Archive | June, 2009

Honeysnap – Pcap Packet Capture File Parsing Tool

Your website & network are Hackable


Honeysnap is designed to be a command-line tool for parsing single or multiple pcap data files and producing a ‘first-cut’ analysis report that identifies significant events within the processed data. This presents security analysts with a pre-prepared menu of high value network activity, aimed at focusing manual forensic analysis and saving significant incident investigation time. Once you have identified data that interests you, you can then employ other tools for more in depth analysis, such as the Walleye user interface to the Honeywall. Honeysnap is also suitable for manual operation or automation via cron.

Example Functions

  • Packet and connection overview.
  • Flow extraction of ASCII based communications.
  • Protocol decode of the more common Internet communication protocols.
  • Binary file transfer extraction.
  • Flow summary of inbound and outbound connections.
  • Keystroke extraction of ver2 and ver 3 Sebek data.
  • Identification and analysis of IRC traffic, including keyword matching.

Version 1.0.6 now decodes the following protocols.

  • DNS
  • FTP
  • HTTP
  • IRC
  • Socks
  • Sebek

In addtion, the new 1.0.6 version includes

  • Socks proxy traffic stats
  • User definable filters for the counts
  • Improved DNS output
  • Fixed bug in file extraction
  • A big speed increase in gzip decoding
  • Print querying IP for DNS decodes
  • Auto-spotting of IRC traffic on any port
  • SOCKS decoding
  • Fix to the truncation of extracted files
  • Includes magicpy in the distribution to solve the problems caused by the original website going away.

You can download Honeysnap here:

honeysnap-1.0.6.14.tar.gz

Or read more here.


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
- BBQSQL – Blind SQL Injection Framework
- DET – Data Exfiltration Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,991,922 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,476,508 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 686,935 views

Get protected with Sucuri


FBI Unclassified E-mail Network Owned By Virus

Find your website's Achilles' Heel


If the FBI e-mail network can get owned by a virus, what hope does the average joe have when it comes to keeping their e-mail secure?

It must be pretty serious too if it actually forced them to shut down the Internet facing e-mail network, it seems like it was down for at least a week and possible still unavailable to some users.

This demonstrates the problems self-propagating malware can cause to e-mail systems.

A virus has reportedly disrupted Web-based e-mail services at the U.S. Federal Bureau of Investigation.

The FBI confirmed Friday that it had been forced to shut down its Internet-facing unclassified network, but disputed a report that the incident had left the agency unable to e-mail counterparts in other intelligence and law enforcement agencies. “The external, unclassified network was shut down by the FBI as a precautionary measure,” the FBI said in a statement. “Within 48 hours of identifying the issue and mitigating risks, e-mail traffic was largely restored to the external, unclassified network.”

FBI agents can send e-mail on the agency’s more secure internal network or via BlackBerry, but many use this unclassified network to send messages via a Web-based e-mail system, said a source familiar with the situation. That webmail service was down throughout the week and continued to be unavailable for some users, the source said.

Where’s the full disclosure! We want details please, was this a normal virus that going around online? Was it something tailored to attack the FBI network? Was it seeded from inside or did it come in externally?

So many interesting questions, but no answers as usual.

It could be related to the recent QuickTime flaw with the DirectX rendering, the timing is about right – I guess we’ll never know though.

The FBI did not provide details on the security incident, but it looks as though hackers may have used maliciously encoded file attachments to hack into the network. In its statement, the FBI said it was now blocking users from sending or receiving attachments on the unclassified network “to give our technicians time to scan all the attachments that came into the e-mail system to make sure we have identified and mitigated all threats to the network.”

Malicious attachments are a constant security threat for computer users.

Microsoft warned Thursday that attackers are sending malicious QuickTime media files to victims, exploiting an unpatched flaw in Apple’s media format, in order to install malicious software on Windows systems.

It was first reported by NYPost and then later by CBS News.

I’ll be keeping an eye out to see if there are any further developments or news disclosure, if you’ve read anything relevant drop a link the comments.

Source: Network World


Posted in: Exploits/Vulnerabilities, Legal Issues, Malware

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Malware | Add a Comment
Recent in Exploits/Vulnerabilities:
- PunkSPIDER – A Web Vulnerability Search Engine
- Dropbox Hacked – 68 Million User Accounts Compromised
- PowerOPS – PowerShell Runspace Portable Post Exploitation Tool

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,822 views
- AJAX: Is your application secure enough? - 120,268 views
- eEye Launches 0-Day Exploit Tracker - 85,737 views

Get protected with Sucuri


FTPXerox v1.0 – FTP File Transfer Sniffer

Find your website's Achilles' Heel


This is an old tool, but still useful. I saw someone asking for a tool to grab FTP files from the wire without using something like Wireshark, which brought me to this tool – FTPXerox.

