Browsing articles in "Uncategorized"

Cookie Re-Use flaw in Amazon,Ebay,Linkedin,Office365 and other web service

Jul 17, 2013   //   by   //   Uncategorized  //  No Comments

 

“Ethical hacking professor Sam Bowne recently put a cookie re-use method to test on several major web services, finding that Office 365, Yahoo mail, Twitter, LinkedIn, Amazon, eBay, and WordPress all failed the security test. Both Amazon and eBay can be tied directly to your money via the method of payment you have on record. And, just for kicks, we tried it with Netflix. And it worked. Microsoft has apparently known that accounts can be hijacked since at least 2012 when The Hacker News reported the Hotmail and Outlook cookie-handling vulnerability, so Bowne was curious if Microsoft closed the hole or if stolen cookies could still be re-used. He claims he ‘easily reproduced it using Chrome and the Edit This Cookie extension.’”

Source:

http://samsclass.info/123/proj10/cookie-reuse.htm

http://www.networkworld.com/community/node/83383

About NOSEC

NOSEC has its roots in Web Application Security with core products are JSky, Pangolin, iiScan. They are best in class tools to identify and eliminate security vulnerabilities in your company’s web applications.

Pangolin 3.3 Injecte JSP Form

Nov 20, 2012   //   by   //   Uncategorized  //  No Comments

JavaServer Pages (JSP) is a technology that helps software developers create dynamically generated web pages based on HTML, XML, or other document types.
JSP pages are similar to PHP pages and ASP.NET Web Forms, in that all three add server-side code to an HTML page

Test Environment

OS

CentOS Linux Release 6.0(Final)

Web Server

Apach Tomcat 6.0.36
jdk1.5.0_06

Java Server Pages Version

Written by NOSEC Tech Team

Injecte Environment

OS

OS : Microsoft Windows XP Professional SP3

Pennetrate Test Tool

Pangolin 3.3

 

Injecte Demo

Download the video

http://www.nosec.org/wp-content/uploads/Pangolin3.3InjectJSPPostForm-EN.avi

Pangolin 3.3 Released

Nov 19, 2012   //   by   //   Uncategorized  //  No Comments

Pangolin 3.3 Released

===================================================================
RELEASE NOTE for Pangolin Professinal Edition 3.3(Nov 19 2012)
===================================================================
For product support and the latest release notes, please visit http://www.nosec.org/

Product Description:
====================
Pangolin is a SQL Injection Test Tool.

Features:
=========
* HTTPS support
* Pre-Login
* Proxy
* Specify any HTTP headers(User-agent, Cookie, Referer and so on)
* Bypass firewall setting
* Auto-analyzing keyword
* Detailed check options
* Injection-points management
* Injection Digger
* Data dumper
* Support Access,DB2,Informix,Microsoft SQL Server 2000,Microsoft SQL Server 2005,Microsoft SQL Server 2008,MySQL,Oracle,PostgreSQL,Sqlite3,Sybase.

New Feature
=========

Enhancements:
=============
Faster dumping data in Informix database.
Optimizing DB2,Sybase database injection in union mode.
Several major bugs fixed.
Please view the video about optimization

System Requirements:
====================
Hardware Requirements:
- Intel 800MHZ or AMD K7, Memory 128M

Software Requirements:
- Windows 2000
- Windows XP
- Windows Vista 32 bit
- Windows Vista 64 bit
- Windows 7 32bit
- Windows 7 64bit

Known Problems:
===============

Futher Info:
============

http://www.nosec.org/

Copyright 2012 NOSEC

What if My WordPress site hacked

Jun 23, 2012   //   by   //   Uncategorized  //  No Comments

Help I think I’ve been hacked

So you’ve carefully installed WordPress, you’ve made it look exactly how you like with a decent theme, you’ve maybe installed some fancy plugins and you’ve crafted some fine posts and Pages. In short, you’ve put a lot of time and effort into your site.

Then, one day, you load up your site in your browser, and find that it’s not there, or it redirects to a porn site, or your site is full of adverts for performance-enhancing drugs. What do you do?

