天和樹脂-浙江-上海-南通-http://www.chinaresins.com

AdSense

        

Spaghetti: A Website Applications Security Scanner


About Spaghetti
   Author: m4ll0k   Spaghetti is an Open Source web application scanner, it is designed to find various default and insecure files, configurations, and misconfigurations. Spaghetti is built on Python 2.7 and can run on any platform which has a Python environment.

Spaghetti Installation:

Spaghetti's Features:
   Fingerprints:
  • Server:
  • Web Frameworks (CakePHP,CherryPy,...)
  • Web Application Firewall (Waf)
  • Content Management System (CMS)
  • Operating System (Linux,Unix,..)
  • Language (PHP,Ruby,...)
  • Cookie Security
   Discovery:
  • Bruteforce:Admin Interface
    Common Backdoors
    Common Backup Directory
    Common Backup File
    Common Directory
    Common FileLog File
  • Disclosure: Emails, Private IP, Credit Cards
   Attacks:
  • HTML Injection
  • SQL Injection
  • LDAP Injection
  • XPath Injection
  • Cross Site Scripting (XSS)
  • Remote File Inclusion (RFI)
  • PHP Code Injection
   Other:
  • HTTP Allow Methods
  • HTML Object
  • Multiple Index
  • Robots Paths
  • Web Dav
  • Cross Site Tracing (XST)
  • PHPINFO
  • .Listing
   Vulns:
  • ShellShock
  • Anonymous Cipher (CVE-2007-1858)
  • Crime (SPDY) (CVE-2012-4929)
  • Struts-Shock
Spaghetti Example:
python spaghetti --url example.com --scan 0 --random-agent --verbose


Read more


0 留言

Change Passwords Regularly - A Myth And A Lie, Don'T Be Fooled, Part 1


TL;DR: different passwords have different protection requirements, and different attackers using various attacks can only be prevented through different prevention methods. Password security is not simple. For real advise, checking the second post (in progress).

Are you sick of password advices like "change your password regularly" or "if your password is password change it to pa$$w0rd"? This post is for you!

The news sites are full of password advises nowadays due to recent breaches. When I read/watch these advise (especially on CNN), I am usually pissed off for a lot of reasons. Some advises are terrible (a good collection is here), some are good but without solutions, and others are better, but they don't explain the reasons. Following is my analysis of the problem. It works for me. It might not work for you. Comments are welcome!

Password history

Passwords have been used since ancient times.


Because it is simple. When I started using the Internet, I believe I had three passwords. Windows login, webmail, and IRC. Now I have ~250 accounts/passwords to different things, like to my smartphone, to my cable company (this password can be used to change the channels on the TV), to my online secure cloud storage, to full disk encryption to start my computer, to my nude pictures, to my WiFi router, to my cloud server hosting provider, etc etc etc. My money is protected with passwords, my communication is protected with passwords/encryption, my work is protected with passwords. It is pretty damn important. But yet people tend to choose lame passwords. Pretty lame ones. Because they don't think it can be significant. But what is not essential today will be relevant tomorrow. The service you used to download music (iTunes) with the lame password will one day protect all your Apple devices, where attackers can download your backup files, erase all your devices, etc. The seven-character and one capital rule is not enough anymore. This advice is like PDF is safe to open, Java is secure. Old, outdated, untrue.

Now, after this lengthy prologue, we will deep dive into the analysis of the problem, by checking what we want to protect, against whom (who is the attacker), and only after that, we can analyze the solutions. Travel with me, I promise it will be fun! ;)

What to protect?

There are different services online, and various services need different ways to protect. You don't use the same lock on your Trabant as you do on your BMW.

Internet banking, online money

For me, this is the most vital service to protect. Luckily, most of the internet banking services use two-factor authentication (2FA), but unfortunately, not all of them offer transaction authorization/verification with complete transactions. 2FA is not effective against malware, it just complicates the attack. Transaction authorization/verification is better, but not perfect (see Zitmo). If the access is not protected with 2FA, better choose the best password you have (long, real random, sophisticated, but we will get to this later). If it is protected with 2FA, it is still no reason not to use the best password ;) This is what I call the "very high-level password" class.