FTPXerox grabs files that are transferred across the network using the FTP protocol. It was written to demonstrate the fact that any “clear-text” file transfer protocol is susceptible to such attacks. It implements a full end-to-end TCP re-assembly engine that watches for FTP transfers. Once the engine detects an FTP file transfer, it grabs the file off the wire and stores it in a local file. It is quite intelligent in the sense, it can reconstruct exact file names and even grab binary files! Version 1.0, however, does NOT support PASV mode file transfers.


Notes

Due to the way the TCP re-assembly engine is implemented, FTPXerox can also give directory listing commands (NLST), (LIST) etc in a file. These files will be of the form “fnXXXXXX”. This is just extra information. We plan to fix that in the next release. If you do not need directory listings, just delete these files as and when they’re formed.

You can download FTPXerox v1.0 here:

ftpxerox.zip

Or read more here.


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
- BBQSQL – Blind SQL Injection Framework
- DET – Data Exfiltration Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,991,922 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,476,508 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 686,935 views

Get protected with Sucuri


Apple Struggling With Security & Malware

Your website & network are Hackable


It’s inevitable as Apple products become more and more popular they will get targeted by the bad guys. Count on more viruses, malware, exploits and rootkits for Apple Operating Systems.

They are a bit behind in the curve as they don’t have a formal security program and it’s unknown if they use secure development practices (they seem to focus more on interface design than anything else).

Something has to be done though or the next big botnet could be running on Apple machines.

A well-known security consultant says Apple is struggling to effectively protect its users against malware and other online threats and suggests executives improve by adopting a secure development lifecycle to design its growing roster of products.

“Based on a variety of sources, we know that Apple does not have a formal security program, and as such fails to catch vulnerabilities that would otherwise be prevented before product releases,” writes Rich Mogull, founder of security firm Securosis and a self-described owner of seven Macs. “To address this lack, Apple should integrate secure software development into all internal development efforts.”

Microsoft was among the first companies to integrate an SDL into its internal development routine. Under the program, products are built from the ground up with security in mind, so that poorly written sections of older code are replaced with code that can better withstand attack. It also subjects programs to a variety of simulated attacks. Adobe Systems recently beefed up the SDL program for Reader and Acrobat following criticism about the security of those two programs.

With their fairly rapid development and pumping out of new product lines (Apple TV, Mac Mini etc) they are going to face security problems at some point.

That’s without considering the Internet connected mobile devices (iPhone, iPod touch).

Adobe has taken notice too with it’s recent spate of exploits and improved its Secure Development Lifecycle to ensure future problems are minimized.

Mogull’s suggestion was one of five he made recently to ensure company is doing everything it should to safeguard its customers.

“It’s clear that that Apple considers security important, but that the company also struggles to execute effectively when faced with security challenges,” he writes in a recent article on Mac news website Tidbits. He goes on to fault the company for its ongoing failure to patch a gaping security hole in Mac versions of Java.

The suggestions came as Apple on Monday announced Safari 4.0, a release that fixes more than 50 vulnerabilities in the browser. Protection against clickjacking attacks, denial-of-service flaws and bugs that allow for remote code execution were among the fare.

Another suggestion from Mogull is that Apple appoint and empower a high-ranking executive to oversee security in all Apple products. The CSO, or chief security officer, would serve as the public face for Apple security as well as the internal boss who coordinates the company’s response to security incidents and development of new products that are safe.

I believe Apple is indeed need of a solid CSO, one that can implement more proactive measures against security flaws such as secure development, a dedicated response and research team for vulnerabilities and spearhead a generally more responsible organisation when it comes to security concerns.

Obviously to fit into Apple it has to be someone charismatic that can ‘sell’ the benefits of Apples ‘iSecurity’ system or whatever they are gonna call it.

I’m sure they’ll find some way to spin whatever security measures they take into a marketing exercise.