Some steps to take

Stay calm.
You have to stay calm to be able to deal with this situation. The first step before you respond to any security incident is to calm yourself down to make sure you do not commit any mistakes. We are serious about it.
Scan your local machine.
Sometimes the malware was introduced through a compromised desktop system. Make sure you run a full anti-virus/malware scan on your local machine. Some viruses are good at detecting AV software and hiding from them. So maybe try a different one. This advice generally only applies to Windows systems.
Check with your hosting provider.
The hack may have affected more than just your site, especially if you are using shared hosting. It is worth checking with your hosting provider in case they are taking steps or need to. Your hosting provider might also be able to confirm if a hack is an actual hack or a loss of service, for example.
Change your passwords.
Change passwords for the blog users, your FTP and MySQL users.
Change your secret keys.
If they stole your password and are logged in to your blog, even if you change your password they will remain logged in. How? because their cookies are still valid. To disable them, you have to create a new set of secret keys. Visit the WordPress key generator to obtain a new random set of keys, then overwrite the values in your wp-config.php file with the new ones.
Take a backup of what you have left.
If your files and database are still there, consider backing them up so that you can investigate them later at leisure, or restore to them if your cleaning attempt fails. Be sure to label them as the hacked site backup, though…
Read some good blog posts on what to do.
Donncha wrote a good article on what to do if you suspect a hack, it is well worth reading through and acting on, as it goes into more depth than this page. You can also read How to clean your hacked install and Removing malware from a WordPress blog which explain in details some steps you might need to take.
Check your .htaccess file for hacks.
Hackers can use your .htaccess to redirect to malicious sites from your URL. Look in the base folder for your site, not just your blog’s folder. Hackers will try to hide their code at the bottom of the file, so scroll down. They may also change the permissions of the .htaccess file to stop newbies from editing the file. Change the permissions back to 644.
Consider deleting everything.
A sure way to remove hacks that currently exist, is to delete all the files from your web space, and clear out your WordPress database. Of course, if you do this, you would need backups to restore from, so …
Consider restoring a backup
If you restore from a known clean backup of your WordPress Database, and re-upload your backed up WordPress plugin and theme files through FTP or SFTP, that will ensure that all those bits are clean of malicious code are gone. At the very least …
Replace the core WordPress files with ones from a freshly downloaded zip.
Replacing all your core files will ensure that they are no longer left in a hacked state. If you didn’t already restore backup copies of your plugin and theme files, replace them too.
Upgrade!
Once you are clean, you should upgrade your WordPress installation to the latest software. Older versions are more prone to hacks than newer versions.
Change the passwords again!
Remember, you need to change the passwords for your site after making sure your site is clean. So if you only changed them when you discovered the hack, change them again now.
Secure your site.
Now that you have successfully recovered your site, secure it by implementing some (if not all) of the recommended security measures.
Do a post-mortem.
Once your site is secured, check your site logs to see if you can discover how the hack took place. Open source tools like OSSEC can analyze your logs and point to where/how the attack happened.
Keep regular backups.
Now that the nightmare is over, start keeping regular backups of your database and files. If this ever happens again, all you will need to do is restore from the last know clean backup and change your passwords and secret keys.

Resource

http://codex.wordpress.org/FAQ_My_site_was_hacked

Pangolin 3.2.6 Released

Apr 24, 2012   //   by   //   ReleaseNote, Uncategorized  //  No Comments

Pangolin 3.2.6 Released

===================================================================
RELEASE NOTE for Pangolin Professinal Edition 3.2.6(Apr 24 2012)
===================================================================
For product support and the latest release notes, please visit http://www.nosec.org/

Product Description:
====================
Pangolin is a SQL Injection Test Tool.

Features:
=========
* HTTPS support
* Pre-Login
* Proxy
* Specify any HTTP headers(User-agent, Cookie, Referer and so on)
* Bypass firewall setting
* Auto-analyzing keyword
* Detailed check options
* Injection-points management
* Injection Digger
* Data dumper
* Support Access,DB2,Informix,Microsoft SQL Server 2000,Microsoft SQL Server 2005,Microsoft SQL Server 2008,MySQL,Oracle,PostgreSQL,Sqlite3,Sybase.

New Feature
=========

Enhancements:
=============
Faster dumping data in MySQL database.
Optimizing MySQL database injection in union mode.
Several major bugs fixed.

System Requirements:
====================
Hardware Requirements:
- Intel 800MHZ or AMD K7, Memory 128M

Software Requirements:
- Windows 2000
- Windows XP
- Windows Vista 32 bit
- Windows Vista 64 bit
- Windows 7 32bit
- Windows 7 64bit

Known Problems:
===============
For Windows XP, Windows 2003 only. You will get error “Can’t find DWMAPI.DLL, Please, re-install this application”. Following us to resolve this issue:
1.     Please download dwmapi.dll from http://down3.nosec.org/dwmapi.dll. Save to Pangolin folder.
2.     Run pangolin.exe again.

