Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Fedora 16 Linux Released (Codename "Verne")



Today , Fedora 16(codename "verne") Linux Released, powered by the newly released Linux kernel 3.1, it features the GNOME 3.2.1 desktop environment with the GNOME Shell interface and the KDE Software Compilation 4.7.2 environment. Fedora 16 includes OpenStack, lots of SELinux enhancements, updated Haskell, Perl and Ada environments, Blender 2.5, Boost 1.47, TigerVNC 1.1, and much more.

The following are major features for Fedora 16:

  • Enhanced cloud support including Aeolus Conductor, Condor Cloud, HekaFS, OpenStack and pacemaker-cloud
  • KDE Plasma workspaces 4.7
  • GNOME 3.2
  • A number of core system improvements including GRUB 2 and the removal of HAL.
  • An updated libvirtd, trusted boot, guest inspection, virtual lock manager and a pvops based kernel for Xen all improve virtualization support.
Full feature list here

Fedora 16:

Microsoft office 2007 Excel.xlb Vulnerable to Buffer Overflow Attack


This Metasploit module exploits a vulnerability found in Excel of Microsoft Office 2007. By supplying a malformed .xlb file, an attacker can control the content (source) of a memcpy routine, and the number of bytes to copy, therefore causing a stack-based buffer overflow. This results in arbitrary code execution under the context of the user.

Discovered by :
Aniway
Abyssec
sinn3r
juan vazquez

Reference taken from :
CVE 2011-0105
OSVDB 71765
MSB MS11-021

Platform : windows
Targets :
Win XP sp3 ( Vista and 7 will try to repair the file )
Microsoft Office excel 2007 on Windows XP
Microsoft Office excel 2007 SP2 on Windows XP




source:
snypter

Anonymous Hackers launched DDOS attack on El Salvadoran sites


Anonymous Hackers launched DDOS(Distributed Denial of Service) attack against El Salvadoran sites.  El Salvador's president and other government websites went offline as the result of DDOS attack.  The attacks are part of "Operation Justice El Salvador", which was planned over the last two weeks.

The group's "Operation Justice El Salvador" has "tried to attack our website to publicize the private information of internal and external users," the economy ministry said in a statement on the hours-long attack on Saturday.

Presidential spokesman David Rivas told reporters that Anonymous threatened several government websites two weeks ago, including that of the presidency, which on Saturday received at least 30 million hits, saturating the system.

They took their website offline in order to stop the cyber attack, Rivas said.   

The hackers also attacked website of legislative assembly, the National Civil Police and the ministries of justice and labor. 


The move is a drastic one, similar to that taken by Adidas, which has also suffered what it called a sophisticated, criminal cyber attack that forced the company to take down multiple sites".Says sophos.


Apple Exiles Charlie Miller( A Serial Hacker) for publishing iPhone exploit

 Apple exiles a Security Researcher Charlie Miller from its developer program.Apple just sent a clear message to malicious hackers and security researchers alike: Keep your hands off the App Store.

He has exposed lot of critical vulnerabilities in Apple's Mac and mobile platforms.  Recently, he has found a way to sneak a fully-evil app onto your phone or tablet, right under Apple’s nose.



At the SysCan conference in Taiwan next week, Miller plans to present a method that exploits a flaw in Apple’s restrictions on code signing on iOS devices, the security measure that allows only Apple-approved commands to run in an iPhone or iPad’s memory. Using his method–and Miller has already planted a sleeper app in Apple’s App Store to demonstrate the trick–an app can phone home to a remote computer that downloads new unapproved commands onto the device and executes them at will, including stealing the user’s photos, reading contacts, making the phone vibrate or play sounds, or otherwise repurposing normal iOS app functions for malicious ends.

“Now you could have a program in the App Store like Angry Birds that can run new code on your phone that Apple never had a chance to check,” says Miller. “With this bug, you can’t be assured of anything you download from the App Store behaving nicely.”

After few hours, Apple send an email that informed "This letter serves as notice of termination of the iOS Developer Program License Agreement…between you and Apple".

Video Demo of iPhone Bug:


In February, Apple invited security researchers to become part of its developer program to test its Lion operating system. Miller says he had already paid for his own developer license. “They went out of their way to let researchers in, and now they’re kicking me out for doing research,” Miller says. “I didn’t have to report this bug. Some bad guy could have found it instead and developed real malware.”

According to Forbes, the Miller’s application has now been removed from the App Store.

Persistent XSS vulnerability in iPetitions site discovered by Team INTRA


Team INTRA discovered the XSS vulnerability in iPetitions website.  Unfortunately it is Persistent type, permanent storage of malicious script. iPetitions Provides free petition creation and database tools. Petitions can be hosted for free at iPetitions, or the tools can be easily integrated with an existing site.

Vulnerability Information:
  • Type: XSS(Persistent)
  • Alert: Critical
  • site:http://www.ipetitions.com
  • Demo: http://www.ipetitions.com/petition/danuk/
  • Status : Unfixed

Also they discovered the XSS vulnerability in CyberGhost VPN site.

Brazil ISP servers under DNS cache Poisoning attack , spreads Trojan


"Brazil ISP servers under massive DNS cache Poisoning attack"warns Kaspersky Lab expert Fabio Assolini.  When Brazilians try to visit facebook,google,youtube and othe websites, pop message asked to install Google Defence or some java applet in order to access the sites.