Credit card data

This system is pretty fucked up bad. Something has to be secret (your credit card number), but in the meantime that is the only thing to identify your credit card. It is like your username is your password. Pretty bad idea, huh? The problem is even worse with a lot of different transaction types, especially when the hotel asks you to fax both sides of your CC to them. Unfortunately, you can't change the password on your credit card, as there is no such thing, but Verified by VISA or 3-D Secure with 2FA might increase the chances your credit card won't get hacked. And on a side note, I have removed the CVV numbers from my credit/debit cards. I only read it once from the card when I received it, I don't need it anymore to be printed there.
And sometimes, you are your own worst enemy. Don't do stupid things like this:


Work related passwords (e.g. Windows domain)

This is very important, but because the attack methods are a bit different, I created this as a different category. Details later.

Email, social sites (Gmail/Facebook/Twitter), cloud storage, online shopping

This is what I call the "high level password" class.
Still, pretty important passwords. Some people don't understand "why would attackers put any energy to get his Facebook account?" It is simple. For money. They can use your account to spread spam all over your Facebook wall. They can write messages to all of your connections and tell them you are in trouble and send money via Western Union or Bitcoin.


They can use your account in Facebook votes. Your e-mail, cloud storage is again very important. 20 years ago you also had letters you didn't want to print and put in front of the nearest store, neither want you to do that with your private photo album. On a side note, it is best to use a cloud storage where even the cloud provider admin can't access your data. But in this case, with no password recovery option, better think about "alternative" password recovery mechanisms.

Other important stuff with personal data (e.g. your name, home address)

The "medium level password" class. This is a personal preference to have this class or not, but in the long run, I believe it is not a waste of energy to protect these accounts. These sites include your favorite pizza delivery service, your local PC store, etc.

Not important stuff

This is the category other. I usually use one-time disposable e-mail to these services. Used for the registration, get what I want, drop the email account. Because I don't want to spread my e-mail address all over the internet, whenever one of these sites get hacked. But still, I prefer to use different, random passwords on these sites, although this is the "low level password" class.

Attackers and attack methods

After categorizing the different passwords to be protected, let's look at the different attackers and attack methods. They can/will/or actively doing it now:

Attacking the clear text password 

This is the most effective way of getting the password. Bad news is that if there is no other factor of protection, the victim is definitely not on the winning side. The different attack methods are:

  • phishing sites/applications,


  • social engineering,
  • malware running on the computer (or in the browser), 
  • shoulder surfing (check out for smartphones, hidden cameras), 
  • sniffing clear-text passwords when the website is not protected with SSL,
  • SSL MiTM,
  • rogue website administrator/hacker logging clear text passwords,
  • password reuse - if the attacker can get your password in any way, and you reuse it somewhere else, that is a problem,
  • you told your password to someone and he/she will misuse it later,
  • hardware keyloggers,
  • etc.

The key thing here is that no matter how long your passwords are, no matter how complex it is, no matter how often do you change it (except when you do this every minute ... ), if it is stolen, you are screwed. 2FA might save you, or might not.

Attacking the encrypted password 

This is the usual "hack the webserver (via SQL injection), dump the passwords (with SQLMap), post hashes on pastebin, everybody starts the GPU farm to crack the hashes" scenario. This is basically the only scenario where the password policies makes sense. In this case the different level of passwords need different protection levels. In some cases, this attack turns out to be the same as the previous attack, when the passwords are not hashed, or are just encoded.

The current hash cracking speeds for hashes without any iterations (this is unfortunately very common) renders passwords like Q@tCB3nx (8 character, upper-lowercase, digit, special characters) useless, as those can be cracked in hours. Don't believe me? Let's do the math.

Let's say your password is truly random, and randomly choosen from the 26 upper, 26 lower, 10 digit, 33 special characters. (Once I tried special passwords with high ANSI characters inside. It is a terrible idea. Believe me.). There are 6 634 204 312 890 620 different, 8 character passwords from these characters. Assuming a 2 years-old password cracking rig, and MD5 hash cracking with 180 G/s speed, it takes a worst case 10 hours (average 5) to crack the password, including upgrading your bash to the latest, but still vulnerable bash version. Had the password been 10 characters long, it would take 10 years to crack with today hardware. But if the password is not truly random, it can be cracked a lot sooner.

A lot of common hashing algorithms don't use protections against offline brute-force attacks. This includes LM (old Windows hashes), NTLM (modern Windows hashes), MD-5, SHA1-2-512. These hashing algorithms were not developed for password hashing. They don't have salting, iterations, etc. out of the box. In the case of LM, the problem is even worse, as it converts the lowercase characters to uppercase ones, thus radically decreasing the key space. Out of the box, these hashes are made for fast calculation, thus support fast brute-force.


