Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

2011 Survey of IT Professionals about Insight Passwords

In 2011 Lieberman Software surveyed more than 300 IT professionals for their
insights into password practices and security outcomes. Portions of the survey
focused on the numbers of passwords in use, sharing of privileged passwords,
organizational security and other areas.

Survey respondents worked in organizations ranging from fewer than 100 to
more than 10,000 employees, with the largest portion of respondents (62%)
working in organizations that employ more than 10,000 individuals.
The following sections summarize survey results having to do with the attitudes
and outlook of IT personnel. Highlights include:
  • Fully 51% of respondents said they must remember 10 or more passwords for different systems and applications on their jobs.
  • 42% of IT professionals said that two or more IT staff in their organization share a password to access a system or application.
  • 48% of respondents said that in their organizations a privileged password  for a system, network device or application goes unchanged for more than 90 days.
  • Nearly half of respondents – over 48% – said that they have worked at an organization whose network was breached by a hacker.
Check the Full Report Here:
http://www.liebsoft.com/uploadedFiles/wwwliebsoftcom/MARCOM/Press/Content/2011-Password-Survey.pdf

UNESCO E-Platform website Hacked by Fatal Error Crew


A Hacker team named as Fatal Error Crew hacked one of famous United Nations Website UNESCO(stands for  United Nations Educational, Scientific and Cultural Organization)

Hacked site:
http://creativecontent.unesco.org/

Mirror of Defacement:
http://zonehmirrors.net/defaced/2011/10/16/creativecontent.unesco.org/

Status: now it is recovered.

14 Pakistani websites has been hacked by JAGUAR & ShadY`HaXoR


14 Pakistani websites has been hacked and defaced by JAGUAR & ShadY`HaXoR.  The hacker claimed that he didn't delete any files in database.

Here is the list of Hacked sites:
Site:- http://www.abbottabadonline.com/
Mirror:- http://www.arab-zone.org/mirror/20186/ab...nline.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15465

Site:- http://www.abbasikalhora.com/
Mirror:- http://www.arab-zone.org/mirror/20187/ab...lhora.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15466

Site:- http://www.aimsint.org/
Mirror:- http://www.arab-zone.org/mirror/20189/aimsint.org/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15467

Site:- http://ascop.com.pk/
Mirror:- http://www.arab-zone.org/mirror/20190/ascop.com.pk/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15468

Site:- http://kazmitech.com/
Mirror:- http://www.arab-zone.org/mirror/20191/kazmitech.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15469

Site:- http://makemoneyonlinepk.com/
Mirror:- http://www.arab-zone.org/mirror/20192/ma...inepk.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15470

Site:- http://murree.biz/
Mirror:- http://www.arab-zone.org/mirror/20193/murree.biz/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15471

Site:- http://www.nathiagali.com/
Mirror:- http://www.arab-zone.org/mirror/20194/nathiagali.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15472

Site:- http://northpakistan.com/
Mirror:- http://www.arab-zone.org/mirror/20195/no...istan.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15473

Site:- http://www.ondeskedu.com/
Mirror:- http://www.arab-zone.org/mirror/20196/ondeskedu.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15474

Site:- http://www.pakistanfashionweek.com/
Mirror:- http://www.arab-zone.org/mirror/20197/pa...nweek.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15475

Site:- http://pirc.org.pk/
Mirror:- http://www.arab-zone.org/mirror/20198/pirc.org.pk/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15476

Site:- http://www.saadkhan.net/
Mirror:- http://www.arab-zone.org/mirror/20199/saadkhan.net/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15477

Site:- http://www.sigmaeye.com/
Mirror:- http://www.arab-zone.org/mirror/20200/sigmaeye.com/
Mirror:- http://www.zone-ar1.com/attackmirror/mir...p?id=15478

15+ Pakistan Website hacked by Indian Cyber Army[ICA]

An Indian Hackers team known as Indian Cyber Army Hacked 15+ Pakistan Websites. They told that this is revenge for hacking 100 Indian websites.

http://adsense.com.pk/
http://www.businesscenter.pk/about.php
http://www.students.edu.pk/
ky.net.pk/default.aspx
http://www.griphens.com/default.aspx
thebusinessconsultants.pk
replacementwindowsreviews.co
toc.edu.pk/default.aspx
sspl.pk/default.aspx
replacementwindowcost.info
crm.replacementwindowcost.info
crm.advancewindowsanddoors.com
atozeeevents.com.pk/default.aspx
asleantires.com/default.aspx
ask4car.co.uk/default.aspx
http://www.advancewindowsanddoors.com
http://www.apna.net.pk/about.php

Zexplo v1.0 Released - Penetration Testing Toolkit

About Zexplo v1.0:Zexplo is Penetration Testing Toolkit written in Python. They released the first version of Zexplo has 6 enumeration modules for various network scanning operations such as zping, zarpcache, ztcpscan, znmapport etc and 1 exploit (filecopa). In addition to this it also has some exciting modules for man in the middle (MITM) attack and autopwn. You will also see tools such as Injector (inject modules into running process)and Encoder (with triple layer of XOR).


Features:
  • Presents 6 enumeration modules and 1 exploit
  • Includes Injector tool for injecting chosen modules into running processes
  • Special encoder featuring triple layer XOR encoder for shellcodes
  • Simple and easy to use interface even for beginners

Requirements:

  • Linux OS
  • Python (version < 3.0 and > 2.4)
  • Scapy - powerful packet manipulation program

25 WEBSITES DEFACED bY APACHE MEMBER OF KITTEHSEC

A hacker known as AnonMasked(Member of KittehSec Hackers Team) hacked 25 websites and defaced them.  

