Darknet - The Darkside

Don`t Learn to HACK - Hack to LEARN. That`s our motto and we stick to it, we are all about Ethical Hacking, Penetration Testing & Computer Security. We share and comment on interesting infosec related news, tools and more. Follow us on Twitter, Facebook or RSS for the latest updates.

26 January 2015 | 1,390 views

OAT – Oracle Auditing Tools For Database Security

Check Your Web Security with Acunetix

Oracle Auditing Tools is a tool kit that could be used to audit security within Oracle database servers.

OAT uses CREATE LIBRARY to be able to access the WinExec function in the kernel32.dll in Windows or the system call in libc on Un*x. Having access to this function makes it possible to execute anything on the server with the same security context as the user who started the Oracle Service. So basically all accounts with default passwords, or easy guessable password, having this privilege can do this.

Oracle Database Security

OAT has a builtin TFTP server for making file transfers easy. The Tools are Java based and were tested on both Windows and Linux. They should hopefully also run on any other Java platform.

We don’t write about many Oracle tools as they tend to be a bit ‘Enterprise’ but we did cover ODAT and way before that OAPScan:

ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security
OAPScan – Oracle Application Server Scanner

Contains

  • OraclePWGuess – A dictionary attack tool that can be used with user supplied dictionaries or with the builtin support for finding default accounts.
  • OracleQuery- A minimalistic command line based sql query tool.
  • OracleSamDump – Connects to the Oracle server and executes TFTP get, to fetch the pwdump2 binary. The server is then pwdump2:ed and the result is returned to the SAM folder of the TFTP server.
  • OracleSysExec – Can be run in interactive mode, letting the user specify commands to be executed by the server or in automatic mode. In automatic mode, netcat is tftpd over to the server and binds a shell to the tcp port 31337.
  • OracleTNSCtrl – is used to query the TNS listener for various information, like the Oracle lsnrctl utility. It is somewhat limited though. Use the help command to see commands curently implemented.

Requirements

– Java Runtime Environment
– Oracle JDBC Driver (classes111.zip or classes12.zip)

You can download OAT here:

Version 1.3.1 source oat-source-1.3.1.zip
Version 1.3.1 binary oat-binary-1.3.1.zip

Or read more here.

Advertisements



22 January 2015 | 1,885 views

Flash Zero Day Being Exploited In The Wild

This is not the first Flash Zero Day and it certainly won’t be the last, thanks to the Sandbox implemented in Chrome since 2011 – users of the browser are fairly safe.

Those using IE are in danger (as usual) and certain versions of Firefox.

Flash Zero Day Being Exploited In The Wild

It has been rolled into the popular Angler Exploit Kit, which seems fairly prevalent although not as popular as Blackhole historically.

A zero day Flash vulnerability is being actively exploited by criminals using the popular Angler exploit kit. Adobe is investigating the report by respected French malware researcher Kafeine, who found the exploit kit circulating on cybercrime forums.

The vulnerabilities affected Flash Player versions up to 15.0.0.223 and the latest 16.0.0.257, he said. Punters on Windows 8.1 are safe, along with those using Google Chrome thanks to use of sandboxing.

Those operating other Windows platforms with Internet Explorer versions 10 and below, and some Mozilla Firefox versions, have been confirmed as vulnerable to the exploit. The free version of MalwareBytes’ Anti-Exploit tool prevented the attack, but it is as yet unknown if Microsoft’s Enhanced Mitigation Exploit Tool can fight the attack.

It’s not yet known if Microsoft EMET blocks this attack, but MBAE does.

It seems like the drive by malware slingers are stepping up their game and investing time into obfuscation and encrypted payloads to make detection/blocking more difficult.

The exploit kit drops the Bedep trojan which could serve as a persistent advertising slinger and malware downloader, (last version of Win7 at least) is bypassed. Angler remains one of the most proflic exploit kits.

The zero-day came as Cisco warned separately that exploit kit writers were taking more time to write obfuscated code. This would ostensibly prolong the life of investments such as the discovered Flash zero day that would decrease in effectiveness after users applied the imminent Adobe patches. Cisco bods in a new annual report (pdf) painted Angler as the most active kit last year, followed by Sweet Orange and Goon.