Some innocent peoples will install without knowing what problem will occur.  if you are the reader of EHN or Know about Security risks , you know what happen.  Yes, it will spread the banking Trojan. 

"Brazil has some big ISPs. Official statistics suggest the country has 73 million computers connected to the Internet, and the major ISPs average 3 or 4 million customers each. If a cybercriminal can change the DNS cache in just one server, the number of potential victims is huge," he points out.

According to Kaspersky, the same IP address hosted a number of malicious files and several exploits, and targeted users seem to be exclusively from Brazil.
80.XX.XX.198/Google_setup.exe
80.XX.XX.198/google_setup.exe
80.XX.XX.198/Google_Setup.exe
80.XX.XX.198/ad2.html
80.XX.XX.198/flash.jar
80.XX.XX.198/FaceBook_Complemento.exe
80.XX.XX.198/ad.html
134XX69350/AppletX.class
80.XX.XX.198/YouTube_Setup.exe
80.XX.XX.198/FlashPlayer.class
80.XX.XX.198/google2.exe
80.XX.XX.198/crossdomain.xml
80.XX.XX.198/favicon.ico
In fact the file ad.html is an encrypted script, exploiting CVE-2010-4452 and running arbitrary code in an old installation of JRE. The exploit detected by us as Exploit.Java.CVE-2010-4452.a calls up one of the files in this list.

Infecting peoples with DNS Poisoning attack is very easy because users believe their trusted sites. Cyber criminals paid an employee who has access to the DNS records to modify them so that user are redirected to the malicious site.

Assolini notes that last week the Brazilian police has arrested an employee of an ISP located in the south of the country, and that he stands accused of changing his employer's DNS cache and redirecting users to phishing websites - no doubt at the behest of the people running them. "We strongly suspect similar security breaches will be happening in other small and medium ISPs in the country," Assolini commented.

But random Internet users are not the only one who have been targeted by this type of attack. Employees of various companies have also been seeing similar pop-up windows when they tried to access any website. Once again, they were actually offered a banking Trojan for download.

The attack was made possible by flaws in the networking equipment used by their companies. Routers and modems were accessed remotely by attackers who changed the devices' DNS configurations.

International Foreign Government E-Mails Hacked by TeaMp0isoN



A hacker named as "Hex00010" , a member of Hackers Team "TeaMp0isoN" hacked about 200 emails accounts of International Foreign Government. He released the all database in pastebin. They got these email database by hacking into armynet.mod.uk , website of Parliament of Australia (aph.gov.au)  and some other sites.

SqlNinja v0.2.6 released | SQL Injection Tool written in Perl



SQL Ninja version 0.2.6 is released , a Penetration testing tool used to test the Web application Security. Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.

Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.

ChangeLog:
  • ICMP-based shell (thanks Nico!)
  • CVE-2010-0232 support to escalate the sqlservr.exe process to SYSTEM (greetz Tavis!)
  • Header-based injection support
Features

  • Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)
  • Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental)
  • Privilege escalation to sysadmin group if 'sa' password has been found
  • Creation of a custom xp_cmdshell if the original one has been removed
  • Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed)
  • TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell
  • Direct and reverse bindshell, both TCP and UDP
  • ICMP-tunneled shell, when no TCP/UDP ports are available for a direct/reverse shell but the DB can ping your box
  • DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames (check the documentation for details about how this works)
  • Evasion techniques to confuse a few IDS/IPS/WAF
  • Integration with Metasploit3, to obtain a graphical access to the remote DB server through a VNC server injection
  • Integration with churrasco.exe, to escalate privileges to SYSTEM on w2k3 via token kidnapping
  • Support for CVE-2010-0232, to escalate the privileges of sqlservr.exe to SYSTEM
Supported Operating Systems:
Sqlninja is written in Perl and should run on any UNIX based platform with a Perl interpreter, as long as all needed modules have been installed. So far it has been successfully tested on:
  • Linux
  • FreeBSD
  • Mac OS X
Sqlninja does not have support for Windows.

Download it from here:
http://sqlninja.sourceforge.net/download.html

Adidas websites go offline after Cyber Attack

 After the Cyber attack, Adidas shuts down all website(adidas.com, reebok.com, miCoach.com, adidas-group.com and various local eCommerce shops) in order to provide security for Users data.

Adidas said they found Sophisticated, Criminal cyber attack on 3re November,2011. According to their preliminary investigation, there is no data has been compromised. They Take down affected sites in order to protect their data. Their site will be offline until they finish forensic review.

The company's New Zealand site was displaying a "technical difficulty" message today and redirecting online shoppers to the company's e-commerce sites in Canada, UK, US and Germany among others.


"Nothing is more important to us than the privacy and security of our consumers' personal data,We appreciate your understanding and patience during this time" Addidas.



XSS Vulnerability found in CyberGhost VPN by Team INTRA

Team INTRA found XSS vulnerability in CyberGhost website.  CyberGhost is one of famous VPN that provides complete privacy when surfing, downloading, and sharing files on the Internet.

Vulnerability Status:
  • Type: XSS
  • website:cyberghostvpn.com
  • Status: Fixed
  • Researcher: Team Intra

Proof of XSS:





Here you can check more news about Team INTRA:
Team INTRA