Hacked Sites:
http://vilallum.com/
http://autocaravanas-pilote.com/
http://blancher.es/
http://brutnature.com/
http://capdevilapujol.es/
http://caravanasalemanas.com/
http://carlesdelavern.com/
http://castellroig.com/
http://cavamartinsoler.com/
http://cavamiquelpons.com/
http://deltsbcn.org/
http://docava.es/
http://elbolet.net/
http://esturion.info/
http://ferretguasch.com/
http://fincasarmengol.net/
http://indesai.com/
http://indesai.net/
http://inzolia.com/
http://jparquitectura.net/
http://mariacasanovas.com/
http://martinex.com/
http://maset.es/
http://mercauto.biz/
http://olive-rueda.com/

XBox Live(XBL) Accounts hacked to buy FIFA 12 packs


As per the eurogamer report, Xbox 360 owners account is hacked in order to buy FIFA ultimate Team content packs. 

One of victim Speedjack reported to Eurogamer first about the compromise , who on 11th October found his gamertag had been "recovered" to someone else's machine.

"I then find out that I've had 5000 then 500 MS points bought on my credit card. Better yet, all the points including the 120 I had already on my account are gone... all spent on FIFA 12 content packs yesterday afternoon while I was at work.

"Not only that, but my account now has 35 FIFA 12 achievement points on it!!! Never played the game in my life - hate football."  Speedjack spoke to Microsoft support, which suggested there exists an issue with EA's servers that leaves XBL accounts vulnerable.

There is also a similar report on forum Facepunch, and multiple users' reports on the Xbox.com forum.

In order to Investigate complaints ,Microsoft support freezed compromised accounts up to 30 days.

HFOX Security Testing Framework(HSTF) 0.1 Beta released by Hcon


HFOX Security Testing Framework(HSTF) 0.1 Beta released by Hcon.  This is chromium Based Penetration Testing tool.

Specification :
  1. Based on Chromium Source (iron build) version 14
  2.  more secure and Tracking free from Google & Stable then other Chromium based builds
  3.  Over 100 tools integration with very easy use interface
  4. Tested and heavily modified tools suggestions contributed by professional pentesters , web developers , Security
  5. Free and open source
  6. Totally Portable (no need to install) , you can carry it around in your usb , memory card etc. 
  7. Runs on all windows including windows - XP , VISTA , 7

Project Homepage:
http://www.hcon.in

60 Poland webSites hacked and defaced by Team IndiShell

Decoder,A member of Indian Hacker team named as "IndiShell" hacked about 60 Poland websites hacked and defaced.
This defacement page contains :
(0_0) ---------OOOpppzz.... HACKED ? Lol

Owned By Decoder
Jai Hind
Team Indishell

Few hacked sites:
http://www.seda.pl/jaihind.html
http://www.zlecenia-zlecenia.pl/jaihind.html
http://www.telefilm.pl/jaihind.html
http://www.atrakcje-dla-turysty.pl/jaihind.html
http://www.znane-hotele.pl/jaihind.html
http://www.wszystkoourodzie.pl/jaihind.html
http://www.portal-urody.pl/jaihind.html

Here is the Full of List:
http://pastebin.com/CE3tV7fb


Mirror:
http://www.zone-ar1.com/attack/?name=sksking

Another Mass IFrame Injection Attack |350,000 ASP sites infected

 Another Mass Iframe Injection Attack detected by armorize.com Researchers.  On july, They detected the Mass Iframe injection that infected the 90000 websites. Looks like this time the number of sites is increased.   350,000 websites infected by Malware.  Also they targeted the website that are developed using ASP.net.


As per the Google result, there is 180,000 websites infected by this Iframe injection attack. They targeted victims who use 6 particular language:English, German, French, Italian, Polish, and Breton in their websites.
If you want to check the list of Infected sites, then do google search as "http://jjghui.com/urchin.js".  Never click the website that return by google after this search.  It will launch the malware attack.

Malware Infection:
The Malicious scripts inserted inside the victims website causes the visiting browser to load an iframe first from www3.strongdefenseiz.in and then from www2.safetosecurity.rr.nu.
Multiple browser-based drive-by download exploits are served depending on the visiting browser.

When the user is redirected to the malware server, it will server to the visitors. The malware will be automatically installed without your knowledge. This is if they have outdated browsing platforms (browser or Adobe PDF or Adobe Flash or Java etc).

Currently, the 6 out of 43 antivirus vendors on VirusTotal can detect the dropped malware.

jjghui.com resolves to IP 146.185.248.3 (AS3999), which is in Russia. www3.strongdefenseiz.in resolves to 75.102.21.121 (AS36352), which is in the US and hosted by HostForWeb.com. www2.safetosecurity.rr.nu resolves to IP 67.208.74.71 (AS33597), which is in the US and hosted by InfoRelayOnlineSystems.

The dropped malware attempts to connect to: 65.98.83.115 (AS25653), which is in the US.


IFrame Injection:
They inserted the Iframe inside the webpage using the web application vulnerability. like this:
<script src="Link_to_malicious_script"></script>

This inserts the malicious javascript inside website.  This malicious script generates an iframe to www3.strongdefenseiz.in, which gives an HTTP 302 redirect to the exploit server at www2.safetosecurity.rr.

Security Tips from BreakTheSecurity.com to Web Masters:
If your site also infected, then delete all files from your server. I hope you have backup of your website contents. Install the Latest Antivirus in your system. Verify your code before uploading.