General News

Tags: , , , , , , , ,

Posted in: General News | Add a Comment
Recent in General News:
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,365 views
- eEye Launches 0-Day Exploit Tracker - 85,455 views
- Seattle Computer Security Expert Turns Tables On The Police - 43,618 views

Get 50% off your second year with our 2-year deal!


Inguma – Penetration Testing Toolkit

Cybertroopers storming your ship?


Inguma is a penetration testing toolkit entirely written in python. The framework includes modules to discover hosts, gather information about, fuzz targets, brute force user names and passwords and, of course, exploits for many products.

Inguma the word is the name of a Basque’s mythological spirit who kills people while sleeping and, also, the one who make the nightmares.

It was initially oriented to attack Oracle related systems but it can be used for any kind of setup.

What are the discover and gather modules you may ask? Discover modules are used to detect networks and host; gather modules are used to determine what services are listening at the host, what operative system is being used, what service pack, etc…

Sadly at this time it doesn’t work at all on Win32, again the problem with RAW sockets and the Scapy library won’t work for Win32. If you are running Win2k you might have less problems.

It’s a very early version of the software and development seems to have been quiet lately, I hope more people can contribute to this project and get it moving again.

It certainly has promise!

You can download Inguma here:

inguma0.0.2.tar.gz

Or read more here.


Posted in: Database Hacking, Exploits/Vulnerabilities, Hacking Tools, Password Cracking

Tags: , , , , , , , , , , , , , ,

Posted in: Database Hacking, Exploits/Vulnerabilities, Hacking Tools, Password Cracking | Add a Comment
Recent in Database Hacking:
- Onapsis Bizploit v1.50 – SAP Penetration Testing Framework
- OAT – Oracle Auditing Tools For Database Security
- ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security

Related Posts:

Most Read in Database Hacking:
- Pangolin – Automatic SQL Injection Tool - 75,978 views
- bsqlbf 1.1 – Blind SQL Injection Tool - 54,296 views
- SQLBrute – SQL Injection Brute Force Tool - 40,553 views

Get 50% off your second year with our 2-year deal!