Darknet - The Darkside

Don`t Learn to HACK - Hack to LEARN. That`s our motto and we stick to it, we are all about Ethical Hacking, Penetration Testing & Computer Security. We share and comment on interesting infosec related news, tools and more. Follow us on Twitter, Facebook or RSS for the latest updates.

10 May 2006 | 25,051 views

SecureDVD – Multiboot Live Security Distro’s

Check Your Web Security with Acunetix

SecureDVD is a DVD with the 10 Best Security related Live CD’s.

Yes that’s right, they authored this DVD based on the recommendations made by Darknet!

Now you can have all your favorite CDs ‘compiled’ into a single DVD. I love this idea.

SecureDVD is available to download, but due to it’s size, only in BitTorrent. You can also have it shipped to your address if you buy it.

You can take a look at the boot loader screenshot here

Enjoy, and remember to seed after you’re done downloading.

P.S: I suggest everyone to wait a couple of hours until starting to download. SecureDVD is currently fixing some problems they had with the .Torrent.

Update: Download is going smooth now ;) ~100KBs



09 May 2006 | 10,208 views

UK hackers condemn McKinnon trial

It is a little over the top, this guy used over the counter kiddy tool and ‘hacked’ into systems because of blank passwords.

Not rocket science, and apparently the machines he had access to were air-gapped, or segregated from the networks containing sensitive information, so the charges are greatly trumped up and are NOT relative to his offence.

The UK’s hacking community has strongly criticised how fellow hacker Gary McKinnon has been treated.

Accused of hacking into US military computer networks, Mr McKinnon this week is expected to find out if he is to be extradited for trial in the US.

British hackers say he is being made an example of to serve political ends rather than improve computer security.

The punishment he faces, up to 70 years in jail, was also too harsh a sentence for the crimes he has confessed to.

70 years? For hacking into some minor grade web servers and finding some mostly declassified information.

Mark, and another attendee Rat, suggested that Mr McKinnon was being treated harshly to send a message to the rest of the hacking community to clean up its act.

“But,” they said, “the idea of clamping down on some unlucky guy and threatening him with 70 years in jail will not make the blindest bit of difference.”

“All [hackers] think they will not get caught,” said Mark.

Rat said that almost every message received by the blogs set up to document Mr McKinnon’s treatment and the progress of the court case had been supportive.

Dr K, another UK hacker interviewed by the BBC News website, questioned why Mr McKinnon had to be extradited to be tried for the crimes for which he has already confessed.

He got sloppy and he got caught, he made a mistake. He really doesn’t deserve to get 70 years for what he did.

No one is saying he didn’t do anything wrong, but branding him a terrorist is going a bit far, I don’t think the US needs to make an example of him in this way.

Source: BBC News


09 May 2006 | 4,013 views

ASP.NET Memberships and Roles

If your familiar with asp.net, you’ll know the feeling of wasting hours searching through countless settings to get an app working, and then the many more hours it takes to tweak IIS to get your site running smoothly. But this is nothing compaired to getting authentication and domain controllers properly integrated. On Microsofts asp.net newsgroup the biggest single security issue mentioned is user error and bad setup, sometimes allowing things as stupid as anonymous users having full control of a web app.

4GuysFromRolla regular .net author Scott Mitchell has written a kick-ass guide to all things membership and role based, and if your producing an intranet or just a large webapp you will want to take a look. Allowing .net to manage your permissions and users can not only save you time, but takes out some of the many errors that can sneak in when your managing a large sites security manually.


08 May 2006 | 6,387 views

McAfee Seeds Mac Virus Threat FUD

What a surprise, McAfee spreading FUD to sell more copies of their bloated AV software?

Apart from the fact I think the whole AV model is flawed i.e. it can only protect against things the AV companies 1) know about 2) have written a definition for and 3) have delivered the definition to you – That’s a LOT of ifs.

Now McAfee is spreading some FUD about Apple viruses so they can sell their new Mac antivirus software.

Among its key findings, which McAfee clearly hopes will scare you enough to consider buying its anti-virus software for the Mac:

  • From 2003 to 2005, the annual rate of vulnerability discovery on on Apple;s Mac OS platform has increased by 228% compared to Microsoft’s products which only saw a 73% increase.
  • As demonstrated by its March 2006 patch, which corrected 20 vulnerabilities, Apple’s Mac OS platform is just as vulnerable to targeted malware attacks as other operating systems
  • Security researchers and hackers will increasingly target the Mac OS and other Apple products, such as iTunes and iPods.

The direct link to the McAfee whitepaper is here (PDF WARNING).

Here’s the part that is supposed to the Mac users worried.