Another attack is when the protected thing is not an online service, but rather an encrypted file or crypto-currency wallet.

Attacking the authentication system online

This is what happened in the recent iCloud hack (besides phishing). Attackers were attacking the authentication system, by either brute-forcing the password, or bypassing the password security by answering the security question. Good passwords can not be brute-forced, as it takes ages. Good security answers have nothing to do with the question in first place. A good security answer is as hard to guess as the password itself. If password recovery requires manual phone calls, I know, it is a bit awkward to say that your first dog name was Xjg.2m`4cJw:V2= , but on the other hand, no one will guess that!


Attacking single sign on

This type of attack is a bit different, as I was not able to put the "pass the hash" attacks anywhere. Pass the hash attack is usually found in Windows domain environments, but others might be affected as well. The key thing is single sign on. If you can login to one system (e.g. your workstation), and access many different network resources (file share, printer, web proxy, e-mail, etc.) without providing any password, then something (a secret) has to be in the memory which can be used to to authenticate to the services. If an attacker can access this secret, he will be able to access all these services. The key thing is (again) it does not matter, how complex your passwords are, how long it is, how often do you change, as someone can easily misuse that secret.

 

Attacking 2FA

As already stated, 2 factor authentication raises the efforts from an attacker point of view, but does not provide 100% protection. 
  • one time tokens (SecurID, Yubikey) can be relayed in a man-in-the-middle attack
  • smartcard authentication can be relayed with the help of a malware to the attacker machine - or simply circumvented in the browser malware, 
  • text based (SMS) messages can be stolen by malware on the smartphone or rerouted via SS7, 
  • bio-metric protection is constantly bypassed,
  • SSH keys are constantly stolen,
  • but U2F keys are pretty good actually, even though BGP/DNS hijack or similar MiTM can still circumvent that protection,
  • etc. 


Others

Beware that there are tons of other attack methods to access your online account (like XSS/CSRF), but all of these have to be handled on the webserver side. The best you can do is to choose a website where the Bug Bounty program is running 24/7. Otherwise, the website may be full of low hanging, easy-to-hack bugs.

Now that we have covered what we want to protect against what, in the next blog post, you will see how to do that. Stay tuned. I will also explain the title of this blog post.Read more

0 留言

Experts Reported Security Bug In IBM's Db2 Data Management Software

Cybersecurity researchers today disclosed details of a memory vulnerability in IBM's Db2 family of data management products that could potentially allow a local attacker to access sensitive data and even cause a denial of service attacks. The flaw (CVE-2020-4414), which impacts IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on all platforms, is caused by improper usage shared memory,