“Angler’s use of Flash, Java, Microsoft Internet Explorer, and even Silverlight vulnerabilities makes this exploit kit the ‘one to watch’,” Cisco bods said.

“Once the exploit is triggered, the malware payload is written directly into memory in a process such as iexplore.exe, instead of being written to a disk. “The payload delivered by Angler looks like a blob of encrypted data, which makes it harder to identify and block.” Angler was more popular having spiked in August thanks to a developer decision to nix the need to download Windows executables to foist malware.

It seems like there’s quite a few Exploit kits floating around, which basically bundle together a whole set of exploits and pop a web browser however they can to install further malware, things like Bedep just slurp down even more malware and install that covertly on a victims machine.

That’s usually why when you see an infected machine, it has a LOT of malware on it – not just one thing.

Source: The Register


20 January 2015 | 2,447 views

Gitrob – Scan Github For Sensitive Files

Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations where employees can be joined.

Sometimes employees might publish things that should not be publicly available, things that contain sensitive information or things that could even lead to direct compromise of a system. This can happen by accident or because the employee does not know the sensitivity of the information.

Gitrob - Scan Github For Sensitive Files

Gitrob is a command line tool that can help organizations and security professionals scan Github for sensitive files exposed in their repos. The tool will iterate over all public organization and member repositories and match filenames against a range of patterns for files, that typically contain sensitive or dangerous information.

How it Works

Looking for sensitive information in GitHub repositories is not a new thing, it has been known for a while that things such as private keys and credentials can be found with GitHub’s search functionality, however Gitrob makes it easier to focus the effort on a specific organization.

The first thing the tool does is to collect all public repositories of the organization itself. It then goes on to collect all the organization members and their public repositories, in order to compile a list of repositories that might be related or have relevance to the organization.

When the list of repositories has been compiled, it proceeds to gather all the filenames in each repository and runs them through a series of observers that will flag the files, if they match any patterns of known sensitive files. This step might take a while if the organization is big or if the members have a lot of public repositories.

All of the members, repositories and files will be saved to a PostgreSQL database. When everything has been sifted through, it will start a Sinatra web server locally on the machine, which will serve a simple web application to present the collected data for analysis.

You can download Gitrob here:

v0.0.5.zip

Or read more here – the author can be found on Twitter here @michenriksen.


17 January 2015 | 3,792 views

OpenVAS 7 Released – Open Source Vulnerability Scanner

The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 35,000 in total (as of April 2014).

The OpenVAS Manager is the central service that consolidates plain vulnerability scanning into a full vulnerability management solution. The Manager controls the Scanner via OTP (OpenVAS Transfer Protocol) and itself offers the XML-based, stateless OpenVAS Management Protocol (OMP). All intelligence is implemented in the Manager so that it is possible to implement various lean clients that will behave consistently e.g. with regard to filtering or sorting scan results.

OpenVAS 7 Released - Open Source Vulnerability Scanner

The Manager also controls a SQL database (sqlite-based) where all configuration and scan result data is centrally stored. Finally, Manager also handles user management includiung access control with groups and roles.

We haven’t written about OpenVAS for 6 years, when it first forked off from Nessus back in 2008. It sure has come a long way since then, especially with the fully stocked NVT feed – it’s become a pretty powerful tool with a well thought out architecture.

Still today it’s pretty much the only fully fledged Open Source vulnerability scanner out there.

Features

  • OpenVAS Scanner
    • Many target hosts are scanned concurrently
    • OpenVAS Transfer Protocol (OTP)
    • SSL support for OTP (always)
    • WMI support (optional)
  • OpenVAS Manager
    • OpenVAS Management Protocol (OMP)
    • SQL Database (sqlite) for configurations and scan results
    • SSL support for OMP (always)
    • Many concurrent scans tasks (many OpenVAS Scanners)
    • Notes management for scan results
    • False Positive management for scan results
    • Scheduled scans
    • Flexible escalators upon status of a scan task
    • Stop, Pause and Resume of scan tasks
    • Master-Slave Mode to control many instances from a central one
    • Reports Format Plugin Framework with various plugins for: XML, HTML, LateX, etc.
    • User Management
    • Feed status view
    • Feed synchronisation
  • Greenbone Security Assistant (GSA)
    • Client for OMP and OAP
    • HTTP and HTTPS
    • Web server on its own (microhttpd), thus no extra web server required
    • Integrated online-help system
    • Multi-language support
  • OpenVAS CLI
    • Client for OMP
    • Runs on Windows, Linux, etc.
    • Plugin for Nagios

The powerful and comprehensive OpenVAS solution is available as Free Software and maintained on a daily basis. This is because of dedicated contributors and sponsors.