Source: The Register


Posted in: Apple, Malware, Security Software

Tags: , , , , , , , ,

Posted in: Apple, Malware, Security Software | Add a Comment
Recent in Apple:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- FBI Backed Off Apple In iPhone Cracking Case
- Mac OS X Ransomware KeRanger Is Linux Encoder Trojan

Related Posts:

Most Read in Apple:
- KisMAC – Free WiFi Stumbler/Scanner for Mac OS X - 83,064 views
- Apple Struggling With Security & Malware - 24,143 views
- Java Based Cross Platform Malware Trojan (Mac/Linux/Windows) - 15,994 views

Get protected with Sucuri


WEPBuster – Wireless Security Assessment Tool – WEP Cracking

Your website & network are Hackable


WEPBuster basically seems to be a toolkit that attempts to automate the tasks done by the various parts of the aircrack-ng suite.

The end goal of course is to crack the WEP key of a given Wireless network.

Features

The main part of this is the autonomous nature of the toolkit, it can crack all access points within the range in one go. Other than the the features would be those found in aircrack-ng.

  • Mac address filtering bypass (via mac spoofing)
  • Auto reveal hidden SSID
  • Client-less Access Point injection
  • Shared Key Authentication
  • WEP Decloaking (future version)
  • Whitelists (crack only APs included in the list)
  • Blacklists (do not crack APs included in the list)

You can download WEPBuster here:

wepbuster.tgz

Or read more here.


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
- BBQSQL – Blind SQL Injection Framework
- DET – Data Exfiltration Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,991,922 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,476,508 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 686,935 views

Get protected with Sucuri


Hackers Exploiting Unpatched DirectX Bug With Quicktime

Find your website's Achilles' Heel


It seems like another fairly critical flaw has been discovered in Microsoft Windows. It’s serious as it allows remote code execution, which basically means if you get hit with it your machine is owned.

It seems DirectX 7, 8 and 9 in Windows 2000, XP and Server 2003 are at risk. Windows Vista, Server 2008 and Windows 7 are not effected – so they have fixed the problem at some point in their development cycle, they just haven’t pushed it back to the older operating systems yet.

For the third time in the last 90 days, Microsoft Corp. has warned that hackers are exploiting an unpatched critical vulnerability in its software.

Late Thursday, Microsoft issued a security advisory that said malicious hackers were already using attack code that leveraged a bug in DirectX, a Windows subsystem crucial to games and used when streaming video from Web sites.

Hackers are using malicious QuickTime files — QuickTime is rival Apple Inc.’s default video format — to hijack PCs, Microsoft said. “The vulnerability could allow remote code execution if [the] user opened a specially crafted QuickTime media file,” the company said in the advisory. “Microsoft is aware of limited, active attacks that use this exploit code.”

According to Christopher Budd, a spokesman for the Microsoft Security Response Center, QuickTime itself is not flawed. Instead, the QuickTime parser in DirectShow, a component of DirectX, contains the bug. “An attacker would try and exploit the vulnerability by crafting a specially formed video file and then posting it on a website or sending it as an attachment in e-mail,,” Budd said in an entry on the MSRC blog.

Microsoft has had quite a spate of serious vulnerabilities recently, it seems resourceful hackers are targeting applications and components of the OS rather than the actual OS or networking stack.

Which makes sense, you’d expect the actual OS to be fairly secure now and not attention has been paid to those ‘must-have’ system softwares like DirectX.

Because the bug is in DirectShow, any browser using a plug-in that relies on DirectShow is also vulnerable.

DirectX 7, 8 and 9 in Windows 2000, XP and Server 2003 are at risk, Budd said, but Vista, Server 2008 and Windows 7 are not. “Our investigation has shown that the vulnerable code was removed as part of our work building Windows Vista,” Budd said.

Until a patch is available, users can protect their PCs by disabling QuickTime parsing. To do that requires editing the Windows registry, normally a task most users shy from, but Microsoft has automated the workaround. “We’ve gone ahead and built a ‘Fix it’ that implements the ‘Disable the parsing of QuickTime content in quartz.dll’ registry change,” Budd said. “We have also built a ‘Fix it’ that will undo the workaround automatically.”

Watch out when you are opening video files from unknown sources, especially in e-mail attachments (even from known sources) and you can use the ‘Fix it’ to mitigate against the problem until the patch is released.

Microsoft Security Advisory: Vulnerability in Microsoft DirectShow could allow remote code execution

Source: Network World


Posted in: Exploits/Vulnerabilities, Malware, Windows Hacking

Tags: , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- PunkSPIDER – A Web Vulnerability Search Engine
- Dropbox Hacked – 68 Million User Accounts Compromised
- PowerOPS – PowerShell Runspace Portable Post Exploitation Tool

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,822 views
- AJAX: Is your application secure enough? - 120,268 views
- eEye Launches 0-Day Exploit Tracker - 85,737 views

Get protected with Sucuri