Archive | February, 2012

MagicTree v1.1 Released For Download – Pen-Testing Productivity Tool

Find your website's Achilles' Heel


If you aren’t aware (yes we wrote about MagicTree v1.0) what MagicTree is..

Think of it this way, have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host or service? Or copy-pasting bits of output from a bunch of typescripts into a report? The author certainly did, and that’s why they wrote MagicTree – so that it does such mind-numbing stuff for you, so you can spend your time hacking.

MagicTree is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and (yeah!) report generation. In case you wonder, “Tree” is because all the data is stored in a tree structure, and “Magic” is because it is designed to magically do the most cumbersome and boring part of penetration testing – data management and reporting.

And the good news? MagicTree 1.1 has been released and is available for download now!

Updates

  • Rapid 7 NeXpose XML import (both simple XML and full XML formats are supported)
  • Arachni XML import (as of 0.4.0.2. Thanks to Herman Stevens of Astyran for contribution)
  • OWASP Zed Attack Proxy XML import (development snapshot as of 6-Feb-2012)
  • New matrix query interface
  • Bug fix (#224) Remove orphan projects does not work anymore
  • Bug fix (#226) NPE in dumpData()
  • Bug fix (#239) “Uncaught exception in Swing thread: null. null” when saving a custom query into the repo
  • Bug fix (#241) Corrupted reference links in report templates
  • Bug fix (#242) Updated report templates to honor “ignore” status

You can download MagicTree v1.1 here:

MagicTree-1.1-build1643.jar

Or read more here.


Posted in: General Hacking, Security Software

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Security Software | Add a Comment
Recent in General Hacking:
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- Dradis – Reporting Platform For IT Security Professionals
- Kid Gets Arrested For Building A Clock – World Goes NUTS

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,171,960 views
- Hack Tools/Exploits - 631,133 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 436,606 views

Get protected with Sucuri


UK Facebook Hacker Jailed For 8 Months

Your website & network are Hackable


It’s a pretty harsh sentence if you ask me, especially since Facebook decided in July 2011 to start paying bug bounties.

I have to say though, this guy must be a pretty talented hacker to break into the Facebook servers – they aren’t exactly low hanging fruit. I’d imagine they are some of the most hammered servers in the World (especially by script kiddies).

Sadly, however talented he is, or whatever his intention was in reality – what he did was illegal and he can be punished (fairly harshly) for it.

York-based software development student has been sentenced to eight months in jail for hacking into social networking site Facebook, including three of its servers, from his bedroom.

According to the BBC, Glenn Mangham, 26, had admitted to hacking into Facebook between April and May 2011.

Mangham used an ethical hacking defence, saying that after he showed search engine Yahoo how it could improve its security, he wanted to do the same for Facebook.

Yahoo had “rewarded” Mangham (with GBP7,000) for revealing its vulnerabilities previously, his lawyer Tom Ventham said.

However, prosecutor Sandip Patel said that Mangham had acted “with determination, undoubted ingenuity and it was sophisticated, it was calculating”.

Patel told London’s Southwark Crown Court that Mangham had “unlawfully accessed and hacked” into Facebook’s website and its computers from his bedroom in Yorkshire, and then downloaded “invaluable” intellectual property onto an external hard drive.

It’s not the first time Facebook has been hacked or security issues have surfaced, but it is the first time I recall someone being jailed for it. Facebook security hasn’t always had the best reputation – remember not long ago – Facebook Attachment Uploader Owned By A Space.

Yah that wasn’t a flaw that could be leveraged to hack Facebook itself, but it was a demonstration of some of the sloppy coding involved in Facebook.


Judge Alistair McCreath said that Mangham’s actions were not “just a bit of harmless experimentation” – despite acknowledging that Mangham had never intended to pass on the hacked information nor make any money from it.

“You accessed the very heart of the system of an international business of massive size, so this was not just fiddling about in the business records of some tiny business of no great importance.

“You and others who are tempted to act as you did really must understand how serious this is.

“The creation of that risk, the extent of that risk and the cost of putting it right mean at the end of it all, I’m afraid a prison sentence is inevitable,” McCreath said.

Prosecutor Patel said that Facebook spent $200,000 (GBP126,108) on investigating Mangham’s hacking.

A spokesperson for the social network said that personal user data was not compromised by the breach, and added: “We take any attempt to gain unauthorised access to our network very seriously, and we work closely with law enforcement authorities to ensure that offenders are brought to justice.”

No one is publishing exactly what the hack was, how he got in, or even what data he got access to – but Facebook are taking it seriously so I imagine it was an important part of their infrastructure.

But they state no personal user data was compromised, so I’m not exactly sure what he got hold of.

Source: Network World


Posted in: Exploits/Vulnerabilities, Legal Issues, Web Hacking

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Tesla Hack – Remote Access Whilst Parked or Driving
- PunkSPIDER – A Web Vulnerability Search Engine
- Dropbox Hacked – 68 Million User Accounts Compromised

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,868 views
- AJAX: Is your application secure enough? - 120,269 views
- eEye Launches 0-Day Exploit Tracker - 85,745 views

Get protected with Sucuri


xSQLScanner – Database Password Cracker & Security Audit Tool For MS-SQL & MySQL

Your website & network are Hackable


xSQL Scanner is a advanced SQL audit tool that allows users to find weak passwords and vulnerabilities on MS-SQL and MySQL database servers.