A major source of sustainability of OpenVAS comes from the strong commitment of companies that use OpenVAS as a cornerstone of their business:

You can download OpenVAS 7 Virtual Appliance here:

OpenVAS-7-DEMO-2.2.ova

Or read more here.


15 January 2015 | 1,610 views

Google Leaves Android Users Vulnerable To WebView Exploit

So it seems the Google corporate motto/slogan “Don’t be evil” is falling down again, Google is adopting a very Microsoft-esque approach and orphaning users of older version of Android (basically anything before the current production version 4.4 AKA Kit Kat).

Which is the majority of Android users right now, especially those using lower end devices are unlikely to get 4.4 updates and even less likely to get the upcoming Android 5.x version which is coming to most providers early this year.

Google Leaves Android Users Vulnerable To WebView Exploit

WebView vulnerabilities aren’t unheard of, and they only effect Android 4.3 (Jelly Bean) and below – because the newer version uses a much newer Chromium version of WebView – which is not susceptible to the current crop of exploits.

Over the past year, independent researcher Rafay Baloch (of “Rafay’s Hacking Articles”) and Rapid7’s Joe Vennix have been knocking out Android WebView exploits somewhat routinely, based both on published research and original findings. Today, Metasploit ships with 11 such exploits, thanks to Rafay, Joe, and the rest of the open source security community. Generally speaking, these exploits affect “only” Android 4.3 and prior — either native Android 4.3, or apps built with 4.3 WebView compatibility.

WebView is the core component used to render web pages on an Android device. It was replaced in Android KitKat (4.4) with a more recent Chromium-based version of WebView, used by the popular Chrome browser.

Despite this change, though, it’s likely there will be no slow-down of these Android security bugs, and they will probably last a long time due to a new and under-reported policy from Google’s Android security team: Google will no longer be providing security patches for vulnerabilities reported to affect only versions of Android’s native WebView prior to 4.4. In other words, Google is now only supporting the current named version of Android (Lollipop, or 5.0) and the prior named version (KitKat, or 4.4). Jelly Bean (versions 4.0 through 4.3) and earlier will no longer see security patches for WebView from Google, according to incident handlers at security@android.com.

Up until recently, when there’s a newly discovered vulnerability with Android 4.3, the folks at Google were pretty quick with a fix. After all, most people were on the “Jelly Bean” version of Android until December of 2013. Jelly Bean’s final release was just over a year ago in October of 2013. This is why this universal cross-site scripting bug was fixed, as seen in the Android changelog and Rafay’s blog, Rafay Hacking Articles.

The sad part is Google seems to acknowledge this situation and isn’t really willing to do anything about it, basically it seems like Android 4.3 has reached EOL (End of Life) and is being orphaned, Google will not be providing patches any more – even for critical security issues like this.

Perhaps it’s a forking issue and the fact the core of WebView is different now, because other components of Android 4.3 will be receiving back-ported patches.

However, after receiving a report of a new vulnerability in pre-4.4 WebView, the incident handlers at security@android.com responded with this:

If the affected version [of WebView] is before 4.4, we generally do not develop the patches ourselves, but welcome patches with the report for consideration. Other than notifying OEMs, we will not be able to take action on any report that is affecting versions before 4.4 that are not accompanied with a patch.

So, Google is no longer going to be providing patches for 4.3. This is some eyebrow-raising news.

I’ve never seen a vulnerability response program that was gated on the reporter providing his own patch, yet that seems to be Google’s position. This change in security policy seemed so bizarre, in fact, that I couldn’t believe that it was actually official Google policy. So, I followed up and asked for confirmation on what was told to the vulnerability reporter. In response, I got a nearly identical statement from security@android.com:

If the affected version [of WebView] is before 4.4, we generally do not develop the patches ourselves but do notify partners of the issue[…] If patches are provided with the report or put into AOSP we are happy to provide them to partners as well.

When asked for further clarification, the Android security team did confirm that other pre-KitKat components, such as the multi-media players, will continue to receive back-ported patches.