Apple appears to be in the earlier stages of malware evolution where exploits are written and spreads as proof-of-concept to demonstrate technical prowess and garner notoriety. While these elements remain in the Windows malware community, they are being overshadowed today by the more professional, profit-seeking malefactors. Apples customer base does not yet provide an attractive enough target to warrant interest from this for-profit contingent. However, as Apple’s continued market success places its products in the hands of more and more consumers that status will inevitably change

Nice eh? Are you scared yet? I’m not..

I have to say from experience though, Mac users tend to be more tech savvy, they know a bit about their machines and the Operating System running on it.

Plus OSX does actually have some concepts of real priveledge seperation built in, unlike Windows. It’s basically *nix with a great Window Manager.

I mean niche doesn’t mean safe, but still, any virus that infects a properly designed operating system can’t do anything, other than delete that users files, assuming the virus can work out where they are..files which should be backed up anyway.

Proper OS security architecture renders antivirus software pointless.

Source: Business Week


08 May 2006 | 8,174 views

SinFP – Next Generation OS Detection Tool

OS Fingerprinting is an important part of any penetration test or hack as it allows you focus your efforts a lot more effeciently when point testing, rather than throwing everything at a machine like a script kiddy would. So let’s introduce a new option, other than p0f and xprobe2.

SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has.

Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization, its approach to OS fingerprinting is becoming to be obsolete.

SinFP uses the aforementioned limitations as a basis for tests to be obsolutely avoided in used frames to identify accurately the remote operating system. That is, it only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3 (with
only 1 test giving the OS reliably in most cases).

Features list:

  • full OS fingerprinting suite, built as a Perl module
  • active fingerprinting
  • passive fingerprinting (with signature matching made against active ones)
  • works the same over IPv4 and IPv6 (yes, IPv6 fingerprinting)
  • online mode
  • offline mode (especially useful when you have a pcap file)
  • heuristic matching algorithm to avoid the need to write new signature for a target stack which has some TCP option deactivated, or changed window size

To read more you can check out the SinFP Homepage.

You can download SinFP directly here.


07 May 2006 | 4,817 views

New Trojan Targets World Cup Fans – Troj/Haxdoor-IN

Ah, first we had the ransomeware, yesterday the trojan targetting WoW users, now we have the World Cup trojan..

It really must be Trojan season.

A Trojan horse that poses as a World Cup wallchart has begun circulating on the net. The Haxdoor-IN Trojan horse is been spamvertised in messages, written in German, that purport a program that will allow fans to keep tab on football teams participating in next month’s eagerly anticipated tournament.

Windows users who follow links in these messages and download the software will wind up with infected PCs. Net security firm Sophos says all the spam emails promoting downloads of the malware it has seen so far have been written in German. “There is no reason to believe that hackers will not switch to using other languages to increase their pool of potential victims,” it warns.

It has happened in similar ways before.

Virus writers have regularly taken advantage of World Cup competitions to promote their wares. A year ago, the Sober-N worm offered tickets to the tournament in an attempt to trap gullible users into opening an infectious email attachment. In 2002, the Chick-F virus tried to exploit fans’ desires to learn the latest scores from games in South Korea and Japan.

At the end of the day it all comes down to Social Engineering, hacking the wetware, always the weakest link..They may have firewalls, antivirus and anti-spyware software up the chute, but if you can make them run an executable their PC is yours. Especially on Windows where the concept of privelege segregation is extremely vague..

Theres a bit more info about the trojan over at Sophos: Haxdoor-IN.

Its aliases are:

  • Backdoor.Win32.Haxdoor.in
  • BKDR_HAXDOOR.GM
  • Backdoor.Haxdoor.J

Source: The Register


06 May 2006 | 13,701 views

New Password Stealing Trojan Targets WoW Players

It really does seem like the Malware/Spyware folks are really into making money nowdays, what with $15 spyware kits and Viruses that place your machine under lockdown until you pay the ransom..

What happened to people just doing stuff for learning, for enhancement of knowledge, deep understanding..not a quick few hundred dollars.

I have to say though targetting WoW users is a pretty smart and unique vector, as quite a lot of money does come from Virtual sources, selling level 60 characters, selling certain items, selling information and so on.

A new password-stealing Trojan targeting players of the popular online game “World of Warcraft” hopes to make money off secondary sales of gamer goods, a security company warned Tuesday.

MicroWorld, an Indian-based anti-virus and security software maker with offices in the U.S., Germany, and Malaysia, said that the PWS.Win32.WOW.x Trojan horse was spreading fast, and attacking World of Warcraft players.

The trojan spreads through the normal VB virus of the week vectors (email, network etc), but specifically targets WoW accounts.

The Trojan spreads via traditional vectors, such as e-mail and peer-to-peer file sharing, added Rammurthy, but it has also been watched while it installs in a drive-by download from gaming sites’ pop-up ads. The surreptitious installation is accomplished by exploiting various vulnerabilities in Microsoft’s Internet Explorer Web browser.