via The Hacker News

More info


  1. Wifi Hacker Tools For Windows
  2. Hack Tools
  3. Pentest Tools Website
  4. Bluetooth Hacking Tools Kali
  5. Pentest Tools Bluekeep
  6. Hacker Search Tools
  7. Pentest Tools Subdomain
  8. Pentest Tools Apk
  9. Pentest Tools For Ubuntu
  10. Pentest Tools Tcp Port Scanner
  11. Tools For Hacker
  12. Best Hacking Tools 2019
  13. Hacker Tools 2020
  14. Hacker Tool Kit
  15. Hack Tools For Games
  16. Hacker Tools Free
  17. Pentest Box Tools Download
  18. Pentest Reporting Tools
  19. Computer Hacker
  20. Tools For Hacker
  21. Hacking Tools Windows
  22. Pentest Tools For Windows
  23. Hack Tool Apk
  24. Tools 4 Hack
  25. Underground Hacker Sites
  26. Easy Hack Tools
  27. Nsa Hacker Tools
  28. Hacking Tools And Software
  29. Hacker Tools Free Download
  30. Pentest Tools Linux
  31. Hack Tools Pc
  32. Pentest Tools Online
  33. Best Hacking Tools 2020
  34. Hacking Tools 2019
  35. Hack Tools Download
  36. Pentest Tools Open Source
  37. Hack App
  38. Hacking Tools 2020
  39. Hacker Tools Apk
  40. Hack Website Online Tool
  41. Pentest Tools Free
  42. Pentest Tools Open Source
  43. Pentest Reporting Tools
  44. Pentest Tools Windows
  45. Hack Website Online Tool
  46. Hacker Tools Free Download
  47. Pentest Tools Open Source
  48. Hack Tools For Ubuntu
  49. Ethical Hacker Tools
  50. Top Pentest Tools
  51. Hacker Tools For Mac
  52. Tools 4 Hack
  53. Hacker Tool Kit
  54. Pentest Tools For Android
  55. Nsa Hacker Tools
  56. Hacking Tools Windows 10
  57. Hack Tools For Games
  58. Pentest Tools Open Source
  59. Kik Hack Tools
  60. Hacker Search Tools
  61. Hack And Tools
  62. Best Hacking Tools 2020
  63. Pentest Tools
  64. Hacker Tools Windows
  65. Hack Rom Tools
  66. Underground Hacker Sites
  67. Game Hacking
  68. Hacking Tools 2020
  69. Hack Tools Github
  70. What Is Hacking Tools
  71. Hacker Tools For Mac
  72. Game Hacking
  73. Github Hacking Tools
  74. Hacking Tools Name
  75. Hack Tools For Ubuntu
  76. Pentest Tools Online
  77. Kik Hack Tools
  78. How To Make Hacking Tools
  79. Pentest Tools Review
  80. Hack Tools
  81. Github Hacking Tools
  82. Hacking Tools Software
  83. Hacking Tools
  84. Hacking App
  85. Pentest Tools List
  86. What Are Hacking Tools
  87. Bluetooth Hacking Tools Kali
  88. Hacker Tools Free Download
  89. Black Hat Hacker Tools
  90. What Is Hacking Tools
  91. Hacker Tools Linux
  92. Hacker Tools Mac
  93. Hack Tools
  94. Pentest Tools Free
  95. Hacker Techniques Tools And Incident Handling
  96. New Hacker Tools
  97. Hackers Toolbox
  98. Hak5 Tools
  99. Hacker Security Tools
  100. Nsa Hacker Tools
  101. Tools Used For Hacking
  102. Hack Tools For Ubuntu
  103. Hacking Tools And Software
  104. Hacker Tools Apk
  105. Hack Apps
  106. Hacker Tools Apk
  107. Hacker Tools Linux
  108. Hack Tools
  109. Computer Hacker
  110. Hacking Tools For Pc
  111. Underground Hacker Sites
  112. Hacker Techniques Tools And Incident Handling
  113. World No 1 Hacker Software
  114. Hacking Tools For Mac
  115. Install Pentest Tools Ubuntu
  116. Hacker Hardware Tools
  117. Hacking Tools Usb
  118. Hacking Apps
  119. Hacker Tools Windows
  120. Hack Apps
  121. What Is Hacking Tools
  122. Hacks And Tools
  123. Hacker Security Tools
  124. Pentest Tools Website Vulnerability
  125. Hacker Tool Kit
  126. Pentest Tools Online
  127. Top Pentest Tools
  128. Hacking Tools For Pc
  129. Hack Tools Github
  130. Hacking Tools Name
  131. Hacker Hardware Tools
  132. Pentest Recon Tools
  133. Hacking Tools Usb
  134. Hack And Tools
  135. Pentest Tools Review
  136. Hacker Tools Windows
  137. Nsa Hack Tools
  138. Hacker Tools List
  139. Pentest Tools Linux
  140. Hacker Tools Apk Download

0 留言

PentestBox - Opensource PreConfigured Portable Penetration Testing Environment For The Windows