Knowing Google, I don’t foresee them changing their stance on this – they might because of community/media pressue – but honestly I find that unlikely.

Either way, we shall keep an eye out – because if they don’t patch these kind of issues we could be looking at some large-scale Android worm/malware infections popping up on the back of this.

Source: Rapid7


13 January 2015 | 2,014 views

pwntools – CTF Framework & Exploit Development Library

pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.

pwntools - CTF Framework & Exploit Development Library

Command-line frontends for some of the functionality are available:

  • asm/disasm: Small wrapper for various assemblers.
  • constgrep: Tool for finding constants defined in header files.
  • cyclic: De Bruijn sequence generator and lookup tool.
  • hex/unhex: Command line tools for doing common hexing/unhexing operations.
  • shellcraft: Frontend to our shellcode.
  • phd: Replacement for hexdump with colors.

Usage

Requirements

pwntools is best supported on Ubuntu 12.04 and 14.04, but most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.).

Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly with:

However, some of the features (ROP generation and assembling/disassembling foreign architectures) require non-Python dependencies. For more information, see the complete installation instructions here.

You can download pwntools here:

2.2.0.zip

Or read more here.


10 January 2015 | 2,453 views

BlueScan – A Bluetooth Device Scanner

BlueScan is a BASH script that acts as a Bluetooth device scanner. It’s a tool designed to detect Bluetooth devices within the radio range of your system and extract as much information as possible from the devices without the requirement to pair.

BlueScan - A Bluetooth Device Scanner

The tool works unobtrusively, ie without establishing a connection to the devices found and undetected. No superuser privileges are required to run it.

Requirements

  • A GNU / Linux operating system
  • A kernel version 2.4.6 or higher with the Bluetooth protocol stack implemented
  • A Bluetooth adapter that provides the system with HCI interface
  • Libraries – libbluetooth2 & bluez-utils

Features

Currently it is able to detect:

  • BD device address (is equivalent to the MAC of a network card)
  • Device Name
  • Manufacturer (in most cases)
  • Active services on the device
  • Open channels on the device

One caveat, it’s in Spanish, so yah – you’ll have to figure that out.

You can download BlueScan here:

bluescan_1.0.6.zip

Or read more here.


08 January 2015 | 3,994 views

ATM Hacked Using Samsung Galaxy S4 & USB Port

A pretty interesting black box daughter board attack on ATM via USB, the crowd cry ATM Hacked! Yah it was, and it was triggered using a mobile phone to actually activate the attack, showing it’s fairly complex and also abstracting the actual attacker from being physically there.

ATM Hacked Using Samsung Galaxy S4 & USB Port

The guy carrying the black box can’t actually perform the attack without whoever has the phone trigger letting it lose.

Carders have jackpotted an ATM by inserting a circuit board into the USB ports of an ATM, tricking it into spitting out cash.

The technique was thought to have emulated the cash dispenser of the ATM so the brains of the machine thought everything was normal, buying additional time for the brazen crooks to make off with the cash.

A Samsung Galaxy S4 was then used by a remote attacker to issue commands to the dispenser, cybercrime scribe Brian Krebs reported.

NCR global security manager Charlie Harrow said the circuit board gives crime lords control, but the folks who install it are not necessarily the real perps.

“… you have the Mr. Big back at the hideout who’s sending the commands, and the mules are the ones at the ATMs,” Harrow said.

“So the mule who has the black box is unable to activate the attack unless he gets the command from the Mr. Big, and the mobile phone is the best way to do that.”

It really reads like something from the movies, some lacky with a black box and a mysterious Dr. Evil somewhere on a desert island triggering the attack from his mobile phone causing the ATM to endlessly spit out $100 bills.

I doubt it was so obvious, but it would be fun wouldn’t it? The black box basically fooled the ATM into thinking the cash dispenser was still attached, pretty clever stuff.

The amount of cash stolen was not revealed.

The mobile phone component also made it difficult for investigators to piece together how the attackers pushed commands through to the cash dispenser.

Investigators were unsure what commands were sent to the dispenser only that they were funneled through the phone.

The type of attacks were increasing, NCR said. Most logical USB port attacks involved malware and only one other had used the type of black box equipment used here.