The objective of xSQLScanner is to assist the Security Analyst or Penetration Tester in auditing the security of MS-SQL and MySQL database servers.

xSQLScanner

Features

  • Test for weak password fast;
  • Test for wear/user passwords;
  • Wordlist option;
  • Userlist option;
  • Portscanner
  • Range IP Address audit and more.

Windows – xsqlscanner-1.2.zip
Linux – xsqlscan-mono.tgz

Or read more here.


Posted in: Database Hacking, Hacking Tools

Tags: , , , , , , , , , , , , ,

Posted in: Database Hacking, Hacking Tools | Add a Comment
Recent in Database Hacking:
- DBPwAudit – Database Password Auditing Tool
- VTech Hack – Over 7 Million Records Leaked (Children & Parents)
- Onapsis Bizploit v1.50 – SAP Penetration Testing Framework

Related Posts:

Most Read in Database Hacking:
- Pangolin – Automatic SQL Injection Tool - 77,247 views
- bsqlbf 1.1 – Blind SQL Injection Tool - 54,524 views
- SQLBrute – SQL Injection Brute Force Tool - 41,455 views

Get protected with Sucuri


At Last – Adobe Launches Sandboxed Flash Player For Firefox

Find your website's Achilles' Heel


Finally a proactive measure from Adobe to try and remedy the horrible security flaws they have introduced to Firefox with their Flash Player.

There have been some massive hacks recently due to Flash –

Hackers Exploiting Latest Adobe Flash Bug On Large Scale
Adobe Patches Latest Flash Zero Day Vulnerability
Adobe Promises Patch For Flash 0-day Being Used In Targeted Attacks

Those 3 were all in 2011!

Adobe has released a beta version of Flash Player for Firefox, which has better protection against vulnerability exploits because of a new sandboxed architecture.

“The design of this sandbox is similar to what Adobe delivered with Adobe Reader X Protected Mode and follows the same Practical Windows Sandboxing approach,” said Peleus Uhley, platform security strategist at Adobe, in a blog post on Monday. “Like the Adobe Reader X sandbox, Flash Player will establish a low integrity, highly restricted process that must communicate through a broker to limit its privileged activities.”

In secure software development, sandboxing refers to the practice of isolating a process from the operating system in order to minimize the fallout of a potential exploit. This type of technology has gained popularity in recent years, primarily because of its use in Google Chrome, a browser that has never experienced a successful remote code execution attack so far.

Adobe decided to implement sandboxing in Adobe Reader back in 2010 in order to counter the large number of exploits that targeted the product and its users. The technology was built into Adobe Reader X (10.0) and is based on the same sandboxing principles that Google used when developing Chrome.

Later that same year Adobe also launched a sandboxed version of Flash Player for Chrome and promised to explore the possibility of doing the same for other browsers. The new sandboxed Flash Player for Firefox, which works with Windows Vista and Windows 7, is the result of those efforts.

They have been talking about sandboxing for a long time and did mention they wanted to sandbox Adobe PDF Reader too, Chrome has had great success with it’s sandbox model and I’m sure many more software vendors will follow suit.

It’s good to see this approach with the web becoming an extremely dangerous place and more and more commerce is moving online, this gives us a deadly mix of poor security and lots of money floating around.


Critical Flash Player vulnerabilities have regularly been exploited to infect computers with malware during the past several years. Along with Java and Adobe Reader, Flash Player is one of the most attacked software applications, because its vulnerabilities can usually be exploited by simply visiting a malicious website.

“Since its launch in November 2010, we have not seen a single successful exploit in the wild against Adobe Reader X,” Uhley said. “We hope to see similar results with the Flash Player sandbox for Firefox once the final version is released later this year.”

However, the success of this version at deterring cybercriminals from writing Flash Player exploits in the future will largely depend on how quickly it gets adopted. In order to speed up the process, Adobe is working on a new update mechanism, the company’s senior manager for corporate communications, Wiebke Lips, said.

Having a sandboxed version of Flash Player for every major browser, not just Chrome and Firefox, is also important, if Adobe wants cybercriminals to lose interest in its product. “We are currently in the process of researching the best path to provide Flash Player sandbox protection for Internet Explorer,” Lips said.

However, because Internet Explorer has a completely different plug-in architecture than Chrome and Firefox, namely ActiveX, developing a sandboxed Flash Player version for it requires a different approach, Lips said. Nevertheless, the current version of Flash Player supports Protected Mode in Internet Explorer 7 or later on Windows Vista and Windows 7.

I’d like to see them implement a much better and more user-friendly update system for Flash player, so when the update comes out more users get it ASAP.

Also, this is only for Firefox and the largest target for malware peddlers is Internet Exploder Explorer – so they better get that version sorted out soon too.

Source: Network World


Posted in: Countermeasures, Security Software, Web Hacking

Tags: , , , , , , , , , , , , , ,

Posted in: Countermeasures, Security Software, Web Hacking | Add a Comment
Recent in Countermeasures:
- Bearded – Security Automation Platform
- An Introduction To Web Application Security Systems
- OpenIOC – Sharing Threat Intelligence

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,269 views
- Password Hasher Firefox Extension - 117,883 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,752 views

Get protected with Sucuri