Futher Info:
============

http://www.nosec.org/

Copyright 2011 NOSEC

NOSEC Pangolin Won HKISC Golden Prize

Jul 1, 2011   //   by   //   News, Uncategorized  //  No Comments
    HKISC was established in 2010, it is a social group combined by companies, of which focus on software development, marketing and technical services. Targeting “Internationalize,Communicate, Cooperate, Grow, Surmount”, make an effort to build up a service platform for international resources sharing.
    The association has setting a standard for the industry by using perspective plan, timely strategy, and unique measure. We sincerely invite you to join us, together, we can make a brilliant future. More info please access : http://en.hkisc.com
     

    Pangolin is a penetration testing, SQL Injection test tool on database security. It finds SQL Injection vulnerabilities.Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user”s specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.

    NOSEC Pangolin won International Software Association of Hong Kong(HKISC) Golden Prize.

    NOSEC Pangolin Won HKISC Golden Prize

    Software Association of Hong Kong Hong Kong International Software Contest guests had a group-photo taken

Labor Day Discount

Apr 28, 2011   //   by   //   News, Uncategorized  //  No Comments

 

Expired

Our distinguished customers,
Pangolin is on sale now for celebration of Labor Day.
This discount is available from Apr 30, 2011 to May 5, 2011.

  • Full 15 days trial,
  • 30 days money back guarantee!

Fast Action Bonus:
Risk free

Expired

Pangolin 3.2.5 Released

Apr 5, 2011   //   by   //   ReleaseNote, Uncategorized  //  No Comments

Pangolin 3.2.5 Released

===================================================================
RELEASE NOTE for Pangolin Professinal Edition 3.2.5(Apr 28 2010)
===================================================================
For product support and the latest release notes, please visit http://www.nosec.org/

Product Description:
====================
Pangolin is a SQL Injection Test Tool.

Features:
=========
* HTTPS support
* Pre-Login
* Proxy
* Specify any HTTP headers(User-agent, Cookie, Referer and so on)
* Bypass firewall setting
* Auto-analyzing keyword
* Detailed check options
* Injection-points management
* Injection Digger
* Data dumper
* Support Access,DB2,Informix,Microsoft SQL Server 2000,Microsoft SQL Server 2005,Microsoft SQL Server 2008,MySQL,Oracle,PostgreSQL,Sqlite3,Sybase.

New Feature
=========
Auto analyzing keywords before injecte with cookie.
Support manually select keywords.
Release “oracle_data.php” to customize “Remote Data URL” when injecte Oracle.

Enhancements:
=============
Several major bugs fixed.
Enhance ablitity to inject Infomix. Optimize parameter analysis to inject Infomix.

System Requirements:
====================
Hardware Requirements:
- Intel 800MHZ or AMD K7, Memory 128M

Software Requirements:
- Windows 2000
- Windows XP
- Windows Vista 32 bit
- Windows Vista 64 bit
- Windows 7 32bit
- Windows 7 64bit

Known Problems:
===============
For Windows XP, Windows 2003 only. You will get error “Can’t find DWMAPI.DLL, Please, re-install this application”. Following us to resolve this issue:
1.     Please download dwmapi.dll from http://down3.nosec.org/dwmapi.dll. Save to Pangolin folder.
2.     Run pangolin.exe again.

Futher Info:
============

http://www.nosec.org/

Copyright 2011 NOSEC

JSky 3.5.1 released

Feb 23, 2011   //   by   //   ReleaseNote, Uncategorized  //  No Comments
    Dear Our Valued Customer:

    JSky 3.5.1 released. As always, you’re encouraged to tell us what you think by clicking “Contact”.

    New Feature and improvement
    1. Add tens of new vulnerabilities definition.
    2. Enhanced SQL Injection ability.
    3. Add ability to process a special HTTP 404 redirection page.
    4. Add a new parameter to control scanning process when HTTP connection failed.
    5. Add new function report template editor.
    6. Enhanced HTML report.
    7. Support vulnerabilities sorting by URL type.

    Bug fixed:
    1. Fixed bug failed to display HTML info after scan a default page.
    2. Fixed bug when export report to Chinese directory.
    3. Fixed issue Max scan links.
    4. Fixed some other Bugs.

JSky 3.5.0 released

Jan 28, 2011   //   by   //   ReleaseNote, Uncategorized  //  No Comments

1. Fixed some bugs.

2. Add more configuration options.

3. Add more vulnerability database
Thanks for so many kind hearted friends. Please contact us if you have a good advice.

Best Regards

NOSEC

Pages:12»