Interesting to see what comes next..

Source: Information Week


05 May 2006 | 17,106 views

The MIT IP Packet Spoofing Project – Can We Spoof IP Packets?

Now this is a VERY interesting project, as I’ve always said the majority of DoS attacks and DDoS attacks (90%+) could be stopped if all the ISP’s null routed packets which DO NOT originate from IP blocks they own, e.g. spoofed packets.

Basically the project has been established to see if you can spoof IP packets or not, and what percentage of ISPs already drop the packets.

It seems in general about 20-25% of systems are able to spoof packets.

Packet Pie Charts

The classic design tenets of Internet architecture produced a network capable of remarkable scalability while relegating security to the end hosts. As a result, the public Internet includes no explicit notion of authenticity and will forward packets with forged headers. Malicious users capitalize on the ability to spoof” source IP addresses for anonymity, indirection, targeted attacks and security circumvention. Compromised hosts on networks that permit IP spoofing enable a wide variety of attacks. Despite being first exploited over two-decades ago, IP spoofing is a persistent problem and a continued threat. In addition to mounting spoofed-source bandwidth-based denial-of-service (DoS) attacks, new exploits utilizing IP spoofing surface regularly.

You can read more of the intro to the ANA spoofing project here.

Some may suspect the project and the software involved is somewhat nefarious, but oh well, if you are going to get r00ted by someone, let it be MIT ok? Anyway you can always run it in a sandbox or in a fresh VMware machine.

If you don’t care either way, you can download the spoofer software here.

Please note though, it won’t run under Windows XP SP2, due to the whole raw sockets issue I would imagine.

The majority of systems tested so far have been Windows systems though (64%).

A summary of the results:

Total Completely Failed Spoof Attemps: 1823
Failed as a result of Windows XP SP2: 528
Failed as a result of (non-Windows) Operating System block: 111
Failed as a result of being Behind a NAT: 702

The various types of tests show which restrictions are in place.

Packet Summary Results

A full summary of the results are here.

Digg This Article


04 May 2006 | 4,529 views

AV Firms Say Windows Vista Security Claims are Bullsh*t

It seems the faith in Microsoft from the security industry is at an all time low, not surprising really with the amount of flaws that have been coming out in both the OS and the crapware forced upon its users like Internet Explorer Exploder.

Anti-virus firms at Infosec say they expect Vista and IE7 to change nothing for the industry. Microsoft used its presence at the show to laud the security features they’ve been busy building in the the upcoming software.

In particular, Microsoft was eager to talk about how Vista will finally jettison the need to run Windows as an administrator most of the time.

Basically what they are saying is, your mom, your gran and anyone else technically unsavvy is still going to be subjected to huge risks, even if they upgrade to Vista. Nothing is going to change in essence.

Eugene Kaspersky, founder of the eponymous Russian AV outfit said he expects the new privilege regime to have little effect. He said: “Of course they [virus writers] will find a way round it. Within a year there will be something like a rootkit for Vista.”

John Kay, Chief Technical Officer at Blackspider reckons on a “bug per line of code”. With the traditionally Heath-Robinsonian construction of MS browsers he’s not hopeful for IE7. He said: “I dread to think how many lines of code there are in there.”

1 bug per line of code? Amazingly bad, but I don’t think it would be quite so terrible. Even so, the people in the know say Windows is the worst hodge podge of spaghetti coding they’ve ever seen. It was pretty much confirmed when the Win2k & NT4 source code leaked out.

Let’s all stick to *nix & Open Source hey, but then that’s not perfect either. At least it’s improving at a rate of knots…I’m just waiting for Firefox to have a decent Bookmark manager ;)

Source: The Register


04 May 2006 | 12,803 views

Homeland Security Uncovers Critical Flaw in X11

An open-source security audit program funded by the U.S. Department of Homeland Security has flagged a critical vulnerability in the X Window System (X11) which is used in Unix and Linux systems. A missing parentheses in a bit of code is to blame. The error can grant a user root access, and was discovered using an automated code-scanning tool.

The flaw has been fixed.

It was a change from this:

if (getuid() == 0 || geteuid != 0)

to this:

if (getuid() == 0 || geteuid() != 0)

The best part was the CVS comment:

Fri Mar 10 17:29:51 2006 UTC (7 weeks, 4 days ago) by deraadt:
proper geteuid calls because suse hires people who mistype things

From the article:

Coverity, the San Franciso-based company managing the project under a $1.25 million grant, described the flaw as the “biggest security vulnerability” found in the X Window System code since 2000.

The X Window System, also called X11 or X, provides the toolkit and protocol to build GUIs for Unix and Unix-like operating systems. It is used to provide windowing for bit-map displays.

Source: Yahoo News

Apparently OpenBSD already fixed this during a code-cleanup.