ATM owners have been urged to avoid stand alone machines where possible, as they are more easily attacked. NCR has updated its encryption scheme so that a key is exchanged between the brains and dispenser after a specific authentication sequence, and hardened firmware preventing thieves from downgrading.

I’m assuming this happened in the US as NCR is quoted (formerly National Cash Register) a US-based computer hardware/software company that provides ATMs and the like.

More details in Krebs article here: Thieves Jackpot ATMs With ‘Black Box’ Attack

Interesting stuff, will have to see if they manage to pop any more ATMs with this technique (if it gets reported that is).

Source: The Register


06 January 2015 | 2,124 views

A Look Back At 2014 – Tools & News Highlights

So it’s back to normal programming today, here’s a look back at 2014 (ups and down) and interesting happenings over the past 12 months – including tools and news stories.

2014 Darknet Summary

2014 News Stories

So Bitcoin and cryptocurrency in general was a pretty hot topic in 2014, and the year started out with Yahoo! spreading malware via adverts on their portal.

Later in the year in May, some smart pirates infested the hottest new game Watchdogs with Bitcoin mining malware and made themselves a fortune. There was also an academic paper about hiding a Bitcoin Mining Botnet in the Cloud using free tier accounts – pretty interesting stuff.

There was of course some massive drama too with some large scale vulnerabilities that got everyone in a panic like the SSL bug Heartbleed, the OTHER SSL bug POODLE and the BASH Shellshock.

It turns out nothing really major happened due to either of them, as far as we know anyway..

There were some large scale hacks/compromises in 2014 though such as Target, eBay, Spotify, Code Spaces, the massive celeb leak/fappening, JPMorgan, ICANN and the mother of all hacks in 2014 and possible ever – Sony Pictures who got totally owned.

There was loads of vulns found in Microsoft software (Schannel was pretty important), as usual – so we won’t bother listing all of those out. Some other fairly inconsequential stuff like bugs in WordPress and a pretty nifty (really ancient) bug in FTP.

2014 Tools

There’s been some pretty neat stuff released this year, with highlights being:

You may have overlooked some of these, so do check them out if you did!

Bonus – Top 10 Most Viewed Posts From 2014

  1. PACK – Password Analysis & Cracking Kit
  2. ICANN Hacked Including Root DNS Systems
  3. Massive Celeb Leak Brings iCloud Security Into Question
  4. Blackhash – Audit Passwords Without Hashes
  5. masscan – The Fastest TCP Port Scanner
  6. Password Manager Security – LastPass, RoboForm Etc Are Not That Safe
  7. 14-Year Olds Hack ATM With Default Password
  8. ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security
  9. ParanoiDF – PDF Analysis & Password Cracking Tool
  10. The 25 Worst Passwords Of 2013 – “password” Is Not #1

Enjoy 2015!


30 December 2014 | 5,734 views

SniffPass – Simple Password Sniffer

SniffPass is small password monitoring software (basically a password sniffer) that listens to your network, capture the passwords that pass through your network adapter, and display them on the screen instantly. SniffPass can capture the passwords of the following Protocols: POP3, IMAP4, SMTP, FTP, and HTTP (basic authentication passwords).

You can use this utility to recover lost Web/FTP/Email passwords via your own network adapter.

SniffPass - Simple Password Sniffer

Requirements

SniffPass can capture passwords on any 32-bit Windows operating system (Windows 98/ME/NT/2000/XP/2003/Vista) as long as WinPcap capture driver is installed and works properly with your network adapter. You can also use SniffPass with the capture driver of Microsoft Network Monitor, if it’s installed on your system.

Under Windows 2000/XP (or greater), SniffPass also allows you to capture TCP/IP packets without installing any capture driver, by using ‘Raw Sockets’ method. However, this capture method has the following limitation:

  • On Windows XP/SP1 passwords cannot be captured at all – Thanks to Microsoft’s bug that appeared in SP1 update…
  • On Windows Vista with SP1, only UDP packets are captured. TCP packets are not captured at all.
  • On Windows 7, it seems that ‘Raw Sockets’ method works properly again, at least for now…

Do note, this software is NOT designed to grab passwords from other machines on the network, and could do so but only if the computers were connected via a simple hub or unecrypted Wireless networks.

You can download SniffPass v1.13 here:

sniffpass.zip

Or read more here.