Related word

  1. Hacker Tools Mac
  2. Pentest Tools Open Source
  3. New Hacker Tools
  4. Pentest Tools Review
  5. Hacking Tools Software
  6. Pentest Tools Online
  7. Pentest Tools
  8. Computer Hacker
  9. Hacker Tools Free Download
  10. Hack Tools For Ubuntu
  11. Game Hacking
  12. Hacker Tools For Pc
  13. Top Pentest Tools
  14. What Are Hacking Tools
  15. Hacking Tools Online
  16. Pentest Tools Github
  17. Hacker Tools Hardware
  18. Hacker Tools List
  19. Wifi Hacker Tools For Windows
  20. Hacker Tools Free
  21. Pentest Tools Github
  22. Beginner Hacker Tools
  23. Pentest Tools Android
  24. Pentest Tools For Ubuntu
  25. Hacker Tools Mac
  26. Hacking Tools Github
  27. Hacker Tools 2019
  28. Hacking Tools Online
  29. Hacker Tools Online
  30. Android Hack Tools Github
  31. Android Hack Tools Github
  32. Free Pentest Tools For Windows
  33. Pentest Tools Apk
  34. Hacking App
  35. Hacking Tools For Beginners
  36. What Are Hacking Tools
  37. Nsa Hacker Tools
  38. Hack And Tools
  39. Pentest Tools Port Scanner
  40. Hacker Tools For Mac
  41. Hack Tools
  42. Hack Tools Github
  43. Hacker Tools Mac
  44. Pentest Tools Framework
  45. Hacking Tools For Windows
  46. Hacker Tools List
  47. Install Pentest Tools Ubuntu
  48. Wifi Hacker Tools For Windows
  49. Hack Tools Pc
  50. Hacker Tools Github
  51. Pentest Tools Find Subdomains
  52. Usb Pentest Tools
  53. Pentest Tools Url Fuzzer
  54. Hacker Tools Mac
  55. Pentest Tools Framework
  56. Hacking Tools And Software
  57. Hacker Tools List
  58. Hack Tool Apk No Root
  59. Hacker Hardware Tools
  60. Hacker Tool Kit
  61. Pentest Tools For Mac
  62. Pentest Tools For Ubuntu
  63. What Are Hacking Tools
  64. Usb Pentest Tools
  65. Hacker
  66. Pentest Tools Website Vulnerability
  67. Hacking Tools Hardware
  68. Hacker Tools
  69. Hacking Tools Usb
  70. How To Install Pentest Tools In Ubuntu
  71. Hacking Tools For Games
  72. Easy Hack Tools
  73. Underground Hacker Sites
  74. How To Hack
  75. Usb Pentest Tools
  76. Hacking Tools Mac
  77. Pentest Tools For Windows
  78. Hacking Tools For Windows
  79. Hack App
  80. Pentest Tools For Windows
  81. Pentest Tools List
  82. Pentest Tools Download
  83. Tools 4 Hack
  84. Hacks And Tools
  85. How To Install Pentest Tools In Ubuntu
  86. Pentest Tools For Ubuntu
  87. Hacker Tools
  88. Hacker Tools 2020
  89. Hack Tools For Games
  90. Pentest Tools List
  91. Pentest Tools Online
  92. Hacker Hardware Tools
  93. Pentest Tools Nmap
  94. Pentest Tools Url Fuzzer
  95. Pentest Tools Github
  96. Pentest Tools Review
  97. Hack Tools For Pc
  98. How To Make Hacking Tools
  99. Hack Tools
  100. Beginner Hacker Tools
  101. Pentest Tools Apk
  102. Hack Tools Pc
  103. Hacker Tools Github
  104. Pentest Tools Review
  105. Hacker Tools Free
  106. Pentest Tools Linux
  107. Pentest Tools For Android
  108. Hacker
  109. Pentest Tools Download
  110. Hacker Hardware Tools
  111. Hacker Tools For Ios
  112. Hacking Tools For Pc
  113. Hacker Search Tools
  114. Wifi Hacker Tools For Windows
  115. Hacker Tools Windows
  116. Hacking Tools 2019
  117. Hacker Tools Software
  118. Hack Tools
  119. Black Hat Hacker Tools
  120. Hacker Tool Kit
  121. Hacking Tools 2020
  122. Hack Tools For Ubuntu
  123. Hacking Tools 2020
  124. Hack And Tools
  125. Pentest Tools Find Subdomains
  126. Hack Tools For Games
  127. World No 1 Hacker Software
  128. Pentest Box Tools Download
  129. Hack Tools For Windows
  130. Hacker Tools For Windows
  131. Hacking Tools
  132. Pentest Tools Online
  133. Hacker Tools Online
  134. Hacking Tools Mac
  135. Pentest Tools Tcp Port Scanner
  136. Hacking App
  137. Hackers Toolbox
  138. What Are Hacking Tools
  139. Growth Hacker Tools
  140. Hacking Tools Usb
  141. Pentest Tools Review
  142. Pentest Tools Subdomain
  143. Pentest Tools Apk
  144. Hacker Tools For Windows
  145. Install Pentest Tools Ubuntu
  146. Pentest Tools Open Source
  147. Pentest Tools For Android
  148. Best Hacking Tools 2019
  149. Pentest Tools Framework
  150. Pentest Tools Subdomain
  151. Hack Tools
  152. Pentest Tools Kali Linux
  153. Hacker Tools 2019

0 留言